
From fcorella@pomcor.com  Tue Mar  1 09:56:35 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A3A863A6A35 for <oauth@core3.amsl.com>; Tue,  1 Mar 2011 09:56:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.443
X-Spam-Level: 
X-Spam-Status: No, score=-2.443 tagged_above=-999 required=5 tests=[AWL=0.155,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l9KpnZIZZU5d for <oauth@core3.amsl.com>; Tue,  1 Mar 2011 09:56:32 -0800 (PST)
Received: from nm30-vm0.bullet.mail.ac4.yahoo.com (nm30-vm0.bullet.mail.ac4.yahoo.com [98.139.52.250]) by core3.amsl.com (Postfix) with SMTP id D551E3A6A1A for <oauth@ietf.org>; Tue,  1 Mar 2011 09:56:31 -0800 (PST)
Received: from [98.139.52.190] by nm30.bullet.mail.ac4.yahoo.com with NNFMP; 01 Mar 2011 17:57:32 -0000
Received: from [98.139.52.133] by tm3.bullet.mail.ac4.yahoo.com with NNFMP; 01 Mar 2011 17:57:32 -0000
Received: from [127.0.0.1] by omp1016.mail.ac4.yahoo.com with NNFMP; 01 Mar 2011 17:57:32 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 428013.27324.bm@omp1016.mail.ac4.yahoo.com
Received: (qmail 56303 invoked by uid 60001); 1 Mar 2011 17:57:32 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1299002252; bh=WeD7UqwPYKeLVfpBTqcs0hywpvvIkv1+hYpewM8iwAI=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=JgCIGgX2+caPrWq7LgqUmNyoGCxmaY1fwfk/kggWkeWv/mLByElNbGaZpgPKTJCQoocsARyMJYabOq2Qs40hfwJsdv/NkZ21Z8sMrK1w5ROcAi+Id3GMi9jEB0JruqszNoriBAmLmGK6KdgpnyGFiUvv8fu4dnIsHkM9JPhx7xY=
Message-ID: <315279.56286.qm@web55803.mail.re3.yahoo.com>
X-YMail-OSG: U_jPtRsVM1kLI_nHwV8n6YdK6i_Znn.eXOBEOo28TYgtvmL y7OfB70Wj2soAjXzT6AM3ZkG2neyRAAJi3OyOLOWdOpQ_n0Q9e9aSW8W96ye QygD_WWBJJh0514VlfcoivdVyGKNnOcyuS_MRazBjiQbsdITknyZ31yvvyy1 dALAql9QiFBmIVpsiSOOZdpAYI5th36nHbKzAf9ZIhBzgK3UOM1VmJz_qAe. 3e_FEWyvEn_eAXs16rZVLMFSJJu5qS3xkupE06IDGAyjpayH1OVval5wS_nz ABNZ5sU2lF0lEhHugVt.cjHmvPw.BNPuMHDkH08qt.ifDYdcT7LAbNbDTCod jDQ--
Received: from [67.91.91.101] by web55803.mail.re3.yahoo.com via HTTP; Tue, 01 Mar 2011 09:57:31 PST
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/11.4.20 YahooMailWebService/0.8.109.292656
Date: Tue, 1 Mar 2011 09:57:31 -0800 (PST)
From: Francisco Corella <fcorella@pomcor.com>
To: OAuth Mailing List <oauth@ietf.org>, James HManger <James.H.Manger@team.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E1127F4DAE9D@WSMSG3153V.srv.dir.telstra.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1561885316-1299002251=:56286"
Cc: "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Mar 2011 17:56:35 -0000

--0-1561885316-1299002251=:56286
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi James,

It would help if you would spell out an attack flow, step by step, and poin=
t out the practical consequences of the attack.

Thanks,

Francisco

--- On Tue, 3/1/11, Manger, James H <James.H.Manger@team.telstra.com> wrote=
:

From: Manger, James H <James.H.Manger@team.telstra.com>
Subject: RE: [OAUTH-WG] Indicating origin of OAuth credentials to combat lo=
gin CSRF
To: "fcorella@pomcor.com" <fcorella@pomcor.com>, "OAuth Mailing List" <oaut=
h@ietf.org>
Cc: "Karen P. Lewison" <kplewison@pomcor.com>
Date: Tuesday, March 1, 2011, 6:59 AM

=0A=0A =0A =0A=0A=0A=0A=0A> The attack is only possible if there are multip=
le independent authorization servers that don't trust each other. =0A =C2=
=A0 =0AAnd there are. Facebook, Twitter, Photos-are-us, Xyz=E2=80=A6 can op=
erate authorization servers; they are all independent; and don=E2=80=99t pa=
rticularly trust each other. The attack doesn=E2=80=99t require a single re=
source server to trust all these independent=0A authorization servers. =0A =
=C2=A0 =0A> By far the most widespread deployment of OAuth is for social lo=
gin, as in "log in with Facebook".=C2=A0 In that case the authorization ser=
ver is a Facebook endpoint, the resource servers are Facebook endpoints, an=
d the attack is not possible =0A =C2=A0 =0A =C2=A0 =0AYou are probably righ=
t that this attack is not possible against a client app offering a =E2=80=
=9Clogin with facebook=E2=80=9D button. Such a client is hardwired to work =
with a single service =E2=80=93 which is one (very limiting) way to avoid t=
hese attacks. =0A =C2=A0 =0AA client accepting login from any social networ=
k (even ones the client hasn=E2=80=99t heard of) could be susceptible this =
attack. The =E2=80=9Cother=E2=80=9D social network returns a token that it =
actually got from Facebook and gets the client app to use it at=0A Facebook=
. =0A =C2=A0 =0A =C2=A0 =0A-- =0AJames Manger =0A =C2=A0 =0A =C2=A0 =0A=0AF=
rom: Francisco Corella [mailto:fcorella@pomcor.com]=0A
=0ASent: Tuesday, 1 March 2011 4:17 PM
=0ATo: OAuth Mailing List; Manger, James H
=0ACc: Karen P. Lewison
=0ASubject: RE: [OAUTH-WG] Indicating origin of OAuth credentials to combat=
 login CSRF =0A=0A =C2=A0 =0A=0A=0A=0A=0AHi James,
=0A
=0AI think I got it now.=C2=A0 Thanks for explaining it so patiently.
=0A
=0AThe attack is only possible if there are multiple independent authorizat=
ion servers that don't trust each other.=C2=A0 But the OAuth specification =
talks about multiple resource servers but only one authorization server.=C2=
=A0 I think there is an implicit assumption that=0A the multiple resource s=
ervers will only accept tokens from the one authorization server.=C2=A0 By =
far the most widespread deployment of OAuth is for social login, as in "log=
 in with Facebook".=C2=A0 In that case the authorization server is a Facebo=
ok endpoint, the resource=0A servers are Facebook endpoints, and the attack=
 is not possible.
=0A
=0AFrancisco
=0A
=0A--- On Tue, 3/1/11, Manger, James H <James.H.Manger@team.telstra.com> wr=
ote:
=0A
=0A =0A
=0AFrom: Manger, James H <James.H.Manger@team.telstra.com>
=0ASubject: RE: [OAUTH-WG] Indicating origin of OAuth credentials to combat=
 login CSRF
=0ATo: "fcorella@pomcor.com" <fcorella@pomcor.com>, "OAuth Mailing List" <o=
auth@ietf.org>
=0ACc: "Karen P. Lewison" <kplewison@pomcor.com>
=0ADate: Tuesday, March 1, 2011, 12:43 AM =0A=0A=0AFrancisco, =0A=C2=A0 =0A=
>> A client that follows HTTP redirects (or Link: header or any
=0A>> other variety of hypertext) might get directed to an 2nd
=0A>> service while still using the token from the 1st service.
=0A
=0A> But why would a legitimate authorization server redirect the
=0A> client to an attacker's server? =0A=C2=A0 =0AIt can happen the other w=
ay around. The 1st service acts maliciously, forwarding a token that was ac=
tually obtained from the 2nd service. The client then uses=0A that token to=
 make requests to the 2nd service =E2=80=93 because it thinks it is part of=
 the 1st service. =0A=C2=A0 =0AThe core issue is that a client gets a opaqu=
e token from one service and will use it to access other resources. The tok=
en is opaque to the client: =0A1.=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 The c=
lient cannot check that the token was originally issued by this service (as=
 opposed to this service forwarding a token from elsewhere); =0A2.=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 The client cannot check that the token was mean=
t for itself (as opposed to being forwarded from another client); =0A3.=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 The client isn=E2=80=99t told by the toke=
n issuer where it should & shouldn=E2=80=99t be used (ie the boundary of th=
e services); =0A4.=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 The client isn=E2=80=
=99t told by a resource server which sources of tokens are legitimate. =0A=
=C2=A0 =0AOne way to avoid some of these issues is to hardwire clients to a=
 specific service =E2=80=93 which is very limiting. =0AAnother way is to ha=
ve a standard token format =E2=80=93 which is limiting, and a big burden on=
 clients. =0AA better way is to accept points 1 & 2; address 3 by listing r=
esource sites in token responses; and address 4 obliquely by listing the au=
thorization server in the =E2=80=9COrigin=E2=80=9D HTTP request=0A header. =
Then it doesn=E2=80=99t matter if a client unwittingly connects with an att=
acker=E2=80=99s service (just as it shouldn=E2=80=99t matter to a legitimat=
e web site if their web browser clients unwittingly visit malicious or comp=
romised web sites). =0A=C2=A0 =0A-- =0AJames Manger =0A=0A=0A=0A=0A=0A=0A =
=C2=A0 =0A=0A =0A
--0-1561885316-1299002251=:56286
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">Hi James,<br><br>It would help if you would s=
pell out an attack flow, step by step, and point out the practical conseque=
nces of the attack.<br><br>Thanks,<br><br>Francisco<br><br>--- On <b>Tue, 3=
/1/11, Manger, James H <i>&lt;James.H.Manger@team.telstra.com&gt;</i></b> w=
rote:<br><blockquote style=3D"border-left: 2px solid rgb(16, 16, 255); marg=
in-left: 5px; padding-left: 5px;"><br>From: Manger, James H &lt;James.H.Man=
ger@team.telstra.com&gt;<br>Subject: RE: [OAUTH-WG] Indicating origin of OA=
uth credentials to combat login CSRF<br>To: "fcorella@pomcor.com" &lt;fcore=
lla@pomcor.com&gt;, "OAuth Mailing List" &lt;oauth@ietf.org&gt;<br>Cc: "Kar=
en P. Lewison" &lt;kplewison@pomcor.com&gt;<br>Date: Tuesday, March 1, 2011=
, 6:59 AM<br><br><div id=3D"yiv936749894">=0A=0A =0A =0A<style>=0A<!--=0A#y=
iv936749894  =0A _filtered #yiv936749894 {font-family:Calibri;=0Apanose-1:2=
 15 5 2 2 2 4 3 2 4;}=0A _filtered #yiv936749894 {font-family:Tahoma;=0Apan=
ose-1:2 11 6 4 3 5 4 4 2 4;}=0A#yiv936749894  =0A#yiv936749894 p.yiv9367498=
94MsoNormal, #yiv936749894 li.yiv936749894MsoNormal, #yiv936749894 div.yiv9=
36749894MsoNormal=0A=09{margin:0cm;=0Amargin-bottom:.0001pt;=0Afont-size:12=
.0pt;=0Afont-family:"serif";}=0A#yiv936749894 a:link, #yiv936749894 span.yi=
v936749894MsoHyperlink=0A=09{=0Acolor:blue;=0Atext-decoration:underline;}=
=0A#yiv936749894 a:visited, #yiv936749894 span.yiv936749894MsoHyperlinkFoll=
owed=0A=09{=0Acolor:purple;=0Atext-decoration:underline;}=0A#yiv936749894 p=
.yiv936749894MsoListParagraph, #yiv936749894 li.yiv936749894MsoListParagrap=
h, #yiv936749894 div.yiv936749894MsoListParagraph=0A=09{=0Amargin-top:0cm;=
=0Amargin-right:0cm;=0Amargin-bottom:0cm;=0Amargin-left:36.0pt;=0Amargin-bo=
ttom:.0001pt;=0Afont-size:12.0pt;=0Afont-family:"serif";}=0A#yiv936749894 p=
.yiv936749894msolistparagraph, #yiv936749894 li.yiv936749894msolistparagrap=
h, #yiv936749894 div.yiv936749894msolistparagraph=0A=09{=0A=0Amargin-right:=
0cm;=0A=0Amargin-left:0cm;=0Afont-size:12.0pt;=0Afont-family:"serif";}=0A#y=
iv936749894 p.yiv936749894msonormal, #yiv936749894 li.yiv936749894msonormal=
, #yiv936749894 div.yiv936749894msonormal=0A=09{=0A=0Amargin-right:0cm;=0A=
=0Amargin-left:0cm;=0Afont-size:12.0pt;=0Afont-family:"serif";}=0A#yiv93674=
9894 span.yiv936749894msohyperlink=0A=09{}=0A#yiv936749894 span.yiv93674989=
4msohyperlinkfollowed=0A=09{}=0A#yiv936749894 span.yiv936749894emailstyle17=
=0A=09{}=0A#yiv936749894 p.yiv936749894msonormal1, #yiv936749894 li.yiv9367=
49894msonormal1, #yiv936749894 div.yiv936749894msonormal1=0A=09{=0Amargin:0=
cm;=0Amargin-bottom:.0001pt;=0Afont-size:12.0pt;=0Afont-family:"serif";}=0A=
#yiv936749894 span.yiv936749894msohyperlink1=0A=09{=0Acolor:blue;=0Atext-de=
coration:underline;}=0A#yiv936749894 span.yiv936749894msohyperlinkfollowed1=
=0A=09{=0Acolor:purple;=0Atext-decoration:underline;}=0A#yiv936749894 p.yiv=
936749894msolistparagraph1, #yiv936749894 li.yiv936749894msolistparagraph1,=
 #yiv936749894 div.yiv936749894msolistparagraph1=0A=09{=0Amargin-top:0cm;=
=0Amargin-right:0cm;=0Amargin-bottom:0cm;=0Amargin-left:36.0pt;=0Amargin-bo=
ttom:.0001pt;=0Afont-size:12.0pt;=0Afont-family:"serif";}=0A#yiv936749894 s=
pan.yiv936749894emailstyle171=0A=09{=0Afont-family:"sans-serif";=0Acolor:#1=
F497D;}=0A#yiv936749894 span.yiv936749894EmailStyle27=0A=09{=0Afont-family:=
"sans-serif";=0Acolor:#1F497D;}=0A#yiv936749894 .yiv936749894MsoChpDefault=
=0A=09{}=0A _filtered #yiv936749894 {=0Amargin:72.0pt 72.0pt 72.0pt 72.0pt;=
}=0A#yiv936749894 div.yiv936749894WordSection1=0A=09{}=0A-->=0A</style>=0A<=
div class=3D"yiv936749894WordSection1">=0A<p class=3D"yiv936749894MsoNormal=
">&gt; The attack is only possible if there are multiple independent author=
ization servers that don't trust each other.</p> =0A<p class=3D"yiv93674989=
4MsoNormal"> &nbsp;</p> =0A<p class=3D"yiv936749894MsoNormal">And there are=
. Facebook, Twitter, Photos-are-us, Xyz=E2=80=A6 can operate authorization =
servers; they are all independent; and don=E2=80=99t particularly trust eac=
h other. The attack doesn=E2=80=99t require a single resource server to tru=
st all these independent=0A authorization servers.</p> =0A<p class=3D"yiv93=
6749894MsoNormal"> &nbsp;</p> =0A<p class=3D"yiv936749894MsoNormal">&gt; By=
 far the most widespread deployment of OAuth is for social login, as in "lo=
g in with Facebook".&nbsp; In that case the authorization server is a Faceb=
ook endpoint, the resource servers are Facebook endpoints, and the attack i=
s not possible</p> =0A<p class=3D"yiv936749894MsoNormal"> &nbsp;</p> =0A<p =
class=3D"yiv936749894MsoNormal"> &nbsp;</p> =0A<p class=3D"yiv936749894MsoN=
ormal">You are probably right that this attack is not possible against a cl=
ient app offering a =E2=80=9Clogin with facebook=E2=80=9D button. Such a cl=
ient is hardwired to work with a single service =E2=80=93 which is one (ver=
y limiting) way to avoid these attacks.</p> =0A<p class=3D"yiv936749894MsoN=
ormal"> &nbsp;</p> =0A<p class=3D"yiv936749894MsoNormal">A client accepting=
 login from any social network (even ones the client hasn=E2=80=99t heard o=
f) could be susceptible this attack. The =E2=80=9Cother=E2=80=9D social net=
work returns a token that it actually got from Facebook and gets the client=
 app to use it at=0A Facebook.</p> =0A<p class=3D"yiv936749894MsoNormal"> &=
nbsp;</p> =0A<p class=3D"yiv936749894MsoNormal"><span style=3D"font-size: 1=
1pt; color: rgb(31, 73, 125);"> &nbsp;</span></p> =0A<p class=3D"yiv9367498=
94MsoNormal"><span style=3D"font-size: 11pt; color: rgb(31, 73, 125);">--</=
span></p> =0A<p class=3D"yiv936749894MsoNormal"><span style=3D"font-size: 1=
1pt; color: rgb(31, 73, 125);">James Manger</span></p> =0A<p class=3D"yiv93=
6749894MsoNormal"><span style=3D"font-size: 11pt; color: rgb(31, 73, 125);"=
> &nbsp;</span></p> =0A<p class=3D"yiv936749894MsoNormal"><span style=3D"fo=
nt-size: 11pt; color: rgb(31, 73, 125);"> &nbsp;</span></p> =0A<div style=
=3D"border-right: medium none; border-width: 1pt medium medium; border-styl=
e: solid none none; border-color: rgb(181, 196, 223) -moz-use-text-color -m=
oz-use-text-color; padding: 3pt 0cm 0cm;">=0A<p class=3D"yiv936749894MsoNor=
mal"><b><span style=3D"font-size: 10pt;" lang=3D"EN-US">From:</span></b><sp=
an style=3D"font-size: 10pt;" lang=3D"EN-US"> Francisco Corella [mailto:fco=
rella@pomcor.com]=0A<br>=0A<b>Sent:</b> Tuesday, 1 March 2011 4:17 PM<br>=
=0A<b>To:</b> OAuth Mailing List; Manger, James H<br>=0A<b>Cc:</b> Karen P.=
 Lewison<br>=0A<b>Subject:</b> RE: [OAUTH-WG] Indicating origin of OAuth cr=
edentials to combat login CSRF</span></p> =0A</div>=0A<p class=3D"yiv936749=
894MsoNormal"> &nbsp;</p> =0A<table class=3D"yiv936749894MsoNormalTable" bo=
rder=3D"0" cellpadding=3D"0" cellspacing=3D"0">=0A<tbody>=0A<tr>=0A<td styl=
e=3D"padding: 0cm;" valign=3D"top">=0A<p class=3D"yiv936749894MsoNormal">Hi=
 James,<br>=0A<br>=0AI think I got it now.&nbsp; Thanks for explaining it s=
o patiently.<br>=0A<br>=0AThe attack is only possible if there are multiple=
 independent authorization servers that don't trust each other.&nbsp; But t=
he OAuth specification talks about multiple resource servers but only one a=
uthorization server.&nbsp; I think there is an implicit assumption that=0A =
the multiple resource servers will only accept tokens from the one authoriz=
ation server.&nbsp; By far the most widespread deployment of OAuth is for s=
ocial login, as in "log in with Facebook".&nbsp; In that case the authoriza=
tion server is a Facebook endpoint, the resource=0A servers are Facebook en=
dpoints, and the attack is not possible.<br>=0A<br>=0AFrancisco<br>=0A<br>=
=0A--- On <b>Tue, 3/1/11, Manger, James H <i>&lt;James.H.Manger@team.telstr=
a.com&gt;</i></b> wrote:<br>=0A<br>=0A</p> =0A<p class=3D"yiv936749894MsoNo=
rmal" style=3D"margin-bottom: 12pt;"><br>=0AFrom: Manger, James H &lt;James=
.H.Manger@team.telstra.com&gt;<br>=0ASubject: RE: [OAUTH-WG] Indicating ori=
gin of OAuth credentials to combat login CSRF<br>=0ATo: "fcorella@pomcor.co=
m" &lt;fcorella@pomcor.com&gt;, "OAuth Mailing List" &lt;oauth@ietf.org&gt;=
<br>=0ACc: "Karen P. Lewison" &lt;kplewison@pomcor.com&gt;<br>=0ADate: Tues=
day, March 1, 2011, 12:43 AM</p> =0A<div id=3D"yiv936749894">=0A<div>=0A<p =
class=3D"yiv936749894msonormal">Francisco,</p> =0A<p class=3D"yiv936749894m=
sonormal">&nbsp;</p> =0A<p class=3D"yiv936749894msonormal" style=3D"margin-=
bottom: 12pt;">&gt;&gt; A client that follows HTTP redirects (or Link: head=
er or any<br>=0A&gt;&gt; other variety of hypertext) might get directed to =
an 2nd<br>=0A&gt;&gt; service while still using the token from the 1st serv=
ice.<br>=0A<br>=0A&gt; But why would a legitimate authorization server redi=
rect the<br>=0A&gt; client to an attacker's server?</p> =0A<p class=3D"yiv9=
36749894msonormal"><span style=3D"font-size: 11pt; color: rgb(31, 73, 125);=
">&nbsp;</span></p> =0A<p class=3D"yiv936749894msonormal"><span style=3D"fo=
nt-size: 11pt; color: rgb(31, 73, 125);">It can happen the other way around=
. The 1<sup>st</sup> service acts maliciously, forwarding a token that was =
actually obtained from the 2<sup>nd</sup> service. The client then uses=0A =
that token to make requests to the 2<sup>nd</sup> service =E2=80=93 because=
 it thinks it is part of the 1<sup>st</sup> service.</span></p> =0A<p class=
=3D"yiv936749894msonormal"><span style=3D"font-size: 11pt; color: rgb(31, 7=
3, 125);">&nbsp;</span></p> =0A<p class=3D"yiv936749894msonormal"><span sty=
le=3D"font-size: 11pt; color: rgb(31, 73, 125);">The core issue is that a c=
lient gets a opaque token from one service and will use it to access other =
resources. The token is opaque to the client:</span></p> =0A<p class=3D"yiv=
936749894msolistparagraph"><span style=3D"font-size: 11pt; color: rgb(31, 7=
3, 125);">1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The client cannot check th=
at the token was originally issued by this service (as opposed to this serv=
ice forwarding a token from elsewhere);</span></p> =0A<p class=3D"yiv936749=
894msolistparagraph"><span style=3D"font-size: 11pt; color: rgb(31, 73, 125=
);">2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The client cannot check that the=
 token was meant for itself (as opposed to being forwarded from another cli=
ent);</span></p> =0A<p class=3D"yiv936749894msolistparagraph"><span style=
=3D"font-size: 11pt; color: rgb(31, 73, 125);">3.&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; The client isn=E2=80=99t told by the token issuer where it shoul=
d &amp; shouldn=E2=80=99t be used (ie the boundary of the services);</span>=
</p> =0A<p class=3D"yiv936749894msolistparagraph"><span style=3D"font-size:=
 11pt; color: rgb(31, 73, 125);">4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The=
 client isn=E2=80=99t told by a resource server which sources of tokens are=
 legitimate.</span></p> =0A<p class=3D"yiv936749894msonormal"><span style=
=3D"font-size: 11pt; color: rgb(31, 73, 125);">&nbsp;</span></p> =0A<p clas=
s=3D"yiv936749894msonormal"><span style=3D"font-size: 11pt; color: rgb(31, =
73, 125);">One way to avoid some of these issues is to hardwire clients to =
a specific service =E2=80=93 which is very limiting.</span></p> =0A<p class=
=3D"yiv936749894msonormal"><span style=3D"font-size: 11pt; color: rgb(31, 7=
3, 125);">Another way is to have a standard token format =E2=80=93 which is=
 limiting, and a big burden on clients.</span></p> =0A<p class=3D"yiv936749=
894msonormal"><span style=3D"font-size: 11pt; color: rgb(31, 73, 125);">A b=
etter way is to accept points 1 &amp; 2; address 3 by listing resource site=
s in token responses; and address 4 obliquely by listing the authorization =
server in the =E2=80=9COrigin=E2=80=9D HTTP request=0A header. Then it does=
n=E2=80=99t matter if a client unwittingly connects with an attacker=E2=80=
=99s service (just as it shouldn=E2=80=99t matter to a legitimate web site =
if their web browser clients unwittingly visit malicious or compromised web=
 sites).</span></p> =0A<p class=3D"yiv936749894msonormal"><span style=3D"fo=
nt-size: 11pt; color: rgb(31, 73, 125);">&nbsp;</span></p> =0A<p class=3D"y=
iv936749894msonormal"><span style=3D"font-size: 11pt; color: rgb(31, 73, 12=
5);">--</span></p> =0A<p class=3D"yiv936749894msonormal"><span style=3D"fon=
t-size: 11pt; color: rgb(31, 73, 125);">James Manger</span></p> =0A</div>=
=0A</div>=0A</td>=0A</tr>=0A</tbody>=0A</table>=0A<p class=3D"yiv936749894M=
soNormal"><span style=3D"font-size: 10pt;"> &nbsp;</span></p> =0A</div>=0A =
=0A</div></blockquote></td></tr></table>
--0-1561885316-1299002251=:56286--

From torsten@lodderstedt.net  Tue Mar  1 12:01:14 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5383C3A6A2D; Tue,  1 Mar 2011 12:01:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.206
X-Spam-Level: 
X-Spam-Status: No, score=-2.206 tagged_above=-999 required=5 tests=[AWL=0.043,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OTUKeMKa2M8j; Tue,  1 Mar 2011 12:01:13 -0800 (PST)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.94]) by core3.amsl.com (Postfix) with ESMTP id 989D03A6AA9; Tue,  1 Mar 2011 12:01:12 -0800 (PST)
Received: from [79.253.34.196] (helo=[192.168.71.49]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1PuVlt-00059l-Iz; Tue, 01 Mar 2011 21:02:13 +0100
Message-ID: <4D6D50C5.4040703@lodderstedt.net>
Date: Tue, 01 Mar 2011 21:02:13 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Marius Scurtescu <mscurtescu@google.com>
References: <90C41DD21FB7C64BB94121FBBC2E723445A8D6254D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723445A91D3EE9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTimjWkO8o+z+P=AKpyYkSjTh6oS7uM9N0JwR_vR6@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723445A91D3F44@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTi=tvwsR=_EhPRkYEwC+ERwRCNN2aAWDqRDvwx8B@mail.gmail.com> <FFDFD7371D517847AD71FBB08F9A315638493F514F@SP2-EX07VS06.ds.corp.yahoo.com> <AANLkTimxhoK1vt8HwSF9dvu4Z5xjqrLLb2SULj9pp=9b@mail.gmail.com> <AANLkTi=DtgpWNyEKBg=0GhOWuqSvzF5q0SJQgfZNRm8M@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723445A91D3F9A@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTindJ3oGpggvZ7jRJ4TRhTRomyZG+DwLOfbHD2kq@mail.gmail.com> <OFEFAF96E1.1837BBD4-ON8025783B.0040108E-8025783B.0040FF69@ie.ibm.com> <AANLkTi=PnOmyaMnNrGgPnOO_wtF8b_=v99wiR5ospHLH@mail.gmail.com> <4D68F471.3090204@lodderstedt.net> <4D6C0289.3030300@alcatel-lucent.com> <AANLkTi=GK2Lrb_snOenhiCPxdqL85VHqLyp4Y1_aCCdp@mail.gmail.com>
In-Reply-To: <AANLkTi=GK2Lrb_snOenhiCPxdqL85VHqLyp4Y1_aCCdp@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Mar 2011 20:01:14 -0000

Am 28.02.2011 23:58, schrieb Marius Scurtescu:
> On Mon, Feb 28, 2011 at 12:16 PM, Igor Faynberg
> <igor.faynberg@alcatel-lucent.com>  wrote:
>> +1
>>
>> Igor
>>
>> Torsten Lodderstedt wrote:
>>> ...
>>>
>>> I'm in favour to add the refresh token parameter to the implicit grant
>>> flow as it would make it more useable for native apps.
> I think it is much safer to go with refresh tokens only sent
> indirectly through an authorization code swap.
>

why is it _much_ safer? The only threat elimimated by this approach is a 
token leak via browser cache. On the other hand, the authorization code 
flow has to be protected from session fixation and guessing attacks, 
threats which are not applicable to the implicit grant flow.

It seams to be acceptable to issue access tokens with the implicit grant 
but not refresh tokens. Why? Because we assume access tokens have a much 
sorter lifetime than refresh tokens? This is not specified by the draft! 
So anyone could issue access tokens with infinite lifetime via the 
implicit grant and claim full OAuth 2.0 compliance.

> Implicit grant with refresh token also has no client secret swap and
> makes things worse by passing the refresh token through the browser.

What do you think is the value of having a client secret for a native app?

As pointed out in my previous posting, refresh tokens can be invalidated 
during every refresh request. So the impact can be reduced to that of an 
access token leak (which seams to be acceptable).

regards,
Torsten.

> Marius

From phil.hunt@oracle.com  Tue Mar  1 12:33:25 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CDBE03A6AA8 for <oauth@core3.amsl.com>; Tue,  1 Mar 2011 12:33:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.491
X-Spam-Level: 
X-Spam-Status: No, score=-6.491 tagged_above=-999 required=5 tests=[AWL=0.107,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fgo1Nac8zMeU for <oauth@core3.amsl.com>; Tue,  1 Mar 2011 12:33:25 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 571F93A69F9 for <oauth@ietf.org>; Tue,  1 Mar 2011 12:33:08 -0800 (PST)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p21KYABg019665 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <oauth@ietf.org>; Tue, 1 Mar 2011 20:34:12 GMT
Received: from acsmt355.oracle.com (acsmt355.oracle.com [141.146.40.155]) by rcsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p21KYAuH031850 for <oauth@ietf.org>; Tue, 1 Mar 2011 20:34:10 GMT
Received: from abhmt008.oracle.com by acsmt355.oracle.com with ESMTP id 1048801751299011641; Tue, 01 Mar 2011 12:34:01 -0800
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 01 Mar 2011 12:34:00 -0800
From: Phil Hunt <phil.hunt@oracle.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-17-729375642
Date: Tue, 1 Mar 2011 12:33:59 -0800
References: <20110301202907.67B403A6A8C@core3.amsl.com>
To: OAuth WG <oauth@ietf.org>
Message-Id: <98237282-4E57-4CD7-AAA1-24373943CDE2@oracle.com>
Mime-Version: 1.0 (Apple Message framework v1082)
X-Mailer: Apple Mail (2.1082)
X-Source-IP: acsmt355.oracle.com [141.146.40.155]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090206.4D6D5842.0144,ss=1,fgs=0
Subject: [OAUTH-WG] Fwd: New Version Notification for draft-hunt-oauth-chain-00
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Mar 2011 20:33:25 -0000

--Apple-Mail-17-729375642
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

After talking to some folks about OAuth protected services being able to =
connect to other REST based OAuth protected services, it occurred to me =
that some form of "chaining" is required to support scenarios that are =
essentially message buses.  The document specifies a new grant type =
which enables an OAuth client that has an oauth_token from its client, =
to request a new access token for another oauth protected server (which =
may or may not be in another OAuth "domain").

Your feedback and contributions greatly appreciated.

Phil
phil.hunt@oracle.com




Begin forwarded message:

> From: IETF I-D Submission Tool <idsubmission@ietf.org>
> Date: March 1, 2011 12:29:07 PM PST
> To: phil.hunt@yahoo.com
> Subject: New Version Notification for draft-hunt-oauth-chain-00=20
>=20
>=20
> A new version of I-D, draft-hunt-oauth-chain-00.txt has been =
successfully submitted by Phil Hunt and posted to the IETF repository.
>=20
> Filename:	 draft-hunt-oauth-chain
> Revision:	 00
> Title:		 Chain Grant Type for OAuth2
> Creation_date:	 2011-03-01
> WG ID:		 Independent Submission
> Number_of_pages: 10
>=20
> Abstract:
> This specification defines a method by which an OAuth protected
> service, can use a received oauth token from its client, to in turn,
> act as a client and access another OAuth protected service in a
> 'chained' profile.
>=20
>=20
>=20
> The IETF Secretariat.
>=20
>=20


--Apple-Mail-17-729375642
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div>After talking to some folks about OAuth protected services being =
able to connect to other REST based OAuth protected services, it =
occurred to me that some form of "chaining" is required to support =
scenarios that are essentially message buses. &nbsp;The document =
specifies a new grant type which enables an OAuth client that has an =
oauth_token from its client, to request a new access token for another =
oauth protected server (which may or may not be in another OAuth =
"domain").</div><div><br></div><div>Your feedback and contributions =
greatly appreciated.</div><div><br></div><div>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>

<div><br><div>Begin forwarded message:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;"><span style=3D"font-family:'Helvetica'; =
font-size:medium; color:rgba(0, 0, 0, 1);"><b>From: </b></span><span =
style=3D"font-family:'Helvetica'; font-size:medium;">IETF I-D Submission =
Tool &lt;<a =
href=3D"mailto:idsubmission@ietf.org">idsubmission@ietf.org</a>&gt;<br></s=
pan></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px;"><span =
style=3D"font-family:'Helvetica'; font-size:medium; color:rgba(0, 0, 0, =
1);"><b>Date: </b></span><span style=3D"font-family:'Helvetica'; =
font-size:medium;">March 1, 2011 12:29:07 PM PST<br></span></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;"><span style=3D"font-family:'Helvetica'; =
font-size:medium; color:rgba(0, 0, 0, 1);"><b>To: </b></span><span =
style=3D"font-family:'Helvetica'; font-size:medium;"><a =
href=3D"mailto:phil.hunt@yahoo.com">phil.hunt@yahoo.com</a><br></span></di=
v><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;"><span style=3D"font-family:'Helvetica'; =
font-size:medium; color:rgba(0, 0, 0, 1);"><b>Subject: </b></span><span =
style=3D"font-family:'Helvetica'; font-size:medium;"><b>New Version =
Notification for draft-hunt-oauth-chain-00 =
</b><br></span></div><br><div><br>A new version of I-D, =
draft-hunt-oauth-chain-00.txt has been successfully submitted by Phil =
Hunt and posted to the IETF repository.<br><br>Filename:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span> =
draft-hunt-oauth-chain<br>Revision:<span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span> 00<br>Title:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span> Chain =
Grant Type for OAuth2<br>Creation_date:<span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span> 2011-03-01<br>WG ID:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span> =
Independent Submission<br>Number_of_pages: 10<br><br>Abstract:<br>This =
specification defines a method by which an OAuth protected<br>service, =
can use a received oauth token from its client, to in turn,<br>act as a =
client and access another OAuth protected service in a<br>'chained' =
profile.<br><br><br><br>The IETF =
Secretariat.<br><br><br></div></blockquote></div><br></body></html>=

--Apple-Mail-17-729375642--

From phil.hunt@oracle.com  Tue Mar  1 16:23:49 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A57D63A6A21 for <oauth@core3.amsl.com>; Tue,  1 Mar 2011 16:23:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.499
X-Spam-Level: 
X-Spam-Status: No, score=-6.499 tagged_above=-999 required=5 tests=[AWL=0.099,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q54dEccA+SIC for <oauth@core3.amsl.com>; Tue,  1 Mar 2011 16:23:48 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 569273A6C10 for <oauth@ietf.org>; Tue,  1 Mar 2011 16:23:13 -0800 (PST)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p220OFoB017059 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <oauth@ietf.org>; Wed, 2 Mar 2011 00:24:17 GMT
Received: from acsmt353.oracle.com (acsmt353.oracle.com [141.146.40.153]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2209xtE011287 for <oauth@ietf.org>; Wed, 2 Mar 2011 00:24:15 GMT
Received: from abhmt002.oracle.com by acsmt353.oracle.com with ESMTP id 1099530181299025447; Tue, 01 Mar 2011 16:24:07 -0800
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 01 Mar 2011 16:24:06 -0800
From: Phil Hunt <phil.hunt@oracle.com>
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: multipart/alternative; boundary=Apple-Mail-25-743181563
Date: Tue, 1 Mar 2011 16:24:04 -0800
In-Reply-To: <98237282-4E57-4CD7-AAA1-24373943CDE2@oracle.com>
To: OAuth WG <oauth@ietf.org>
References: <20110301202907.67B403A6A8C@core3.amsl.com> <98237282-4E57-4CD7-AAA1-24373943CDE2@oracle.com>
Message-Id: <4FE8C786-00C9-478C-8210-B030A559264C@oracle.com>
X-Mailer: Apple Mail (2.1082)
X-Source-IP: acsmt353.oracle.com [141.146.40.153]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090207.4D6D8E2F.0194,ss=1,fgs=0
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-hunt-oauth-chain-00
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2011 00:23:49 -0000

--Apple-Mail-25-743181563
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

For those interested in the chain grant proposal, I have posted more =
details on my blog:=20
  =
http://independentidentity.blogspot.com/2011/03/oauth-new-chain-grant-type=
.html

Phil
phil.hunt@oracle.com




On 2011-03-01, at 12:33 PM, Phil Hunt wrote:

> After talking to some folks about OAuth protected services being able =
to connect to other REST based OAuth protected services, it occurred to =
me that some form of "chaining" is required to support scenarios that =
are essentially message buses.  The document specifies a new grant type =
which enables an OAuth client that has an oauth_token from its client, =
to request a new access token for another oauth protected server (which =
may or may not be in another OAuth "domain").
>=20
> Your feedback and contributions greatly appreciated.
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> Begin forwarded message:
>=20
>> From: IETF I-D Submission Tool <idsubmission@ietf.org>
>> Date: March 1, 2011 12:29:07 PM PST
>> To: phil.hunt@yahoo.com
>> Subject: New Version Notification for draft-hunt-oauth-chain-00=20
>>=20
>>=20
>> A new version of I-D, draft-hunt-oauth-chain-00.txt has been =
successfully submitted by Phil Hunt and posted to the IETF repository.
>>=20
>> Filename:	 draft-hunt-oauth-chain
>> Revision:	 00
>> Title:		 Chain Grant Type for OAuth2
>> Creation_date:	 2011-03-01
>> WG ID:		 Independent Submission
>> Number_of_pages: 10
>>=20
>> Abstract:
>> This specification defines a method by which an OAuth protected
>> service, can use a received oauth token from its client, to in turn,
>> act as a client and access another OAuth protected service in a
>> 'chained' profile.
>>=20
>>=20
>>=20
>> The IETF Secretariat.
>>=20
>>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail-25-743181563
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">For =
those interested in the chain grant proposal, I have posted more details =
on my blog:&nbsp;<div>&nbsp;&nbsp;<a =
href=3D"http://independentidentity.blogspot.com/2011/03/oauth-new-chain-gr=
ant-type.html">http://independentidentity.blogspot.com/2011/03/oauth-new-c=
hain-grant-type.html</a><div><div><br><div>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-01, at 12:33 PM, Phil Hunt wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; "><div>After talking to some =
folks about OAuth protected services being able to connect to other REST =
based OAuth protected services, it occurred to me that some form of =
"chaining" is required to support scenarios that are essentially message =
buses. &nbsp;The document specifies a new grant type which enables an =
OAuth client that has an oauth_token from its client, to request a new =
access token for another oauth protected server (which may or may not be =
in another OAuth "domain").</div><div><br></div><div>Your feedback and =
contributions greatly appreciated.</div><div><br></div><div>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-size: medium; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; =
white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-size: =
medium; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>

<div><br><div>Begin forwarded message:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;"><span style=3D"font-family:'Helvetica'; =
font-size:medium; color:rgba(0, 0, 0, 1);"><b>From: </b></span><span =
style=3D"font-family:'Helvetica'; font-size:medium;">IETF I-D Submission =
Tool &lt;<a =
href=3D"mailto:idsubmission@ietf.org">idsubmission@ietf.org</a>&gt;<br></s=
pan></div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px;"><span =
style=3D"font-family:'Helvetica'; font-size:medium; color:rgba(0, 0, 0, =
1);"><b>Date: </b></span><span style=3D"font-family:'Helvetica'; =
font-size:medium;">March 1, 2011 12:29:07 PM PST<br></span></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;"><span style=3D"font-family:'Helvetica'; =
font-size:medium; color:rgba(0, 0, 0, 1);"><b>To: </b></span><span =
style=3D"font-family:'Helvetica'; font-size:medium;"><a =
href=3D"mailto:phil.hunt@yahoo.com">phil.hunt@yahoo.com</a><br></span></di=
v><div style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;"><span style=3D"font-family:'Helvetica'; =
font-size:medium; color:rgba(0, 0, 0, 1);"><b>Subject: </b></span><span =
style=3D"font-family:'Helvetica'; font-size:medium;"><b>New Version =
Notification for draft-hunt-oauth-chain-00 =
</b><br></span></div><br><div><br>A new version of I-D, =
draft-hunt-oauth-chain-00.txt has been successfully submitted by Phil =
Hunt and posted to the IETF repository.<br><br>Filename:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span> =
draft-hunt-oauth-chain<br>Revision:<span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span> 00<br>Title:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span> Chain =
Grant Type for OAuth2<br>Creation_date:<span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span> 2011-03-01<br>WG ID:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span> =
Independent Submission<br>Number_of_pages: 10<br><br>Abstract:<br>This =
specification defines a method by which an OAuth protected<br>service, =
can use a received oauth token from its client, to in turn,<br>act as a =
client and access another OAuth protected service in a<br>'chained' =
profile.<br><br><br><br>The IETF =
Secretariat.<br><br><br></div></blockquote></div><br></div>_______________=
________________________________<br>OAuth mailing list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></div></div></body>=
</html>=

--Apple-Mail-25-743181563--

From hannes.tschofenig@gmx.net  Tue Mar  1 23:31:08 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BCF3A3A6A49 for <oauth@core3.amsl.com>; Tue,  1 Mar 2011 23:31:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3UmZu+1yPOZG for <oauth@core3.amsl.com>; Tue,  1 Mar 2011 23:31:07 -0800 (PST)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.23]) by core3.amsl.com (Postfix) with SMTP id C9F443A6934 for <oauth@ietf.org>; Tue,  1 Mar 2011 23:31:06 -0800 (PST)
Received: (qmail invoked by alias); 02 Mar 2011 07:32:10 -0000
Received: from unknown (EHLO [10.255.138.199]) [192.100.123.77] by mail.gmx.net (mp049) with SMTP; 02 Mar 2011 08:32:10 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX19kFdxAITBkiTZZmUvshcIG3YcHU0DAA7gbng9yb3 BOcO5SzSWqLw6I
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Wed, 2 Mar 2011 09:32:05 +0200
Message-Id: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
To: OAuth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1082)
X-Mailer: Apple Mail (2.1082)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2011 07:31:08 -0000

This is a Last Call for comments on=20

http://www.ietf.org/id/draft-ietf-oauth-v2-13.txt

Please have your comments in no later than March 16.

Do remember to send a note in if you have read the document and have no=20=

other comments other than "its ready to go" - we need those as much as =
we need "I found a problem".

Thanks!
Hannes & Blaine


From hannes.tschofenig@gmx.net  Wed Mar  2 00:30:33 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7B3CB3A6A08 for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 00:30:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pWorpS2PgUMI for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 00:30:32 -0800 (PST)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.23]) by core3.amsl.com (Postfix) with SMTP id 3A5623A6A32 for <oauth@ietf.org>; Wed,  2 Mar 2011 00:30:31 -0800 (PST)
Received: (qmail invoked by alias); 02 Mar 2011 08:31:35 -0000
Received: from unknown (EHLO [10.255.138.199]) [192.100.123.77] by mail.gmx.net (mp055) with SMTP; 02 Mar 2011 09:31:35 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX19hmPUpshRh4NSiQcW6oD0w9bKkUAR1jRZ4QIC5DJ kwk73uPk4grij3
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Wed, 2 Mar 2011 10:31:33 +0200
Message-Id: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net>
To: OAuth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1082)
X-Mailer: Apple Mail (2.1082)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2011 08:30:33 -0000

This is a Last Call for comments on=20

http://www.ietf.org/id/draft-ietf-oauth-v2-bearer-03.txt

Please have your comments in no later than March 25 (extended deadline =
because of the ongoing OAuth base specification WGLC).

Do remember to send a note in if you have read the document and have no=20=

other comments other than "its ready to go" - we need those as much as =
we need "I found a problem".

Thanks!
Hannes & Blaine

From bcampbell@pingidentity.com  Wed Mar  2 06:04:41 2011
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7D6A03A67E3 for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 06:04:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.977
X-Spam-Level: 
X-Spam-Status: No, score=-2.977 tagged_above=-999 required=5 tests=[AWL=-1.000, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X0mjb9Q7AwFI for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 06:04:40 -0800 (PST)
Received: from na3sys009aog115.obsmtp.com (na3sys009aog115.obsmtp.com [74.125.149.238]) by core3.amsl.com (Postfix) with ESMTP id 3FAB13A67B7 for <oauth@ietf.org>; Wed,  2 Mar 2011 06:04:39 -0800 (PST)
Received: from source ([209.85.161.51]) (using TLSv1) by na3sys009aob115.postini.com ([74.125.148.12]) with SMTP ID DSNKTW5OuJByMlgctMsqONENjqHiMLXGhGQF@postini.com; Wed, 02 Mar 2011 06:05:46 PST
Received: by fxm11 with SMTP id 11so1604fxm.24 for <oauth@ietf.org>; Wed, 02 Mar 2011 06:05:43 -0800 (PST)
Received: by 10.223.74.73 with SMTP id t9mr104410faj.16.1299074743257; Wed, 02 Mar 2011 06:05:43 -0800 (PST)
MIME-Version: 1.0
Received: by 10.223.113.83 with HTTP; Wed, 2 Mar 2011 06:05:12 -0800 (PST)
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Wed, 2 Mar 2011 07:05:12 -0700
Message-ID: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: OAuth WG <oauth@ietf.org>
Subject: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2011 14:04:41 -0000

I propose that the "or native applications" text be dropped from the
first paragraph in section 4.2 Implicit Grant  [1].

There is clearly some disagreement about what is most appropriate for
mobile/native applications and many, including myself, don't feel that
the implicit grant works well to support them (due to the lack of a
refresh token and need to repeat the authorization steps).  I
understand that the text in section 4 is non-normative, however, I
feel that the mention of native apps in 4.2 biases thinking in a
particular way (it's already led to one lengthy internal discussion
that I'd rather not have again and again).  I believe it'd be more
appropriate for the draft to remain silent on how native apps should
acquire tokens and leave it up to implementations/deployments to
decide (or an extension draft as Marius has proposed).

The "or native applications" text in is also somewhat inconsistent
with the text in the following sentence that talks about the
authentication of the client being based on the user-agent's
same-origin policy.

Removing those three words is a small change but one that I feel would
be beneficial on a number of fronts.

Thanks,
Brian


[1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2

On Wed, Feb 16, 2011 at 2:57 PM, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
> Feel free to propose alternative preamble for the implicit and authorization code sections, describing the characteristics of what they are good for. It should fit in a single paragraph. Such a proposal would fit right in with last call feedback to -13.
>
> EHL
>
>> -----Original Message-----
>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
>> Sent: Wednesday, February 16, 2011 1:39 PM
>> To: Eran Hammer-Lahav
>> Cc: Brian Campbell; OAuth WG
>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
>>
>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
>> <eran@hueniverse.com> wrote:
>> > The reason why we don't return a refresh token in the implicit grant is
>> exactly because there is no client authentication...
>>
>> Not sure that's the main reason. AFAIK it is because the response is sent
>> through the user-agent and it could leak.
>>
>>
>> > These are all well-balanced flows with specific security properties. If you
>> need something else, even if it is just a tweak, it must be considered a
>> different flow. That doesn't mean you need to register a new grant type, just
>> that you are dealing with different implementation details unique to your
>> server.
>>
>> The Authorization Code flow, with no client secret, is perfectly fine for Native
>> Apps IMO.
>>
>> Marius
>

From ietf@adambarth.com  Fri Feb 25 23:09:22 2011
Return-Path: <ietf@adambarth.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 694F53A691B; Fri, 25 Feb 2011 23:09:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.839
X-Spam-Level: 
X-Spam-Status: No, score=-2.839 tagged_above=-999 required=5 tests=[AWL=0.138,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6JxNyhCSLUAO; Fri, 25 Feb 2011 23:09:16 -0800 (PST)
Received: from mail-iw0-f172.google.com (mail-iw0-f172.google.com [209.85.214.172]) by core3.amsl.com (Postfix) with ESMTP id AABEB3A68A0; Fri, 25 Feb 2011 23:09:16 -0800 (PST)
Received: by iwl42 with SMTP id 42so1902795iwl.31 for <multiple recipients>; Fri, 25 Feb 2011 23:10:11 -0800 (PST)
Received: by 10.231.161.15 with SMTP id p15mr3530063ibx.104.1298704210675; Fri, 25 Feb 2011 23:10:10 -0800 (PST)
Received: from mail-iw0-f172.google.com (mail-iw0-f172.google.com [209.85.214.172]) by mx.google.com with ESMTPS id 8sm1627920iba.22.2011.02.25.23.10.09 (version=SSLv3 cipher=OTHER); Fri, 25 Feb 2011 23:10:09 -0800 (PST)
Received: by iwl42 with SMTP id 42so1902774iwl.31 for <multiple recipients>; Fri, 25 Feb 2011 23:10:09 -0800 (PST)
Received: by 10.231.160.80 with SMTP id m16mr3552715ibx.106.1298704209087; Fri, 25 Feb 2011 23:10:09 -0800 (PST)
MIME-Version: 1.0
Received: by 10.231.40.7 with HTTP; Fri, 25 Feb 2011 23:09:39 -0800 (PST)
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E1127DCD2142@WSMSG3153V.srv.dir.telstra.com>
References: <255B9BB34FB7D647A506DC292726F6E1127DCD2142@WSMSG3153V.srv.dir.telstra.com>
From: Adam Barth <ietf@adambarth.com>
Date: Fri, 25 Feb 2011 23:09:39 -0800
Message-ID: <AANLkTina+=5uV4V7DRfX6RsZUDU1j_Ag+Ruf2C9dPOW_@mail.gmail.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
X-Mailman-Approved-At: Wed, 02 Mar 2011 08:01:36 -0800
Cc: "websec@ietf.org" <websec@ietf.org>, OAuth Mailing List <oauth@ietf.org>
Subject: Re: [OAUTH-WG] [websec] Indicating origin of OAuth credentials to combat login CSRF
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Feb 2011 07:09:23 -0000

On Thu, Feb 24, 2011 at 4:08 PM, Manger, James H
<James.H.Manger@team.telstra.com> wrote:
> Q. Should an OAuth client app list the authorization server in the Origin
> header of requests to resource servers?

They are allowed to, but are not required to, by the Origin header
specification.  Whether they should or not is a question for the OAuth
working group to decide.

Adam


> In OAuth (delegation) flows a server dynamically issues credentials (such=
 as
> a bearer token) to a client app to use in subsequent HTTP requests to oth=
er
> servers. To combat login cross-site request forgery (CSRF) attacks [1]
> (where an attacker=92s server issues the attacker=92s credentials to a cl=
ient
> app to use on behalf of a victim at a legitimate server) the client app
> needs to indicate where the credentials came from. The Origin header [2]
> looks like the right place to indicate this.
>
>
>
> [For the OAuth list: The Origin HTTP request header =93indicates the orig=
in(s)
> that caused the user agent to issue the request=94
> [http://tools.ietf.org/html/draft-ietf-websec-origin-00#section-6.2].]
>
>
>
> [For the WebSec list: An OAuth credential from an authorization server is=
 a
> bit like a cookie, but not restricted to the same origin.]
>
>
>
>
>
> Example:
>
>
>
> =A0 Client to (malicious) authorization server: ->
>
> =A0 =A0=A0POST /token HTTP/1.1
>
> =A0 =A0=A0Host: login.example.com
>
> =A0 =A0=A0=85
>
> =A0 <-
>
> =A0 =A0=A0HTTP/1.1 200 OK
>
> =A0 =A0=A0=85
>
> =A0 =A0=A0{ "access_token": "SlAV32hkKG", =85}
>
>
>
> =A0 Client to resource server: ->
>
> =A0 =A0=A0POST /uploadData HTTP/1.1
>
> =A0 =A0=A0Host: api.exampledata.com
>
> =A0 =A0=A0Authorization: BEARER SlAV32hkKG
>
> =A0 =A0=A0Origin: https://login.example.com
>
> =A0=A0=A0 =85
>
>
>
>
>
> There can be other servers that contribute to a client app making a reque=
st.
> For instance, one server can redirect to another. A Origin request header
> can list multiple origins. The server will not be able to distinguish whi=
ch
> origin issued OAuth credentials from which issued a redirect etc. That mi=
ght
> not matter if a server has to trust all the values listed in the Origin
> header.
>
> Q. Is it the group=92s expectation that servers checking the Origin heade=
r
> will require all the listed origins to be trusted?
>
>
>
> [1] Robust Defenses for Cross Site Request Forgery,
> http://www.adambarth.com/papers/2008/barth-jackson-mitchell-b.pdf
>
> [2] The Web Origin Concept,
> http://tools.ietf.org/html/draft-ietf-websec-origin
>
> [3] Principles of the Same Origin Policy,
> http://tools.ietf.org/html/draft-abarth-principles-of-origin
>
>
>
> --
>
> James Manger
>
>
>
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec
>
>

From eran@hueniverse.com  Wed Mar  2 08:32:50 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B371B3A6831 for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 08:32:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.547
X-Spam-Level: 
X-Spam-Status: No, score=-2.547 tagged_above=-999 required=5 tests=[AWL=0.052,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 56D2x9M7FDHL for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 08:32:49 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 3D04E3A682C for <oauth@ietf.org>; Wed,  2 Mar 2011 08:32:49 -0800 (PST)
Received: (qmail 15806 invoked from network); 2 Mar 2011 16:33:54 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 2 Mar 2011 16:33:54 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Wed, 2 Mar 2011 09:33:47 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, OAuth WG <oauth@ietf.org>
Date: Wed, 2 Mar 2011 09:33:40 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
Thread-Index: AcvYtETztIMdYVRmR0yEWy35xSKtpQAPcMHA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F0C3D88@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net>
In-Reply-To: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2011 16:32:50 -0000

Last call comments on draft-ietf-oauth-v2-bearer-03:

Section 2.1:

- ABNF includes '1#auth-param', but no prose is provided about how new para=
meters may be defined. There is no reason for this scheme to be extensible,=
 given its designed simplicity and limitations. If more attributes are need=
ed in the future, a new scheme must be defined.

- RWS should be replaces with SP since the header has no other attributes (=
and should not have any). This will make parsing easier by mandating a sing=
le space (unless HTTPbis has other guidelines).

Section 2.4:

- Realm is a required attribute per RFC 2617. While discussions about this =
are on-going in HTTPbis (open issue), this document must comply with the cu=
rrent standard. If the WG feels strongly about it, it should engage the HTT=
Pbis working group and provide feedback.

- ABNF includes '( token "=3D" ( token / quoted-string ) )', but no prose i=
s provided about how new parameters may be defined. Retained this extensibi=
lity point must be justified with actual use cases.

Section 2.4.1:

- Why are the HTTP error code suggested and not required?

Section 4.1.1:

- There is no 'Additional Resource Request Parameters' in the template - re=
move.
- Missing 'Additional Token Endpoint Response Parameters: None'.

Section 4.2:

- The entire registry is ridiculous. Protected resource endpoints are compl=
etely within the authority of the resource provider. The fact that this doc=
ument defines the 'oauth_token' parameter which infringes on the provider's=
 namespace is bad enough. To suggest that this document has any authority o=
ver other parameters defined and used by the resource server is overreachin=
g. No single use cases has been suggested for this registry in over three y=
ears of OAuth work.

Section 4.2.2.2:

- There is no 'error' parameter for resource responses. It is not defined a=
nywhere in this specification or elsewhere. There is an 'error' attribute d=
efined for the WWW-Authenticate header, but so is 'error_description' and '=
error_uri'.  How exactly is this parameter added to the resource response i=
f not in the header? If it is in the header, there is no such location in t=
he registry (nor is header extensibility discussed see 2.4).


Section 4.3:

- This registry is unnecessary and adds no value here (namespace collision =
is unlikely in general, and unlikely to cause problems). No use cases where=
 suggested to justify it, and no additional error codes were proposed in ov=
er a year of discussions. Error codes were intentionally left non-extensibl=
e to increase interoperability. If addition color is needed for existing er=
ror codes, additional response parameters may be registered. Otherwise, if =
new error codes are needed, a new RFC must be published updating draft-ietf=
-oauth-v2.
- The only way to define such a registry is to bring it up as a comment for=
 draft-ietf-oauth-v2. Otherwise, it is limited to the Bearer token header o=
nly (and since this document is not extensible, not needed even here).


This document is not ready for publication.

EHL


> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Hannes Tschofenig
> Sent: Wednesday, March 02, 2011 12:32 AM
> To: OAuth WG
> Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
>=20
> This is a Last Call for comments on
>=20
> http://www.ietf.org/id/draft-ietf-oauth-v2-bearer-03.txt
>=20
> Please have your comments in no later than March 25 (extended deadline
> because of the ongoing OAuth base specification WGLC).
>=20
> Do remember to send a note in if you have read the document and have no
> other comments other than "its ready to go" - we need those as much as we
> need "I found a problem".
>=20
> Thanks!
> Hannes & Blaine
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From craig.heath@wacapps.net  Wed Mar  2 10:03:12 2011
Return-Path: <craig.heath@wacapps.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 437D83A683E for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 10:03:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fBiFUl0jKcpj for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 10:03:11 -0800 (PST)
Received: from out02.themessagecenter.com (out02.themessagecenter.com [208.113.96.229]) by core3.amsl.com (Postfix) with ESMTP id 69C403A683A for <oauth@ietf.org>; Wed,  2 Mar 2011 10:03:11 -0800 (PST)
Received: from [192.168.66.109] by out02.themessagecenter.com with ESMTP (Tumbleweed Email Firewall SMTP Relay); Wed, 02 Mar 2011 09:52:25 -0800
X-Server-Uuid: 385D78BC-A8BE-4780-80CD-A503E34C32DD
Received: from EX-CH-002-SFO.shared.themessagecenter.com (192.168.66.93) by EX-CH-004-SFO.shared.themessagecenter.com (192.168.66.111) with Microsoft SMTP Server (TLS) id 8.1.393.1; Wed, 2 Mar 2011 10:04:07 -0800
Received: from ex-be-016-sfo.shared.themessagecenter.com ( [192.168.66.102]) by EX-CH-002-SFO.shared.themessagecenter.com ( [64.151.95.180]) with mapi; Wed, 2 Mar 2011 10:04:07 -0800
From: "Craig Heath" <craig.heath@wacapps.net>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Wed, 2 Mar 2011 10:05:15 -0800
Thread-Topic: RFC5849 - Purpose of Temporary Credentials Shared Secret?
Thread-Index: AcvZAYG4U5dLvKGJQXyOocum691xEQ==
Message-ID: <4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C63@EX-BE-016-SFO.shared.themessagecenter.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
MIME-Version: 1.0
X-WSS-ID: 61705C533PS15352902-01-01
Content-Type: multipart/alternative; boundary=_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C63EXBE016SFOsha_
Subject: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secret?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2011 19:48:35 -0000

--_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C63EXBE016SFOsha_
Content-Type: text/plain;
 charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Hello!  Can some kind soul help me understand the purpose of the shared sec=
ret part of the Temporary Credentials in RFC5849?

- The client authenticates using the Cient Credentials, and gets the Tempor=
ary Credentials.
- The Resource Owner gives their authorization.
- The Temporary Credentials are then used in the Token Credentials Request.

The part that's puzzling me is the RFC says the client authenticates using =
*both* the Client Credentials and the Token Credentials in the Token Creden=
tials Request.  I could understand one or the other, but why both? (and inc=
identally, how can it provide both?)  Clearly the Token Credentials identif=
ier is needed, as it is part of the Token Credentials Request; it's only th=
e shared secret I'm wondering about (the "oauth_token_secret" part of the r=
eponse to the Temporary Credentials Request).

My best guess so far is that it is intended to allow for the case when the =
Client Credentials are not secret, but in that case why use the Client Cred=
entials at all in the Token Credential Request?

Thanks for any light shed on this!

- Craig Heath.

--_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C63EXBE016SFOsha_
Content-Type: text/html;
 charset=us-ascii
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-GB link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>Hello!&nbsp; Can=
 some kind soul help me understand the purpose of the shared secret part of=
 the Temporary Credentials in RFC5849?<o:p></o:p></p><p class=3DMsoNormal><=
o:p>&nbsp;</o:p></p><p class=3DMsoNormal>- The client authenticates using t=
he Cient Credentials, and gets the Temporary Credentials.<o:p></o:p></p><p =
class=3DMsoNormal>- The Resource Owner gives their authorization.<o:p></o:p=
></p><p class=3DMsoNormal>- The Temporary Credentials are then used in the =
Token Credentials Request.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</=
o:p></p><p class=3DMsoNormal>The part that's puzzling me is the RFC says th=
e client authenticates using *both* the Client Credentials and the Token Cr=
edentials in the Token Credentials Request.&nbsp; I could understand one or=
 the other, but why both? (and incidentally, how can it provide both?)&nbsp=
; Clearly the Token Credentials identifier is needed, as it is part of the =
Token Credentials Request; it's only the shared secret I'm wondering about =
(the &quot;oauth_token_secret&quot; part of the reponse to the Temporary Cr=
edentials Request).<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p=
><p class=3DMsoNormal>My best guess so far is that it is intended to allow =
for the case when the Client Credentials are not secret, but in that case w=
hy use the Client Credentials at all in the Token Credential Request?<o:p><=
/o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Tha=
nks for any light shed on this! <o:p></o:p></p><p class=3DMsoNormal><o:p>&n=
bsp;</o:p></p><p class=3DMsoNormal>- Craig Heath.<o:p></o:p></p></div></bod=
y></html>=

--_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C63EXBE016SFOsha_--


From craig.heath@wacapps.net  Wed Mar  2 11:51:26 2011
Return-Path: <craig.heath@wacapps.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 327CF3A6889 for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 11:51:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.458
X-Spam-Level: 
X-Spam-Status: No, score=-2.458 tagged_above=-999 required=5 tests=[AWL=0.140,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mdY09LYpZZGD for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 11:51:23 -0800 (PST)
Received: from out02.themessagecenter.com (out02.themessagecenter.com [208.113.96.229]) by core3.amsl.com (Postfix) with ESMTP id CC83F3A687E for <oauth@ietf.org>; Wed,  2 Mar 2011 11:51:23 -0800 (PST)
Received: from [192.168.66.92] by out02.themessagecenter.com with ESMTP (Tumbleweed Email Firewall SMTP Relay); Wed, 02 Mar 2011 11:40:37 -0800
X-Server-Uuid: 385D78BC-A8BE-4780-80CD-A503E34C32DD
Received: from EX-CH-002-SFO.shared.themessagecenter.com (192.168.66.89) by EX-CH-001-SFO.shared.themessagecenter.com (192.168.66.88) with Microsoft SMTP Server (TLS) id 8.1.393.1; Wed, 2 Mar 2011 11:52:18 -0800
Received: from ex-be-016-sfo.shared.themessagecenter.com ( [192.168.66.102]) by EX-CH-002-SFO.shared.themessagecenter.com ( [64.151.95.180]) with mapi; Wed, 2 Mar 2011 11:52:18 -0800
From: "Craig Heath" <craig.heath@wacapps.net>
To: "Craig Heath" <craig.heath@wacapps.net>, "oauth@ietf.org" <oauth@ietf.org>
Date: Wed, 2 Mar 2011 11:53:27 -0800
Thread-Topic: RFC5849 - Purpose of Temporary Credentials Shared Secret?
Thread-Index: AcvZAYG4U5dLvKGJQXyOocum691xEQAEbxrA
Message-ID: <4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C95@EX-BE-016-SFO.shared.themessagecenter.com>
References: <4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C63@EX-BE-016-SFO.shared.themessagecenter.com>
In-Reply-To: <4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C63@EX-BE-016-SFO.shared.themessagecenter.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
MIME-Version: 1.0
X-WSS-ID: 617042BF3PS15398640-01-01
Content-Type: multipart/alternative; boundary=_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C95EXBE016SFOsha_
Subject: Re: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secret?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2011 19:51:26 -0000

--_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C95EXBE016SFOsha_
Content-Type: text/plain;
 charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Oops, just noticed a typo in my previous message, I meant:

" The part that's puzzling me is the RFC says the client authenticates usin=
g *both* the Client Credentials and the _Temporary_ Credentials in the Toke=
n Credentials Request.  I could understand one or the other, but why both? =
(and incidentally, how can it provide both?)  Clearly the _Temporary_ Crede=
ntials identifier is needed, as it is part of the Token Credentials Request=
; it's only the shared secret I'm wondering about (the "oauth_token_secret"=
 part of the reponse to the Temporary Credentials Request)."

Sorry!

- Craig.

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of C=
raig Heath
Sent: 02 March 2011 18:05
To: oauth@ietf.org
Subject: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secre=
t?

Hello!  Can some kind soul help me understand the purpose of the shared sec=
ret part of the Temporary Credentials in RFC5849?

- The client authenticates using the Cient Credentials, and gets the Tempor=
ary Credentials.
- The Resource Owner gives their authorization.
- The Temporary Credentials are then used in the Token Credentials Request.

The part that's puzzling me is the RFC says the client authenticates using =
*both* the Client Credentials and the Token Credentials in the Token Creden=
tials Request.  I could understand one or the other, but why both? (and inc=
identally, how can it provide both?)  Clearly the Token Credentials identif=
ier is needed, as it is part of the Token Credentials Request; it's only th=
e shared secret I'm wondering about (the "oauth_token_secret" part of the r=
eponse to the Temporary Credentials Request).

My best guess so far is that it is intended to allow for the case when the =
Client Credentials are not secret, but in that case why use the Client Cred=
entials at all in the Token Credential Request?

Thanks for any light shed on this!

- Craig Heath.

--_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C95EXBE016SFOsha_
Content-Type: text/html;
 charset=us-ascii
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-GB link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'c=
olor:#1F497D'>Oops, just noticed a typo in my previous message, I meant:<o:=
p></o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>=
&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'>&=
quot; The part that's puzzling me is the RFC says the client authenticates =
using *both* the Client Credentials and the _Temporary_ Credentials in the =
Token Credentials Request.&nbsp; I could understand one or the other, but w=
hy both? (and incidentally, how can it provide both?)&nbsp; Clearly the _Te=
mporary_ Credentials identifier is needed, as it is part of the Token Crede=
ntials Request; it's only the shared secret I'm wondering about (the &quot;=
oauth_token_secret&quot; part of the reponse to the Temporary Credentials R=
equest).&quot;<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'col=
or:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D=
'color:#1F497D'>Sorry!<o:p></o:p></span></p><p class=3DMsoNormal><span styl=
e=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'>- Craig.<o:p></o:p></span></p><p class=3DMsoNormal>=
<span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNor=
mal><span style=3D'color:#1F497D'>From: oauth-bounces@ietf.org [mailto:oaut=
h-bounces@ietf.org] On Behalf Of Craig Heath<br>Sent: 02 March 2011 18:05<b=
r>To: oauth@ietf.org<br>Subject: [OAUTH-WG] RFC5849 - Purpose of Temporary =
Credentials Shared Secret?<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'color:#1F497D'>Hello!&nbsp; Can some kind soul help me underst=
and the purpose of the shared secret part of the Temporary Credentials in R=
FC5849?<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F4=
97D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'color:=
#1F497D'>- The client authenticates using the Cient Credentials, and gets t=
he Temporary Credentials.<o:p></o:p></span></p><p class=3DMsoNormal><span s=
tyle=3D'color:#1F497D'>- The Resource Owner gives their authorization.<o:p>=
</o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'>- The T=
emporary Credentials are then used in the Token Credentials Request.<o:p></=
o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbs=
p;</o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'>The p=
art that's puzzling me is the RFC says the client authenticates using *both=
* the Client Credentials and the Token Credentials in the Token Credentials=
 Request.&nbsp; I could understand one or the other, but why both? (and inc=
identally, how can it provide both?)&nbsp; Clearly the Token Credentials id=
entifier is needed, as it is part of the Token Credentials Request; it's on=
ly the shared secret I'm wondering about (the &quot;oauth_token_secret&quot=
; part of the reponse to the Temporary Credentials Request).<o:p></o:p></sp=
an></p><p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p>=
</span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'>My best guess=
 so far is that it is intended to allow for the case when the Client Creden=
tials are not secret, but in that case why use the Client Credentials at al=
l in the Token Credential Request?<o:p></o:p></span></p><p class=3DMsoNorma=
l><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoN=
ormal><span style=3D'color:#1F497D'>Thanks for any light shed on this! <o:p=
></o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&=
nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'>- =
Craig Heath.<o:p></o:p></span></p></div></body></html>=

--_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C95EXBE016SFOsha_--


From eran@hueniverse.com  Wed Mar  2 12:26:26 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CDED33A6823 for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 12:26:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.547
X-Spam-Level: 
X-Spam-Status: No, score=-2.547 tagged_above=-999 required=5 tests=[AWL=0.051,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vqFLD61OMa-C for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 12:26:24 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 5124E3A6816 for <oauth@ietf.org>; Wed,  2 Mar 2011 12:26:21 -0800 (PST)
Received: (qmail 23195 invoked from network); 2 Mar 2011 20:27:26 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 2 Mar 2011 20:27:26 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Wed, 2 Mar 2011 13:27:04 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Craig Heath <craig.heath@wacapps.net>, "oauth@ietf.org" <oauth@ietf.org>
Date: Wed, 2 Mar 2011 13:26:57 -0700
Thread-Topic: RFC5849 - Purpose of Temporary Credentials Shared Secret?
Thread-Index: AcvZAYG4U5dLvKGJQXyOocum691xEQAFn/sw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F0C3E9D@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C63@EX-BE-016-SFO.shared.themessagecenter.com>
In-Reply-To: <4EDB411A4D566C45BE3AB6E0152BFAF92761AC1C63@EX-BE-016-SFO.shared.themessagecenter.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234464F0C3E9DP3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secret?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2011 20:26:26 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F0C3E9DP3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Because it uses the same method of making authenticated requests as everyth=
ing else. It's just a result of pushing everything through a single functio=
n.

EHL

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of C=
raig Heath
Sent: Wednesday, March 02, 2011 10:05 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secre=
t?

Hello!  Can some kind soul help me understand the purpose of the shared sec=
ret part of the Temporary Credentials in RFC5849?

- The client authenticates using the Cient Credentials, and gets the Tempor=
ary Credentials.
- The Resource Owner gives their authorization.
- The Temporary Credentials are then used in the Token Credentials Request.

The part that's puzzling me is the RFC says the client authenticates using =
*both* the Client Credentials and the Token Credentials in the Token Creden=
tials Request.  I could understand one or the other, but why both? (and inc=
identally, how can it provide both?)  Clearly the Token Credentials identif=
ier is needed, as it is part of the Token Credentials Request; it's only th=
e shared secret I'm wondering about (the "oauth_token_secret" part of the r=
eponse to the Temporary Credentials Request).

My best guess so far is that it is intended to allow for the case when the =
Client Credentials are not secret, but in that case why use the Client Cred=
entials at all in the Token Credential Request?

Thanks for any light shed on this!

- Craig Heath.

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F0C3E9DP3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'c=
olor:#1F497D'>Because it uses the same method of making authenticated reque=
sts as everything else. It&#8217;s just a result of pushing everything thro=
ugh a single function.<o:p></o:p></span></p><p class=3DMsoNormal><span styl=
e=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'>EHL<o:p></o:p></span></p><p class=3DMsoNormal><span=
 style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><div style=3D'border:n=
one;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><div><div style=
=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><=
p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma"=
,"sans-serif"'>From:</span></b><span style=3D'font-size:10.0pt;font-family:=
"Tahoma","sans-serif"'> oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.o=
rg] <b>On Behalf Of </b>Craig Heath<br><b>Sent:</b> Wednesday, March 02, 20=
11 10:05 AM<br><b>To:</b> oauth@ietf.org<br><b>Subject:</b> [OAUTH-WG] RFC5=
849 - Purpose of Temporary Credentials Shared Secret?<o:p></o:p></span></p>=
</div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>=
<span lang=3DEN-GB>Hello!&nbsp; Can some kind soul help me understand the p=
urpose of the shared secret part of the Temporary Credentials in RFC5849?<o=
:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-GB><o:p>&nbsp;</o:=
p></span></p><p class=3DMsoNormal><span lang=3DEN-GB>- The client authentic=
ates using the Cient Credentials, and gets the Temporary Credentials.<o:p><=
/o:p></span></p><p class=3DMsoNormal><span lang=3DEN-GB>- The Resource Owne=
r gives their authorization.<o:p></o:p></span></p><p class=3DMsoNormal><spa=
n lang=3DEN-GB>- The Temporary Credentials are then used in the Token Crede=
ntials Request.<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-G=
B><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span lang=3DEN-GB>The p=
art that's puzzling me is the RFC says the client authenticates using *both=
* the Client Credentials and the Token Credentials in the Token Credentials=
 Request.&nbsp; I could understand one or the other, but why both? (and inc=
identally, how can it provide both?)&nbsp; Clearly the Token Credentials id=
entifier is needed, as it is part of the Token Credentials Request; it's on=
ly the shared secret I'm wondering about (the &quot;oauth_token_secret&quot=
; part of the reponse to the Temporary Credentials Request).<o:p></o:p></sp=
an></p><p class=3DMsoNormal><span lang=3DEN-GB><o:p>&nbsp;</o:p></span></p>=
<p class=3DMsoNormal><span lang=3DEN-GB>My best guess so far is that it is =
intended to allow for the case when the Client Credentials are not secret, =
but in that case why use the Client Credentials at all in the Token Credent=
ial Request?<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-GB><=
o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span lang=3DEN-GB>Thanks f=
or any light shed on this! <o:p></o:p></span></p><p class=3DMsoNormal><span=
 lang=3DEN-GB><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span lang=
=3DEN-GB>- Craig Heath.<o:p></o:p></span></p></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F0C3E9DP3PW5EX1MB01E_--

From craig.heath@wacapps.net  Wed Mar  2 12:56:19 2011
Return-Path: <craig.heath@wacapps.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CD72C3A686E for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 12:56:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.505
X-Spam-Level: 
X-Spam-Status: No, score=-2.505 tagged_above=-999 required=5 tests=[AWL=0.093,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 74Y2pHFDm2SZ for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 12:56:18 -0800 (PST)
Received: from out02.themessagecenter.com (out02.themessagecenter.com [208.113.96.229]) by core3.amsl.com (Postfix) with ESMTP id A41C33A6874 for <oauth@ietf.org>; Wed,  2 Mar 2011 12:56:18 -0800 (PST)
Received: from [192.168.66.109] by out02.themessagecenter.com with ESMTP (Tumbleweed Email Firewall SMTP Relay); Wed, 02 Mar 2011 12:45:32 -0800
X-Server-Uuid: 385D78BC-A8BE-4780-80CD-A503E34C32DD
Received: from EX-CH-002-SFO.shared.themessagecenter.com (192.168.66.93) by EX-CH-004-SFO.shared.themessagecenter.com (192.168.66.109) with Microsoft SMTP Server (TLS) id 8.1.393.1; Wed, 2 Mar 2011 12:57:14 -0800
Received: from ex-be-016-sfo.shared.themessagecenter.com ( [192.168.66.102]) by EX-CH-002-SFO.shared.themessagecenter.com ( [64.151.95.180]) with mapi; Wed, 2 Mar 2011 12:57:14 -0800
From: "Craig Heath" <craig.heath@wacapps.net>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Wed, 2 Mar 2011 12:57:13 -0800
Thread-Topic: RFC5849 - Purpose of Temporary Credentials Shared Secret?
Thread-Index: AcvZAYG4U5dLvKGJQXyOocum691xEQAFn/swAAEZosY=
Message-ID: <Ns3TvYk5gRSf@HZMCnr0d>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
MIME-Version: 1.0
X-WSS-ID: 617073E63PS15422066-01-01
Content-Type: multipart/alternative; boundary=_000_Ns3TvYk5gRSfHZMCnr0d_
Subject: Re: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secret?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2011 20:56:19 -0000

--_000_Ns3TvYk5gRSfHZMCnr0d_
Content-Type: text/plain;
 charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Thanks for the quick response!  Can I ask a more specific question:  What's=
 the security purpose of the Temporary Credentials shared secret?  If an im=
plementation were to, say, always use an empty string, would it make any di=
fference to the security of the protocol?

- Craig.
-----Original Message-----
From: Eran Hammer-Lahav
Sent:  02-03-2011, 8:27  pm
To: Craig Heath; oauth@ietf.org
Subject: RE: RFC5849 - Purpose of Temporary Credentials Shared Secret?


Because it uses the same method of making authenticated requests as everyth=
ing else. It=92s just a result of pushing everything through a single funct=
ion.

EHL

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of C=
raig Heath
Sent: Wednesday, March 02, 2011 10:05 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secre=
t?

Hello!  Can some kind soul help me understand the purpose of the shared sec=
ret part of the Temporary Credentials in RFC5849?

- The client authenticates using the Cient Credentials, and gets the Tempor=
ary Credentials.
- The Resource Owner gives their authorization.
- The Temporary Credentials are then used in the Token Credentials Request.

The part that's puzzling me is the RFC says the client authenticates using =
*both* the Client Credentials and the Token Credentials in the Token Creden=
tials Request.  I could understand one or the other, but why both? (and inc=
identally, how can it provide both?)  Clearly the Token Credentials identif=
ier is needed, as it is part of the Token Credentials Request; it's only th=
e shared secret I'm wondering about (the "oauth_token_secret" part of the r=
eponse to the Temporary Credentials Request).

My best guess so far is that it is intended to allow for the case when the =
Client Credentials are not secret, but in that case why use the Client Cred=
entials at all in the Token Credential Request?

Thanks for any light shed on this!

- Craig Heath.

--_000_Ns3TvYk5gRSfHZMCnr0d_
Content-Type: text/html;
 charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<pre style=3D"word-wrap:break-word; font-size:10.0pt; font-family:Tahoma; c=
olor:black">Thanks for the quick response!  Can I ask a more specific quest=
ion:  What's the security purpose of the Temporary Credentials shared secre=
t?  If an implementation were to, say, always use an empty string, would it=
 make any difference to the security of the protocol?

- Craig.
-----Original Message-----
From: Eran Hammer-Lahav
Sent:  02-03-2011, 8:27  pm
To: Craig Heath; oauth@ietf.org
Subject: RE: RFC5849 - Purpose of Temporary Credentials Shared Secret?

</pre>
<div>
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">Because it uses the sa=
me method of making authenticated requests as everything else. It=92s just =
a result of pushing everything through a single function.<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">EHL<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Craig Heath<br>
<b>Sent:</b> Wednesday, March 02, 2011 10:05 AM<br>
<b>To:</b> oauth@ietf.org<br>
<b>Subject:</b> [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Share=
d Secret?<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Hello!&nbsp; Can some kind soul=
 help me understand the purpose of the shared secret part of the Temporary =
Credentials in RFC5849?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">- The client authenticates usin=
g the Cient Credentials, and gets the Temporary Credentials.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">- The Resource Owner gives thei=
r authorization.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">- The Temporary Credentials are=
 then used in the Token Credentials Request.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">The part that's puzzling me is =
the RFC says the client authenticates using *both* the Client Credentials a=
nd the Token Credentials in the Token Credentials Request.&nbsp; I could un=
derstand one or the other, but why both?
 (and incidentally, how can it provide both?)&nbsp; Clearly the Token Crede=
ntials identifier is needed, as it is part of the Token Credentials Request=
; it's only the shared secret I'm wondering about (the &quot;oauth_token_se=
cret&quot; part of the reponse to the Temporary
 Credentials Request).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">My best guess so far is that it=
 is intended to allow for the case when the Client Credentials are not secr=
et, but in that case why use the Client Credentials at all in the Token Cre=
dential Request?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Thanks for any light shed on th=
is! <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">- Craig Heath.<o:p></o:p></span=
></p>
</div>
</div>
</div>
</body>
</html>

--_000_Ns3TvYk5gRSfHZMCnr0d_--


From huilan.lu@alcatel-lucent.com  Wed Mar  2 15:22:17 2011
Return-Path: <huilan.lu@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E3ADD3A68B7 for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 15:22:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.998
X-Spam-Level: 
X-Spam-Status: No, score=-5.998 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_42=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8U6AfLxSYUjb for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 15:22:15 -0800 (PST)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by core3.amsl.com (Postfix) with ESMTP id E1A0D3A687D for <oauth@ietf.org>; Wed,  2 Mar 2011 15:22:14 -0800 (PST)
Received: from usnavsmail1.ndc.alcatel-lucent.com (usnavsmail1.ndc.alcatel-lucent.com [135.3.39.9]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id p22NNGOJ019124 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 2 Mar 2011 17:23:16 -0600 (CST)
Received: from USNAVSXCHHUB03.ndc.alcatel-lucent.com (usnavsxchhub03.ndc.alcatel-lucent.com [135.3.39.112]) by usnavsmail1.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p22NNFak019296 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Wed, 2 Mar 2011 17:23:15 -0600
Received: from USNAVSXCHMBSB3.ndc.alcatel-lucent.com ([135.3.39.135]) by USNAVSXCHHUB03.ndc.alcatel-lucent.com ([135.3.39.112]) with mapi; Wed, 2 Mar 2011 17:23:15 -0600
From: "Lu, Hui-Lan (Huilan)" <huilan.lu@alcatel-lucent.com>
To: "'Torsten Lodderstedt'" <torsten@lodderstedt.net>, Eric <pflam@cs.stanford.edu>
Date: Wed, 2 Mar 2011 17:23:14 -0600
Thread-Topic: [OAUTH-WG] validate authorization code in draft 12
Thread-Index: AcvHCXuSlyw/KjdaSx2Gy4J3t7p6ggSHjW/w
Message-ID: <0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DCB@USNAVSXCHMBSB3.ndc.alcatel-lucent.com>
References: <4D39442B.2090408@cs.stanford.edu> <4D505C6F.7090209@lodderstedt.net>
In-Reply-To: <4D505C6F.7090209@lodderstedt.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DCBUSNAVSXCHMBSB_"
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.9
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] validate authorization code in draft 12
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2011 23:22:18 -0000

--_000_0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DCBUSNAVSXCHMBSB_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I agree with Tosten. A healthy client is not expected to issue an access to=
ken request unconditionally when receiving an authorization code at its red=
irect_uri. The client should do so only if it is in the right state with a =
correlatable authorization request pending.

Best regards,

Huilan LU


CONFIDENTIALITY NOTICE: This e-mail and any files attached may contain conf=
idential and proprietary information of Alcatel-Lucent and/or its affiliate=
d entities. Access by the intended recipient only is authorized. Any liabil=
ity arising from any party acting, or refraining from acting, on any inform=
ation contained in this e-mail is hereby excluded. If you are not the inten=
ded recipient, please notify the sender immediately, destroy the original t=
ransmission and its attachments and do not disclose the contents to any oth=
er person, use it for any purpose, or store or copy the information in any =
medium. Copyright in this e-mail and any attachments belongs to Alcatel-Luc=
ent and/or its affiliated entities.


________________________________
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of T=
orsten Lodderstedt
Sent: Monday, February 07, 2011 3:56 PM
To: Eric
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] validate authorization code in draft 12

Hi Eric,

I'm trying to understand the attack you described. I would expect any clien=
t to mark its web sessions if it triggers an authorization process. If so, =
the attacker would need to forge a valid client session in the right state =
(authz process in progress) in order to place a sucessful attack. For a typ=
ical web application this would require the attacker to login to this app a=
nd kick off the authorization process. This requires more than one addition=
al http call.

What do you think?

regards,
Torsten.

Am 21.01.2011 09:30, schrieb Eric:
Eran, and others,

A few of us had some discussions on the authorization code flow, as depicte=
d in Fig. 3 of the current (12th) draft. We think that it is probably worth=
while to suggest in the specification that an OAuth implementation SHOULD p=
rovide a way for the client to validate the authorization code before sendi=
ng it to the  Authorization Server (AS). From what we have heard, this has =
been done in some of the current OAuth deployments. There are other people =
who do not think this is such a big security risk, although so far no one h=
as objected that there is some risk here.

The issue is that according to the current draft, someone who owns a botnet=
 can locate the redirect URIs of clients that listen on HTTP, and access th=
em with random authorization codes, and cause HTTPS connections to be made =
on the Authorization Server (AS). There are a few things that the attacker =
can achieve with this OAuth flow that he cannot easily achieve otherwise :

1. Cost magnification: the attacker incurs the cost of an HTTP connection a=
nd causes an HTTPS connection to be made on the AS; and he can co-ordinate =
the timing of such HTTPS connections across multiple clients relatively eas=
ily, if these clients blindly connect to the AS without first validating th=
e authorization codes received.

Although the attacker could achieve something similar, say by including an =
iframe pointing to the HTTPS URL of the AS in an HTTP web page and lure web=
  users to visit that page, timing attacks using such a scheme is (say for =
the purpose of DDoS) more difficult .

2. Connection laundering: if the AS realizes it is flooded by HTTPS connect=
ions with illegitimate codes, it collects no useful information about the a=
ttacker, since the clients act as relays.

3. CSRF defense/the 'state' parameter don't completely address this problem=
. With such a defense, the attacker might need to incur an additional HTTP =
request to obtain a valid CSRF code/ state parameter. This does cut down th=
e effectiveness of the attack by a factor of 2, which is good. However, if =
the HTTPS/HTTP cost ratio is higher than 2 (the cost factor is estimated to=
 be around 3.5x at http://www.semicomplete.com/blog/geekery/ssl-latency.htm=
l), the attacker still achieves a cost magnification.

Our proposal is that the OAuth specification suggests that an OAuth impleme=
ntation SHOULD provide a way for the client to validate the authorization c=
ode before sending it to the  Authorization Server (AS). The specifics of h=
ow to validate the authorization code may not need to be part of the core s=
pecification. We sketch a design below for consideration for future impleme=
ntation. It might be reasonable to assume that OAuth implementations provid=
e some API for the client to call to validate and send the authorization co=
de to the AS. There are two possible schemes for implementation: a) if the =
client and the AS already share a symmetric secret, an HMAC key can be crea=
ted from the shared secret, and the authorization code will be HMAC'ed and =
standard techniques can be employed in the client-side API implementation t=
o detect replay and forgery attempts on the code; b) an alternative is for =
the AS to sign the code using the private key from its SSL certificate, and=
 for the client API to validate the signature using the public key.



On Thu, Jan 20, 2011 at 4:56 PM, Eran Hammer-Lahav <eran@hueniverse.com><ma=
ilto:eran@hueniverse.com> wrote:
Draft -12 is finally out.

This is almost a complete rewrite of the entire document, with the primary =
goal of moving it back to a similar structure used in -05. I have been thin=
king about this for a few months and finally came up with a structure that =
combines the two approaches.

The draft includes some major cleanups, significantly simpler language, red=
uces repeated prose, and tried to keep prose to the introduction and normat=
ive language in the rest of the specification. I took out sections that bro=
ke the flow, and did my best to give this a linear narrative that is easy t=
o follow.

The draft includes the following normative changes:

  o  Clarified 'token_type' as case insensitive.
  o  Authorization endpoint requires TLS when an access token is issued.
  o  Removed client assertion credentials, mandatory HTTP Basic authenticat=
ion support for client credentials, WWW-Authenticate header, and the OAuth2=
 authentication scheme.
  o  Changed implicit grant (aka user-agent flow) error response from query=
 to fragment.
  o  Removed the 'redirect_uri_mismatch' error code since in such a case, t=
he authorization server must not send the error back to the client.
  o  Defined access token type registry.

I would like to spend the coming week receiving and applying feedback befor=
e requesting a WGLC for everything but the security considerations section =
(missing) 2/1.

EHL



> -----Original Message-----
> From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth=
-bounces@ietf.org<mailto:oauth-bounces@ietf.org>] On Behalf
> Of Internet-Drafts@ietf.org<mailto:Internet-Drafts@ietf.org>
> Sent: Thursday, January 20, 2011 4:45 PM
> To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>
> Cc: oauth@ietf.org<mailto:oauth@ietf.org>
> Subject: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
>
> A New Internet-Draft is available from the on-line Internet-Drafts direct=
ories.
> This draft is a work item of the Open Authentication Protocol Working Gro=
up
> of the IETF.
>
>
>       Title           : The OAuth 2.0 Authorization Protocol
>       Author(s)       : E. Hammer-Lahav, et al.
>       Filename        : draft-ietf-oauth-v2-12.txt
>       Pages           : 46
>       Date            : 2011-01-20
>
> This specification describes the OAuth 2.0 authorization protocol.
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> Below is the data which will enable a MIME compliant mail reader
> implementation to automatically retrieve the ASCII version of the Interne=
t-
> Draft.
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth




_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DCBUSNAVSXCHMBSB_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2900.6058" name=3DGENERATOR></HEAD>
<BODY text=3D#000000 bgColor=3D#ffffff>
<DIV dir=3Dltr align=3Dleft><SPAN class=3D312011822-02032011><FONT face=3D"=
Trebuchet MS"=20
color=3D#0000ff size=3D2>I agree with Tosten.&nbsp;A</FONT></SPAN><SPAN=20
class=3D312011822-02032011><FONT face=3D"Trebuchet MS" color=3D#0000ff size=
=3D2> healthy=20
client is not expected to issue an access token request unconditionally=20
when&nbsp;receiving an authorization code at its redirect_uri. The=20
client&nbsp;should do so only if it&nbsp;is in the right state with a=20
correlatable&nbsp;authorization request pending.&nbsp;</FONT></SPAN><SPAN=20
class=3D312011822-02032011><FONT size=3D2><SPAN class=3D312011822-02032011>=
<FONT=20
face=3D"Trebuchet MS" color=3D#0000ff=20
size=3D2>&nbsp;&nbsp;</FONT></SPAN></DIV></FONT></SPAN>
<DIV><FONT face=3D"Trebuchet MS" color=3D#0000ff size=3D2></FONT>&nbsp;</DI=
V>
<DIV><FONT size=3D2>Best regards,<BR><BR>Huilan LU<BR><BR><BR>CONFIDENTIALI=
TY=20
NOTICE: This e-mail and any files attached may contain confidential and=20
proprietary information of Alcatel-Lucent and/or its affiliated entities. A=
ccess=20
by the intended recipient only is authorized. Any liability arising from an=
y=20
party acting, or refraining from acting, on any information contained in th=
is=20
e-mail is hereby excluded. If you are not the intended recipient, please no=
tify=20
the sender immediately, destroy the original transmission and its attachmen=
ts=20
and do not disclose the contents to any other person, use it for any purpos=
e, or=20
store or copy the information in any medium. Copyright in this e-mail and a=
ny=20
attachments belongs to Alcatel-Lucent and/or its affiliated=20
entities.<BR></FONT></DIV>
<DIV>&nbsp;</DIV><BR>
<BLOCKQUOTE dir=3Dltr=20
style=3D"PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px soli=
d; MARGIN-RIGHT: 0px">
  <DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr align=3Dleft>
  <HR tabIndex=3D-1>
  <FONT face=3DTahoma size=3D2><B>From:</B> oauth-bounces@ietf.org=20
  [mailto:oauth-bounces@ietf.org] <B>On Behalf Of </B>Torsten=20
  Lodderstedt<BR><B>Sent:</B> Monday, February 07, 2011 3:56 PM<BR><B>To:</=
B>=20
  Eric<BR><B>Cc:</B> oauth@ietf.org<BR><B>Subject:</B> Re: [OAUTH-WG] valid=
ate=20
  authorization code in draft 12<BR></FONT><BR></DIV>
  <DIV></DIV>Hi Eric,<BR><BR>I'm trying to understand the attack you descri=
bed.=20
  I would expect any client to mark its web sessions if it triggers an=20
  authorization process. If so, the attacker would need to forge a valid cl=
ient=20
  session in the right state (authz process in progress) in order to place =
a=20
  sucessful attack. For a typical web application this would require the=20
  attacker to login to this app and kick off the authorization process. Thi=
s=20
  requires more than one additional http call.<BR><BR>What do you=20
  think?<BR><BR>regards,<BR>Torsten. <BR><BR>Am 21.01.2011 09:30, schrieb E=
ric:=20
  <BLOCKQUOTE cite=3Dmid:4D39442B.2090408@cs.stanford.edu type=3D"cite">Era=
n, and=20
    others,<BR><BR>A few of us had some discussions on the authorization co=
de=20
    flow, as depicted in Fig. 3 of the current (12th) draft. We think that =
it is=20
    probably worthwhile to suggest in the specification that an OAuth=20
    implementation SHOULD provide a way for the client to validate the=20
    authorization code before sending it to the&nbsp; Authorization Server =
(AS).=20
    From what we have heard, this has been done in some of the current OAut=
h=20
    deployments. There are other people who do not think this is such a big=
=20
    security risk, although so far no one has objected that there is some r=
isk=20
    here.<BR><BR>The issue is that according to the current draft, someone =
who=20
    owns a botnet can locate the redirect URIs of clients that listen on HT=
TP,=20
    and access them with random authorization codes, and cause HTTPS connec=
tions=20
    to be made on the Authorization Server (AS). There are a few things tha=
t the=20
    attacker can achieve with this OAuth flow that he cannot easily achieve=
=20
    otherwise : <BR><BR>1. Cost magnification: the attacker incurs the cost=
 of=20
    an HTTP connection and causes an HTTPS connection to be made on the AS;=
 and=20
    he can co-ordinate the timing of such HTTPS connections across multiple=
=20
    clients relatively easily, if these clients blindly connect to the AS=20
    without first validating the authorization codes received.<BR><BR>Altho=
ugh=20
    the attacker could achieve something similar, say by including an ifram=
e=20
    pointing to the HTTPS URL of the AS in an HTTP web page and lure web&nb=
sp;=20
    users to visit that page, timing attacks using such a scheme is (say fo=
r the=20
    purpose of DDoS) more difficult .<BR><BR>2. Connection laundering: if t=
he AS=20
    realizes it is flooded by HTTPS connections with illegitimate codes, it=
=20
    collects no useful information about the attacker, since the clients ac=
t as=20
    relays.&nbsp; <BR><BR>3. CSRF defense/the 'state' parameter don't compl=
etely=20
    address this problem. With such a defense, the attacker might need to i=
ncur=20
    an additional HTTP request to obtain a valid CSRF code/ state parameter=
.=20
    This does cut down the effectiveness of the attack by a factor of 2, wh=
ich=20
    is good. However, if the HTTPS/HTTP cost ratio is higher than 2 (the co=
st=20
    factor is estimated to be around 3.5x at <A class=3Dmoz-txt-link-freete=
xt=20
    href=3D"http://www.semicomplete.com/blog/geekery/ssl-latency.html"=20
    moz-do-not-send=3D"true">http://www.semicomplete.com/blog/geekery/ssl-l=
atency.html</A>),=20
    the attacker still achieves a cost magnification.<BR><BR>Our proposal i=
s=20
    that the OAuth specification suggests that an OAuth implementation SHOU=
LD=20
    provide a way for the client to validate the authorization code before=
=20
    sending it to the&nbsp; Authorization Server (AS). The specifics of how=
 to=20
    validate the authorization code may not need to be part of the core=20
    specification. We sketch a design below for consideration for future=20
    implementation. It might be reasonable to assume that OAuth implementat=
ions=20
    provide some API for the client to call to validate and send the=20
    authorization code to the AS. There are two possible schemes for=20
    implementation: a) if the client and the AS already share a symmetric=20
    secret, an HMAC key can be created from the shared secret, and the=20
    authorization code will be HMAC'ed and standard techniques can be emplo=
yed=20
    in the client-side API implementation to detect replay and forgery atte=
mpts=20
    on the code; b) an alternative is for the AS to sign the code using the=
=20
    private key from its SSL certificate, and for the client API to validat=
e the=20
    signature using the public key.<BR><BR>&nbsp;<SPAN class=3DApple-style-=
span=20
    style=3D"WORD-SPACING: 0px; FONT: medium Times; TEXT-TRANSFORM: none; C=
OLOR: rgb(0,0,0); TEXT-INDENT: 0px; WHITE-SPACE: normal; LETTER-SPACING: no=
rmal; BORDER-COLLAPSE: separate; orphans: 2; widows: 2"><SPAN=20
    class=3DApple-style-span style=3D"FONT-SIZE: small; FONT-FAMILY: arial"=
><BR><BR>
    <DIV class=3Dgmail_quote>On Thu, Jan 20, 2011 at 4:56 PM, Eran=20
    Hammer-Lahav<SPAN class=3DApple-converted-space>&nbsp;</SPAN><SPAN dir=
=3Dltr><A=20
    class=3Dmoz-txt-link-rfc2396E href=3D"mailto:eran@hueniverse.com"=20
    moz-do-not-send=3D"true">&lt;eran@hueniverse.com&gt;</A></SPAN><SPAN=20
    class=3DApple-converted-space>&nbsp;</SPAN>wrote:<BR>
    <BLOCKQUOTE class=3Dgmail_quote=20
    style=3D"PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: rgb=
(204,204,204) 1px solid">Draft=20
      -12 is finally out.<BR><BR>This is almost a complete rewrite of the e=
ntire=20
      document, with the primary goal of moving it back to a similar struct=
ure=20
      used in -05. I have been thinking about this for a few months and fin=
ally=20
      came up with a structure that combines the two approaches.<BR><BR>The=
=20
      draft includes some major cleanups, significantly simpler language,=20
      reduces repeated prose, and tried to keep prose to the introduction a=
nd=20
      normative language in the rest of the specification. I took out secti=
ons=20
      that broke the flow, and did my best to give this a linear narrative =
that=20
      is easy to follow.<BR><BR>The draft includes the following normative=
=20
      changes:<BR><BR>&nbsp; o &nbsp;Clarified 'token_type' as case=20
      insensitive.<BR>&nbsp; o &nbsp;Authorization endpoint requires TLS wh=
en an=20
      access token is issued.<BR>&nbsp; o &nbsp;Removed client assertion=20
      credentials, mandatory HTTP Basic authentication support for client=20
      credentials, WWW-Authenticate header, and the OAuth2 authentication=20
      scheme.<BR>&nbsp; o &nbsp;Changed implicit grant (aka user-agent flow=
)=20
      error response from query to fragment.<BR>&nbsp; o &nbsp;Removed the=
=20
      'redirect_uri_mismatch' error code since in such a case, the authoriz=
ation=20
      server must not send the error back to the client.<BR>&nbsp; o=20
      &nbsp;Defined access token type registry.<BR><BR>I would like to spen=
d the=20
      coming week receiving and applying feedback before requesting a WGLC =
for=20
      everything but the security considerations section (missing)=20
      2/1.<BR><BR>EHL<BR>
      <DIV>
      <DIV class=3Dh5><BR><BR><BR>&gt; -----Original Message-----<BR>&gt;=20
      From:<SPAN class=3DApple-converted-space>&nbsp;</SPAN><A=20
      href=3D"mailto:oauth-bounces@ietf.org"=20
      moz-do-not-send=3D"true">oauth-bounces@ietf.org</A><SPAN=20
      class=3DApple-converted-space>&nbsp;</SPAN>[mailto:<A=20
      href=3D"mailto:oauth-bounces@ietf.org"=20
      moz-do-not-send=3D"true">oauth-bounces@ietf.org</A><WBR>] On Behalf<B=
R>&gt;=20
      Of<SPAN class=3DApple-converted-space>&nbsp;</SPAN><A=20
      href=3D"mailto:Internet-Drafts@ietf.org"=20
      moz-do-not-send=3D"true">Internet-Drafts@ietf.org</A><BR>&gt; Sent:=20
      Thursday, January 20, 2011 4:45 PM<BR>&gt; To:<SPAN=20
      class=3DApple-converted-space>&nbsp;</SPAN><A=20
      href=3D"mailto:i-d-announce@ietf.org"=20
      moz-do-not-send=3D"true">i-d-announce@ietf.org</A><BR>&gt; Cc:<SPAN=20
      class=3DApple-converted-space>&nbsp;</SPAN><A href=3D"mailto:oauth@ie=
tf.org"=20
      moz-do-not-send=3D"true">oauth@ietf.org</A><BR>&gt; Subject: [OAUTH-W=
G] I-D=20
      Action:draft-ietf-oauth-v2-12.<WBR>txt<BR>&gt;<BR>&gt; A New=20
      Internet-Draft is available from the on-line Internet-Drafts=20
      directories.<BR>&gt; This draft is a work item of the Open Authentica=
tion=20
      Protocol Working Group<BR>&gt; of the IETF.<BR>&gt;<BR>&gt;<BR>&gt; &=
nbsp;=20
      &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : The OAuth 2.=
0=20
      Authorization Protocol<BR>&gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp;=
=20
      &nbsp; &nbsp; : E. Hammer-Lahav, et al.<BR>&gt; &nbsp; &nbsp; &nbsp;=
=20
      Filename &nbsp; &nbsp; &nbsp; &nbsp;: draft-ietf-oauth-v2-12.txt<BR>&=
gt;=20
      &nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 46<BR=
>&gt;=20
      &nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;:=
=20
      2011-01-20<BR>&gt;<BR>&gt; This specification describes the OAuth 2.0=
=20
      authorization protocol.<BR>&gt;<BR>&gt; A URL for this Internet-Draft=
=20
      is:<BR>&gt;<SPAN class=3DApple-converted-space>&nbsp;</SPAN><A=20
      href=3D"http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.tx=
t"=20
      target=3D_blank=20
      moz-do-not-send=3D"true">http://www.ietf.org/internet-<WBR>drafts/dra=
ft-ietf-oauth-v2-12.<WBR>txt</A><BR>&gt;<BR>&gt;=20
      Internet-Drafts are also available by anonymous FTP at:<BR>&gt;<SPAN=
=20
      class=3DApple-converted-space>&nbsp;</SPAN><A=20
      href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D_blank=20
      moz-do-not-send=3D"true">ftp://ftp.ietf.org/internet-<WBR>drafts/</A>=
<BR>&gt;<BR>&gt;=20
      Below is the data which will enable a MIME compliant mail reader<BR>&=
gt;=20
      implementation to automatically retrieve the ASCII version of the=20
      Internet-<BR>&gt;=20
      Draft.<BR></DIV></DIV>______________________________<WBR>____________=
_____<BR>OAuth=20
      mailing list<BR><A href=3D"mailto:OAuth@ietf.org"=20
      moz-do-not-send=3D"true">OAuth@ietf.org</A><BR><A=20
      href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D_blank=
=20
      moz-do-not-send=3D"true">https://www.ietf.org/mailman/<WBR>listinfo/o=
auth</A><BR></BLOCKQUOTE></DIV></SPAN></SPAN><BR=20
    class=3DApple-interchange-newline><BR><PRE wrap=3D""><FIELDSET class=3D=
mimeAttachmentHeader></FIELDSET>
_______________________________________________
OAuth mailing list
<A class=3Dmoz-txt-link-abbreviated href=3D"mailto:OAuth@ietf.org">OAuth@ie=
tf.org</A>
<A class=3Dmoz-txt-link-freetext href=3D"https://www.ietf.org/mailman/listi=
nfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</A>
</PRE></BLOCKQUOTE></BLOCKQUOTE></BODY></HTML>

--_000_0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DCBUSNAVSXCHMBSB_--

From eran@hueniverse.com  Wed Mar  2 15:25:59 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7089E3A6907 for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 15:25:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.548
X-Spam-Level: 
X-Spam-Status: No, score=-2.548 tagged_above=-999 required=5 tests=[AWL=0.050,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ujYToZvSBuQ9 for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 15:25:51 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id EB8E43A68B5 for <oauth@ietf.org>; Wed,  2 Mar 2011 15:25:50 -0800 (PST)
Received: (qmail 27062 invoked from network); 2 Mar 2011 23:26:56 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 2 Mar 2011 23:26:56 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Wed, 2 Mar 2011 16:26:49 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Craig Heath <craig.heath@wacapps.net>, "oauth@ietf.org" <oauth@ietf.org>
Date: Wed, 2 Mar 2011 16:26:42 -0700
Thread-Topic: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secret?
Thread-Index: AcvZAYG4U5dLvKGJQXyOocum691xEQAFn/swAAEZosYABQzQ0A==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F0C3F4B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <Ns3TvYk5gRSf@HZMCnr0d>
In-Reply-To: <Ns3TvYk5gRSf@HZMCnr0d>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234464F0C3F4BP3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared	Secret?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2011 23:25:59 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F0C3F4BP3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

It limits the ability to exchange the token in cases where the client has n=
o private secret, or if the client has multiple instances using the same cr=
edentials (providing an isolation between them). You need to make your own =
security analysis of the protocol and your needs.

EHL


From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of C=
raig Heath
Sent: Wednesday, March 02, 2011 12:57 PM
To: oauth@ietf.org
Subject: Re: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared S=
ecret?


Thanks for the quick response!  Can I ask a more specific question:  What's=
 the security purpose of the Temporary Credentials shared secret?  If an im=
plementation were to, say, always use an empty string, would it make any di=
fference to the security of the protocol?



- Craig.

-----Original Message-----

From: Eran Hammer-Lahav

Sent:  02-03-2011, 8:27  pm

To: Craig Heath; oauth@ietf.org

Subject: RE: RFC5849 - Purpose of Temporary Credentials Shared Secret?


Because it uses the same method of making authenticated requests as everyth=
ing else. It's just a result of pushing everything through a single functio=
n.

EHL

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of C=
raig Heath
Sent: Wednesday, March 02, 2011 10:05 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secre=
t?

Hello!  Can some kind soul help me understand the purpose of the shared sec=
ret part of the Temporary Credentials in RFC5849?

- The client authenticates using the Cient Credentials, and gets the Tempor=
ary Credentials.
- The Resource Owner gives their authorization.
- The Temporary Credentials are then used in the Token Credentials Request.

The part that's puzzling me is the RFC says the client authenticates using =
*both* the Client Credentials and the Token Credentials in the Token Creden=
tials Request.  I could understand one or the other, but why both? (and inc=
identally, how can it provide both?)  Clearly the Token Credentials identif=
ier is needed, as it is part of the Token Credentials Request; it's only th=
e shared secret I'm wondering about (the "oauth_token_secret" part of the r=
eponse to the Temporary Credentials Request).

My best guess so far is that it is intended to allow for the case when the =
Client Credentials are not secret, but in that case why use the Client Cred=
entials at all in the Token Credential Request?

Thanks for any light shed on this!

- Craig Heath.

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F0C3F4BP3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Consolas","serif";}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'c=
olor:#1F497D'>It limits the ability to exchange the token in cases where th=
e client has no private secret, or if the client has multiple instances usi=
ng the same credentials (providing an isolation between them). You need to =
make your own security analysis of the protocol and your needs.<o:p></o:p><=
/span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o=
:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'>EHL<o:p></=
o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbs=
p;</o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>=
&nbsp;</o:p></span></p><div style=3D'border:none;border-left:solid blue 1.5=
pt;padding:0in 0in 0in 4.0pt'><div><div style=3D'border:none;border-top:sol=
id #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span s=
tyle=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b=
><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> oauth-=
bounces@ietf.org [mailto:oauth-bounces@ietf.org] <b>On Behalf Of </b>Craig =
Heath<br><b>Sent:</b> Wednesday, March 02, 2011 12:57 PM<br><b>To:</b> oaut=
h@ietf.org<br><b>Subject:</b> Re: [OAUTH-WG] RFC5849 - Purpose of Temporary=
 Credentials Shared Secret?<o:p></o:p></span></p></div></div><p class=3DMso=
Normal><o:p>&nbsp;</o:p></p><pre><span style=3D'font-family:"Tahoma","sans-=
serif";color:black'>Thanks for the quick response!&nbsp; Can I ask a more s=
pecific question:&nbsp; What's the security purpose of the Temporary Creden=
tials shared secret?&nbsp; If an implementation were to, say, always use an=
 empty string, would it make any difference to the security of the protocol=
?<o:p></o:p></span></pre><pre><span style=3D'font-family:"Tahoma","sans-ser=
if";color:black'><o:p>&nbsp;</o:p></span></pre><pre><span style=3D'font-fam=
ily:"Tahoma","sans-serif";color:black'>- Craig.<o:p></o:p></span></pre><pre=
><span style=3D'font-family:"Tahoma","sans-serif";color:black'>-----Origina=
l Message-----<o:p></o:p></span></pre><pre><span style=3D'font-family:"Taho=
ma","sans-serif";color:black'>From: Eran Hammer-Lahav<o:p></o:p></span></pr=
e><pre><span style=3D'font-family:"Tahoma","sans-serif";color:black'>Sent:&=
nbsp; 02-03-2011, 8:27&nbsp; pm<o:p></o:p></span></pre><pre><span style=3D'=
font-family:"Tahoma","sans-serif";color:black'>To: Craig Heath; oauth@ietf.=
org<o:p></o:p></span></pre><pre><span style=3D'font-family:"Tahoma","sans-s=
erif";color:black'>Subject: RE: RFC5849 - Purpose of Temporary Credentials =
Shared Secret?<o:p></o:p></span></pre><pre><span style=3D'font-family:"Taho=
ma","sans-serif";color:black'><o:p>&nbsp;</o:p></span></pre><div><p class=
=3DMsoNormal><span style=3D'color:#1F497D'>Because it uses the same method =
of making authenticated requests as everything else. It&#8217;s just a resu=
lt of pushing everything through a single function.<o:p></o:p></span></p><p=
 class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></=
p><p class=3DMsoNormal><span style=3D'color:#1F497D'>EHL<o:p></o:p></span><=
/p><p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></sp=
an></p><div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0=
in 0in 4.0pt'><div><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt=
;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span style=3D'font-siz=
e:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span style=3D'=
font-size:10.0pt;font-family:"Tahoma","sans-serif"'> oauth-bounces@ietf.org=
 [mailto:oauth-bounces@ietf.org] <b>On Behalf Of </b>Craig Heath<br><b>Sent=
:</b> Wednesday, March 02, 2011 10:05 AM<br><b>To:</b> oauth@ietf.org<br><b=
>Subject:</b> [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared =
Secret?<o:p></o:p></span></p></div></div><p class=3DMsoNormal><o:p>&nbsp;</=
o:p></p><p class=3DMsoNormal><span lang=3DEN-GB>Hello!&nbsp; Can some kind =
soul help me understand the purpose of the shared secret part of the Tempor=
ary Credentials in RFC5849?<o:p></o:p></span></p><p class=3DMsoNormal><span=
 lang=3DEN-GB><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span lang=
=3DEN-GB>- The client authenticates using the Cient Credentials, and gets t=
he Temporary Credentials.<o:p></o:p></span></p><p class=3DMsoNormal><span l=
ang=3DEN-GB>- The Resource Owner gives their authorization.<o:p></o:p></spa=
n></p><p class=3DMsoNormal><span lang=3DEN-GB>- The Temporary Credentials a=
re then used in the Token Credentials Request.<o:p></o:p></span></p><p clas=
s=3DMsoNormal><span lang=3DEN-GB><o:p>&nbsp;</o:p></span></p><p class=3DMso=
Normal><span lang=3DEN-GB>The part that's puzzling me is the RFC says the c=
lient authenticates using *both* the Client Credentials and the Token Crede=
ntials in the Token Credentials Request.&nbsp; I could understand one or th=
e other, but why both? (and incidentally, how can it provide both?)&nbsp; C=
learly the Token Credentials identifier is needed, as it is part of the Tok=
en Credentials Request; it's only the shared secret I'm wondering about (th=
e &quot;oauth_token_secret&quot; part of the reponse to the Temporary Crede=
ntials Request).<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-=
GB><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span lang=3DEN-GB>My b=
est guess so far is that it is intended to allow for the case when the Clie=
nt Credentials are not secret, but in that case why use the Client Credenti=
als at all in the Token Credential Request?<o:p></o:p></span></p><p class=
=3DMsoNormal><span lang=3DEN-GB><o:p>&nbsp;</o:p></span></p><p class=3DMsoN=
ormal><span lang=3DEN-GB>Thanks for any light shed on this! <o:p></o:p></sp=
an></p><p class=3DMsoNormal><span lang=3DEN-GB><o:p>&nbsp;</o:p></span></p>=
<p class=3DMsoNormal><span lang=3DEN-GB>- Craig Heath.<o:p></o:p></span></p=
></div></div></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F0C3F4BP3PW5EX1MB01E_--

From James.H.Manger@team.telstra.com  Wed Mar  2 19:34:36 2011
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 342E13A692F for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 19:34:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.467
X-Spam-Level: 
X-Spam-Status: No, score=-0.467 tagged_above=-999 required=5 tests=[AWL=0.433,  BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, HTML_MESSAGE=0.001, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HA1THrCBU3Bh for <oauth@core3.amsl.com>; Wed,  2 Mar 2011 19:34:25 -0800 (PST)
Received: from ipxcvo.tcif.telstra.com.au (ipxcvo.tcif.telstra.com.au [203.35.135.208]) by core3.amsl.com (Postfix) with ESMTP id E98CA3A6938 for <oauth@ietf.org>; Wed,  2 Mar 2011 19:34:22 -0800 (PST)
X-IronPort-AV: E=Sophos;i="4.62,256,1296997200"; d="scan'208,217";a="28397924"
Received: from unknown (HELO ipcdvi.tcif.telstra.com.au) ([10.97.217.212]) by ipocvi.tcif.telstra.com.au with ESMTP; 03 Mar 2011 14:35:28 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6273"; a="20450764"
Received: from wsmsg3707.srv.dir.telstra.com ([172.49.40.81]) by ipcdvi.tcif.telstra.com.au with ESMTP; 03 Mar 2011 14:35:27 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by wsmsg3707.srv.dir.telstra.com ([172.49.40.81]) with mapi; Thu, 3 Mar 2011 14:35:27 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: OAuth Mailing List <oauth@ietf.org>
Date: Thu, 3 Mar 2011 14:35:25 +1100
Thread-Topic: Comments on draft-ietf-oauth-v2-bearer-03
Thread-Index: AcvZVAhzw0GRBeXeR+WutxG9byCctA==
Message-ID: <255B9BB34FB7D647A506DC292726F6E1127F5DFA5F@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: multipart/alternative; boundary="_000_255B9BB34FB7D647A506DC292726F6E1127F5DFA5FWSMSG3153Vsrv_"
MIME-Version: 1.0
Subject: [OAUTH-WG] Comments on draft-ietf-oauth-v2-bearer-03
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2011 03:34:36 -0000

--_000_255B9BB34FB7D647A506DC292726F6E1127F5DFA5FWSMSG3153Vsrv_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Comments on the bearer token spec:



1. There is a whole lot of text about OAuth2 get-a-token parts that isn't n=
ecessary in the bearer token spec.

A bit of context can be useful to a reader, but in this case it brings too =
much of the complexity of the get-a-token flows into what should be a quite=
 simple spec. It is not as though it can replace reading OAuth2 core.



1a. Change the title from "The OAuth 2.0 Protocol: Bearer Tokens" to

 "The BEARER HTTP authentication scheme", or

"Using Bearer Tokens in HTTP requests".



2. The abstract should say this is a mechanism for HTTP requests. My sugges=
tion:

  "This specification describes how to include a bearer token conveying aut=
horization information in an HTTP request. It also describes how to recogni=
ze a bearer token delivered by an OAuth 2.0 delegation flow."



3. We shouldn't "treat" an access token as a bearer token. A particular tok=
en either "is" a bearer token, or not (in which case "treating" it as a bea=
rer token is wrong). Perhaps change:

"treating an OAuth access token as a bearer token" to

"when an OAuth access token is a bearer token".



4. Drop most of the "Introduction" and all of the "Overview". These are all=
 about OAuth2 core and aren't necessary for understanding how to use a bear=
er token in an HTTP request. Here is my suggestion:

"Introduction



"A bearer token is the simplest mechanism for a client to convey its author=
ity when sending a request to a server. A server accepting a bearer token a=
ssumes the authority it represents applies to whom ever presented it. That =
is, there is no additional authentication of the client. Consequently, it i=
s crucial that a bearer token is never exposed to any party that might misu=
se it. Using bearer tokens that only represents a limited amount of authori=
ty, in a specific context, for a short amount of time can reduce the risks =
of using bearer tokens.



"This document specifies the "BEARER" HTTP authentication scheme for convey=
ing a bearer token in an HTTP request header. It also specifies two alterna=
tives for situations where it is infeasible for clients to modify HTTP head=
ers: a URI query parameter; and a parameter in the body of a POST that uses=
 the application/x-www-form-urlencoded media type.



"For example:

  GET /resource HTTP/1.1

  Host: example.com

  Authorization: BEARER vF9dft4qmTG_fdf-qwAS



"One possible source of dynamically issued bearer tokens is an OAuth 2.0 fl=
ow for user delegation or credential exchange as specified in [OAUTH2]. Sec=
tion X of this document describes how a bearer token is represented in an O=
Auth 2.0 token response."



5. Section 2 "Authenticated Requests" starts with "clients make authenticat=
ed token requests using...". It sounds like the client is requesting a toke=
n, as opposed to using it. The term "authenticated token" confuses me a bit=
. Perhaps this section could start with:

  "Clients make requests with a bearer token using...".

Section 2.1 similarly talks about "authenticated token requests".



6. The multiple "MAY support" statements about the different methods in sec=
tion 2 "Authenticated Requests" awkwardly overlap: MAY support additional m=
ethods [other than Authorization header]; MAY attempt to use POST body; MAY=
 support these alternatives (POST body and URI query param).

How about:

"Sections 2.1, 2.2 and 2.3 defines how a bearer token can be carried in an =
HTTP header, a POST body, and a URI respectively. A server MUST support the=
 HTTP header approach, MAY support the POST body approach, and MAY support =
the URI approach."



7. The ABNF for the Authorization header <credentials> doesn't comply with =
the ABNF in draft-ietf-httpbis-p7-auth-12. HTTPbis has relaxed the ABNF fro=
m its original spec in RFC2617 to accommodate schemes that use a base64 blo=
b, instead of comma-separated name=3Dvalue pairs, but it doesn't allow a mi=
x of both forms. Acceptably choices for this spec are (from my most preferr=
ed to least): 1) use "BEARER a=3D<token>"; 2) use "BEARER <token>" with no =
extensions possible; 3) get a change to HTTPbis.



8. The allowed characters in <access-token> is crazy. Using <quoted-char>, =
but not within quotes is not a good sign?!

Token issuers don't need 93 allowed chars, just allow the 66 web-safe ones =
and make it simpler for everyone.



9. Don't say oauth_token SHOULD be the last parameter. This "SHOULD" has no=
 useful purpose for clients or servers. All it can do is: add more code to =
clients to make it the last param (as opposed to treating it like any param=
, perhaps held in a Map/dictionary/associative-arrray); encourage servers t=
o make dangerous checks, such as looking for the last occurrence of "&oauth=
_token=3D" instead of properly parsing the string.



10. Instead of concentrating on when a "WWW-Authenticate: Bearer" response =
header MUST be returned, we should focus what it means when it is present i=
n a response. Servers can return it when they need that meaning. This would=
 makes it clearer that it can be included with, say, a 200 OK response to i=
ndicate that more would be available if a bearer token had been included.



11. The "WWW-Authenticate: Bearer" response header would be a good place fo=
r the server to indicate whether or not it supports the URI & POST-body opt=
ional methods for conveying a bearer token. Perhaps a supports=3D"body quer=
y" parameter?



12. A section explaining how a client can recognizes when a OAuth 2.0 token=
 response contains a bearer token is needed. It would simply says that the =
token_type parameter SHALL have the value "bearer" when the token is intend=
ed to be used with the methods defined in this spec.



13. "Message Authentication Code (MAC)" is a better term than "keyed messag=
e digest" when describing how a token can be protected. Keyed message diges=
ts are only a subset of MACs, which can also be constructed from block ciph=
ers for instance.



13. The threat mitigation (3.2) text about passing-by-reference is not quit=
e right. Suggestion:

  "Alternatively, a bearer token can be a reference to authorization inform=
ation, rather than encoding the information directly. Such references MUST =
be infeasible for an attacker to guess, for instance by being randomly chos=
en 128-bit values (22 base64url characters). Using a reference may require =
an extra interaction between a server and the token issuer to resolve the r=
eference to the authorization information."



14. Drop "with OAuth" from the first recommendation in 3.3. It is true for =
any use of the BEARER scheme.

 "This is the primary security consideration when using bearer tokens with =
OAuth..."



15. "Don't pass bearer tokens in page URLs" is a rather strange recommendat=
ion given the spec defines a way to do just this. The recommendation goes o=
n to say "pass browser tokens in message bodies", but elsewhere we recommen=
d using the Authorization header in preference to the body. Plus I guess "b=
rowser token" should be "bearer token".

Perhaps this recommendation is not about a client making requests to a reso=
urce server, but a client caching items in a user's browser for whom it is =
acting. If this is the case, the advice should be moved out of this spec an=
d into OAuth 2.0 core.



16. "Don't store bearer tokens in cookies" has a MUST NOT "as cookies are g=
enerally sent in the clear", which seems harsh given that a server can use =
HTTPS to set a cookie and include a "secure" attribute so it is only return=
ed over HTTPS. How about just telling servers to do these two things?



17. "Issue short-lived bearer tokens" mentions "the User-Agent" flow, but I=
 think that has changed names. Perhaps rephrase it generically: "Only short=
-lived bearer tokens should be issued to clients that run within a web brow=
ser".



--

James Manger




--_000_255B9BB34FB7D647A506DC292726F6E1127F5DFA5FWSMSG3153Vsrv_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle18
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
-->
</style><!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-AU" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Comments on the bearer token spec:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">1. There is a whole lot of text about OAuth2 get-a-t=
oken parts that isn&#8217;t necessary in the bearer token spec.<o:p></o:p><=
/p>
<p class=3D"MsoNormal">A bit of context can be useful to a reader, but in t=
his case it brings too much of the complexity of the get-a-token flows into=
 what should be a quite simple spec. It is not as though it can replace rea=
ding OAuth2 core.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">1a. Change the title from &#8220;The OAuth 2.0 Proto=
col: Bearer Tokens&#8221; to<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&#8220;The BEARER HTTP authentication scheme&#=
8221;, or<o:p></o:p></p>
<p class=3D"MsoNormal">&#8220;Using Bearer Tokens in HTTP requests&#8221;.<=
o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">2. The abstract should say this is a mechanism for H=
TTP requests. My suggestion:<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp; &#8220;This specification describes how to in=
clude a bearer token conveying authorization information in an HTTP request=
. It also describes how to recognize a bearer token delivered by an OAuth 2=
.0 delegation flow.&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">3. We shouldn&#8217;t &#8220;treat&#8221; an access =
token as a bearer token. A particular token either &#8220;is&#8221; a beare=
r token, or not (in which case &#8220;treating&#8221; it as a bearer token =
is wrong). Perhaps change:<o:p></o:p></p>
<p class=3D"MsoNormal">&#8220;treating an OAuth access token as a bearer to=
ken&#8221; to<o:p></o:p></p>
<p class=3D"MsoNormal">&#8220;when an OAuth access token is a bearer token&=
#8221;.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">4. Drop most of the &#8220;Introduction&#8221; and a=
ll of the &#8220;Overview&#8221;. These are all about OAuth2 core and aren&=
#8217;t necessary for understanding how to use a bearer token in an HTTP re=
quest. Here is my suggestion:<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt">&#8220;Introduction<o:p=
></o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt">&#8220;A bearer token i=
s the simplest mechanism for a client to convey its authority when sending =
a request to a server. A server accepting a bearer token assumes the author=
ity it represents applies to whom ever presented
 it. That is, there is no additional authentication of the client. Conseque=
ntly, it is crucial that a bearer token is never exposed to any party that =
might misuse it. Using bearer tokens that only represents a limited amount =
of authority, in a specific context,
 for a short amount of time can reduce the risks of using bearer tokens.<o:=
p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt">&#8220;This document sp=
ecifies the &#8220;BEARER&#8221; HTTP authentication scheme for conveying a=
 bearer token in an HTTP request header. It also specifies two alternatives=
 for situations where it is infeasible for clients to
 modify HTTP headers: a URI query parameter; and a parameter in the body of=
 a POST that uses the application/x-www-form-urlencoded media type.<o:p></o=
:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt">&#8220;For example:<o:p=
></o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt">&nbsp; GET /resource HT=
TP/1.1<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt">&nbsp; Host: example.co=
m<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt">&nbsp; Authorization: B=
EARER vF9dft4qmTG_fdf-qwAS<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:36.0pt">&#8220;One possible sou=
rce of dynamically issued bearer tokens is an OAuth 2.0 flow for user deleg=
ation or credential exchange as specified in [OAUTH2]. Section X of this do=
cument describes how a bearer token is represented
 in an OAuth 2.0 token response.&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">5. Section 2 &#8220;Authenticated Requests&#8221; st=
arts with &#8220;clients make authenticated token requests using&#8230;&#82=
21;. It sounds like the client is requesting a token, as opposed to using i=
t. The term &#8220;authenticated token&#8221; confuses me a bit. Perhaps th=
is
 section could start with:<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&#8220;Clients make requests with a bear=
er token using&#8230;&#8221;.<o:p></o:p></p>
<p class=3D"MsoNormal">Section 2.1 similarly talks about &#8220;authenticat=
ed token requests&#8221;.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">6. The multiple &#8220;MAY support&#8221; statements=
 about the different methods in section 2 &#8220;Authenticated Requests&#82=
21; awkwardly overlap: MAY support additional methods [other than Authoriza=
tion header]; MAY attempt to use POST body; MAY support these
 alternatives (POST body and URI query param).<o:p></o:p></p>
<p class=3D"MsoNormal">How about:<o:p></o:p></p>
<p class=3D"MsoNormal">&#8220;Sections 2.1, 2.2 and 2.3 defines how a beare=
r token can be carried in an HTTP header, a POST body, and a URI respective=
ly. A server MUST support the HTTP header approach, MAY support the POST bo=
dy approach, and MAY support the URI approach.&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">7. The ABNF for the Authorization header &lt;credent=
ials&gt; doesn&#8217;t comply with the ABNF in draft-ietf-httpbis-p7-auth-1=
2. HTTPbis has relaxed the ABNF from its original spec in RFC2617 to accomm=
odate schemes that use a base64 blob, instead
 of comma-separated name=3Dvalue pairs, but it doesn&#8217;t allow a mix of=
 both forms. Acceptably choices for this spec are (from my most preferred t=
o least): 1) use &#8220;BEARER a=3D&lt;token&gt;&#8221;; 2) use &#8220;BEAR=
ER &lt;token&gt;&#8221; with no extensions possible; 3) get a change to HTT=
Pbis.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">8. The allowed characters in &lt;access-token&gt; is=
 crazy. Using &lt;quoted-char&gt;, but not within quotes is not a good sign=
?!<o:p></o:p></p>
<p class=3D"MsoNormal">Token issuers don&#8217;t need 93 allowed chars, jus=
t allow the 66 web-safe ones and make it simpler for everyone.<o:p></o:p></=
p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">9. Don&#8217;t say oauth_token SHOULD be the last pa=
rameter. This &#8220;SHOULD&#8221; has no useful purpose for clients or ser=
vers. All it can do is: add more code to clients to make it the last param =
(as opposed to treating it like any param, perhaps held
 in a Map/dictionary/associative-arrray); encourage servers to make dangero=
us checks, such as looking for the last occurrence of &#8220;&amp;oauth_tok=
en=3D&#8221; instead of properly parsing the string.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">10. Instead of concentrating on when a &#8220;WWW-Au=
thenticate: Bearer&#8221; response header MUST be returned, we should focus=
 what it means when it is present in a response. Servers can return it when=
 they need that meaning. This would makes it clearer
 that it can be included with, say, a 200 OK response to indicate that more=
 would be available if a bearer token had been included.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">11. The &#8220;WWW-Authenticate: Bearer&#8221; respo=
nse header would be a good place for the server to indicate whether or not =
it supports the URI &amp; POST-body optional methods for conveying a bearer=
 token. Perhaps a supports=3D&#8221;body query&#8221; parameter?<o:p></o:p>=
</p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">12. A section explaining how a client can recognizes=
 when a OAuth 2.0 token response contains a bearer token is needed. It woul=
d simply says that the token_type parameter SHALL have the value &#8220;bea=
rer&#8221; when the token is intended to be used
 with the methods defined in this spec.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">13. &#8220;Message Authentication Code (MAC)&#8221; =
is a better term than &#8220;keyed message digest&#8221; when describing ho=
w a token can be protected. Keyed message digests are only a subset of MACs=
, which can also be constructed from block ciphers for instance.<o:p></o:p>=
</p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">13. The threat mitigation (3.2) text about passing-b=
y-reference is not quite right. Suggestion:<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp; &#8220;Alternatively, a bearer token can be a=
 reference to authorization information, rather than encoding the informati=
on directly. Such references MUST be infeasible for an attacker to guess, f=
or instance by being randomly chosen 128-bit
 values (22 base64url characters). Using a reference may require an extra i=
nteraction between a server and the token issuer to resolve the reference t=
o the authorization information.&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">14. Drop &#8220;with OAuth&#8221; from the first rec=
ommendation in 3.3. It is true for any use of the BEARER scheme.<o:p></o:p>=
</p>
<p class=3D"MsoNormal">&nbsp;&#8220;This is the primary security considerat=
ion when using bearer tokens with OAuth&#8230;&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">15. &#8220;Don&#8217;t pass bearer tokens in page UR=
Ls&#8221; is a rather strange recommendation given the spec defines a way t=
o do just this. The recommendation goes on to say &#8220;pass browser token=
s in message bodies&#8221;, but elsewhere we recommend using the
 Authorization header in preference to the body. Plus I guess &#8220;browse=
r token&#8221; should be &#8220;bearer token&#8221;.<o:p></o:p></p>
<p class=3D"MsoNormal">Perhaps this recommendation is not about a client ma=
king requests to a resource server, but a client caching items in a user&#8=
217;s browser for whom it is acting. If this is the case, the advice should=
 be moved out of this spec and into OAuth
 2.0 core.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">16. &#8220;Don&#8217;t store bearer tokens in cookie=
s&#8221; has a MUST NOT &#8220;as cookies are generally sent in the clear&#=
8221;, which seems harsh given that a server can use HTTPS to set a cookie =
and include a &#8220;secure&#8221; attribute so it is only returned over HT=
TPS.
 How about just telling servers to do these two things?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">17. &#8220;Issue short-lived bearer tokens&#8221; me=
ntions &#8220;the User-Agent&#8221; flow, but I think that has changed name=
s. Perhaps rephrase it generically: &#8220;Only short-lived bearer tokens s=
hould be issued to clients that run within a web browser&#8221;.<o:p></o:p>=
</p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">--<o:p></o:p></p>
<p class=3D"MsoNormal">James Manger<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_255B9BB34FB7D647A506DC292726F6E1127F5DFA5FWSMSG3153Vsrv_--

From craig.heath@wacapps.net  Thu Mar  3 01:04:36 2011
Return-Path: <craig.heath@wacapps.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4FA243A6882 for <oauth@core3.amsl.com>; Thu,  3 Mar 2011 01:04:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.528
X-Spam-Level: 
X-Spam-Status: No, score=-2.528 tagged_above=-999 required=5 tests=[AWL=0.070,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Naz9CGRTcybV for <oauth@core3.amsl.com>; Thu,  3 Mar 2011 01:04:30 -0800 (PST)
Received: from out02.themessagecenter.com (out02.themessagecenter.com [208.113.96.229]) by core3.amsl.com (Postfix) with ESMTP id E37573A699C for <oauth@ietf.org>; Thu,  3 Mar 2011 01:04:30 -0800 (PST)
Received: from [192.168.66.109] by out02.themessagecenter.com with ESMTP (Tumbleweed Email Firewall SMTP Relay); Thu, 03 Mar 2011 00:53:29 -0800
X-Server-Uuid: 385D78BC-A8BE-4780-80CD-A503E34C32DD
Received: from EX-CH-002-SFO.shared.themessagecenter.com (192.168.66.93) by EX-CH-004-SFO.shared.themessagecenter.com (192.168.66.110) with Microsoft SMTP Server (TLS) id 8.1.393.1; Thu, 3 Mar 2011 01:05:11 -0800
Received: from ex-be-016-sfo.shared.themessagecenter.com ( [192.168.66.102]) by EX-CH-002-SFO.shared.themessagecenter.com ( [64.151.95.180]) with mapi; Thu, 3 Mar 2011 01:05:11 -0800
From: "Craig Heath" <craig.heath@wacapps.net>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 3 Mar 2011 01:06:18 -0800
Thread-Topic: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secret?
Thread-Index: AcvZAYG4U5dLvKGJQXyOocum691xEQAFn/swAAEZosYABQzQ0AAUXp0A
Message-ID: <4EDB411A4D566C45BE3AB6E0152BFAF92761AC1D1C@EX-BE-016-SFO.shared.themessagecenter.com>
References: <Ns3TvYk5gRSf@HZMCnr0d> <90C41DD21FB7C64BB94121FBBC2E7234464F0C3F4B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F0C3F4B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
MIME-Version: 1.0
X-WSS-ID: 617188833PS15555354-01-01
Content-Type: multipart/alternative; boundary=_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1D1CEXBE016SFOsha_
Subject: Re: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secret?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2011 09:04:36 -0000

--_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1D1CEXBE016SFOsha_
Content-Type: text/plain;
 charset=us-ascii
Content-Transfer-Encoding: quoted-printable

"... if the client has multiple instances ..."

Aha, the penny drops!  Thank you :-)

- Craig.

From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]
Sent: 02 March 2011 23:27
To: Craig Heath; oauth@ietf.org
Subject: RE: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared S=
ecret?

It limits the ability to exchange the token in cases where the client has n=
o private secret, or if the client has multiple instances using the same cr=
edentials (providing an isolation between them). You need to make your own =
security analysis of the protocol and your needs.

EHL


From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of C=
raig Heath
Sent: Wednesday, March 02, 2011 12:57 PM
To: oauth@ietf.org
Subject: Re: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared S=
ecret?


Thanks for the quick response!  Can I ask a more specific question:  What's=
 the security purpose of the Temporary Credentials shared secret?  If an im=
plementation were to, say, always use an empty string, would it make any di=
fference to the security of the protocol?



- Craig.

-----Original Message-----

From: Eran Hammer-Lahav

Sent:  02-03-2011, 8:27  pm

To: Craig Heath; oauth@ietf.org

Subject: RE: RFC5849 - Purpose of Temporary Credentials Shared Secret?


Because it uses the same method of making authenticated requests as everyth=
ing else. It's just a result of pushing everything through a single functio=
n.

EHL

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of C=
raig Heath
Sent: Wednesday, March 02, 2011 10:05 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] RFC5849 - Purpose of Temporary Credentials Shared Secre=
t?

Hello!  Can some kind soul help me understand the purpose of the shared sec=
ret part of the Temporary Credentials in RFC5849?

- The client authenticates using the Cient Credentials, and gets the Tempor=
ary Credentials.
- The Resource Owner gives their authorization.
- The Temporary Credentials are then used in the Token Credentials Request.

The part that's puzzling me is the RFC says the client authenticates using =
*both* the Client Credentials and the Token Credentials in the Token Creden=
tials Request.  I could understand one or the other, but why both? (and inc=
identally, how can it provide both?)  Clearly the Token Credentials identif=
ier is needed, as it is part of the Token Credentials Request; it's only th=
e shared secret I'm wondering about (the "oauth_token_secret" part of the r=
eponse to the Temporary Credentials Request).

My best guess so far is that it is intended to allow for the case when the =
Client Credentials are not secret, but in that case why use the Client Cred=
entials at all in the Token Credential Request?

Thanks for any light shed on this!

- Craig Heath.

--_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1D1CEXBE016SFOsha_
Content-Type: text/html;
 charset=us-ascii
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-GB link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'c=
olor:#1F497D'>&quot;&#8230; </span><span lang=3DEN-US style=3D'color:#1F497=
D'>if the client has multiple instances &#8230;&quot;<o:p></o:p></span></p>=
<p class=3DMsoNormal><span lang=3DEN-US style=3D'color:#1F497D'><o:p>&nbsp;=
</o:p></span></p><p class=3DMsoNormal><span lang=3DEN-US style=3D'color:#1F=
497D'>Aha, the penny drops!&nbsp; Thank you :-)<o:p></o:p></span></p><p cla=
ss=3DMsoNormal><span lang=3DEN-US style=3D'color:#1F497D'><o:p>&nbsp;</o:p>=
</span></p><p class=3DMsoNormal><span lang=3DEN-US style=3D'color:#1F497D'>=
- Craig.</span><span style=3D'color:#1F497D'><o:p></o:p></span></p><p class=
=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><div=
><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm=
 0cm 0cm'><p class=3DMsoNormal><b><span lang=3DEN-US style=3D'font-size:10.=
0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span lang=3DEN-US s=
tyle=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> Eran Hammer-La=
hav [mailto:eran@hueniverse.com] <br><b>Sent:</b> 02 March 2011 23:27<br><b=
>To:</b> Craig Heath; oauth@ietf.org<br><b>Subject:</b> RE: [OAUTH-WG] RFC5=
849 - Purpose of Temporary Credentials Shared Secret?<o:p></o:p></span></p>=
</div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>=
<span lang=3DEN-US style=3D'color:#1F497D'>It limits the ability to exchang=
e the token in cases where the client has no private secret, or if the clie=
nt has multiple instances using the same credentials (providing an isolatio=
n between them). You need to make your own security analysis of the protoco=
l and your needs.<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN=
-US style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNorma=
l><span lang=3DEN-US style=3D'color:#1F497D'>EHL<o:p></o:p></span></p><p cl=
ass=3DMsoNormal><span lang=3DEN-US style=3D'color:#1F497D'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span lang=3DEN-US style=3D'color:#1F497D'=
><o:p>&nbsp;</o:p></span></p><div style=3D'border:none;border-left:solid bl=
ue 1.5pt;padding:0cm 0cm 0cm 4.0pt'><div><div style=3D'border:none;border-t=
op:solid #B5C4DF 1.0pt;padding:3.0pt 0cm 0cm 0cm'><p class=3DMsoNormal><b><=
span lang=3DEN-US style=3D'font-size:10.0pt;font-family:"Tahoma","sans-seri=
f"'>From:</span></b><span lang=3DEN-US style=3D'font-size:10.0pt;font-famil=
y:"Tahoma","sans-serif"'> oauth-bounces@ietf.org [mailto:oauth-bounces@ietf=
.org] <b>On Behalf Of </b>Craig Heath<br><b>Sent:</b> Wednesday, March 02, =
2011 12:57 PM<br><b>To:</b> oauth@ietf.org<br><b>Subject:</b> Re: [OAUTH-WG=
] RFC5849 - Purpose of Temporary Credentials Shared Secret?<o:p></o:p></spa=
n></p></div></div><p class=3DMsoNormal><span lang=3DEN-US><o:p>&nbsp;</o:p>=
</span></p><pre><span lang=3DEN-US style=3D'font-family:"Tahoma","sans-seri=
f";color:black'>Thanks for the quick response!&nbsp; Can I ask a more speci=
fic question:&nbsp; What's the security purpose of the Temporary Credential=
s shared secret?&nbsp; If an implementation were to, say, always use an emp=
ty string, would it make any difference to the security of the protocol?<o:=
p></o:p></span></pre><pre><span lang=3DEN-US style=3D'font-family:"Tahoma",=
"sans-serif";color:black'><o:p>&nbsp;</o:p></span></pre><pre><span lang=3DE=
N-US style=3D'font-family:"Tahoma","sans-serif";color:black'>- Craig.<o:p><=
/o:p></span></pre><pre><span lang=3DEN-US style=3D'font-family:"Tahoma","sa=
ns-serif";color:black'>-----Original Message-----<o:p></o:p></span></pre><p=
re><span lang=3DEN-US style=3D'font-family:"Tahoma","sans-serif";color:blac=
k'>From: Eran Hammer-Lahav<o:p></o:p></span></pre><pre><span lang=3DEN-US s=
tyle=3D'font-family:"Tahoma","sans-serif";color:black'>Sent:&nbsp; 02-03-20=
11, 8:27&nbsp; pm<o:p></o:p></span></pre><pre><span lang=3DEN-US style=3D'f=
ont-family:"Tahoma","sans-serif";color:black'>To: Craig Heath; oauth@ietf.o=
rg<o:p></o:p></span></pre><pre><span lang=3DEN-US style=3D'font-family:"Tah=
oma","sans-serif";color:black'>Subject: RE: RFC5849 - Purpose of Temporary =
Credentials Shared Secret?<o:p></o:p></span></pre><pre><span lang=3DEN-US s=
tyle=3D'font-family:"Tahoma","sans-serif";color:black'><o:p>&nbsp;</o:p></s=
pan></pre><div><p class=3DMsoNormal><span lang=3DEN-US style=3D'color:#1F49=
7D'>Because it uses the same method of making authenticated requests as eve=
rything else. It&#8217;s just a result of pushing everything through a sing=
le function.<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-US s=
tyle=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><sp=
an lang=3DEN-US style=3D'color:#1F497D'>EHL<o:p></o:p></span></p><p class=
=3DMsoNormal><span lang=3DEN-US style=3D'color:#1F497D'><o:p>&nbsp;</o:p></=
span></p><div style=3D'border:none;border-left:solid blue 1.5pt;padding:0cm=
 0cm 0cm 4.0pt'><div><div style=3D'border:none;border-top:solid #B5C4DF 1.0=
pt;padding:3.0pt 0cm 0cm 0cm'><p class=3DMsoNormal><b><span lang=3DEN-US st=
yle=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b>=
<span lang=3DEN-US style=3D'font-size:10.0pt;font-family:"Tahoma","sans-ser=
if"'> oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] <b>On Behalf O=
f </b>Craig Heath<br><b>Sent:</b> Wednesday, March 02, 2011 10:05 AM<br><b>=
To:</b> oauth@ietf.org<br><b>Subject:</b> [OAUTH-WG] RFC5849 - Purpose of T=
emporary Credentials Shared Secret?<o:p></o:p></span></p></div></div><p cla=
ss=3DMsoNormal><span lang=3DEN-US><o:p>&nbsp;</o:p></span></p><p class=3DMs=
oNormal>Hello!&nbsp; Can some kind soul help me understand the purpose of t=
he shared secret part of the Temporary Credentials in RFC5849?<o:p></o:p></=
p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>- The clie=
nt authenticates using the Cient Credentials, and gets the Temporary Creden=
tials.<o:p></o:p></p><p class=3DMsoNormal>- The Resource Owner gives their =
authorization.<o:p></o:p></p><p class=3DMsoNormal>- The Temporary Credentia=
ls are then used in the Token Credentials Request.<o:p></o:p></p><p class=
=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>The part that's puzz=
ling me is the RFC says the client authenticates using *both* the Client Cr=
edentials and the Token Credentials in the Token Credentials Request.&nbsp;=
 I could understand one or the other, but why both? (and incidentally, how =
can it provide both?)&nbsp; Clearly the Token Credentials identifier is nee=
ded, as it is part of the Token Credentials Request; it's only the shared s=
ecret I'm wondering about (the &quot;oauth_token_secret&quot; part of the r=
eponse to the Temporary Credentials Request).<o:p></o:p></p><p class=3DMsoN=
ormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>My best guess so far is tha=
t it is intended to allow for the case when the Client Credentials are not =
secret, but in that case why use the Client Credentials at all in the Token=
 Credential Request?<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></=
p><p class=3DMsoNormal>Thanks for any light shed on this! <o:p></o:p></p><p=
 class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>- Craig Heath.=
<o:p></o:p></p></div></div></div></div></body></html>=

--_000_4EDB411A4D566C45BE3AB6E0152BFAF92761AC1D1CEXBE016SFOsha_--


From pflam@cs.stanford.edu  Thu Mar  3 01:51:19 2011
Return-Path: <pflam@cs.stanford.edu>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0DF7E3A687F for <oauth@core3.amsl.com>; Thu,  3 Mar 2011 01:51:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.256
X-Spam-Level: 
X-Spam-Status: No, score=-5.256 tagged_above=-999 required=5 tests=[AWL=-0.742, BAYES_00=-2.599, HTML_FONT_FACE_BAD=0.884, HTML_MESSAGE=0.001, J_CHICKENPOX_27=0.6, J_CHICKENPOX_42=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jmjv0kjnWmJD for <oauth@core3.amsl.com>; Thu,  3 Mar 2011 01:51:16 -0800 (PST)
Received: from cs-smtp-1.Stanford.EDU (cs-smtp-1.Stanford.EDU [171.64.64.25]) by core3.amsl.com (Postfix) with ESMTP id 87AB13A6827 for <oauth@ietf.org>; Thu,  3 Mar 2011 01:51:16 -0800 (PST)
Received: from secllab.stanford.edu ([171.64.65.88] helo=css-macbook-pro-9.local) by cs-smtp-1.Stanford.EDU with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.60) (envelope-from <pflam@cs.stanford.edu>) id 1Pv5Cn-0002q3-6F; Thu, 03 Mar 2011 01:52:22 -0800
Message-ID: <4D6F64D0.3040608@cs.stanford.edu>
Date: Thu, 03 Mar 2011 01:52:16 -0800
From: pflam@cs.stanford.edu
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.14) Gecko/20110221 Lightning/1.0b2 OracleBeehiveExtension/1.0.0.0-OracleInternal Thunderbird/3.1.8
MIME-Version: 1.0
To: "Lu, Hui-Lan (Huilan)" <huilan.lu@alcatel-lucent.com>
Content-Type: multipart/alternative; boundary="------------030409060802030006010107"
X-Scan-Signature: 5d4d7bb02bad719eb6b7853edc1469aa
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] validate authorization code in draft 12
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2011 09:51:19 -0000

This is a multi-part message in MIME format.
--------------030409060802030006010107
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Hi Huilan,

If you are referring to the 'state' parameter (or some other way such as 
a session cookie that the client uses to track the state of the 
request), there are a few limitations:
a) it is an optional feature as far as the spec is concerned,
b) it is not sufficient to prevent a DDoS attack. See the discussion 
below regarding "3. CSRF defense/the 'state' parameter don't completely 
address this problem."

Regards,
Eric

On Wed, Mar 2, 2011 at 3:23 PM, Lu, Hui-Lan 
(Huilan)<huilan.lu@alcatel-lucent.com>wrote:

    I agree with Tosten. Ahealthy client is not expected to issue an
    access token request unconditionally when receiving an authorization
    code at its redirect_uri. The client should do so only if it is in
    the right state with a correlatable authorization request pending.
    Best regards,

    Huilan LU


    CONFIDENTIALITY NOTICE: This e-mail and any files attached may
    contain confidential and proprietary information of Alcatel-Lucent
    and/or its affiliated entities. Access by the intended recipient
    only is authorized. Any liability arising from any party acting, or
    refraining from acting, on any information contained in this e-mail
    is hereby excluded. If you are not the intended recipient, please
    notify the sender immediately, destroy the original transmission and
    its attachments and do not disclose the contents to any other
    person, use it for any purpose, or store or copy the information in
    any medium. Copyright in this e-mail and any attachments belongs to
    Alcatel-Lucent and/or its affiliated entities.

        ------------------------------------------------------------------------
        *From:*oauth-bounces@ietf.org
        <mailto:oauth-bounces@ietf.org>[mailto:oauth-bounces@ietf.org
        <mailto:oauth-bounces@ietf.org>]*On Behalf Of*Torsten Lodderstedt
        *Sent:*Monday, February 07, 2011 3:56 PM
        *To:*Eric
        *Cc:*oauth@ietf.org <mailto:oauth@ietf.org>

        *Subject:*Re: [OAUTH-WG] validate authorization code in draft 12

        Hi Eric,

        I'm trying to understand the attack you described. I would
        expect any client to mark its web sessions if it triggers an
        authorization process. If so, the attacker would need to forge a
        valid client session in the right state (authz process in
        progress) in order to place a sucessful attack. For a typical
        web application this would require the attacker to login to this
        app and kick off the authorization process. This requires more
        than one additional http call.

        What do you think?

        regards,
        Torsten.

        Am 21.01.2011 09:30, schrieb Eric:
>         Eran, and others,
>
>         A few of us had some discussions on the authorization code
>         flow, as depicted in Fig. 3 of the current (12th) draft. We
>         think that it is probably worthwhile to suggest in the
>         specification that an OAuth implementation SHOULD provide a
>         way for the client to validate the authorization code before
>         sending it to the  Authorization Server (AS). From what we
>         have heard, this has been done in some of the current OAuth
>         deployments. There are other people who do not think this is
>         such a big security risk, although so far no one has objected
>         that there is some risk here.
>
>         The issue is that according to the current draft, someone
>         whoowns a botnet can locate the redirect URIs of clients that
>         listen on HTTP, and access them with random authorization
>         codes, and cause HTTPS connections to be made on the
>         Authorization Server (AS). There are a few things that the
>         attacker can achieve with this OAuth flow that he cannot
>         easily achieve otherwise :
>
>         1. Cost magnification: the attacker incurs the cost of an HTTP
>         connection and causes an HTTPS connection to be made on the
>         AS; and he can co-ordinate the timing of such HTTPS
>         connections across multiple clients relatively easily, if
>         these clients blindly connect to the AS without first
>         validating the authorization codes received.
>
>         Although the attacker could achieve something similar, say by
>         including an iframe pointing to the HTTPS URL of the AS in an
>         HTTP web page and lure web  users to visit that page, timing
>         attacks using such a scheme is (say for the purpose of DDoS)
>         more difficult .
>
>         2. Connection laundering: if the AS realizes it is flooded by
>         HTTPS connections with illegitimate codes, it collects no
>         useful information about the attacker, since the clients act
>         as relays.
>
>         3. CSRF defense/the 'state' parameter don't completely address
>         this problem. With such a defense, the attacker might need to
>         incur an additional HTTP request to obtain a valid CSRF code/
>         state parameter. This does cut down the effectiveness of the
>         attack by a factor of 2, which is good. However, if the
>         HTTPS/HTTP cost ratio is higher than 2 (the cost factor is
>         estimated to be around 3.5x
>         athttp://www.semicomplete.com/blog/geekery/ssl-latency.html
>         <http://www.semicomplete.com/blog/geekery/ssl-latency.html>),
>         the attacker still achieves a cost magnification.
>
>         Our proposal is that the OAuth specification suggests that an
>         OAuth (Authorization Server) implementation SHOULD provide a
>         way for the client to validate the authorization code before
>         sending it to the  Authorization Server (AS). The specifics of
>         how to validate the authorization code may not need to be part
>         of the core specification. We sketch a design below for
>         consideration for future implementation. It might be
>         reasonable to assume that OAuth implementations provide some
>         API for the client to call to validate and send the
>         authorization code to the AS. There are two possible schemes
>         for implementation: a) if the client and the AS already share
>         a symmetric secret, an HMAC key can be created from the shared
>         secret, and the authorization code will be HMAC'ed and
>         standard techniques can be employed in the client-side API
>         implementation to detect replay and forgery attempts on the
>         code; b) an alternative is for the AS to sign the code using
>         the private key from its SSL certificate, and for the client
>         API to validate the signature using the public key.
>
>
>
>         On Thu, Jan 20, 2011 at 4:56 PM, Eran
>         Hammer-Lahav<eran@hueniverse.com>
>         <mailto:eran@hueniverse.com>wrote:
>
>             Draft -12 is finally out.
>
>             This is almost a complete rewrite of the entire document,
>             with the primary goal of moving it back to a similar
>             structure used in -05. I have been thinking about this for
>             a few months and finally came up with a structure that
>             combines the two approaches.
>
>             The draft includes some major cleanups, significantly
>             simpler language, reduces repeated prose, and tried to
>             keep prose to the introduction and normative language in
>             the rest of the specification. I took out sections that
>             broke the flow, and did my best to give this a linear
>             narrative that is easy to follow.
>
>             The draft includes the following normative changes:
>
>               o  Clarified 'token_type' as case insensitive.
>               o  Authorization endpoint requires TLS when an access
>             token is issued.
>               o  Removed client assertion credentials, mandatory HTTP
>             Basic authentication support for client credentials,
>             WWW-Authenticate header, and the OAuth2 authentication scheme.
>               o  Changed implicit grant (aka user-agent flow) error
>             response from query to fragment.
>               o  Removed the 'redirect_uri_mismatch' error code since
>             in such a case, the authorization server must not send the
>             error back to the client.
>               o  Defined access token type registry.
>
>             I would like to spend the coming week receiving and
>             applying feedback before requesting a WGLC for everything
>             but the security considerations section (missing) 2/1.
>
>             EHL
>
>
>
>             > -----Original Message-----
>             > From:oauth-bounces@ietf.org
>             <mailto:oauth-bounces@ietf.org>[mailto:oauth-bounces@ietf.org
>             <mailto:oauth-bounces@ietf.org>] On Behalf
>             > OfInternet-Drafts@ietf.org <mailto:Internet-Drafts@ietf.org>
>             > Sent: Thursday, January 20, 2011 4:45 PM
>             > To:i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
>             > Cc:oauth@ietf.org <mailto:oauth@ietf.org>
>             > Subject: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
>             >
>             > A New Internet-Draft is available from the on-line
>             Internet-Drafts directories.
>             > This draft is a work item of the Open Authentication
>             Protocol Working Group
>             > of the IETF.
>             >
>             >
>             >       Title           : The OAuth 2.0 Authorization Protocol
>             >       Author(s)       : E. Hammer-Lahav, et al.
>             >       Filename        : draft-ietf-oauth-v2-12.txt
>             >       Pages           : 46
>             >       Date            : 2011-01-20
>             >
>             > This specification describes the OAuth 2.0 authorization
>             protocol.
>             >
>             > A URL for this Internet-Draft is:
>             >http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt
>             <http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt>
>             >
>             > Internet-Drafts are also available by anonymous FTP at:
>             >ftp://ftp.ietf.org/internet-drafts/
>             <ftp://ftp.ietf.org/internet-drafts/>
>             >
>             > Below is the data which will enable a MIME compliant mail
>             reader
>             > implementation to automatically retrieve the ASCII
>             version of the Internet-
>             > Draft.
>             _______________________________________________
>             OAuth mailing list
>             OAuth@ietf.org <mailto:OAuth@ietf.org>
>             https://www.ietf.org/mailman/listinfo/oauth
>             <https://www.ietf.org/mailman/listinfo/oauth>
>
>
>
>
>         _______________________________________________
>         OAuth mailing list
>         OAuth@ietf.org  <mailto:OAuth@ietf.org>
>         https://www.ietf.org/mailman/listinfo/oauth  <https://www.ietf.org/mailman/listinfo/oauth>




--------------030409060802030006010107
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#ffffff">
    <span class="Apple-style-span" style="border-collapse: separate;
      color: rgb(0, 0, 0); font-family: Times; font-style: normal;
      font-variant: normal; font-weight: normal; letter-spacing: normal;
      line-height: normal; orphans: 2; text-indent: 0px; text-transform:
      none; white-space: normal; widows: 2; word-spacing: 0px;
      font-size: medium;"><span class="Apple-style-span"
        style="font-family: arial; font-size: small;">Hi Huilan,<br>
        <br>
        If you are referring to the 'state' parameter (or some other way
        such as a session cookie that the client uses to track the state
        of the request), there are a few limitations:<br>
        a) it is an optional feature as far as the spec is concerned,<br>
        b) it is not sufficient to prevent a DDoS attack. See the
        discussion below regarding "3. CSRF defense/the 'state'
        parameter don't completely address this problem."<br>
        <br>
        Regards,<br>
        Eric<br>
        <br>
        <div class="gmail_quote">On Wed, Mar 2, 2011 at 3:23 PM, Lu,
          Hui-Lan (Huilan)<span class="Apple-converted-space">&nbsp;</span><span
            dir="ltr"><a class="moz-txt-link-rfc2396E" href="mailto:huilan.lu@alcatel-lucent.com">&lt;huilan.lu@alcatel-lucent.com&gt;</a></span><span
            class="Apple-converted-space">&nbsp;</span>wrote:<br>
          <blockquote class="gmail_quote" style="margin: 0px 0px 0px
            0.8ex; border-left: 1px solid rgb(204, 204, 204);
            padding-left: 1ex;">
            <div bgcolor="#ffffff">
              <div dir="ltr" align="left"><span><font color="#0000ff"
                    face="Trebuchet MS" size="2">I agree with Tosten.&nbsp;A</font></span><span><font
                    color="#0000ff" face="Trebuchet MS" size="2"><span
                      class="Apple-converted-space">&nbsp;</span>healthy
                    client is not expected to issue an access token
                    request unconditionally when&nbsp;receiving an
                    authorization code at its redirect_uri. The
                    client&nbsp;should do so only if it&nbsp;is in the right state
                    with a correlatable&nbsp;authorization request pending.&nbsp;</font></span><span><font
                    size="2"><span><font color="#0000ff" face="Trebuchet
                        MS" size="2">&nbsp;&nbsp;</font></span></font></span></div>
              <div>&nbsp;</div>
              <div><font size="2">Best regards,<br>
                  <br>
                  Huilan LU<br>
                  <br>
                  <br>
                  CONFIDENTIALITY NOTICE: This e-mail and any files
                  attached may contain confidential and proprietary
                  information of Alcatel-Lucent and/or its affiliated
                  entities. Access by the intended recipient only is
                  authorized. Any liability arising from any party
                  acting, or refraining from acting, on any information
                  contained in this e-mail is hereby excluded. If you
                  are not the intended recipient, please notify the
                  sender immediately, destroy the original transmission
                  and its attachments and do not disclose the contents
                  to any other person, use it for any purpose, or store
                  or copy the information in any medium. Copyright in
                  this e-mail and any attachments belongs to
                  Alcatel-Lucent and/or its affiliated entities.<br>
                </font></div>
              <div>&nbsp;</div>
              <br>
              <blockquote dir="ltr" style="padding-left: 5px;
                margin-left: 5px; border-left: 2px solid rgb(0, 0, 255);
                margin-right: 0px;">
                <div dir="ltr" align="left" lang="en-us">
                  <hr><font face="Tahoma" size="2"><b>From:</b><span
                      class="Apple-converted-space">&nbsp;</span><a
                      href="mailto:oauth-bounces@ietf.org"
                      target="_blank">oauth-bounces@ietf.org</a><span
                      class="Apple-converted-space">&nbsp;</span>[mailto:<a
                      href="mailto:oauth-bounces@ietf.org"
                      target="_blank">oauth-bounces@ietf.org</a><wbr>]<span
                      class="Apple-converted-space">&nbsp;</span><b>On Behalf
                      Of<span class="Apple-converted-space">&nbsp;</span></b>Torsten
                    Lodderstedt<br>
                    <b>Sent:</b><span class="Apple-converted-space">&nbsp;</span>Monday,
                    February 07, 2011 3:56 PM<br>
                    <b>To:</b><span class="Apple-converted-space">&nbsp;</span>Eric<br>
                    <b>Cc:</b><span class="Apple-converted-space">&nbsp;</span><a
                      href="mailto:oauth@ietf.org" target="_blank">oauth@ietf.org</a>
                    <div class="im"><br>
                      <b>Subject:</b><span class="Apple-converted-space">&nbsp;</span>Re:
                      [OAUTH-WG] validate authorization code in draft 12<br>
                    </div>
                  </font><br>
                </div>
                <div>
                  <div class="h5">Hi Eric,<br>
                    <br>
                    I'm trying to understand the attack you described. I
                    would expect any client to mark its web sessions if
                    it triggers an authorization process. If so, the
                    attacker would need to forge a valid client session
                    in the right state (authz process in progress) in
                    order to place a sucessful attack. For a typical web
                    application this would require the attacker to login
                    to this app and kick off the authorization process.
                    This requires more than one additional http call.<br>
                    <br>
                    What do you think?<br>
                    <br>
                    regards,<br>
                    Torsten.<span class="Apple-converted-space">&nbsp;</span><br>
                    <br>
                    Am 21.01.2011 09:30, schrieb Eric:
                    <blockquote type="cite">Eran, and others,<br>
                      <br>
                      A few of us had some discussions on the
                      authorization code flow, as depicted in Fig. 3 of
                      the current (12th) draft. We think that it is
                      probably worthwhile to suggest in the
                      specification that an OAuth implementation SHOULD
                      provide a way for the client to validate the
                      authorization code before sending it to the&nbsp;
                      Authorization Server (AS). From what we have
                      heard, this has been done in some of the current
                      OAuth deployments. There are other people who do
                      not think this is such a big security risk,
                      although so far no one has objected that there is
                      some risk here.<br>
                      <br>
                      The issue is that according to the current draft,
                      someone who<span class="Apple-converted-space">&nbsp;</span>
                      <span class="Apple-converted-space">&nbsp;</span><span
                        class="Apple-converted-space">&nbsp;</span> <span
                        class="Apple-converted-space">&nbsp;</span>owns a
                      botnet can locate the redirect URIs of clients
                      that listen on HTTP, and access them with random
                      authorization codes, and cause HTTPS connections
                      to be made on the Authorization Server (AS). There
                      are a few things that the attacker can achieve
                      with this OAuth flow that he cannot easily achieve
                      otherwise :<span class="Apple-converted-space">&nbsp;</span><br>
                      <br>
                      1. Cost magnification: the attacker incurs the
                      cost of an HTTP connection and causes an HTTPS
                      connection to be made on the AS; and he can
                      co-ordinate the timing of such HTTPS connections
                      across multiple clients relatively easily, if
                      these clients blindly connect to the AS without
                      first validating the authorization codes received.<br>
                      <br>
                      Although the attacker could achieve something
                      similar, say by including an iframe pointing to
                      the HTTPS URL of the AS in an HTTP web page and
                      lure web&nbsp; users to visit that page, timing attacks
                      using such a scheme is (say for the purpose of
                      DDoS) more difficult .<br>
                      <br>
                      2. Connection laundering: if the AS realizes it is
                      flooded by HTTPS connections with illegitimate
                      codes, it collects no useful information about the
                      attacker, since the clients act as relays.&nbsp;<span
                        class="Apple-converted-space">&nbsp;</span><br>
                      <br>
                      3. CSRF defense/the 'state' parameter don't
                      completely address this problem. With such a
                      defense, the attacker might need to incur an
                      additional HTTP request to obtain a valid CSRF
                      code/ state parameter. This does cut down the
                      effectiveness of the attack by a factor of 2,
                      which is good. However, if the HTTPS/HTTP cost
                      ratio is higher than 2 (the cost factor is
                      estimated to be around 3.5x at<span
                        class="Apple-converted-space">&nbsp;</span><a
                        href="http://www.semicomplete.com/blog/geekery/ssl-latency.html"
                        target="_blank">http://www.semicomplete.com/<wbr>blog/geekery/ssl-latency.html</a>)<wbr>,
                      the attacker still achieves a cost magnification.<br>
                      <br>
                      Our proposal is that the OAuth specification
                      suggests that an OAuth (Authorization Server)
                      implementation SHOULD provide a way for the client
                      to validate the authorization code before sending
                      it to the&nbsp; Authorization Server (AS). The
                      specifics of how to validate the authorization
                      code may not need to be part of the core
                      specification. We sketch a design below for
                      consideration for future implementation. It might
                      be reasonable to assume that OAuth implementations
                      provide some API for the client to call to
                      validate and send the authorization code to the
                      AS. There are two possible schemes for
                      implementation: a) if the client and the AS
                      already share a symmetric secret, an HMAC key can
                      be created from the shared secret, and the
                      authorization code will be HMAC'ed and standard
                      techniques can be employed in the client-side API
                      implementation to detect replay and forgery
                      attempts on the code; b) an alternative is for the
                      AS to sign the code using the private key from its
                      SSL certificate, and for the client API to
                      validate the signature using the public key.<br>
                      <br>
                      &nbsp;<span style="word-spacing: 0px; font: medium
                        Times; text-transform: none; color: rgb(0, 0,
                        0); text-indent: 0px; white-space: normal;
                        letter-spacing: normal; border-collapse:
                        separate;"><span style="font-size: small;
                          font-family: arial;"><br>
                          <br>
                          <div class="gmail_quote">On Thu, Jan 20, 2011
                            at 4:56 PM, Eran Hammer-Lahav<span>&nbsp;</span><span
                              dir="ltr"><a
                                href="mailto:eran@hueniverse.com"
                                target="_blank">&lt;eran@hueniverse.<wbr>com&gt;</a></span><span>&nbsp;</span>wrote:<br>
                            <blockquote class="gmail_quote"
                              style="padding-left: 1ex; margin: 0px 0px
                              0px 0.8ex; border-left: 1px solid rgb(204,
                              204, 204);">Draft -12 is finally out.<br>
                              <br>
                              This is almost a complete rewrite of the
                              entire document, with the primary goal of
                              moving it back to a similar structure used
                              in -05. I have been thinking about this
                              for a few months and finally came up with
                              a structure that combines the two
                              approaches.<br>
                              <br>
                              The draft includes some major cleanups,
                              significantly simpler language, reduces
                              repeated prose, and tried to keep prose to
                              the introduction and normative language in
                              the rest of the specification. I took out
                              sections that broke the flow, and did my
                              best to give this a linear narrative that
                              is easy to follow.<br>
                              <br>
                              The draft includes the following normative
                              changes:<br>
                              <br>
                              &nbsp; o &nbsp;Clarified 'token_type' as case
                              insensitive.<br>
                              &nbsp; o &nbsp;Authorization endpoint requires TLS
                              when an access token is issued.<br>
                              &nbsp; o &nbsp;Removed client assertion credentials,
                              mandatory HTTP Basic authentication
                              support for client credentials,
                              WWW-Authenticate header, and the OAuth2
                              authentication scheme.<br>
                              &nbsp; o &nbsp;Changed implicit grant (aka
                              user-agent flow) error response from query
                              to fragment.<br>
                              &nbsp; o &nbsp;Removed the 'redirect_uri_mismatch'
                              error code since in such a case, the
                              authorization server must not send the
                              error back to the client.<br>
                              &nbsp; o &nbsp;Defined access token type registry.<br>
                              <br>
                              I would like to spend the coming week
                              receiving and applying feedback before
                              requesting a WGLC for everything but the
                              security considerations section (missing)
                              2/1.<br>
                              <br>
                              EHL<br>
                              <div>
                                <div><br>
                                  <br>
                                  <br>
                                  &gt; -----Original Message-----<br>
                                  &gt; From:<span>&nbsp;</span><a
                                    href="mailto:oauth-bounces@ietf.org"
                                    target="_blank">oauth-bounces@ietf.org</a><span>&nbsp;</span>[<wbr>mailto:<a
                                    href="mailto:oauth-bounces@ietf.org"
                                    target="_blank">oauth-bounces@ietf.org</a>]
                                  On Behalf<br>
                                  &gt; Of<span>&nbsp;</span><a
                                    href="mailto:Internet-Drafts@ietf.org"
                                    target="_blank">Internet-Drafts@ietf.org</a><br>
                                  &gt; Sent: Thursday, January 20, 2011
                                  4:45 PM<br>
                                  &gt; To:<span>&nbsp;</span><a
                                    href="mailto:i-d-announce@ietf.org"
                                    target="_blank">i-d-announce@ietf.org</a><br>
                                  &gt; Cc:<span>&nbsp;</span><a
                                    href="mailto:oauth@ietf.org"
                                    target="_blank">oauth@ietf.org</a><br>
                                  &gt; Subject: [OAUTH-WG] I-D
                                  Action:draft-ietf-oauth-v2-12.<wbr>txt<br>
                                  &gt;<br>
                                  &gt; A New Internet-Draft is available
                                  from the on-line Internet-Drafts
                                  directories.<br>
                                  &gt; This draft is a work item of the
                                  Open Authentication Protocol Working
                                  Group<br>
                                  &gt; of the IETF.<br>
                                  &gt;<br>
                                  &gt;<br>
                                  &gt; &nbsp; &nbsp; &nbsp; Title &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : The OAuth
                                  2.0 Authorization Protocol<br>
                                  &gt; &nbsp; &nbsp; &nbsp; Author(s) &nbsp; &nbsp; &nbsp; : E.
                                  Hammer-Lahav, et al.<br>
                                  &gt; &nbsp; &nbsp; &nbsp; Filename &nbsp; &nbsp; &nbsp; &nbsp;:
                                  draft-ietf-oauth-v2-12.txt<br>
                                  &gt; &nbsp; &nbsp; &nbsp; Pages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 46<br>
                                  &gt; &nbsp; &nbsp; &nbsp; Date &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;:
                                  2011-01-20<br>
                                  &gt;<br>
                                  &gt; This specification describes the
                                  OAuth 2.0 authorization protocol.<br>
                                  &gt;<br>
                                  &gt; A URL for this Internet-Draft is:<br>
                                  &gt;<span>&nbsp;</span><a
                                    href="http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt"
                                    target="_blank">http://www.ietf.org/<wbr>internet-drafts/draft-ietf-<wbr>oauth-v2-12.txt</a><br>
                                  &gt;<br>
                                  &gt; Internet-Drafts are also
                                  available by anonymous FTP at:<br>
                                  &gt;<span>&nbsp;</span><a
                                    href="ftp://ftp.ietf.org/internet-drafts/"
                                    target="_blank">ftp://ftp.ietf.org/internet-<wbr>drafts/</a><br>
                                  &gt;<br>
                                  &gt; Below is the data which will
                                  enable a MIME compliant mail reader<br>
                                  &gt; implementation to automatically
                                  retrieve the ASCII version of the
                                  Internet-<br>
                                  &gt; Draft.<br>
                                </div>
                              </div>
                              ______________________________<wbr>_________________<br>
                              OAuth mailing list<br>
                              <a href="mailto:OAuth@ietf.org"
                                target="_blank">OAuth@ietf.org</a><br>
                              <a
                                href="https://www.ietf.org/mailman/listinfo/oauth"
                                target="_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><br>
                            </blockquote>
                          </div>
                        </span></span><br>
                      <br>
                      <pre><fieldset></fieldset>
______________________________<wbr>_________________
OAuth mailing list
<a href="mailto:OAuth@ietf.org" target="_blank">OAuth@ietf.org</a>
<a href="https://www.ietf.org/mailman/listinfo/oauth" target="_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a>
</pre>
                    </blockquote>
                  </div>
                </div>
              </blockquote>
            </div>
          </blockquote>
        </div>
      </span></span><br class="Apple-interchange-newline">
    <br>
  </body>
</html>

--------------030409060802030006010107--

From huilan.lu@alcatel-lucent.com  Thu Mar  3 20:07:12 2011
Return-Path: <huilan.lu@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D50293A6926 for <oauth@core3.amsl.com>; Thu,  3 Mar 2011 20:07:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.999
X-Spam-Level: 
X-Spam-Status: No, score=-5.999 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, J_CHICKENPOX_42=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bgyww8EF7nQi for <oauth@core3.amsl.com>; Thu,  3 Mar 2011 20:07:11 -0800 (PST)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by core3.amsl.com (Postfix) with ESMTP id 092143A6920 for <oauth@ietf.org>; Thu,  3 Mar 2011 20:07:10 -0800 (PST)
Received: from usnavsmail3.ndc.alcatel-lucent.com (usnavsmail3.ndc.alcatel-lucent.com [135.3.39.11]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id p2448DVg012947 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 3 Mar 2011 22:08:14 -0600 (CST)
Received: from USNAVSXCHHUB03.ndc.alcatel-lucent.com (usnavsxchhub03.ndc.alcatel-lucent.com [135.3.39.112]) by usnavsmail3.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p2448Dvb030141 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Thu, 3 Mar 2011 22:08:13 -0600
Received: from USNAVSXCHMBSB3.ndc.alcatel-lucent.com ([135.3.39.135]) by USNAVSXCHHUB03.ndc.alcatel-lucent.com ([135.3.39.112]) with mapi; Thu, 3 Mar 2011 22:08:12 -0600
From: "Lu, Hui-Lan (Huilan)" <huilan.lu@alcatel-lucent.com>
To: "'pflam@cs.stanford.edu'" <pflam@cs.stanford.edu>
Date: Thu, 3 Mar 2011 22:08:12 -0600
Thread-Topic: [OAUTH-WG] validate authorization code in draft 12
Thread-Index: AcvZiLRexNLE1cfeRumrbZrV7rgsdwAlfkmw
Message-ID: <0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DCD@USNAVSXCHMBSB3.ndc.alcatel-lucent.com>
References: <4D6F64D0.3040608@cs.stanford.edu>
In-Reply-To: <4D6F64D0.3040608@cs.stanford.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.11
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] validate authorization code in draft 12
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Mar 2011 04:07:12 -0000

Eric,
=20
The state parameter helps simplify but is not necessary for state managemen=
t. I would note that the client has total control of what information the p=
arameter captures. So it could be devised to carry an index to the state ta=
ble, a sequence number (for replay protection), and a signature (for authen=
tication).


The CSRF case is interesting. Let's consider the following scenario:

1. Rob (the resource owner) is tricked to send a service request to the cli=
ent.

2. Upon receiving the request, the client redirects Rob to the authorizatio=
n server as well as changes its internal state to pending authorization by =
Bob. (Note that the client may try to authenticate Rob first. Rob could bec=
ome suspicous of the authentication request. But let's assume that he plays=
 along.)

3. Upon receiving the authorization request, the authorization server authe=
nticates Rob and asks for his approval of the client's request.

4. Upon seeing the approval dialogue box, Rob should become alarmed, becaus=
e he didn't take the action in step 1 knowingly. He rejects the request.=20

5. The authorization server redirects the rejection response back to the cl=
ient.

6. The client sends an apology to Rob explaining why it can not carry out h=
is service request.


So Rob needs to be totally clueless for the CSRF attacks to work. What is t=
he likelihood for that to happen? Have I missed something?

=20
Best regards,
Huilan=20

________________________________

	From: pflam@cs.stanford.edu [mailto:pflam@cs.stanford.edu]=20
	Sent: Thursday, March 03, 2011 4:52 AM
	To: Lu, Hui-Lan (Huilan)
	Cc: Torsten Lodderstedt; Eric; oauth@ietf.org
	Subject: Re: [OAUTH-WG] validate authorization code in draft 12
=09
=09
	Hi Huilan,
=09
	If you are referring to the 'state' parameter (or some other way such as a=
 session cookie that the client uses to track the state of the request), th=
ere are a few limitations:
	a) it is an optional feature as far as the spec is concerned,
	b) it is not sufficient to prevent a DDoS attack. See the discussion below=
 regarding "3. CSRF defense/the 'state' parameter don't completely address =
this problem."
=09
	Regards,
	Eric
=09
=09
	On Wed, Mar 2, 2011 at 3:23 PM, Lu, Hui-Lan (Huilan) <huilan.lu@alcatel-lu=
cent.com> <mailto:huilan.lu@alcatel-lucent.com>  wrote:
=09

		I agree with Tosten. A healthy client is not expected to issue an access =
token request unconditionally when receiving an authorization code at its r=
edirect_uri. The client should do so only if it is in the right state with =
a correlatable authorization request pending.  =20
		=20
		Best regards,
	=09
		Huilan LU
	=09
	=09
		CONFIDENTIALITY NOTICE: This e-mail and any files attached may contain co=
nfidential and proprietary information of Alcatel-Lucent and/or its affilia=
ted entities. Access by the intended recipient only is authorized. Any liab=
ility arising from any party acting, or refraining from acting, on any info=
rmation contained in this e-mail is hereby excluded. If you are not the int=
ended recipient, please notify the sender immediately, destroy the original=
 transmission and its attachments and do not disclose the contents to any o=
ther person, use it for any purpose, or store or copy the information in an=
y medium. Copyright in this e-mail and any attachments belongs to Alcatel-L=
ucent and/or its affiliated entities.
	=09
		=20


________________________________

			From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf O=
f Torsten Lodderstedt
			Sent: Monday, February 07, 2011 3:56 PM
			To: Eric
			Cc: oauth@ietf.org=20

			Subject: Re: [OAUTH-WG] validate authorization code in draft 12
		=09
		=09
		=09
			Hi Eric,
		=09
			I'm trying to understand the attack you described. I would expect any cl=
ient to mark its web sessions if it triggers an authorization process. If s=
o, the attacker would need to forge a valid client session in the right sta=
te (authz process in progress) in order to place a sucessful attack. For a =
typical web application this would require the attacker to login to this ap=
p and kick off the authorization process. This requires more than one addit=
ional http call.
		=09
			What do you think?
		=09
			regards,
			Torsten.=20
		=09
			Am 21.01.2011 09:30, schrieb Eric:=20

				Eran, and others,
			=09
				A few of us had some discussions on the authorization code flow, as dep=
icted in Fig. 3 of the current (12th) draft. We think that it is probably w=
orthwhile to suggest in the specification that an OAuth implementation SHOU=
LD provide a way for the client to validate the authorization code before s=
ending it to the  Authorization Server (AS). From what we have heard, this =
has been done in some of the current OAuth deployments. There are other peo=
ple who do not think this is such a big security risk, although so far no o=
ne has objected that there is some risk here.
			=09
				The issue is that according to the current draft, someone who      owns=
 a botnet can locate the redirect URIs of clients that listen on HTTP, and =
access them with random authorization codes, and cause HTTPS connections to=
 be made on the Authorization Server (AS). There are a few things that the =
attacker can achieve with this OAuth flow that he cannot easily achieve oth=
erwise :=20
			=09
				1. Cost magnification: the attacker incurs the cost of an HTTP connecti=
on and causes an HTTPS connection to be made on the AS; and he can co-ordin=
ate the timing of such HTTPS connections across multiple clients relatively=
 easily, if these clients blindly connect to the AS without first validatin=
g the authorization codes received.
			=09
				Although the attacker could achieve something similar, say by including=
 an iframe pointing to the HTTPS URL of the AS in an HTTP web page and lure=
 web  users to visit that page, timing attacks using such a scheme is (say =
for the purpose of DDoS) more difficult .
			=09
				2. Connection laundering: if the AS realizes it is flooded by HTTPS con=
nections with illegitimate codes, it collects no useful information about t=
he attacker, since the clients act as relays. =20
			=09
				3. CSRF defense/the 'state' parameter don't completely address this pro=
blem. With such a defense, the attacker might need to incur an additional H=
TTP request to obtain a valid CSRF code/ state parameter. This does cut dow=
n the effectiveness of the attack by a factor of 2, which is good. However,=
 if the HTTPS/HTTP cost ratio is higher than 2 (the cost factor is estimate=
d to be around 3.5x at http://www.semicomplete.com/blog/geekery/ssl-latency=
.html <http://www.semicomplete.com/blog/geekery/ssl-latency.html> ), the at=
tacker still achieves a cost magnification.
			=09
				Our proposal is that the OAuth specification suggests that an OAuth (Au=
thorization Server) implementation SHOULD provide a way for the client to v=
alidate the authorization code before sending it to the  Authorization Serv=
er (AS). The specifics of how to validate the authorization code may not ne=
ed to be part of the core specification. We sketch a design below for consi=
deration for future implementation. It might be reasonable to assume that O=
Auth implementations provide some API for the client to call to validate an=
d send the authorization code to the AS. There are two possible schemes for=
 implementation: a) if the client and the AS already share a symmetric secr=
et, an HMAC key can be created from the shared secret, and the authorizatio=
n code will be HMAC'ed and standard techniques can be employed in the clien=
t-side API implementation to detect replay and forgery attempts on the code=
; b) an alternative is for the AS to sign the code using the private key fr=
om its SSL certificate, and for the client API to validate the signature us=
ing the public key.
			=09
				=20
			=09
			=09
				On Thu, Jan 20, 2011 at 4:56 PM, Eran Hammer-Lahav <eran@hueniverse.com=
> <mailto:eran@hueniverse.com>  wrote:
			=09

					Draft -12 is finally out.
				=09
					This is almost a complete rewrite of the entire document, with the pri=
mary goal of moving it back to a similar structure used in -05. I have been=
 thinking about this for a few months and finally came up with a structure =
that combines the two approaches.
				=09
					The draft includes some major cleanups, significantly simpler language=
, reduces repeated prose, and tried to keep prose to the introduction and n=
ormative language in the rest of the specification. I took out sections tha=
t broke the flow, and did my best to give this a linear narrative that is e=
asy to follow.
				=09
					The draft includes the following normative changes:
				=09
					  o  Clarified 'token_type' as case insensitive.
					  o  Authorization endpoint requires TLS when an access token is issue=
d.
					  o  Removed client assertion credentials, mandatory HTTP Basic authen=
tication support for client credentials, WWW-Authenticate header, and the O=
Auth2 authentication scheme.
					  o  Changed implicit grant (aka user-agent flow) error response from =
query to fragment.
					  o  Removed the 'redirect_uri_mismatch' error code since in such a ca=
se, the authorization server must not send the error back to the client.
					  o  Defined access token type registry.
				=09
					I would like to spend the coming week receiving and applying feedback =
before requesting a WGLC for everything but the security considerations sec=
tion (missing) 2/1.
				=09
					EHL
				=09



					> -----Original Message-----
					> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Beha=
lf
					> Of Internet-Drafts@ietf.org
					> Sent: Thursday, January 20, 2011 4:45 PM
					> To: i-d-announce@ietf.org
					> Cc: oauth@ietf.org
					> Subject: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
					>
					> A New Internet-Draft is available from the on-line Internet-Drafts d=
irectories.
					> This draft is a work item of the Open Authentication Protocol Workin=
g Group
					> of the IETF.
					>
					>
					>       Title           : The OAuth 2.0 Authorization Protocol
					>       Author(s)       : E. Hammer-Lahav, et al.
					>       Filename        : draft-ietf-oauth-v2-12.txt
					>       Pages           : 46
					>       Date            : 2011-01-20
					>
					> This specification describes the OAuth 2.0 authorization protocol.
					>
					> A URL for this Internet-Draft is:
					> http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt <http=
://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt>=20
					>
					> Internet-Drafts are also available by anonymous FTP at:
					> ftp://ftp.ietf.org/internet-drafts/ <ftp://ftp.ietf.org/internet-dra=
fts/>=20
					>
					> Below is the data which will enable a MIME compliant mail reader
					> implementation to automatically retrieve the ASCII version of the In=
ternet-
					> Draft.
				=09
					_______________________________________________
					OAuth mailing list
					OAuth@ietf.org
					https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mail=
man/listinfo/oauth>=20
				=09

			=09
			=09
			=09
			=09
				_______________________________________________
				OAuth mailing list
				OAuth@ietf.org
				https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailm=
an/listinfo/oauth>=20
			=09

=09
=09
=09


From pflam@cs.stanford.edu  Thu Mar  3 22:21:49 2011
Return-Path: <pflam@cs.stanford.edu>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6DE603A6975 for <oauth@core3.amsl.com>; Thu,  3 Mar 2011 22:21:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.627
X-Spam-Level: 
X-Spam-Status: No, score=-5.627 tagged_above=-999 required=5 tests=[AWL=0.371,  BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_42=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1K2s1QBfIugi for <oauth@core3.amsl.com>; Thu,  3 Mar 2011 22:21:42 -0800 (PST)
Received: from cs-smtp-1.Stanford.EDU (cs-smtp-1.Stanford.EDU [171.64.64.25]) by core3.amsl.com (Postfix) with ESMTP id 25F5E3A6969 for <oauth@ietf.org>; Thu,  3 Mar 2011 22:21:41 -0800 (PST)
Received: from secllab.stanford.edu ([171.64.65.88] helo=css-macbook-pro-9.local) by cs-smtp-1.Stanford.EDU with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.60) (envelope-from <pflam@cs.stanford.edu>) id 1PvOPY-0004Zm-Cr; Thu, 03 Mar 2011 22:22:50 -0800
Message-ID: <4D708537.8030000@cs.stanford.edu>
Date: Thu, 03 Mar 2011 22:22:47 -0800
From: pflam@cs.stanford.edu
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.14) Gecko/20110221 Lightning/1.0b2 OracleBeehiveExtension/1.0.0.0-OracleInternal Thunderbird/3.1.8
MIME-Version: 1.0
To: "Lu, Hui-Lan (Huilan)" <huilan.lu@alcatel-lucent.com>
Content-Type: multipart/alternative; boundary="------------000405060205020802070201"
X-Scan-Signature: e64d3a2317fc6887b6826b0462acec30
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] validate authorization code in draft 12
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Mar 2011 06:21:49 -0000

This is a multi-part message in MIME format.
--------------000405060205020802070201
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Hi Huilan,

The vulnerability being mentioned here is not that an attacker 
impersonates Rob. Please refer to the original discussion below:
"The issue is that according to the current draft, someone who owns a 
botnet can locate the redirect URIs of clients that listen on HTTP, and 
access them with random authorization codes, and cause HTTPS connections 
to be made on the Authorization Server (AS). There are a few things that 
the attacker can achieve with this OAuth flow that he cannot easily 
achieve otherwise : ..."

The point 3. about the state parameter/CSRF defense is that they can 
have the beneficial effect of making the above attack more difficult, 
but does not prevent it.

Best regards,
Eric


On Thu, Mar 3, 2011 at 8:08 PM, Lu, Hui-Lan 
(Huilan)<huilan.lu@alcatel-lucent.com>wrote:

    Eric,

    The state parameter helps simplify but is not necessary for state
    management. I would note that the client has total control of what
    information the parameter captures. So it could be devised to carry
    an index to the state table, a sequence number (for replay
    protection), and a signature (for authentication).


    The CSRF case is interesting. Let's consider the following scenario:

    1. Rob (the resource owner) is tricked to send a service request to
    the client.

    2. Upon receiving the request, the client redirects Rob to the
    authorization server as well as changes its internal state to
    pending authorization by Bob. (Note that the client may try to
    authenticate Rob first. Rob could become suspicous of the
    authentication request. But let's assume that he plays along.)

    3. Upon receiving the authorization request, the authorization
    server authenticates Rob and asks for his approval of the client's
    request.

    4. Upon seeing the approval dialogue box, Rob should become alarmed,
    because he didn't take the action in step 1 knowingly. He rejects
    the request.

    5. The authorization server redirects the rejection response back to
    the client.

    6. The client sends an apology to Rob explaining why it can not
    carry out his service request.


    So Rob needs to be totally clueless for the CSRF attacks to work.
    What is the likelihood for that to happen? Have I missed something?


    Best regards,
    Huilan

    ________________________________

            From:pflam@cs.stanford.edu
    <mailto:pflam@cs.stanford.edu>[mailto:pflam@cs.stanford.edu
    <mailto:pflam@cs.stanford.edu>]
            Sent: Thursday, March 03, 2011 4:52 AM
            To: Lu, Hui-Lan (Huilan)
            Cc: Torsten Lodderstedt; Eric;oauth@ietf.org
    <mailto:oauth@ietf.org>
            Subject: Re: [OAUTH-WG] validate authorization code in draft 12


            Hi Huilan,

            If you are referring to the 'state' parameter (or some other
    way such as a session cookie that the client uses to track the state
    of the request), there are a few limitations:
            a) it is an optional feature as far as the spec is concerned,
            b) it is not sufficient to prevent a DDoS attack. See the
    discussion below regarding "3. CSRF defense/the 'state' parameter
    don't completely address this problem."

            Regards,
            Eric


            On Wed, Mar 2, 2011 at 3:23 PM, Lu, Hui-Lan (Huilan)
    <huilan.lu <http://huilan.lu/>@alcatel-lucent.com
    <http://alcatel-lucent.com/>> <mailto:huilan.lu@alcatel-lucent.com
    <mailto:huilan.lu@alcatel-lucent.com>>  wrote:


                    I agree with Tosten. A healthy client is not
    expected to issue an access token request unconditionally when
    receiving an authorization code at its redirect_uri. The client
    should do so only if it is in the right state with a correlatable
    authorization request pending.

                    Best regards,

                    Huilan LU


                    CONFIDENTIALITY NOTICE: This e-mail and any files
    attached may contain confidential and proprietary information of
    Alcatel-Lucent and/or its affiliated entities. Access by the
    intended recipient only is authorized. Any liability arising from
    any party acting, or refraining from acting, on any information
    contained in this e-mail is hereby excluded. If you are not the
    intended recipient, please notify the sender immediately, destroy
    the original transmission and its attachments and do not disclose
    the contents to any other person, use it for any purpose, or store
    or copy the information in any medium. Copyright in this e-mail and
    any attachments belongs to Alcatel-Lucent and/or its affiliated
    entities.




    ________________________________

                            From:oauth-bounces@ietf.org
    <mailto:oauth-bounces@ietf.org>[mailto:oauth-bounces@ietf.org
    <mailto:oauth-bounces@ietf.org>] On Behalf Of Torsten Lodderstedt
                            Sent: Monday, February 07, 2011 3:56 PM
                            To: Eric
                            Cc:oauth@ietf.org <mailto:oauth@ietf.org>

                            Subject: Re: [OAUTH-WG] validate
    authorization code in draft 12



                            Hi Eric,

                            I'm trying to understand the attack you
    described. I would expect any client to mark its web sessions if it
    triggers an authorization process. If so, the attacker would need to
    forge a valid client session in the right state (authz process in
    progress) in order to place a sucessful attack. For a typical web
    application this would require the attacker to login to this app and
    kick off the authorization process. This requires more than one
    additional http call.

                            What do you think?

                            regards,
                            Torsten.

                            Am 21.01.2011 09:30, schrieb Eric:

                                    Eran, and others,

                                    A few of us had some discussions on
    the authorization code flow, as depicted in Fig. 3 of the current
    (12th) draft. We think that it is probably worthwhile to suggest in
    the specification that an OAuth implementation SHOULD provide a way
    for the client to validate the authorization code before sending it
    to the  Authorization Server (AS). From what we have heard, this has
    been done in some of the current OAuth deployments. There are other
    people who do not think this is such a big security risk, although
    so far no one has objected that there is some risk here.

                                    The issue is that according to the
    current draft, someone who owns a botnet can locate the redirect
    URIs of clients that listen on HTTP, and access them with random
    authorization codes, and cause HTTPS connections to be made on the
    Authorization Server (AS). There are a few things that the attacker
    can achieve with this OAuth flow that he cannot easily achieve
    otherwise :

                                    1. Cost magnification: the attacker
    incurs the cost of an HTTP connection and causes an HTTPS connection
    to be made on the AS; and he can co-ordinate the timing of such
    HTTPS connections across multiple clients relatively easily, if
    these clients blindly connect to the AS without first validating the
    authorization codes received.

                                    Although the attacker could achieve
    something similar, say by including an iframe pointing to the HTTPS
    URL of the AS in an HTTP web page and lure web  users to visit that
    page, timing attacks using such a scheme is (say for the purpose of
    DDoS) more difficult .

                                    2. Connection laundering: if the AS
    realizes it is flooded by HTTPS connections with illegitimate codes,
    it collects no useful information about the attacker, since the
    clients act as relays.

                                    3. CSRF defense/the 'state'
    parameter don't completely address this problem. With such a
    defense, the attacker might need to incur an additional HTTP request
    to obtain a valid CSRF code/ state parameter. This does cut down the
    effectiveness of the attack by a factor of 2, which is good.
    However, if the HTTPS/HTTP cost ratio is higher than 2 (the cost
    factor is estimated to be around 3.5x
    athttp://www.semicomplete.com/blog/geekery/ssl-latency.html
    <http://www.semicomplete.com/blog/geekery/ssl-latency.html><http://www.semicomplete.com/blog/geekery/ssl-latency.html
    <http://www.semicomplete.com/blog/geekery/ssl-latency.html>> ), the
    attacker still achieves a cost magnification.

                                    Our proposal is that the OAuth
    specification suggests that an OAuth (Authorization Server)
    implementation SHOULD provide a way for the client to validate the
    authorization code before sending it to the  Authorization Server
    (AS). The specifics of how to validate the authorization code may
    not need to be part of the core specification. We sketch a design
    below for consideration for future implementation. It might be
    reasonable to assume that OAuth implementations provide some API for
    the client to call to validate and send the authorization code to
    the AS. There are two possible schemes for implementation: a) if the
    client and the AS already share a symmetric secret, an HMAC key can
    be created from the shared secret, and the authorization code will
    be HMAC'ed and standard techniques can be employed in the
    client-side API implementation to detect replay and forgery attempts
    on the code; b) an alternative is for the AS to sign the code using
    the private key from its SSL certificate, and for the client API to
    validate the signature using the public key.




                                    On Thu, Jan 20, 2011 at 4:56 PM,
    Eran Hammer-Lahav <eran@hueniverse.com <mailto:eran@hueniverse.com>>
    <mailto:eran@hueniverse.com <mailto:eran@hueniverse.com>>  wrote:


                                            Draft -12 is finally out.

                                            This is almost a complete
    rewrite of the entire document, with the primary goal of moving it
    back to a similar structure used in -05. I have been thinking about
    this for a few months and finally came up with a structure that
    combines the two approaches.

                                            The draft includes some
    major cleanups, significantly simpler language, reduces repeated
    prose, and tried to keep prose to the introduction and normative
    language in the rest of the specification. I took out sections that
    broke the flow, and did my best to give this a linear narrative that
    is easy to follow.

                                            The draft includes the
    following normative changes:

                                              o  Clarified 'token_type'
    as case insensitive.
                                              o  Authorization endpoint
    requires TLS when an access token is issued.
                                              o  Removed client
    assertion credentials, mandatory HTTP Basic authentication support
    for client credentials, WWW-Authenticate header, and the OAuth2
    authentication scheme.
                                              o  Changed implicit grant
    (aka user-agent flow) error response from query to fragment.
                                              o  Removed the
    'redirect_uri_mismatch' error code since in such a case, the
    authorization server must not send the error back to the client.
                                              o  Defined access token
    type registry.

                                            I would like to spend the
    coming week receiving and applying feedback before requesting a WGLC
    for everything but the security considerations section (missing) 2/1.

                                            EHL




    >  -----Original Message-----
    >  From:oauth-bounces@ietf.org
    <mailto:oauth-bounces@ietf.org>[mailto:oauth-bounces@ietf.org
    <mailto:oauth-bounces@ietf.org>] On Behalf
    >  OfInternet-Drafts@ietf.org <mailto:Internet-Drafts@ietf.org>
    >  Sent: Thursday, January 20, 2011 4:45 PM
    >  To:i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
    >  Cc:oauth@ietf.org <mailto:oauth@ietf.org>
    >  Subject: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt
    >
    >  A New Internet-Draft is available from the on-line Internet-Drafts
    directories.
    >  This draft is a work item of the Open Authentication Protocol
    Working Group
    >  of the IETF.
    >
    >
    >        Title           : The OAuth 2.0 Authorization Protocol
    >        Author(s)       : E. Hammer-Lahav, et al.
    >        Filename        : draft-ietf-oauth-v2-12.txt
    >        Pages           : 46
    >        Date            : 2011-01-20
    >
    >  This specification describes the OAuth 2.0 authorization protocol.
    >
    >  A URL for this Internet-Draft is:
    >http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt
    <http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt><http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt
    <http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt>>
    >
    >  Internet-Drafts are also available by anonymous FTP at:
    >ftp://ftp.ietf.org/internet-drafts/
    <ftp://ftp.ietf.org/internet-drafts/><ftp://ftp.ietf.org/internet-drafts/
    <ftp://ftp.ietf.org/internet-drafts/>>
    >
    >  Below is the data which will enable a MIME compliant mail reader
    >  implementation to automatically retrieve the ASCII version of the
    Internet-
    >  Draft.

                                          
      _______________________________________________
                                            OAuth mailing list
    OAuth@ietf.org <mailto:OAuth@ietf.org>
    https://www.ietf.org/mailman/listinfo/oauth
    <https://www.ietf.org/mailman/listinfo/oauth><https://www.ietf.org/mailman/listinfo/oauth
    <https://www.ietf.org/mailman/listinfo/oauth>>






                                  
      _______________________________________________
                                    OAuth mailing list
    OAuth@ietf.org <mailto:OAuth@ietf.org>
    https://www.ietf.org/mailman/listinfo/oauth
    <https://www.ietf.org/mailman/listinfo/oauth><https://www.ietf.org/mailman/listinfo/oauth
    <https://www.ietf.org/mailman/listinfo/oauth>>









--------------000405060205020802070201
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#ffffff">
    Hi Huilan,<br>
    <br>
    The vulnerability being mentioned here is not that an attacker
    impersonates Rob. Please refer to the original discussion below:<br>
    "<span class="Apple-style-span" style="border-collapse: separate;
      color: rgb(0, 0, 0); font-family: Times; font-style: normal;
      font-variant: normal; font-weight: normal; letter-spacing: normal;
      line-height: normal; orphans: 2; text-indent: 0px; text-transform:
      none; white-space: normal; widows: 2; word-spacing: 0px;
      font-size: medium;"><span class="Apple-style-span"
        style="font-family: arial; font-size: small;">The issue is that
        according to the current draft, someone who owns a botnet can
        locate the redirect URIs of clients that listen on HTTP, and
        access them with random authorization codes, and cause HTTPS
        connections to be made on the Authorization Server (AS). There
        are a few things that the attacker can achieve with this OAuth
        flow that he cannot easily achieve otherwise : ..." <br>
        <br>
        The point 3. about the state parameter/CSRF defense is that they
        can have the beneficial effect of making the above attack more
        difficult, but does not prevent it. <br>
        <br>
        Best regards,<br>
        Eric<br>
      </span></span><span class="Apple-style-span"
      style="border-collapse: separate; color: rgb(0, 0, 0);
      font-family: Times; font-style: normal; font-variant: normal;
      font-weight: normal; letter-spacing: normal; line-height: normal;
      orphans: 2; text-indent: 0px; text-transform: none; white-space:
      normal; widows: 2; word-spacing: 0px; font-size: medium;"><span
        class="Apple-style-span" style="font-family: arial; font-size:
        small;"><br>
        <br>
        <div class="gmail_quote">On Thu, Mar 3, 2011 at 8:08 PM, Lu,
          Hui-Lan (Huilan)<span class="Apple-converted-space">&nbsp;</span><span
            dir="ltr"><a class="moz-txt-link-rfc2396E" href="mailto:huilan.lu@alcatel-lucent.com">&lt;huilan.lu@alcatel-lucent.com&gt;</a></span><span
            class="Apple-converted-space">&nbsp;</span>wrote:<br>
          <blockquote class="gmail_quote" style="margin: 0px 0px 0px
            0.8ex; border-left: 1px solid rgb(204, 204, 204);
            padding-left: 1ex;">Eric,<br>
            <br>
            The state parameter helps simplify but is not necessary for
            state management. I would note that the client has total
            control of what information the parameter captures. So it
            could be devised to carry an index to the state table, a
            sequence number (for replay protection), and a signature
            (for authentication).<br>
            <br>
            <br>
            The CSRF case is interesting. Let's consider the following
            scenario:<br>
            <br>
            1. Rob (the resource owner) is tricked to send a service
            request to the client.<br>
            <br>
            2. Upon receiving the request, the client redirects Rob to
            the authorization server as well as changes its internal
            state to pending authorization by Bob. (Note that the client
            may try to authenticate Rob first. Rob could become
            suspicous of the authentication request. But let's assume
            that he plays along.)<br>
            <br>
            3. Upon receiving the authorization request, the
            authorization server authenticates Rob and asks for his
            approval of the client's request.<br>
            <br>
            4. Upon seeing the approval dialogue box, Rob should become
            alarmed, because he didn't take the action in step 1
            knowingly. He rejects the request.<br>
            <br>
            5. The authorization server redirects the rejection response
            back to the client.<br>
            <br>
            6. The client sends an apology to Rob explaining why it can
            not carry out his service request.<br>
            <br>
            <br>
            So Rob needs to be totally clueless for the CSRF attacks to
            work. What is the likelihood for that to happen? Have I
            missed something?<br>
            <br>
            <br>
            Best regards,<br>
            Huilan<br>
            <br>
            ______________________________<wbr>__<br>
            <br>
            &nbsp; &nbsp; &nbsp; &nbsp;From:<span class="Apple-converted-space">&nbsp;</span><a
              href="mailto:pflam@cs.stanford.edu">pflam@cs.stanford.edu</a><span
              class="Apple-converted-space">&nbsp;</span>[mailto:<a
              href="mailto:pflam@cs.stanford.edu">pflam@cs.stanford.edu</a>]<br>
            &nbsp; &nbsp; &nbsp; &nbsp;Sent: Thursday, March 03, 2011 4:52 AM<br>
            &nbsp; &nbsp; &nbsp; &nbsp;To: Lu, Hui-Lan (Huilan)<br>
            &nbsp; &nbsp; &nbsp; &nbsp;Cc: Torsten Lodderstedt; Eric;<span
              class="Apple-converted-space">&nbsp;</span><a
              href="mailto:oauth@ietf.org">oauth@ietf.org</a><br>
            <div class="im">&nbsp; &nbsp; &nbsp; &nbsp;Subject: Re: [OAUTH-WG] validate
              authorization code in draft 12<br>
              <br>
              <br>
            </div>
            <div class="im">&nbsp; &nbsp; &nbsp; &nbsp;Hi Huilan,<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp;If you are referring to the 'state' parameter (or
              some other way such as a session cookie that the client
              uses to track the state of the request), there are a few
              limitations:<br>
              &nbsp; &nbsp; &nbsp; &nbsp;a) it is an optional feature as far as the spec is
              concerned,<br>
              &nbsp; &nbsp; &nbsp; &nbsp;b) it is not sufficient to prevent a DDoS attack.
              See the discussion below regarding "3. CSRF defense/the
              'state' parameter don't completely address this problem."<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp;Regards,<br>
              &nbsp; &nbsp; &nbsp; &nbsp;Eric<br>
              <br>
              <br>
            </div>
            <div class="im">&nbsp; &nbsp; &nbsp; &nbsp;On Wed, Mar 2, 2011 at 3:23 PM, Lu,
              Hui-Lan (Huilan) &lt;<a href="http://huilan.lu/"
                target="_blank">huilan.lu</a>@<a
                href="http://alcatel-lucent.com/" target="_blank">alcatel-lucent.com</a>&gt;
              &lt;mailto:<a href="mailto:huilan.lu@alcatel-lucent.com">huilan.lu@alcatel-<wbr>lucent.com</a>&gt;
              &nbsp;wrote:<br>
              <br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;I agree with Tosten. A healthy client is
              not expected to issue an access token request
              unconditionally when receiving an authorization code at
              its redirect_uri. The client should do so only if it is in
              the right state with a correlatable authorization request
              pending.<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Best regards,<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Huilan LU<br>
              <br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;CONFIDENTIALITY NOTICE: This e-mail and any
              files attached may contain confidential and proprietary
              information of Alcatel-Lucent and/or its affiliated
              entities. Access by the intended recipient only is
              authorized. Any liability arising from any party acting,
              or refraining from acting, on any information contained in
              this e-mail is hereby excluded. If you are not the
              intended recipient, please notify the sender immediately,
              destroy the original transmission and its attachments and
              do not disclose the contents to any other person, use it
              for any purpose, or store or copy the information in any
              medium. Copyright in this e-mail and any attachments
              belongs to Alcatel-Lucent and/or its affiliated entities.<br>
              <br>
              <br>
              <br>
              <br>
              ______________________________<wbr>__<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;From:<span
                class="Apple-converted-space">&nbsp;</span><a
                href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a><span
                class="Apple-converted-space">&nbsp;</span>[mailto:<a
                href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a><wbr>]
              On Behalf Of Torsten Lodderstedt<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Sent: Monday, February 07, 2011
              3:56 PM<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;To: Eric<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Cc:<span
                class="Apple-converted-space">&nbsp;</span><a
                href="mailto:oauth@ietf.org">oauth@ietf.org</a><br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Subject: Re: [OAUTH-WG] validate
              authorization code in draft 12<br>
              <br>
              <br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Hi Eric,<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;I'm trying to understand the attack
              you described. I would expect any client to mark its web
              sessions if it triggers an authorization process. If so,
              the attacker would need to forge a valid client session in
              the right state (authz process in progress) in order to
              place a sucessful attack. For a typical web application
              this would require the attacker to login to this app and
              kick off the authorization process. This requires more
              than one additional http call.<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;What do you think?<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;regards,<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Torsten.<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Am 21.01.2011 09:30, schrieb Eric:<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Eran, and others,<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;A few of us had some
              discussions on the authorization code flow, as depicted in
              Fig. 3 of the current (12th) draft. We think that it is
              probably worthwhile to suggest in the specification that
              an OAuth implementation SHOULD provide a way for the
              client to validate the authorization code before sending
              it to the &nbsp;Authorization Server (AS). From what we have
              heard, this has been done in some of the current OAuth
              deployments. There are other people who do not think this
              is such a big security risk, although so far no one has
              objected that there is some risk here.<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;The issue is that according
              to the current draft, someone who owns a botnet can locate
              the redirect URIs of clients that listen on HTTP, and
              access them with random authorization codes, and cause
              HTTPS connections to be made on the Authorization Server
              (AS). There are a few things that the attacker can achieve
              with this OAuth flow that he cannot easily achieve
              otherwise :<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;1. Cost magnification: the
              attacker incurs the cost of an HTTP connection and causes
              an HTTPS connection to be made on the AS; and he can
              co-ordinate the timing of such HTTPS connections across
              multiple clients relatively easily, if these clients
              blindly connect to the AS without first validating the
              authorization codes received.<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Although the attacker could
              achieve something similar, say by including an iframe
              pointing to the HTTPS URL of the AS in an HTTP web page
              and lure web &nbsp;users to visit that page, timing attacks
              using such a scheme is (say for the purpose of DDoS) more
              difficult .<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;2. Connection laundering:
              if the AS realizes it is flooded by HTTPS connections with
              illegitimate codes, it collects no useful information
              about the attacker, since the clients act as relays.<br>
              <br>
            </div>
            &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;3. CSRF defense/the 'state'
            parameter don't completely address this problem. With such a
            defense, the attacker might need to incur an additional HTTP
            request to obtain a valid CSRF code/ state parameter. This
            does cut down the effectiveness of the attack by a factor of
            2, which is good. However, if the HTTPS/HTTP cost ratio is
            higher than 2 (the cost factor is estimated to be around
            3.5x at<span class="Apple-converted-space">&nbsp;</span><a
              href="http://www.semicomplete.com/blog/geekery/ssl-latency.html"
              target="_blank">http://www.semicomplete.com/<wbr>blog/geekery/ssl-latency.html</a><span
              class="Apple-converted-space">&nbsp;</span>&lt;<a
              href="http://www.semicomplete.com/blog/geekery/ssl-latency.html"
              target="_blank">http://www.semicomplete.com/<wbr>blog/geekery/ssl-latency.html</a>&gt;
            ), the attacker still achieves a cost magnification.<br>
            <div class="im"><br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Our proposal is that the
              OAuth specification suggests that an OAuth (Authorization
              Server) implementation SHOULD provide a way for the client
              to validate the authorization code before sending it to
              the &nbsp;Authorization Server (AS). The specifics of how to
              validate the authorization code may not need to be part of
              the core specification. We sketch a design below for
              consideration for future implementation. It might be
              reasonable to assume that OAuth implementations provide
              some API for the client to call to validate and send the
              authorization code to the AS. There are two possible
              schemes for implementation: a) if the client and the AS
              already share a symmetric secret, an HMAC key can be
              created from the shared secret, and the authorization code
              will be HMAC'ed and standard techniques can be employed in
              the client-side API implementation to detect replay and
              forgery attempts on the code; b) an alternative is for the
              AS to sign the code using the private key from its SSL
              certificate, and for the client API to validate the
              signature using the public key.<br>
              <br>
              <br>
              <br>
              <br>
            </div>
            <div>
              <div class="h5">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;On Thu, Jan
                20, 2011 at 4:56 PM, Eran Hammer-Lahav &lt;<a
                  href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;
                &lt;mailto:<a href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;
                &nbsp;wrote:<br>
                <br>
                <br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Draft -12 is
                finally out.<br>
                <br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;This is almost a
                complete rewrite of the entire document, with the
                primary goal of moving it back to a similar structure
                used in -05. I have been thinking about this for a few
                months and finally came up with a structure that
                combines the two approaches.<br>
                <br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;The draft
                includes some major cleanups, significantly simpler
                language, reduces repeated prose, and tried to keep
                prose to the introduction and normative language in the
                rest of the specification. I took out sections that
                broke the flow, and did my best to give this a linear
                narrative that is easy to follow.<br>
                <br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;The draft
                includes the following normative changes:<br>
                <br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;o &nbsp;Clarified
                'token_type' as case insensitive.<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;o
                &nbsp;Authorization endpoint requires TLS when an access
                token is issued.<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;o &nbsp;Removed
                client assertion credentials, mandatory HTTP Basic
                authentication support for client credentials,
                WWW-Authenticate header, and the OAuth2 authentication
                scheme.<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;o &nbsp;Changed
                implicit grant (aka user-agent flow) error response from
                query to fragment.<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;o &nbsp;Removed the
                'redirect_uri_mismatch' error code since in such a case,
                the authorization server must not send the error back to
                the client.<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;o &nbsp;Defined
                access token type registry.<br>
                <br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;I would like to
                spend the coming week receiving and applying feedback
                before requesting a WGLC for everything but the security
                considerations section (missing) 2/1.<br>
                <br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;EHL<br>
                <br>
                <br>
                <br>
                <br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt;
                -----Original Message-----<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; From:<span
                  class="Apple-converted-space">&nbsp;</span><a
                  href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a><span
                  class="Apple-converted-space">&nbsp;</span>[mailto:<a
                  href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a><wbr>]
                On Behalf<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; Of<span
                  class="Apple-converted-space">&nbsp;</span><a
                  href="mailto:Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a><br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; Sent:
                Thursday, January 20, 2011 4:45 PM<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; To:<span
                  class="Apple-converted-space">&nbsp;</span><a
                  href="mailto:i-d-announce@ietf.org">i-d-announce@ietf.org</a><br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; Cc:<span
                  class="Apple-converted-space">&nbsp;</span><a
                  href="mailto:oauth@ietf.org">oauth@ietf.org</a><br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; Subject:
                [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.<wbr>txt<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt;<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; A New
                Internet-Draft is available from the on-line
                Internet-Drafts directories.<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; This draft
                is a work item of the Open Authentication Protocol
                Working Group<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; of the IETF.<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt;<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt;<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; &nbsp; &nbsp; &nbsp; Title
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : The OAuth 2.0 Authorization Protocol<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; &nbsp; &nbsp; &nbsp;
                Author(s) &nbsp; &nbsp; &nbsp; : E. Hammer-Lahav, et al.<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; &nbsp; &nbsp; &nbsp;
                Filename &nbsp; &nbsp; &nbsp; &nbsp;: draft-ietf-oauth-v2-12.txt<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; &nbsp; &nbsp; &nbsp; Pages
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 46<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; &nbsp; &nbsp; &nbsp; Date &nbsp;
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 2011-01-20<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt;<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; This
                specification describes the OAuth 2.0 authorization
                protocol.<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt;<br>
                &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; A URL for
                this Internet-Draft is:<br>
              </div>
            </div>
            &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt;<span
              class="Apple-converted-space">&nbsp;</span><a
              href="http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt"
              target="_blank">http://www.ietf.org/internet-<wbr>drafts/draft-ietf-oauth-v2-12.<wbr>txt</a><span
              class="Apple-converted-space">&nbsp;</span>&lt;<a
              href="http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-12.txt"
              target="_blank">http://www.ietf.org/internet-<wbr>drafts/draft-ietf-oauth-v2-12.<wbr>txt</a>&gt;<br>
            <div class="im">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt;<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt;
              Internet-Drafts are also available by anonymous FTP at:<br>
            </div>
            &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt;<span
              class="Apple-converted-space">&nbsp;</span><a
              href="ftp://ftp.ietf.org/internet-drafts/" target="_blank">ftp://ftp.ietf.org/internet-<wbr>drafts/</a><span
              class="Apple-converted-space">&nbsp;</span>&lt;<a
              href="ftp://ftp.ietf.org/internet-drafts/" target="_blank">ftp://ftp.ietf.org/internet-<wbr>drafts/</a>&gt;<br>
            <div class="im">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt;<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; Below is the
              data which will enable a MIME compliant mail reader<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; implementation
              to automatically retrieve the ASCII version of the
              Internet-<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&gt; Draft.<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
              &nbsp;______________________________<wbr>_________________<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;OAuth mailing list<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<a
                href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            </div>
            &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<a
              href="https://www.ietf.org/mailman/listinfo/oauth"
              target="_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><span
              class="Apple-converted-space">&nbsp;</span>&lt;<a
              href="https://www.ietf.org/mailman/listinfo/oauth"
              target="_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a>&gt;<br>
            <div class="im"><br>
              <br>
              <br>
              <br>
              <br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;
              &nbsp;______________________________<wbr>_________________<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;OAuth mailing list<br>
              &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<a
                href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
            </div>
            &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<a
              href="https://www.ietf.org/mailman/listinfo/oauth"
              target="_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a><span
              class="Apple-converted-space">&nbsp;</span>&lt;<a
              href="https://www.ietf.org/mailman/listinfo/oauth"
              target="_blank">https://www.ietf.org/mailman/<wbr>listinfo/oauth</a>&gt;<br>
            <br>
            <br>
            <br>
            <br>
            <br>
            <br>
          </blockquote>
        </div>
      </span></span><br class="Apple-interchange-newline">
    <br>
  </body>
</html>

--------------000405060205020802070201--

From huilan.lu@alcatel-lucent.com  Fri Mar  4 10:35:02 2011
Return-Path: <huilan.lu@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DF9103A6A14 for <oauth@core3.amsl.com>; Fri,  4 Mar 2011 10:35:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.299
X-Spam-Level: 
X-Spam-Status: No, score=-6.299 tagged_above=-999 required=5 tests=[AWL=0.300,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jVkZVwRbEZXB for <oauth@core3.amsl.com>; Fri,  4 Mar 2011 10:35:00 -0800 (PST)
Received: from ihemail3.lucent.com (ihemail3.lucent.com [135.245.0.37]) by core3.amsl.com (Postfix) with ESMTP id 08F513A6A07 for <oauth@ietf.org>; Fri,  4 Mar 2011 10:34:59 -0800 (PST)
Received: from usnavsmail2.ndc.alcatel-lucent.com (usnavsmail2.ndc.alcatel-lucent.com [135.3.39.10]) by ihemail3.lucent.com (8.13.8/IER-o) with ESMTP id p24Ia37H019993 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 4 Mar 2011 12:36:03 -0600 (CST)
Received: from USNAVSXCHHUB01.ndc.alcatel-lucent.com (usnavsxchhub01.ndc.alcatel-lucent.com [135.3.39.110]) by usnavsmail2.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p24Ia1cq016020 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Fri, 4 Mar 2011 12:36:02 -0600
Received: from USNAVSXCHMBSB3.ndc.alcatel-lucent.com ([135.3.39.135]) by USNAVSXCHHUB01.ndc.alcatel-lucent.com ([135.3.39.110]) with mapi; Fri, 4 Mar 2011 12:36:02 -0600
From: "Lu, Hui-Lan (Huilan)" <huilan.lu@alcatel-lucent.com>
To: "'pflam@cs.stanford.edu'" <pflam@cs.stanford.edu>
Date: Fri, 4 Mar 2011 12:36:01 -0600
Thread-Topic: [OAUTH-WG] validate authorization code in draft 12
Thread-Index: AcvaNJj4q55qvYHRTGmLM0dSZP+/VQAXDmfw
Message-ID: <0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DCE@USNAVSXCHMBSB3.ndc.alcatel-lucent.com>
References: <4D708537.8030000@cs.stanford.edu>
In-Reply-To: <4D708537.8030000@cs.stanford.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.37
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.10
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] validate authorization code in draft 12
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Mar 2011 18:35:02 -0000

Eric,
=20
I'm confused. I didn't talk about an attacker impersonating Rob. At any rat=
e, inasmuch as we are back to square one, I would maintain that receipt of =
an authorization code by the client alone is not sufficient for causing it =
to issue an access token request to the authorization server. The client ha=
s to have the right context and be in the right state for that to happen. I=
 should say that it is valid to address DDoS attacks. At issue is only the =
plausibility of the chain reaction suggested.    =20
=20

Best regards,
Huilan=20

________________________________

	From: pflam@cs.stanford.edu [mailto:pflam@cs.stanford.edu]=20
	Sent: Friday, March 04, 2011 1:23 AM
	To: Lu, Hui-Lan (Huilan)
	Cc: pflam@cs.stanford.edu; Torsten Lodderstedt; oauth@ietf.org
	Subject: Re: [OAUTH-WG] validate authorization code in draft 12
=09
=09
	Hi Huilan,
=09
	The vulnerability being mentioned here is not that an attacker impersonate=
s Rob. Please refer to the original discussion below:
	"The issue is that according to the current draft, someone who owns a botn=
et can locate the redirect URIs of clients that listen on HTTP, and access =
them with random authorization codes, and cause HTTPS connections to be mad=
e on the Authorization Server (AS). There are a few things that the attacke=
r can achieve with this OAuth flow that he cannot easily achieve otherwise =
: ..."=20
=09
	The point 3. about the state parameter/CSRF defense is that they can have =
the beneficial effect of making the above attack more difficult, but does n=
ot prevent it.=20
=09
	Best regards,
	Eric


From eran@hueniverse.com  Fri Mar  4 12:12:28 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 830043A6845 for <oauth@core3.amsl.com>; Fri,  4 Mar 2011 12:12:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.554
X-Spam-Level: 
X-Spam-Status: No, score=-2.554 tagged_above=-999 required=5 tests=[AWL=0.045,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MI02dR98spSy for <oauth@core3.amsl.com>; Fri,  4 Mar 2011 12:12:27 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id A4B4E3A6844 for <oauth@ietf.org>; Fri,  4 Mar 2011 12:12:27 -0800 (PST)
Received: (qmail 7907 invoked from network); 4 Mar 2011 20:13:37 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 4 Mar 2011 20:13:36 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Fri, 4 Mar 2011 13:13:33 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, OAuth WG <oauth@ietf.org>
Date: Fri, 4 Mar 2011 13:13:22 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvYq/VRfyCqRH/sTkq26EXkRBWSkwB/KDJQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F0C441A@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
In-Reply-To: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Mar 2011 20:12:28 -0000

Ready to go.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Hannes Tschofenig
> Sent: Tuesday, March 01, 2011 11:32 PM
> To: OAuth WG
> Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> This is a Last Call for comments on
>=20
> http://www.ietf.org/id/draft-ietf-oauth-v2-13.txt
>=20
> Please have your comments in no later than March 16.
>=20
> Do remember to send a note in if you have read the document and have no
> other comments other than "its ready to go" - we need those as much as we
> need "I found a problem".
>=20
> Thanks!
> Hannes & Blaine
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From bcampbell@pingidentity.com  Fri Mar  4 12:18:22 2011
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4689C3A6845 for <oauth@core3.amsl.com>; Fri,  4 Mar 2011 12:18:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.644
X-Spam-Level: 
X-Spam-Status: No, score=-4.644 tagged_above=-999 required=5 tests=[AWL=1.333,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7a-UEgeCsmXW for <oauth@core3.amsl.com>; Fri,  4 Mar 2011 12:18:21 -0800 (PST)
Received: from na3sys009aog112.obsmtp.com (na3sys009aog112.obsmtp.com [74.125.149.207]) by core3.amsl.com (Postfix) with ESMTP id 1413B3A6830 for <oauth@ietf.org>; Fri,  4 Mar 2011 12:18:20 -0800 (PST)
Received: from source ([209.85.161.49]) (using TLSv1) by na3sys009aob112.postini.com ([74.125.148.12]) with SMTP ID DSNKTXFJUqd++qqgtOe/aPbDPy/FrdES1LXh@postini.com; Fri, 04 Mar 2011 12:19:31 PST
Received: by fxm16 with SMTP id 16so3482004fxm.22 for <oauth@ietf.org>; Fri, 04 Mar 2011 12:19:27 -0800 (PST)
Received: by 10.223.143.86 with SMTP id t22mr1343333fau.78.1299269967691; Fri, 04 Mar 2011 12:19:27 -0800 (PST)
MIME-Version: 1.0
Received: by 10.223.113.83 with HTTP; Fri, 4 Mar 2011 12:18:55 -0800 (PST)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F0C441A@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <90C41DD21FB7C64BB94121FBBC2E7234464F0C441A@P3PW5EX1MB01.EX1.SECURESERVER.NET>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Fri, 4 Mar 2011 13:18:55 -0700
Message-ID: <AANLkTimFQK_1QmAwg97RLN=rX_BiHNBUKsnQu6GxJga4@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Mar 2011 20:18:22 -0000

The title of the message might have been misleading ('cause it had 12
in it) but http://www.ietf.org/mail-archive/web/oauth/current/msg05551.html
applies to -13 and, while it's minor, I'd like to see it addressed in
future drafts.  Thanks.

On Fri, Mar 4, 2011 at 1:13 PM, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
> Ready to go.
>
> EHL
>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>> Of Hannes Tschofenig
>> Sent: Tuesday, March 01, 2011 11:32 PM
>> To: OAuth WG
>> Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>
>> This is a Last Call for comments on
>>
>> http://www.ietf.org/id/draft-ietf-oauth-v2-13.txt
>>
>> Please have your comments in no later than March 16.
>>
>> Do remember to send a note in if you have read the document and have no
>> other comments other than "its ready to go" - we need those as much as we
>> need "I found a problem".
>>
>> Thanks!
>> Hannes & Blaine
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

From pflam@cs.stanford.edu  Fri Mar  4 19:10:05 2011
Return-Path: <pflam@cs.stanford.edu>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 717DD3A6A0C for <oauth@core3.amsl.com>; Fri,  4 Mar 2011 19:10:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.051
X-Spam-Level: 
X-Spam-Status: No, score=-6.051 tagged_above=-999 required=5 tests=[AWL=0.547,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PuD8qC2dCGwE for <oauth@core3.amsl.com>; Fri,  4 Mar 2011 19:10:04 -0800 (PST)
Received: from cs-smtp-1.Stanford.EDU (cs-smtp-1.Stanford.EDU [171.64.64.25]) by core3.amsl.com (Postfix) with ESMTP id 557523A69FC for <oauth@ietf.org>; Fri,  4 Mar 2011 19:10:04 -0800 (PST)
Received: from secllab.stanford.edu ([171.64.65.88] helo=css-macbook-pro-9.local) by cs-smtp-1.Stanford.EDU with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.60) (envelope-from <pflam@cs.stanford.edu>) id 1Pvhtg-0003Ys-DH; Fri, 04 Mar 2011 19:11:13 -0800
Message-ID: <4D71A9CF.5050809@cs.stanford.edu>
Date: Fri, 04 Mar 2011 19:11:11 -0800
From: pflam@cs.stanford.edu
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.14) Gecko/20110221 Lightning/1.0b2 OracleBeehiveExtension/1.0.0.0-OracleInternal Thunderbird/3.1.8
MIME-Version: 1.0
To: "Lu, Hui-Lan (Huilan)" <huilan.lu@alcatel-lucent.com>
Content-Type: multipart/alternative; boundary="------------030002010803010007010302"
X-Scan-Signature: 702ae50298edc6602ea45f3868e8cc09
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] validate authorization code in draft 12
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Mar 2011 03:10:05 -0000

This is a multi-part message in MIME format.
--------------030002010803010007010302
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Huilan,

In the context of the OAuth protocol, can you describe how an innocent 
user can cause the right context and state to be established, and why a 
DDoS attacker can't accomplish the same, without making assumption on 
additional security measures that are not mandated or recommended by the 
OAuth specification?

Best regards,
Eric



On Fri, Mar 4, 2011 at 10:36 AM, Lu, Hui-Lan 
(Huilan)<huilan.lu@alcatel-lucent.com>wrote:

    Eric,

    I'm confused. I didn't talk about an attacker impersonating Rob. At
    any rate, inasmuch as we are back to square one, I would maintain
    that receipt of an authorization code by the client alone is not
    sufficient for causing it to issue an access token request to the
    authorization server. The client has to have the right context and
    be in the right state for that to happen. I should say that it is
    valid to address DDoS attacks. At issue is only the plausibility of
    the chain reaction suggested.


    Best regards,
    Huilan

    ________________________________

            From:pflam@cs.stanford.edu
    <mailto:pflam@cs.stanford.edu>[mailto:pflam@cs.stanford.edu
    <mailto:pflam@cs.stanford.edu>]
            Sent: Friday, March 04, 2011 1:23 AM
            To: Lu, Hui-Lan (Huilan)
            Cc:pflam@cs.stanford.edu <mailto:pflam@cs.stanford.edu>;
    Torsten Lodderstedt;oauth@ietf.org <mailto:oauth@ietf.org>
            Subject: Re: [OAUTH-WG] validate authorization code in draft 12


            Hi Huilan,

            The vulnerability being mentioned here is not that an
    attacker impersonates Rob. Please refer to the original discussion
    below:
            "The issue is that according to the current draft, someone
    who owns a botnet can locate the redirect URIs of clients that
    listen on HTTP, and access them with random authorization codes, and
    cause HTTPS connections to be made on the Authorization Server (AS).
    There are a few things that the attacker can achieve with this OAuth
    flow that he cannot easily achieve otherwise : ..."

            The point 3. about the state parameter/CSRF defense is that
    they can have the beneficial effect of making the above attack more
    difficult, but does not prevent it.

            Best regards,
            Eric




--------------030002010803010007010302
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
  </head>
  <body text="#000000" bgcolor="#ffffff">
    Huilan,<br>
    &nbsp;<br>
    In the context of the OAuth protocol, can you describe how an
    innocent user can cause the right context and state to be
    established, and why a DDoS attacker can't accomplish the same,
    without making assumption on additional security measures that are
    not mandated or recommended by the OAuth specification?<br>
    <br>
    Best regards,<br>
    Eric<br>
    <br>
    <span class="Apple-style-span" style="border-collapse: separate;
      color: rgb(0, 0, 0); font-family: Times; font-style: normal;
      font-variant: normal; font-weight: normal; letter-spacing: normal;
      line-height: normal; orphans: 2; text-indent: 0px; text-transform:
      none; white-space: normal; widows: 2; word-spacing: 0px;
      font-size: medium;"><span class="Apple-style-span"
        style="font-family: arial; font-size: small;"><br>
        <br>
        <div class="gmail_quote">On Fri, Mar 4, 2011 at 10:36 AM, Lu,
          Hui-Lan (Huilan)<span class="Apple-converted-space">&nbsp;</span><span
            dir="ltr"><a class="moz-txt-link-rfc2396E" href="mailto:huilan.lu@alcatel-lucent.com">&lt;huilan.lu@alcatel-lucent.com&gt;</a></span><span
            class="Apple-converted-space">&nbsp;</span>wrote:<br>
          <blockquote class="gmail_quote" style="margin: 0px 0px 0px
            0.8ex; border-left: 1px solid rgb(204, 204, 204);
            padding-left: 1ex;">Eric,<br>
            <br>
            I'm confused. I didn't talk about an attacker impersonating
            Rob. At any rate, inasmuch as we are back to square one, I
            would maintain that receipt of an authorization code by the
            client alone is not sufficient for causing it to issue an
            access token request to the authorization server. The client
            has to have the right context and be in the right state for
            that to happen. I should say that it is valid to address
            DDoS attacks. At issue is only the plausibility of the chain
            reaction suggested.<br>
            <div class="im"><br>
              <br>
              Best regards,<br>
              Huilan<br>
              <br>
              ______________________________<wbr>__<br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp;From:<span class="Apple-converted-space">&nbsp;</span><a
                href="mailto:pflam@cs.stanford.edu">pflam@cs.stanford.edu</a><span
                class="Apple-converted-space">&nbsp;</span>[mailto:<a
                href="mailto:pflam@cs.stanford.edu">pflam@cs.stanford.edu</a>]<br>
            </div>
            &nbsp; &nbsp; &nbsp; &nbsp;Sent: Friday, March 04, 2011 1:23 AM<br>
            <div class="im">&nbsp; &nbsp; &nbsp; &nbsp;To: Lu, Hui-Lan (Huilan)<br>
            </div>
            &nbsp; &nbsp; &nbsp; &nbsp;Cc:<span class="Apple-converted-space">&nbsp;</span><a
              href="mailto:pflam@cs.stanford.edu">pflam@cs.stanford.edu</a>;
            Torsten Lodderstedt;<span class="Apple-converted-space">&nbsp;</span><a
              href="mailto:oauth@ietf.org">oauth@ietf.org</a><br>
            <div class="im">&nbsp; &nbsp; &nbsp; &nbsp;Subject: Re: [OAUTH-WG] validate
              authorization code in draft 12<br>
              <br>
              <br>
              &nbsp; &nbsp; &nbsp; &nbsp;Hi Huilan,<br>
              <br>
            </div>
            <div>
              <div class="h5">&nbsp; &nbsp; &nbsp; &nbsp;The vulnerability being mentioned
                here is not that an attacker impersonates Rob. Please
                refer to the original discussion below:<br>
                &nbsp; &nbsp; &nbsp; &nbsp;"The issue is that according to the current
                draft, someone who owns a botnet can locate the redirect
                URIs of clients that listen on HTTP, and access them
                with random authorization codes, and cause HTTPS
                connections to be made on the Authorization Server (AS).
                There are a few things that the attacker can achieve
                with this OAuth flow that he cannot easily achieve
                otherwise : ..."<br>
                <br>
                &nbsp; &nbsp; &nbsp; &nbsp;The point 3. about the state parameter/CSRF
                defense is that they can have the beneficial effect of
                making the above attack more difficult, but does not
                prevent it.<br>
                <br>
                &nbsp; &nbsp; &nbsp; &nbsp;Best regards,<br>
                &nbsp; &nbsp; &nbsp; &nbsp;Eric<br>
                <br>
              </div>
            </div>
          </blockquote>
        </div>
      </span></span><br class="Apple-interchange-newline">
    <br>
  </body>
</html>

--------------030002010803010007010302--

From skylar@kiva.org  Fri Mar  4 19:21:36 2011
Return-Path: <skylar@kiva.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D44113A6902 for <oauth@core3.amsl.com>; Fri,  4 Mar 2011 19:21:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 143UECBHimGo for <oauth@core3.amsl.com>; Fri,  4 Mar 2011 19:21:35 -0800 (PST)
Received: from na3sys010aog114.obsmtp.com (na3sys010aog114.obsmtp.com [74.125.245.96]) by core3.amsl.com (Postfix) with SMTP id 50E403A68F9 for <oauth@ietf.org>; Fri,  4 Mar 2011 19:21:34 -0800 (PST)
Received: from source ([74.125.83.172]) (using TLSv1) by na3sys010aob114.postini.com ([74.125.244.12]) with SMTP ID DSNKTXGshA49gmKxgW8OT9Ohgi4CBFieIY50@postini.com; Fri, 04 Mar 2011 19:22:45 PST
Received: by pve39 with SMTP id 39so430032pve.3 for <oauth@ietf.org>; Fri, 04 Mar 2011 19:22:44 -0800 (PST)
Received: by 10.142.90.2 with SMTP id n2mr1140134wfb.157.1299295363084; Fri, 04 Mar 2011 19:22:43 -0800 (PST)
Received: from [10.0.1.9] (c-24-5-80-5.hsd1.ca.comcast.net [24.5.80.5]) by mx.google.com with ESMTPS id w11sm145836wfh.18.2011.03.04.19.22.41 (version=TLSv1/SSLv3 cipher=OTHER); Fri, 04 Mar 2011 19:22:41 -0800 (PST)
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Skylar Woodward <skylar@kiva.org>
In-Reply-To: <AANLkTinyjwfyEgtT83eDELZ2-To7uwLgqavgOk=Xr2BY@mail.gmail.com>
Date: Fri, 4 Mar 2011 19:21:30 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <92D3BF86-64A0-4280-9387-60E5A0966A90@kiva.org>
References: <AANLkTi=YWLHV1Yi0bdKTaDaBw3X5D6Y_kk3xt7EvJHe_@mail.gmail.com> <4D239DCF.4030501@lodderstedt.net> <AANLkTi=RAS5X0jUjxFzf6k1_r+79NFSFjmZs2bw2Lg3o@mail.gmail.com> <3C83928E-56D5-4386-A075-9ECF1F3A469C@kiva.org> <AANLkTin_=nJi7yeJ8VTMV-dufB8UoP5Y4r1ffM+82vgO@mail.gmail.com> <4E163351-08AE-47FA-B1F2-ECE6535346C1@kiva.org> <90C41DD21FB7C64BB94121FBBC2E723445A8FB28DE@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTinyjwfyEgtT83eDELZ2-To7uwLgqavgOk=Xr2BY@mail.gmail.com>
To: Marius Scurtescu <mscurtescu@google.com>
X-Mailer: Apple Mail (2.1082)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Native Client Extension
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Mar 2011 03:21:36 -0000

Marius, did you have an alternative to suggest for this?

Not that it has to be in the spec, but it would be nice to have a best =
practice for this as it's a common case.


> On Fri, Jan 28, 2011 at 10:25 AM, Eran Hammer-Lahav <eran at =
hueniverse.com> wrote:
> > -12 3.1.1:
> >
> >   The redirection URI MUST be an absolute URI and MAY include a =
query
> >   component, which MUST be retained by the authorization server when
> >   adding additional query parameters.
> >
> > 'oob' is not an absolute URI.
>=20
> Good point, I missed the absolute part. Thanks for pointing this out.
>=20
> Let me think about it, the URN you suggested is a good start.
>=20
> Marius
>=20
> From: Marius Scurtescu [mailto:mscurtescu at google.com]
> Sent: Friday, January 28, 2011 10:07 AM
> To: Eran Hammer-Lahav
> Cc: Skylar Woodward; OAuth WG
> Subject: Re: [OAUTH-WG] Native Client Extension
>=20
> On Fri, Jan 28, 2011 at 8:21 AM, Eran Hammer-Lahav
> <eran at hueniverse.com> wrote:
> > Why not:
> >
> > urn:ietf:wg:oauth:2.0:oob
> >



From torsten@lodderstedt.net  Sun Mar  6 11:19:26 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0D3FC3A684F for <oauth@core3.amsl.com>; Sun,  6 Mar 2011 11:19:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.248
X-Spam-Level: 
X-Spam-Status: No, score=-2.248 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tCtmRhf88nU0 for <oauth@core3.amsl.com>; Sun,  6 Mar 2011 11:19:24 -0800 (PST)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.31.26]) by core3.amsl.com (Postfix) with ESMTP id A5B5A3A684A for <oauth@ietf.org>; Sun,  6 Mar 2011 11:19:23 -0800 (PST)
Received: from [87.142.250.245] (helo=[192.168.71.49]) by smtprelay03.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1PwJVK-0002GN-1k; Sun, 06 Mar 2011 20:20:34 +0100
Message-ID: <4D73DE81.5050103@lodderstedt.net>
Date: Sun, 06 Mar 2011 20:20:33 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Brian Campbell <bcampbell@pingidentity.com>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com>
In-Reply-To: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Mar 2011 19:19:26 -0000

+1

Am 02.03.2011 15:05, schrieb Brian Campbell:
> I propose that the "or native applications" text be dropped from the
> first paragraph in section 4.2 Implicit Grant  [1].
>
> There is clearly some disagreement about what is most appropriate for
> mobile/native applications and many, including myself, don't feel that
> the implicit grant works well to support them (due to the lack of a
> refresh token and need to repeat the authorization steps).  I
> understand that the text in section 4 is non-normative, however, I
> feel that the mention of native apps in 4.2 biases thinking in a
> particular way (it's already led to one lengthy internal discussion
> that I'd rather not have again and again).  I believe it'd be more
> appropriate for the draft to remain silent on how native apps should
> acquire tokens and leave it up to implementations/deployments to
> decide (or an extension draft as Marius has proposed).
>
> The "or native applications" text in is also somewhat inconsistent
> with the text in the following sentence that talks about the
> authentication of the client being based on the user-agent's
> same-origin policy.
>
> Removing those three words is a small change but one that I feel would
> be beneficial on a number of fronts.
>
> Thanks,
> Brian
>
>
> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
>
> On Wed, Feb 16, 2011 at 2:57 PM, Eran Hammer-Lahav<eran@hueniverse.com>  wrote:
>> Feel free to propose alternative preamble for the implicit and authorization code sections, describing the characteristics of what they are good for. It should fit in a single paragraph. Such a proposal would fit right in with last call feedback to -13.
>>
>> EHL
>>
>>> -----Original Message-----
>>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
>>> Sent: Wednesday, February 16, 2011 1:39 PM
>>> To: Eran Hammer-Lahav
>>> Cc: Brian Campbell; OAuth WG
>>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
>>>
>>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
>>> <eran@hueniverse.com>  wrote:
>>>> The reason why we don't return a refresh token in the implicit grant is
>>> exactly because there is no client authentication...
>>>
>>> Not sure that's the main reason. AFAIK it is because the response is sent
>>> through the user-agent and it could leak.
>>>
>>>
>>>> These are all well-balanced flows with specific security properties. If you
>>> need something else, even if it is just a tweak, it must be considered a
>>> different flow. That doesn't mean you need to register a new grant type, just
>>> that you are dealing with different implementation details unique to your
>>> server.
>>>
>>> The Authorization Code flow, with no client secret, is perfectly fine for Native
>>> Apps IMO.
>>>
>>> Marius
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From mkent@proofpoint.com  Sun Mar  6 13:17:39 2011
Return-Path: <mkent@proofpoint.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 103B728C0CE for <oauth@core3.amsl.com>; Sun,  6 Mar 2011 13:17:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.865
X-Spam-Level: 
X-Spam-Status: No, score=0.865 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_NUMERIC_HELO=2.067]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FLeS1UkpyIYu for <oauth@core3.amsl.com>; Sun,  6 Mar 2011 13:17:33 -0800 (PST)
Received: from mx2.proofpoint.com (mx2.proofpoint.com [208.86.202.10]) by core3.amsl.com (Postfix) with ESMTP id 3498D28B797 for <oauth@ietf.org>; Sun,  6 Mar 2011 13:17:32 -0800 (PST)
Received: from CUP-POSTAL1.corp.proofpoint.com (cup-sv11.corp.proofpoint.com [10.20.7.111]) by admin1009 (8.14.3/8.14.3) with ESMTP id p26LIiCS015372 for <oauth@ietf.org>; Sun, 6 Mar 2011 13:18:44 -0800
Received: from 99.123.4.33 ([99.123.4.33]) by CUP-POSTAL1.corp.proofpoint.com ([10.20.7.22]) via Exchange Front-End Server owa.proofpoint.com ([10.20.7.23]) with Microsoft Exchange Server HTTP-DAV ;  Sun,  6 Mar 2011 21:18:44 +0000
User-Agent: Microsoft-Entourage/12.28.0.101117
Date: Sun, 06 Mar 2011 13:18:43 -0800
From: Mark Kent <mkent@proofpoint.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Message-ID: <C9993A33.A0BA%mkent@proofpoint.com>
Thread-Topic: draft-ietf-oauth-v2-13 comments
Thread-Index: AcvcRBIdj4Jn5D8EPUCvBXh/THroSA==
Mime-version: 1.0
Content-type: multipart/alternative; boundary="B_3382262323_37138903"
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.2.15, 1.0.148, 0.0.0000 definitions=2011-03-06_04:2011-03-04, 2011-03-06, 1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 suspectscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx engine=5.0.0-1012030000 definitions=main-1103060096
Subject: [OAUTH-WG] draft-ietf-oauth-v2-13 comments
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Mar 2011 21:17:39 -0000

> This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--B_3382262323_37138903
Content-type: text/plain;
	charset="ISO-8859-1"
Content-transfer-encoding: quoted-printable

First up, nice work with the latest version =AD it=B9s considerably easier to
follow than previous version. Based on a simple attempt to implement a
compliant authentication server, I have the following requests for
clarification:

1. The error response mechanism for the authorization endpoint depends on
the response_type being requested. Assuming that the client and redirect UR=
I
are valid, the endpoint might place the error information in the query
string (for repsonse_type =B3code=B2, section 4.1.2.1) or in the fragment (for
response type =B3token=B2, section 4.2.2.1). I believe it is ambiguous what
should be done if the response_type is missing, or invalid. Clarification
would be appreciated.
2. The error response for the authorization endpoint is directed to include
the state, if a state were supplied in the request (sections 4.1.2.1,
4.2.2.1). Assuming that including multiple state parameters in the request
makes the request malformed, how should the server include state in the
error response if the request contains multiple state parameters? I could
see justifications for a number of options (not including the state,
including all the state parameters, including just the first state
parameter, etc). Clarification would be appreciated. Note that, if multiple
state parameters may be legally included in the request, this same question
applies to the grant response, rather than the error response.
3. I believe that section 5.2 is ambiguous as to the error code that should
be returned from the token endpoint when the client credentials are valid,
when the client is authorized to use the authorization code grant type in
general, but when the authorization code supplied is not valid for the
client. I could see unauthorized_client being right, but the wording of the
section doesn=B9t include the exact case above. Please clarify.
4. I believe that section 5.2 is ambiguous as to the error code that should
be returned from the token endpoint when the grant type is =B3password=B2, and
the resource owner=B9s credentials are invalid. Section 4.3.3 implies that
such a request is =B3invalid=B2, suggesting that invalid_request is the correct
response, but section 5.2 could be clearer on this. Please clarify.

In addition, I wonder if the authors have given any thought to the
applicability of the protocol in a federated authentication domain
environment, for example where the authorization endpoint and token
endpoints are on different servers that retain a trust relationship with
each other. Clearly, in this case, the format of the authorization code is
an integration point, much in the same way as the access token is in the
currently provided use cases. Whereas a number of access token formats are
provided in companion specifications, I see no references for authorization
codes. Any thoughts on this would be gratefully received.

Mark.

--B_3382262323_37138903
Content-type: text/html;
	charset="ISO-8859-1"
Content-transfer-encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>draft-ietf-oauth-v2-13 comments</TITLE>
</HEAD>
<BODY>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:11pt=
'>First up, nice work with the latest version &#8211; it&#8217;s considerabl=
y easier to follow than previous version. Based on a simple attempt to imple=
ment a compliant authentication server, I have the following requests for cl=
arification:<BR>
<BR>
</SPAN></FONT><OL><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN=
 STYLE=3D'font-size:11pt'>The error response mechanism for the authorization e=
ndpoint depends on the response_type being requested. Assuming that the clie=
nt and redirect URI are valid, the endpoint might place the error informatio=
n in the query string (for repsonse_type &#8220;code&#8221;, section 4.1.2.1=
) or in the fragment (for response type &#8220;token&#8221;, section 4.2.2.1=
). I believe it is ambiguous what should be done if the response_type is mis=
sing, or invalid. Clarification would be appreciated.
</SPAN></FONT><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STY=
LE=3D'font-size:11pt'>The error response for the authorization endpoint is dir=
ected to include the state, if a state were supplied in the request (section=
s 4.1.2.1, 4.2.2.1). Assuming that including multiple state parameters in th=
e request makes the request malformed, how should the server include state i=
n the error response if the request contains multiple state parameters? I co=
uld see justifications for a number of options (not including the state, inc=
luding all the state parameters, including just the first state parameter, e=
tc). Clarification would be appreciated. Note that, if multiple state parame=
ters may be legally included in the request, this same question applies to t=
he grant response, rather than the error response.
</SPAN></FONT><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STY=
LE=3D'font-size:11pt'>I believe that section 5.2 is ambiguous as to the error =
code that should be returned from the token endpoint when the client credent=
ials are valid, when the client is authorized to use the authorization code =
grant type in general, but when the authorization code supplied is not valid=
 for the client. I could see unauthorized_client being right, but the wordin=
g of the section doesn&#8217;t include the exact case above. Please clarify.
</SPAN></FONT><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STY=
LE=3D'font-size:11pt'>I believe that section 5.2 is ambiguous as to the error =
code that should be returned from the token endpoint when the grant type is =
&#8220;password&#8221;, and the resource owner&#8217;s credentials are inval=
id. Section 4.3.3 implies that such a request is &#8220;invalid&#8221;, sugg=
esting that invalid_request is the correct response, but section 5.2 could b=
e clearer on this. Please clarify.<BR>
</SPAN></FONT></OL><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN ST=
YLE=3D'font-size:11pt'><BR>
In addition, I wonder if the authors have given any thought to the applicab=
ility of the protocol in a federated authentication domain environment, for =
example where the authorization endpoint and token endpoints are on differen=
t servers that retain a trust relationship with each other. Clearly, in this=
 case, the format of the authorization code is an integration point, much in=
 the same way as the access token is in the currently provided use cases. Wh=
ereas a number of access token formats are provided in companion specificati=
ons, I see no references for authorization codes. Any thoughts on this would=
 be gratefully received.<BR>
<BR>
Mark.</SPAN></FONT>
</BODY>
</HTML>


--B_3382262323_37138903--


From dick.hardt@gmail.com  Sun Mar  6 14:11:01 2011
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 40B5228C0CE for <oauth@core3.amsl.com>; Sun,  6 Mar 2011 14:11:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H4TAqp5W1qSh for <oauth@core3.amsl.com>; Sun,  6 Mar 2011 14:10:57 -0800 (PST)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by core3.amsl.com (Postfix) with ESMTP id F2F783A688B for <oauth@ietf.org>; Sun,  6 Mar 2011 14:10:56 -0800 (PST)
Received: by yxk30 with SMTP id 30so1768007yxk.31 for <oauth@ietf.org>; Sun, 06 Mar 2011 14:12:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to:x-mailer; bh=mUvCp0QRIXpoB+kZjepMueB9y7NooRqrw462vNVPMPc=; b=rBMkQ51rqfWNvOwYIUKegvksX0s3LjQGUhEngaJjF8nYyrwZ+p3B0PIfZSsnN7YtNN RipPrRrCh5OS1/5R+S7R+alv3j/cmihLqo8MCRq3q8GcMuPj8bApo5cEUZ12isI2zOAg bDBCFJxyRo5RTIYJHoLraDVwKOzDbs9A6Vniw=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; b=pF9VAvvc91SKdYS6psl1laBqTMcrUFMC9sJ0kbaJ2xadFFQAWCZZ0R5zFlYA6sNgAO 4y5y7ITQsa+s8Zldv/AKPLgMIzgAgLal9JF1gjZGY3KmrSBUfN04ZIHNMkcn6eUx54dZ Md1O+QZo9OUMxMD+1vq8d6QOCkfjnt2MjxKM0=
Received: by 10.150.115.18 with SMTP id n18mr3663007ybc.195.1299449528512; Sun, 06 Mar 2011 14:12:08 -0800 (PST)
Received: from [192.168.1.100] (64-46-1-217.dyn.novuscom.net [64.46.1.217]) by mx.google.com with ESMTPS id v35sm1214732yba.16.2011.03.06.14.12.05 (version=SSLv3 cipher=OTHER); Sun, 06 Mar 2011 14:12:07 -0800 (PST)
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Dick Hardt <dick.hardt@gmail.com>
In-Reply-To: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com>
Date: Sun, 6 Mar 2011 14:12:03 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com>
To: Brian Campbell <bcampbell@pingidentity.com>
X-Mailer: Apple Mail (2.1082)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Mar 2011 22:11:01 -0000

-1

Many sites are using OAuth (or something like it) in native apps now.=20

One of the objectives of having a standard is to bring best practices =
and standardization to how to solve a problem rather than "a million =
freakin unique snowflakes" where developers have to learn and code each =
mechanism to enable authorization to a native app. Brian's suggested =
wording may make sense in the context of where OAuth is now -- but it =
signals that the WG has been unable to solve what I think many viewed as =
an important aspect of the WG.

fwiw: I think a number of important constituents have opted out of the =
dialogue. An unfortunate situation.

On 2011-03-02, at 6:05 AM, Brian Campbell wrote:

> I propose that the "or native applications" text be dropped from the
> first paragraph in section 4.2 Implicit Grant  [1].
>=20
> There is clearly some disagreement about what is most appropriate for
> mobile/native applications and many, including myself, don't feel that
> the implicit grant works well to support them (due to the lack of a
> refresh token and need to repeat the authorization steps).  I
> understand that the text in section 4 is non-normative, however, I
> feel that the mention of native apps in 4.2 biases thinking in a
> particular way (it's already led to one lengthy internal discussion
> that I'd rather not have again and again).  I believe it'd be more
> appropriate for the draft to remain silent on how native apps should
> acquire tokens and leave it up to implementations/deployments to
> decide (or an extension draft as Marius has proposed).
>=20
> The "or native applications" text in is also somewhat inconsistent
> with the text in the following sentence that talks about the
> authentication of the client being based on the user-agent's
> same-origin policy.
>=20
> Removing those three words is a small change but one that I feel would
> be beneficial on a number of fronts.
>=20
> Thanks,
> Brian
>=20
>=20
> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
>=20
> On Wed, Feb 16, 2011 at 2:57 PM, Eran Hammer-Lahav =
<eran@hueniverse.com> wrote:
>> Feel free to propose alternative preamble for the implicit and =
authorization code sections, describing the characteristics of what they =
are good for. It should fit in a single paragraph. Such a proposal would =
fit right in with last call feedback to -13.
>>=20
>> EHL
>>=20
>>> -----Original Message-----
>>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
>>> Sent: Wednesday, February 16, 2011 1:39 PM
>>> To: Eran Hammer-Lahav
>>> Cc: Brian Campbell; OAuth WG
>>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
>>>=20
>>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
>>> <eran@hueniverse.com> wrote:
>>>> The reason why we don't return a refresh token in the implicit =
grant is
>>> exactly because there is no client authentication...
>>>=20
>>> Not sure that's the main reason. AFAIK it is because the response is =
sent
>>> through the user-agent and it could leak.
>>>=20
>>>=20
>>>> These are all well-balanced flows with specific security =
properties. If you
>>> need something else, even if it is just a tweak, it must be =
considered a
>>> different flow. That doesn't mean you need to register a new grant =
type, just
>>> that you are dealing with different implementation details unique to =
your
>>> server.
>>>=20
>>> The Authorization Code flow, with no client secret, is perfectly =
fine for Native
>>> Apps IMO.
>>>=20
>>> Marius
>>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From torsten@lodderstedt.net  Mon Mar  7 01:59:15 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 415F63A6916 for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 01:59:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.209
X-Spam-Level: 
X-Spam-Status: No, score=-2.209 tagged_above=-999 required=5 tests=[AWL=0.040,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dcMyBMuT8vC1 for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 01:59:14 -0800 (PST)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.29.23]) by core3.amsl.com (Postfix) with ESMTP id 05AAA3A68EC for <oauth@ietf.org>; Mon,  7 Mar 2011 01:59:13 -0800 (PST)
Received: from [79.253.43.171] (helo=[192.168.71.49]) by smtprelay01.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1PwXEm-0005A7-L2; Mon, 07 Mar 2011 11:00:24 +0100
Message-ID: <4D74ACB8.3040707@lodderstedt.net>
Date: Mon, 07 Mar 2011 11:00:24 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Dick Hardt <dick.hardt@gmail.com>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com> <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com>
In-Reply-To: <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2011 09:59:15 -0000

Hi Dick,

I agree with you, the OAuth standard should offer clear patterns for 
native apps.

All native apps I'm familiar with use the authorization code, which is 
because of its support for refresh tokens. But the current text of the 
spec only suggests to use the implict grant flow to implement native 
apps whereas previous versions mentioned authz code and password flow as 
well. So in my opinion, the text is misleading to developers. And that's 
not only a feeling since I already meet people, which have been 
misguided :-(.

I think at least the misleading words shall be removed. Better would be 
to come up with a consensus after a discussion in the group.

regards,
Torsten.

Am 06.03.2011 23:12, schrieb Dick Hardt:
> -1
>
> Many sites are using OAuth (or something like it) in native apps now.
>
> One of the objectives of having a standard is to bring best practices and standardization to how to solve a problem rather than "a million freakin unique snowflakes" where developers have to learn and code each mechanism to enable authorization to a native app. Brian's suggested wording may make sense in the context of where OAuth is now -- but it signals that the WG has been unable to solve what I think many viewed as an important aspect of the WG.
>
> fwiw: I think a number of important constituents have opted out of the dialogue. An unfortunate situation.
>
> On 2011-03-02, at 6:05 AM, Brian Campbell wrote:
>
>> I propose that the "or native applications" text be dropped from the
>> first paragraph in section 4.2 Implicit Grant  [1].
>>
>> There is clearly some disagreement about what is most appropriate for
>> mobile/native applications and many, including myself, don't feel that
>> the implicit grant works well to support them (due to the lack of a
>> refresh token and need to repeat the authorization steps).  I
>> understand that the text in section 4 is non-normative, however, I
>> feel that the mention of native apps in 4.2 biases thinking in a
>> particular way (it's already led to one lengthy internal discussion
>> that I'd rather not have again and again).  I believe it'd be more
>> appropriate for the draft to remain silent on how native apps should
>> acquire tokens and leave it up to implementations/deployments to
>> decide (or an extension draft as Marius has proposed).
>>
>> The "or native applications" text in is also somewhat inconsistent
>> with the text in the following sentence that talks about the
>> authentication of the client being based on the user-agent's
>> same-origin policy.
>>
>> Removing those three words is a small change but one that I feel would
>> be beneficial on a number of fronts.
>>
>> Thanks,
>> Brian
>>
>>
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
>>
>> On Wed, Feb 16, 2011 at 2:57 PM, Eran Hammer-Lahav<eran@hueniverse.com>  wrote:
>>> Feel free to propose alternative preamble for the implicit and authorization code sections, describing the characteristics of what they are good for. It should fit in a single paragraph. Such a proposal would fit right in with last call feedback to -13.
>>>
>>> EHL
>>>
>>>> -----Original Message-----
>>>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
>>>> Sent: Wednesday, February 16, 2011 1:39 PM
>>>> To: Eran Hammer-Lahav
>>>> Cc: Brian Campbell; OAuth WG
>>>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
>>>>
>>>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
>>>> <eran@hueniverse.com>  wrote:
>>>>> The reason why we don't return a refresh token in the implicit grant is
>>>> exactly because there is no client authentication...
>>>>
>>>> Not sure that's the main reason. AFAIK it is because the response is sent
>>>> through the user-agent and it could leak.
>>>>
>>>>
>>>>> These are all well-balanced flows with specific security properties. If you
>>>> need something else, even if it is just a tweak, it must be considered a
>>>> different flow. That doesn't mean you need to register a new grant type, just
>>>> that you are dealing with different implementation details unique to your
>>>> server.
>>>>
>>>> The Authorization Code flow, with no client secret, is perfectly fine for Native
>>>> Apps IMO.
>>>>
>>>> Marius
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From jricher@mitre.org  Mon Mar  7 05:55:34 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 195AE3A696B for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 05:55:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HBmfkAx11DWw for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 05:55:33 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id E77193A6998 for <oauth@ietf.org>; Mon,  7 Mar 2011 05:55:32 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 1FE0F21B1228; Mon,  7 Mar 2011 08:56:46 -0500 (EST)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 18AE921B1219; Mon,  7 Mar 2011 08:56:46 -0500 (EST)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub2.MITRE.ORG ([129.83.29.74]) with mapi; Mon, 7 Mar 2011 08:56:45 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Torsten Lodderstedt <torsten@lodderstedt.net>, Dick Hardt <dick.hardt@gmail.com>
Date: Mon, 7 Mar 2011 08:54:26 -0500
Thread-Topic: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
Thread-Index: Acvcrn7U/8pjBuf2RbG6w8ZjZVLl4wAIK08D
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719A@IMCMBX3.MITRE.ORG>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com> <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com>, <4D74ACB8.3040707@lodderstedt.net>
In-Reply-To: <4D74ACB8.3040707@lodderstedt.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2011 13:55:34 -0000

Agree with Torsten - having the mention in just that one place doesn't make=
 sense. It should be removed or replicated throughout, but I think we might=
 want a paragraph addressing native apps more deeply in the introduction. W=
e don't want to give the (incorrect) impression that the implicit flow is t=
he only or even preferred flow for native apps.

 -- Justin
________________________________________
From: oauth-bounces@ietf.org [oauth-bounces@ietf.org] On Behalf Of Torsten =
Lodderstedt [torsten@lodderstedt.net]
Sent: Monday, March 07, 2011 5:00 AM
To: Dick Hardt
Cc: OAuth WG
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 f=
eedback deadline)

Hi Dick,

I agree with you, the OAuth standard should offer clear patterns for
native apps.

All native apps I'm familiar with use the authorization code, which is
because of its support for refresh tokens. But the current text of the
spec only suggests to use the implict grant flow to implement native
apps whereas previous versions mentioned authz code and password flow as
well. So in my opinion, the text is misleading to developers. And that's
not only a feeling since I already meet people, which have been
misguided :-(.

I think at least the misleading words shall be removed. Better would be
to come up with a consensus after a discussion in the group.

regards,
Torsten.

Am 06.03.2011 23:12, schrieb Dick Hardt:
> -1
>
> Many sites are using OAuth (or something like it) in native apps now.
>
> One of the objectives of having a standard is to bring best practices and=
 standardization to how to solve a problem rather than "a million freakin u=
nique snowflakes" where developers have to learn and code each mechanism to=
 enable authorization to a native app. Brian's suggested wording may make s=
ense in the context of where OAuth is now -- but it signals that the WG has=
 been unable to solve what I think many viewed as an important aspect of th=
e WG.
>
> fwiw: I think a number of important constituents have opted out of the di=
alogue. An unfortunate situation.
>
> On 2011-03-02, at 6:05 AM, Brian Campbell wrote:
>
>> I propose that the "or native applications" text be dropped from the
>> first paragraph in section 4.2 Implicit Grant  [1].
>>
>> There is clearly some disagreement about what is most appropriate for
>> mobile/native applications and many, including myself, don't feel that
>> the implicit grant works well to support them (due to the lack of a
>> refresh token and need to repeat the authorization steps).  I
>> understand that the text in section 4 is non-normative, however, I
>> feel that the mention of native apps in 4.2 biases thinking in a
>> particular way (it's already led to one lengthy internal discussion
>> that I'd rather not have again and again).  I believe it'd be more
>> appropriate for the draft to remain silent on how native apps should
>> acquire tokens and leave it up to implementations/deployments to
>> decide (or an extension draft as Marius has proposed).
>>
>> The "or native applications" text in is also somewhat inconsistent
>> with the text in the following sentence that talks about the
>> authentication of the client being based on the user-agent's
>> same-origin policy.
>>
>> Removing those three words is a small change but one that I feel would
>> be beneficial on a number of fronts.
>>
>> Thanks,
>> Brian
>>
>>
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
>>
>> On Wed, Feb 16, 2011 at 2:57 PM, Eran Hammer-Lahav<eran@hueniverse.com> =
 wrote:
>>> Feel free to propose alternative preamble for the implicit and authoriz=
ation code sections, describing the characteristics of what they are good f=
or. It should fit in a single paragraph. Such a proposal would fit right in=
 with last call feedback to -13.
>>>
>>> EHL
>>>
>>>> -----Original Message-----
>>>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
>>>> Sent: Wednesday, February 16, 2011 1:39 PM
>>>> To: Eran Hammer-Lahav
>>>> Cc: Brian Campbell; OAuth WG
>>>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
>>>>
>>>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
>>>> <eran@hueniverse.com>  wrote:
>>>>> The reason why we don't return a refresh token in the implicit grant =
is
>>>> exactly because there is no client authentication...
>>>>
>>>> Not sure that's the main reason. AFAIK it is because the response is s=
ent
>>>> through the user-agent and it could leak.
>>>>
>>>>
>>>>> These are all well-balanced flows with specific security properties. =
If you
>>>> need something else, even if it is just a tweak, it must be considered=
 a
>>>> different flow. That doesn't mean you need to register a new grant typ=
e, just
>>>> that you are dealing with different implementation details unique to y=
our
>>>> server.
>>>>
>>>> The Authorization Code flow, with no client secret, is perfectly fine =
for Native
>>>> Apps IMO.
>>>>
>>>> Marius
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From huilan.lu@alcatel-lucent.com  Mon Mar  7 07:08:14 2011
Return-Path: <huilan.lu@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0CFC23A68F2 for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 07:08:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.399
X-Spam-Level: 
X-Spam-Status: No, score=-6.399 tagged_above=-999 required=5 tests=[AWL=0.200,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZhETBnjyGqdD for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 07:08:12 -0800 (PST)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by core3.amsl.com (Postfix) with ESMTP id B432C3A692D for <oauth@ietf.org>; Mon,  7 Mar 2011 07:08:11 -0800 (PST)
Received: from usnavsmail2.ndc.alcatel-lucent.com (usnavsmail2.ndc.alcatel-lucent.com [135.3.39.10]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id p27F9N1r018910 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 7 Mar 2011 09:09:23 -0600 (CST)
Received: from USNAVSXCHHUB03.ndc.alcatel-lucent.com (usnavsxchhub03.ndc.alcatel-lucent.com [135.3.39.112]) by usnavsmail2.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p27F9M5Y030097 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Mon, 7 Mar 2011 09:09:23 -0600
Received: from USNAVSXCHMBSB3.ndc.alcatel-lucent.com ([135.3.39.135]) by USNAVSXCHHUB03.ndc.alcatel-lucent.com ([135.3.39.112]) with mapi; Mon, 7 Mar 2011 09:09:22 -0600
From: "Lu, Hui-Lan (Huilan)" <huilan.lu@alcatel-lucent.com>
To: "'Richer, Justin P.'" <jricher@mitre.org>, Torsten Lodderstedt <torsten@lodderstedt.net>, Dick Hardt <dick.hardt@gmail.com>
Date: Mon, 7 Mar 2011 09:09:21 -0600
Thread-Topic: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
Thread-Index: Acvcrn7U/8pjBuf2RbG6w8ZjZVLl4wAIK08DAAKa1PA=
Message-ID: <0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DCF@USNAVSXCHMBSB3.ndc.alcatel-lucent.com>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com> <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com>, <4D74ACB8.3040707@lodderstedt.net> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719A@IMCMBX3.MITRE.ORG>
In-Reply-To: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719A@IMCMBX3.MITRE.ORG>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.10
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2011 15:08:14 -0000

+1

Best regards,

Huilan LU


CONFIDENTIALITY NOTICE: This e-mail and any files attached may contain conf=
idential and proprietary information of Alcatel-Lucent and/or its affiliate=
d entities. Access by the intended recipient only is authorized. Any liabil=
ity arising from any party acting, or refraining from acting, on any inform=
ation contained in this e-mail is hereby excluded. If you are not the inten=
ded recipient, please notify the sender immediately, destroy the original t=
ransmission and its attachments and do not disclose the contents to any oth=
er person, use it for any purpose, or store or copy the information in any =
medium. Copyright in this e-mail and any attachments belongs to Alcatel-Luc=
ent and/or its affiliated entities.=20
=20

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org]=20
> On Behalf Of Richer, Justin P.
> Sent: Monday, March 07, 2011 8:54 AM
> To: Torsten Lodderstedt; Dick Hardt
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] slightly alternative preamble (was:=20
> Re: Draft -12 feedback deadline)
>=20
> Agree with Torsten - having the mention in just that one=20
> place doesn't make sense. It should be removed or replicated=20
> throughout, but I think we might want a paragraph addressing=20
> native apps more deeply in the introduction. We don't want to=20
> give the (incorrect) impression that the implicit flow is the=20
> only or even preferred flow for native apps.
>=20
>  -- Justin
> ________________________________________
> From: oauth-bounces@ietf.org [oauth-bounces@ietf.org] On=20
> Behalf Of Torsten Lodderstedt [torsten@lodderstedt.net]
> Sent: Monday, March 07, 2011 5:00 AM
> To: Dick Hardt
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] slightly alternative preamble (was:=20
> Re: Draft -12 feedback deadline)
>=20
> Hi Dick,
>=20
> I agree with you, the OAuth standard should offer clear=20
> patterns for native apps.
>=20
> All native apps I'm familiar with use the authorization code,=20
> which is because of its support for refresh tokens. But the=20
> current text of the spec only suggests to use the implict=20
> grant flow to implement native apps whereas previous versions=20
> mentioned authz code and password flow as well. So in my=20
> opinion, the text is misleading to developers. And that's not=20
> only a feeling since I already meet people, which have been=20
> misguided :-(.
>=20
> I think at least the misleading words shall be removed.=20
> Better would be to come up with a consensus after a=20
> discussion in the group.
>=20
> regards,
> Torsten.
>=20
> Am 06.03.2011 23:12, schrieb Dick Hardt:
> > -1
> >
> > Many sites are using OAuth (or something like it) in native=20
> apps now.
> >
> > One of the objectives of having a standard is to bring best=20
> practices and standardization to how to solve a problem=20
> rather than "a million freakin unique snowflakes" where=20
> developers have to learn and code each mechanism to enable=20
> authorization to a native app. Brian's suggested wording may=20
> make sense in the context of where OAuth is now -- but it=20
> signals that the WG has been unable to solve what I think=20
> many viewed as an important aspect of the WG.
> >
> > fwiw: I think a number of important constituents have opted=20
> out of the dialogue. An unfortunate situation.
> >
> > On 2011-03-02, at 6:05 AM, Brian Campbell wrote:
> >
> >> I propose that the "or native applications" text be=20
> dropped from the=20
> >> first paragraph in section 4.2 Implicit Grant  [1].
> >>
> >> There is clearly some disagreement about what is most=20
> appropriate for=20
> >> mobile/native applications and many, including myself, don't feel=20
> >> that the implicit grant works well to support them (due to=20
> the lack=20
> >> of a refresh token and need to repeat the authorization steps).  I=20
> >> understand that the text in section 4 is non-normative, however, I=20
> >> feel that the mention of native apps in 4.2 biases thinking in a=20
> >> particular way (it's already led to one lengthy internal=20
> discussion=20
> >> that I'd rather not have again and again).  I believe it'd be more=20
> >> appropriate for the draft to remain silent on how native=20
> apps should=20
> >> acquire tokens and leave it up to implementations/deployments to=20
> >> decide (or an extension draft as Marius has proposed).
> >>
> >> The "or native applications" text in is also somewhat inconsistent=20
> >> with the text in the following sentence that talks about the=20
> >> authentication of the client being based on the user-agent's=20
> >> same-origin policy.
> >>
> >> Removing those three words is a small change but one that I feel=20
> >> would be beneficial on a number of fronts.
> >>
> >> Thanks,
> >> Brian
> >>
> >>
> >> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
> >>
> >> On Wed, Feb 16, 2011 at 2:57 PM, Eran=20
> Hammer-Lahav<eran@hueniverse.com>  wrote:
> >>> Feel free to propose alternative preamble for the=20
> implicit and authorization code sections, describing the=20
> characteristics of what they are good for. It should fit in a=20
> single paragraph. Such a proposal would fit right in with=20
> last call feedback to -13.
> >>>
> >>> EHL
> >>>
> >>>> -----Original Message-----
> >>>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
> >>>> Sent: Wednesday, February 16, 2011 1:39 PM
> >>>> To: Eran Hammer-Lahav
> >>>> Cc: Brian Campbell; OAuth WG
> >>>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
> >>>>
> >>>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav=20
> >>>> <eran@hueniverse.com>  wrote:
> >>>>> The reason why we don't return a refresh token in the implicit=20
> >>>>> grant is
> >>>> exactly because there is no client authentication...
> >>>>
> >>>> Not sure that's the main reason. AFAIK it is because the=20
> response=20
> >>>> is sent through the user-agent and it could leak.
> >>>>
> >>>>
> >>>>> These are all well-balanced flows with specific security=20
> >>>>> properties. If you
> >>>> need something else, even if it is just a tweak, it must be=20
> >>>> considered a different flow. That doesn't mean you need=20
> to register=20
> >>>> a new grant type, just that you are dealing with different=20
> >>>> implementation details unique to your server.
> >>>>
> >>>> The Authorization Code flow, with no client secret, is perfectly=20
> >>>> fine for Native Apps IMO.
> >>>>
> >>>> Marius
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> =

From bcampbell@pingidentity.com  Mon Mar  7 07:16:39 2011
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 930193A67E1 for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 07:16:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.977
X-Spam-Level: 
X-Spam-Status: No, score=-4.977 tagged_above=-999 required=5 tests=[AWL=1.000,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 65gVE2PXcOfS for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 07:16:38 -0800 (PST)
Received: from na3sys009aog109.obsmtp.com (na3sys009aog109.obsmtp.com [74.125.149.201]) by core3.amsl.com (Postfix) with ESMTP id 40A203A67D3 for <oauth@ietf.org>; Mon,  7 Mar 2011 07:16:37 -0800 (PST)
Received: from source ([209.85.161.45]) (using TLSv1) by na3sys009aob109.postini.com ([74.125.148.12]) with SMTP ID DSNKTXT3HuyB5Sv8nOXaDKlnVFGOepsfFpl+@postini.com; Mon, 07 Mar 2011 07:17:51 PST
Received: by mail-fx0-f45.google.com with SMTP id 11so4704283fxm.18 for <oauth@ietf.org>; Mon, 07 Mar 2011 07:17:50 -0800 (PST)
Received: by 10.223.143.86 with SMTP id t22mr562134fau.78.1299510993557; Mon, 07 Mar 2011 07:16:33 -0800 (PST)
MIME-Version: 1.0
Received: by 10.223.16.73 with HTTP; Mon, 7 Mar 2011 07:15:33 -0800 (PST)
In-Reply-To: <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com> <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Mon, 7 Mar 2011 08:15:33 -0700
Message-ID: <AANLkTinKR08-T+HgpJweJC9EtRP6byMBFfdOmCaAcQ+L@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2011 15:16:39 -0000

I don't disagree with any of that, Dick. But in the absence of any
specific solution or recommendation from the WG regarding native apps,
I am simply asking that the somewhat misleading text be removed from
the framework spec.

On Sun, Mar 6, 2011 at 3:12 PM, Dick Hardt <dick.hardt@gmail.com> wrote:
> -1
>
> Many sites are using OAuth (or something like it) in native apps now.
>
> One of the objectives of having a standard is to bring best practices and=
 standardization to how to solve a problem rather than "a million freakin u=
nique snowflakes" where developers have to learn and code each mechanism to=
 enable authorization to a native app. Brian's suggested wording may make s=
ense in the context of where OAuth is now -- but it signals that the WG has=
 been unable to solve what I think many viewed as an important aspect of th=
e WG.
>
> fwiw: I think a number of important constituents have opted out of the di=
alogue. An unfortunate situation.
>
> On 2011-03-02, at 6:05 AM, Brian Campbell wrote:
>
>> I propose that the "or native applications" text be dropped from the
>> first paragraph in section 4.2 Implicit Grant =A0[1].
>>
>> There is clearly some disagreement about what is most appropriate for
>> mobile/native applications and many, including myself, don't feel that
>> the implicit grant works well to support them (due to the lack of a
>> refresh token and need to repeat the authorization steps). =A0I
>> understand that the text in section 4 is non-normative, however, I
>> feel that the mention of native apps in 4.2 biases thinking in a
>> particular way (it's already led to one lengthy internal discussion
>> that I'd rather not have again and again). =A0I believe it'd be more
>> appropriate for the draft to remain silent on how native apps should
>> acquire tokens and leave it up to implementations/deployments to
>> decide (or an extension draft as Marius has proposed).
>>
>> The "or native applications" text in is also somewhat inconsistent
>> with the text in the following sentence that talks about the
>> authentication of the client being based on the user-agent's
>> same-origin policy.
>>
>> Removing those three words is a small change but one that I feel would
>> be beneficial on a number of fronts.
>>
>> Thanks,
>> Brian
>>
>>
>> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
>>
>> On Wed, Feb 16, 2011 at 2:57 PM, Eran Hammer-Lahav <eran@hueniverse.com>=
 wrote:
>>> Feel free to propose alternative preamble for the implicit and authoriz=
ation code sections, describing the characteristics of what they are good f=
or. It should fit in a single paragraph. Such a proposal would fit right in=
 with last call feedback to -13.
>>>
>>> EHL
>>>
>>>> -----Original Message-----
>>>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
>>>> Sent: Wednesday, February 16, 2011 1:39 PM
>>>> To: Eran Hammer-Lahav
>>>> Cc: Brian Campbell; OAuth WG
>>>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
>>>>
>>>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
>>>> <eran@hueniverse.com> wrote:
>>>>> The reason why we don't return a refresh token in the implicit grant =
is
>>>> exactly because there is no client authentication...
>>>>
>>>> Not sure that's the main reason. AFAIK it is because the response is s=
ent
>>>> through the user-agent and it could leak.
>>>>
>>>>
>>>>> These are all well-balanced flows with specific security properties. =
If you
>>>> need something else, even if it is just a tweak, it must be considered=
 a
>>>> different flow. That doesn't mean you need to register a new grant typ=
e, just
>>>> that you are dealing with different implementation details unique to y=
our
>>>> server.
>>>>
>>>> The Authorization Code flow, with no client secret, is perfectly fine =
for Native
>>>> Apps IMO.
>>>>
>>>> Marius
>>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>
>

From skylar@kiva.org  Mon Mar  7 11:36:41 2011
Return-Path: <skylar@kiva.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9294D3A681D for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 11:36:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ir-5VB6it9IT for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 11:36:40 -0800 (PST)
Received: from na3sys010aog107.obsmtp.com (na3sys010aog107.obsmtp.com [74.125.245.82]) by core3.amsl.com (Postfix) with SMTP id C36A93A6809 for <oauth@ietf.org>; Mon,  7 Mar 2011 11:36:39 -0800 (PST)
Received: from source ([209.85.161.169]) (using TLSv1) by na3sys010aob107.postini.com ([74.125.244.12]) with SMTP ID DSNKTXU0EN6qfoLM49l82yMuKYGTrBKPs7RC@postini.com; Mon, 07 Mar 2011 11:37:54 PST
Received: by gxk2 with SMTP id 2so2280965gxk.14 for <oauth@ietf.org>; Mon, 07 Mar 2011 11:37:52 -0800 (PST)
Received: by 10.90.22.29 with SMTP id 29mr5608459agv.32.1299526671758; Mon, 07 Mar 2011 11:37:51 -0800 (PST)
Received: from [10.0.1.4] (c-24-5-80-5.hsd1.ca.comcast.net [24.5.80.5]) by mx.google.com with ESMTPS id w4sm4177447anw.36.2011.03.07.11.37.49 (version=TLSv1/SSLv3 cipher=OTHER); Mon, 07 Mar 2011 11:37:50 -0800 (PST)
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Skylar Woodward <skylar@kiva.org>
In-Reply-To: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719A@IMCMBX3.MITRE.ORG>
Date: Mon, 7 Mar 2011 11:37:47 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <F81348BB-1711-49C9-9FDD-148D98C116EB@kiva.org>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com> <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com>, <4D74ACB8.3040707@lodderstedt.net> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719A@IMCMBX3.MITRE.ORG>
To: "Richer, Justin P." <jricher@mitre.org>
X-Mailer: Apple Mail (2.1082)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2011 19:36:41 -0000

Justin has well stated my view on this.  Folks here have explained how =
the flows can work for (or doesn't prohibit) a native app, but it also =
seems clear that new readers don't pick up how native apps fit into the =
flow in a 1st or 2nd pass.

So, in short, I agree with Brian's suggestion of (1) removing choice =
references to native apps, and (2) as a further (and preferred) step, a =
better preamble (possibly with further supporting edits) on the role of =
native apps. It seems Justin and Torsten are suggesting the same.

To go further than step 1 I agree we need some discussion on the story =
for native apps. For my part, here's how I see them fitting in:

- The general assumption is that Native apps can't keep secrets. This is =
mostly true except...
- Native apps with secured distribution (eg, controlled access by =
corporate IT departments who also can modify app preferences w/ the =
provider) can claim the apps keep secrets.  (A sample use case are Kiva =
field partners who develop simple enterprise apps for use inside a =
firewall).
- In truth, the question of secrets or no secrets (can authenticate or =
spoofable) is of primary importance for choosing a flow.
- In the common case, Native apps without secrets, an implicit flow or =
auth-code flow can be used. If an auth-code flow is used, there should =
be no client authentication. Alternatively, providers may instruct such =
clients to authenticate with an empty secret (since such clients should =
never be issued secrets to begin with).
- In the uncommon case of native apps who can keep secrets, an implicit =
flow cannot be used. The app must present credentials which requires an =
auth-code (or other) flow.
- I think there should be some note added to the auth-code flow on how a =
native app chooses and makes use of a redirect_uri.  This was present in =
draft 10 and was (i think) key to understanding the auth-code story for =
native apps.

I do not have strong opinions on the client-assertion flows for native =
apps nor the issuance of refresh tokens in an implicit flow. It does =
seem that some find it important to be able to issue refresh tokens to =
clients without secrets. I don't see a good argument to restrict this =
from a policy point of view (rather it seems more of issue of mechanics =
and/or fragment parsing), but it does seem the policy should be =
consistent. That is, if as an issue of policy, refresh tokens are not =
issued to apps without credentials, the policy applies for auth-code =
flows or implicit flows.

skylar


On Mar 7, 2011, at 5:54 AM, Richer, Justin P. wrote:

> Agree with Torsten - having the mention in just that one place doesn't =
make sense. It should be removed or replicated throughout, but I think =
we might want a paragraph addressing native apps more deeply in the =
introduction. We don't want to give the (incorrect) impression that the =
implicit flow is the only or even preferred flow for native apps.
>=20
> -- Justin
> ________________________________________
> From: oauth-bounces@ietf.org [oauth-bounces@ietf.org] On Behalf Of =
Torsten Lodderstedt [torsten@lodderstedt.net]
> Sent: Monday, March 07, 2011 5:00 AM
> To: Dick Hardt
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft =
-12 feedback deadline)
>=20
> Hi Dick,
>=20
> I agree with you, the OAuth standard should offer clear patterns for
> native apps.
>=20
> All native apps I'm familiar with use the authorization code, which is
> because of its support for refresh tokens. But the current text of the
> spec only suggests to use the implict grant flow to implement native
> apps whereas previous versions mentioned authz code and password flow =
as
> well. So in my opinion, the text is misleading to developers. And =
that's
> not only a feeling since I already meet people, which have been
> misguided :-(.
>=20
> I think at least the misleading words shall be removed. Better would =
be
> to come up with a consensus after a discussion in the group.
>=20
> regards,
> Torsten.
>=20
> Am 06.03.2011 23:12, schrieb Dick Hardt:
>> -1
>>=20
>> Many sites are using OAuth (or something like it) in native apps now.
>>=20
>> One of the objectives of having a standard is to bring best practices =
and standardization to how to solve a problem rather than "a million =
freakin unique snowflakes" where developers have to learn and code each =
mechanism to enable authorization to a native app. Brian's suggested =
wording may make sense in the context of where OAuth is now -- but it =
signals that the WG has been unable to solve what I think many viewed as =
an important aspect of the WG.
>>=20
>> fwiw: I think a number of important constituents have opted out of =
the dialogue. An unfortunate situation.
>>=20
>> On 2011-03-02, at 6:05 AM, Brian Campbell wrote:
>>=20
>>> I propose that the "or native applications" text be dropped from the
>>> first paragraph in section 4.2 Implicit Grant  [1].
>>>=20
>>> There is clearly some disagreement about what is most appropriate =
for
>>> mobile/native applications and many, including myself, don't feel =
that
>>> the implicit grant works well to support them (due to the lack of a
>>> refresh token and need to repeat the authorization steps).  I
>>> understand that the text in section 4 is non-normative, however, I
>>> feel that the mention of native apps in 4.2 biases thinking in a
>>> particular way (it's already led to one lengthy internal discussion
>>> that I'd rather not have again and again).  I believe it'd be more
>>> appropriate for the draft to remain silent on how native apps should
>>> acquire tokens and leave it up to implementations/deployments to
>>> decide (or an extension draft as Marius has proposed).
>>>=20
>>> The "or native applications" text in is also somewhat inconsistent
>>> with the text in the following sentence that talks about the
>>> authentication of the client being based on the user-agent's
>>> same-origin policy.
>>>=20
>>> Removing those three words is a small change but one that I feel =
would
>>> be beneficial on a number of fronts.
>>>=20
>>> Thanks,
>>> Brian
>>>=20
>>>=20
>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
>>>=20
>>> On Wed, Feb 16, 2011 at 2:57 PM, Eran =
Hammer-Lahav<eran@hueniverse.com>  wrote:
>>>> Feel free to propose alternative preamble for the implicit and =
authorization code sections, describing the characteristics of what they =
are good for. It should fit in a single paragraph. Such a proposal would =
fit right in with last call feedback to -13.
>>>>=20
>>>> EHL
>>>>=20
>>>>> -----Original Message-----
>>>>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
>>>>> Sent: Wednesday, February 16, 2011 1:39 PM
>>>>> To: Eran Hammer-Lahav
>>>>> Cc: Brian Campbell; OAuth WG
>>>>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
>>>>>=20
>>>>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
>>>>> <eran@hueniverse.com>  wrote:
>>>>>> The reason why we don't return a refresh token in the implicit =
grant is
>>>>> exactly because there is no client authentication...
>>>>>=20
>>>>> Not sure that's the main reason. AFAIK it is because the response =
is sent
>>>>> through the user-agent and it could leak.
>>>>>=20
>>>>>=20
>>>>>> These are all well-balanced flows with specific security =
properties. If you
>>>>> need something else, even if it is just a tweak, it must be =
considered a
>>>>> different flow. That doesn't mean you need to register a new grant =
type, just
>>>>> that you are dealing with different implementation details unique =
to your
>>>>> server.
>>>>>=20
>>>>> The Authorization Code flow, with no client secret, is perfectly =
fine for Native
>>>>> Apps IMO.
>>>>>=20
>>>>> Marius
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From dick.hardt@gmail.com  Mon Mar  7 12:07:58 2011
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3AB383A67B3 for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 12:07:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[AWL=0.001,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SFcgAUowaqrl for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 12:07:54 -0800 (PST)
Received: from mail-pz0-f44.google.com (mail-pz0-f44.google.com [209.85.210.44]) by core3.amsl.com (Postfix) with ESMTP id EAF023A6765 for <oauth@ietf.org>; Mon,  7 Mar 2011 12:07:53 -0800 (PST)
Received: by pzk30 with SMTP id 30so1223281pzk.31 for <oauth@ietf.org>; Mon, 07 Mar 2011 12:09:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to:x-mailer; bh=cCPR+2+gKhbxVsKBgbFod12KSlvChsRAITEom/nObjA=; b=P240AJ2sXWtmfu78Qde/Iqk7DZ67XBzRNY97tD75uWwVKorE/uQKWtwr3TAhqJGzW2 fwJ+5ednnN+wrPnL1DGV/1yZLrjWE/4bMzBESYyP3KceXfFjrQQpKPU7IbhsuNDCftKn f3QF8jEb6B8BWA1wZnzaKIpkPuI0ZdIREYfiA=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; b=awermE+gCyuz7dQEuhDR7XZ7K2FRSVDe30fkd/ue88Z5ITR5dUEfwdQITFwa10cXuB pu8l9sbeuniH74fifZKY0qBNcMSZIdz/DEiTeZYOD3RkMFeIu+CWIIy/ZZuJaLKpDLBP ON6KP2g1iZDGR4N+StY14nQnKQraZkaL8mJF8=
Received: by 10.142.222.16 with SMTP id u16mr3570901wfg.326.1299528547441; Mon, 07 Mar 2011 12:09:07 -0800 (PST)
Received: from [192.168.1.16] (c-69-181-71-149.hsd1.ca.comcast.net [69.181.71.149]) by mx.google.com with ESMTPS id m10sm4862244wfl.11.2011.03.07.12.09.05 (version=TLSv1/SSLv3 cipher=OTHER); Mon, 07 Mar 2011 12:09:06 -0800 (PST)
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Dick Hardt <dick.hardt@gmail.com>
In-Reply-To: <AANLkTinKR08-T+HgpJweJC9EtRP6byMBFfdOmCaAcQ+L@mail.gmail.com>
Date: Mon, 7 Mar 2011 12:09:02 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <FF8336B2-6DF1-48EF-88C6-18E1D2DCBEC9@gmail.com>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com> <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com> <AANLkTinKR08-T+HgpJweJC9EtRP6byMBFfdOmCaAcQ+L@mail.gmail.com>
To: Brian Campbell <bcampbell@pingidentity.com>
X-Mailer: Apple Mail (2.1082)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2011 20:07:58 -0000

Brian: I agree with your comments if native apps are not going to be =
supported in OAuth v2.=20

my -1 is towards dropping native app support, and your suggestion was =
the easiest thread to comment on.

On 2011-03-07, at 7:15 AM, Brian Campbell wrote:

> I don't disagree with any of that, Dick. But in the absence of any
> specific solution or recommendation from the WG regarding native apps,
> I am simply asking that the somewhat misleading text be removed from
> the framework spec.
>=20
> On Sun, Mar 6, 2011 at 3:12 PM, Dick Hardt <dick.hardt@gmail.com> =
wrote:
>> -1
>>=20
>> Many sites are using OAuth (or something like it) in native apps now.
>>=20
>> One of the objectives of having a standard is to bring best practices =
and standardization to how to solve a problem rather than "a million =
freakin unique snowflakes" where developers have to learn and code each =
mechanism to enable authorization to a native app. Brian's suggested =
wording may make sense in the context of where OAuth is now -- but it =
signals that the WG has been unable to solve what I think many viewed as =
an important aspect of the WG.
>>=20
>> fwiw: I think a number of important constituents have opted out of =
the dialogue. An unfortunate situation.
>>=20
>> On 2011-03-02, at 6:05 AM, Brian Campbell wrote:
>>=20
>>> I propose that the "or native applications" text be dropped from the
>>> first paragraph in section 4.2 Implicit Grant  [1].
>>>=20
>>> There is clearly some disagreement about what is most appropriate =
for
>>> mobile/native applications and many, including myself, don't feel =
that
>>> the implicit grant works well to support them (due to the lack of a
>>> refresh token and need to repeat the authorization steps).  I
>>> understand that the text in section 4 is non-normative, however, I
>>> feel that the mention of native apps in 4.2 biases thinking in a
>>> particular way (it's already led to one lengthy internal discussion
>>> that I'd rather not have again and again).  I believe it'd be more
>>> appropriate for the draft to remain silent on how native apps should
>>> acquire tokens and leave it up to implementations/deployments to
>>> decide (or an extension draft as Marius has proposed).
>>>=20
>>> The "or native applications" text in is also somewhat inconsistent
>>> with the text in the following sentence that talks about the
>>> authentication of the client being based on the user-agent's
>>> same-origin policy.
>>>=20
>>> Removing those three words is a small change but one that I feel =
would
>>> be beneficial on a number of fronts.
>>>=20
>>> Thanks,
>>> Brian
>>>=20
>>>=20
>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
>>>=20
>>> On Wed, Feb 16, 2011 at 2:57 PM, Eran Hammer-Lahav =
<eran@hueniverse.com> wrote:
>>>> Feel free to propose alternative preamble for the implicit and =
authorization code sections, describing the characteristics of what they =
are good for. It should fit in a single paragraph. Such a proposal would =
fit right in with last call feedback to -13.
>>>>=20
>>>> EHL
>>>>=20
>>>>> -----Original Message-----
>>>>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
>>>>> Sent: Wednesday, February 16, 2011 1:39 PM
>>>>> To: Eran Hammer-Lahav
>>>>> Cc: Brian Campbell; OAuth WG
>>>>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
>>>>>=20
>>>>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
>>>>> <eran@hueniverse.com> wrote:
>>>>>> The reason why we don't return a refresh token in the implicit =
grant is
>>>>> exactly because there is no client authentication...
>>>>>=20
>>>>> Not sure that's the main reason. AFAIK it is because the response =
is sent
>>>>> through the user-agent and it could leak.
>>>>>=20
>>>>>=20
>>>>>> These are all well-balanced flows with specific security =
properties. If you
>>>>> need something else, even if it is just a tweak, it must be =
considered a
>>>>> different flow. That doesn't mean you need to register a new grant =
type, just
>>>>> that you are dealing with different implementation details unique =
to your
>>>>> server.
>>>>>=20
>>>>> The Authorization Code flow, with no client secret, is perfectly =
fine for Native
>>>>> Apps IMO.
>>>>>=20
>>>>> Marius
>>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>>=20


From eran@hueniverse.com  Mon Mar  7 13:10:07 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0E3913A6820 for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 13:10:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.555
X-Spam-Level: 
X-Spam-Status: No, score=-2.555 tagged_above=-999 required=5 tests=[AWL=0.044,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5O9IaHr1KsYb for <oauth@core3.amsl.com>; Mon,  7 Mar 2011 13:10:05 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 4C7513A6826 for <oauth@ietf.org>; Mon,  7 Mar 2011 13:09:59 -0800 (PST)
Received: (qmail 21742 invoked from network); 7 Mar 2011 19:46:22 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 7 Mar 2011 19:46:21 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Mon, 7 Mar 2011 12:46:07 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Skylar Woodward <skylar@kiva.org>, "Richer, Justin P." <jricher@mitre.org>
Date: Mon, 7 Mar 2011 12:45:50 -0700
Thread-Topic: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
Thread-Index: Acvc/y7PdbCJoHwAS/Cue5a2zov9wwAAHgSw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F336BE9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com> <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com>, <4D74ACB8.3040707@lodderstedt.net> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719A@IMCMBX3.MITRE.ORG> <F81348BB-1711-49C9-9FDD-148D98C116EB@kiva.org>
In-Reply-To: <F81348BB-1711-49C9-9FDD-148D98C116EB@kiva.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12	feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2011 21:10:07 -0000

I don't have strong views on keeping the reference to native apps, but the =
spec no longer offers advice on picking a grant type, other than pointing o=
ut the importance of being able to keep a secret. The term native app is un=
defined.

What is needed is a separate guide for helping newcomers pick the right gra=
nt type for their specific needs.

I also want to point out that this is a standard, not a tutorial.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Skylar Woodward
> Sent: Monday, March 07, 2011 11:38 AM
> To: Richer, Justin P.
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12
> feedback deadline)
>=20
> Justin has well stated my view on this.  Folks here have explained how th=
e
> flows can work for (or doesn't prohibit) a native app, but it also seems =
clear
> that new readers don't pick up how native apps fit into the flow in a 1st=
 or
> 2nd pass.
>=20
> So, in short, I agree with Brian's suggestion of (1) removing choice refe=
rences
> to native apps, and (2) as a further (and preferred) step, a better pream=
ble
> (possibly with further supporting edits) on the role of native apps. It s=
eems
> Justin and Torsten are suggesting the same.
>=20
> To go further than step 1 I agree we need some discussion on the story fo=
r
> native apps. For my part, here's how I see them fitting in:
>=20
> - The general assumption is that Native apps can't keep secrets. This is =
mostly
> true except...
> - Native apps with secured distribution (eg, controlled access by corpora=
te IT
> departments who also can modify app preferences w/ the provider) can
> claim the apps keep secrets.  (A sample use case are Kiva field partners =
who
> develop simple enterprise apps for use inside a firewall).
> - In truth, the question of secrets or no secrets (can authenticate or
> spoofable) is of primary importance for choosing a flow.
> - In the common case, Native apps without secrets, an implicit flow or au=
th-
> code flow can be used. If an auth-code flow is used, there should be no c=
lient
> authentication. Alternatively, providers may instruct such clients to
> authenticate with an empty secret (since such clients should never be iss=
ued
> secrets to begin with).
> - In the uncommon case of native apps who can keep secrets, an implicit f=
low
> cannot be used. The app must present credentials which requires an auth-
> code (or other) flow.
> - I think there should be some note added to the auth-code flow on how a
> native app chooses and makes use of a redirect_uri.  This was present in
> draft 10 and was (i think) key to understanding the auth-code story for n=
ative
> apps.
>=20
> I do not have strong opinions on the client-assertion flows for native ap=
ps
> nor the issuance of refresh tokens in an implicit flow. It does seem that=
 some
> find it important to be able to issue refresh tokens to clients without s=
ecrets.
> I don't see a good argument to restrict this from a policy point of view =
(rather
> it seems more of issue of mechanics and/or fragment parsing), but it does
> seem the policy should be consistent. That is, if as an issue of policy, =
refresh
> tokens are not issued to apps without credentials, the policy applies for=
 auth-
> code flows or implicit flows.
>=20
> skylar
>=20
>=20
> On Mar 7, 2011, at 5:54 AM, Richer, Justin P. wrote:
>=20
> > Agree with Torsten - having the mention in just that one place doesn't
> make sense. It should be removed or replicated throughout, but I think we
> might want a paragraph addressing native apps more deeply in the
> introduction. We don't want to give the (incorrect) impression that the
> implicit flow is the only or even preferred flow for native apps.
> >
> > -- Justin
> > ________________________________________
> > From: oauth-bounces@ietf.org [oauth-bounces@ietf.org] On Behalf Of
> > Torsten Lodderstedt [torsten@lodderstedt.net]
> > Sent: Monday, March 07, 2011 5:00 AM
> > To: Dick Hardt
> > Cc: OAuth WG
> > Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft
> > -12 feedback deadline)
> >
> > Hi Dick,
> >
> > I agree with you, the OAuth standard should offer clear patterns for
> > native apps.
> >
> > All native apps I'm familiar with use the authorization code, which is
> > because of its support for refresh tokens. But the current text of the
> > spec only suggests to use the implict grant flow to implement native
> > apps whereas previous versions mentioned authz code and password flow
> > as well. So in my opinion, the text is misleading to developers. And
> > that's not only a feeling since I already meet people, which have been
> > misguided :-(.
> >
> > I think at least the misleading words shall be removed. Better would
> > be to come up with a consensus after a discussion in the group.
> >
> > regards,
> > Torsten.
> >
> > Am 06.03.2011 23:12, schrieb Dick Hardt:
> >> -1
> >>
> >> Many sites are using OAuth (or something like it) in native apps now.
> >>
> >> One of the objectives of having a standard is to bring best practices =
and
> standardization to how to solve a problem rather than "a million freakin
> unique snowflakes" where developers have to learn and code each
> mechanism to enable authorization to a native app. Brian's suggested
> wording may make sense in the context of where OAuth is now -- but it
> signals that the WG has been unable to solve what I think many viewed as =
an
> important aspect of the WG.
> >>
> >> fwiw: I think a number of important constituents have opted out of the
> dialogue. An unfortunate situation.
> >>
> >> On 2011-03-02, at 6:05 AM, Brian Campbell wrote:
> >>
> >>> I propose that the "or native applications" text be dropped from the
> >>> first paragraph in section 4.2 Implicit Grant  [1].
> >>>
> >>> There is clearly some disagreement about what is most appropriate
> >>> for mobile/native applications and many, including myself, don't
> >>> feel that the implicit grant works well to support them (due to the
> >>> lack of a refresh token and need to repeat the authorization steps).
> >>> I understand that the text in section 4 is non-normative, however, I
> >>> feel that the mention of native apps in 4.2 biases thinking in a
> >>> particular way (it's already led to one lengthy internal discussion
> >>> that I'd rather not have again and again).  I believe it'd be more
> >>> appropriate for the draft to remain silent on how native apps should
> >>> acquire tokens and leave it up to implementations/deployments to
> >>> decide (or an extension draft as Marius has proposed).
> >>>
> >>> The "or native applications" text in is also somewhat inconsistent
> >>> with the text in the following sentence that talks about the
> >>> authentication of the client being based on the user-agent's
> >>> same-origin policy.
> >>>
> >>> Removing those three words is a small change but one that I feel
> >>> would be beneficial on a number of fronts.
> >>>
> >>> Thanks,
> >>> Brian
> >>>
> >>>
> >>> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
> >>>
> >>> On Wed, Feb 16, 2011 at 2:57 PM, Eran Hammer-
> Lahav<eran@hueniverse.com>  wrote:
> >>>> Feel free to propose alternative preamble for the implicit and
> authorization code sections, describing the characteristics of what they =
are
> good for. It should fit in a single paragraph. Such a proposal would fit =
right in
> with last call feedback to -13.
> >>>>
> >>>> EHL
> >>>>
> >>>>> -----Original Message-----
> >>>>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
> >>>>> Sent: Wednesday, February 16, 2011 1:39 PM
> >>>>> To: Eran Hammer-Lahav
> >>>>> Cc: Brian Campbell; OAuth WG
> >>>>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
> >>>>>
> >>>>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
> >>>>> <eran@hueniverse.com>  wrote:
> >>>>>> The reason why we don't return a refresh token in the implicit
> >>>>>> grant is
> >>>>> exactly because there is no client authentication...
> >>>>>
> >>>>> Not sure that's the main reason. AFAIK it is because the response
> >>>>> is sent through the user-agent and it could leak.
> >>>>>
> >>>>>
> >>>>>> These are all well-balanced flows with specific security
> >>>>>> properties. If you
> >>>>> need something else, even if it is just a tweak, it must be
> >>>>> considered a different flow. That doesn't mean you need to
> >>>>> register a new grant type, just that you are dealing with
> >>>>> different implementation details unique to your server.
> >>>>>
> >>>>> The Authorization Code flow, with no client secret, is perfectly
> >>>>> fine for Native Apps IMO.
> >>>>>
> >>>>> Marius
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From jricher@mitre.org  Tue Mar  8 06:25:26 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B5A4F3A67B7 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 06:25:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sw4eqmAIXPo4 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 06:25:23 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 626993A688F for <oauth@ietf.org>; Tue,  8 Mar 2011 06:25:08 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 1AA0A21B000E; Tue,  8 Mar 2011 09:26:20 -0500 (EST)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 12A952B78336; Tue,  8 Mar 2011 09:26:20 -0500 (EST)
Received: from [129.83.50.23] (129.83.50.23) by imchub1.MITRE.ORG (129.83.29.73) with Microsoft SMTP Server id 8.2.254.0; Tue, 8 Mar 2011 09:26:19 -0500
From: Justin Richer <jricher@mitre.org>
To: Skylar Woodward <skylar@kiva.org>
In-Reply-To: <F81348BB-1711-49C9-9FDD-148D98C116EB@kiva.org>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com> <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com> , <4D74ACB8.3040707@lodderstedt.net> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719A@IMCMBX3.MITRE.ORG> <F81348BB-1711-49C9-9FDD-148D98C116EB@kiva.org>
Content-Type: text/plain; charset="UTF-8"
Date: Tue, 8 Mar 2011 09:26:03 -0500
Message-ID: <1299594363.8411.8.camel@ground>
MIME-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 7bit
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 14:25:26 -0000

Also, there's a big difference between "can keep secrets" and "can be
packed/shipped with secrets". Many native apps fit into the former
category but not the latter, which makes storage of refresh tokens and
other long-term credentials reasonable, but not server-issued client
secrets.

 -- Justin

On Mon, 2011-03-07 at 14:37 -0500, Skylar Woodward wrote:
> Justin has well stated my view on this.  Folks here have explained how the flows can work for (or doesn't prohibit) a native app, but it also seems clear that new readers don't pick up how native apps fit into the flow in a 1st or 2nd pass.
> 
> So, in short, I agree with Brian's suggestion of (1) removing choice references to native apps, and (2) as a further (and preferred) step, a better preamble (possibly with further supporting edits) on the role of native apps. It seems Justin and Torsten are suggesting the same.
> 
> To go further than step 1 I agree we need some discussion on the story for native apps. For my part, here's how I see them fitting in:
> 
> - The general assumption is that Native apps can't keep secrets. This is mostly true except...
> - Native apps with secured distribution (eg, controlled access by corporate IT departments who also can modify app preferences w/ the provider) can claim the apps keep secrets.  (A sample use case are Kiva field partners who develop simple enterprise apps for use inside a firewall).
> - In truth, the question of secrets or no secrets (can authenticate or spoofable) is of primary importance for choosing a flow.
> - In the common case, Native apps without secrets, an implicit flow or auth-code flow can be used. If an auth-code flow is used, there should be no client authentication. Alternatively, providers may instruct such clients to authenticate with an empty secret (since such clients should never be issued secrets to begin with).
> - In the uncommon case of native apps who can keep secrets, an implicit flow cannot be used. The app must present credentials which requires an auth-code (or other) flow.
> - I think there should be some note added to the auth-code flow on how a native app chooses and makes use of a redirect_uri.  This was present in draft 10 and was (i think) key to understanding the auth-code story for native apps.
> 
> I do not have strong opinions on the client-assertion flows for native apps nor the issuance of refresh tokens in an implicit flow. It does seem that some find it important to be able to issue refresh tokens to clients without secrets. I don't see a good argument to restrict this from a policy point of view (rather it seems more of issue of mechanics and/or fragment parsing), but it does seem the policy should be consistent. That is, if as an issue of policy, refresh tokens are not issued to apps without credentials, the policy applies for auth-code flows or implicit flows.
> 
> skylar
> 
> 
> On Mar 7, 2011, at 5:54 AM, Richer, Justin P. wrote:
> 
> > Agree with Torsten - having the mention in just that one place doesn't make sense. It should be removed or replicated throughout, but I think we might want a paragraph addressing native apps more deeply in the introduction. We don't want to give the (incorrect) impression that the implicit flow is the only or even preferred flow for native apps.
> > 
> > -- Justin
> > ________________________________________
> > From: oauth-bounces@ietf.org [oauth-bounces@ietf.org] On Behalf Of Torsten Lodderstedt [torsten@lodderstedt.net]
> > Sent: Monday, March 07, 2011 5:00 AM
> > To: Dick Hardt
> > Cc: OAuth WG
> > Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
> > 
> > Hi Dick,
> > 
> > I agree with you, the OAuth standard should offer clear patterns for
> > native apps.
> > 
> > All native apps I'm familiar with use the authorization code, which is
> > because of its support for refresh tokens. But the current text of the
> > spec only suggests to use the implict grant flow to implement native
> > apps whereas previous versions mentioned authz code and password flow as
> > well. So in my opinion, the text is misleading to developers. And that's
> > not only a feeling since I already meet people, which have been
> > misguided :-(.
> > 
> > I think at least the misleading words shall be removed. Better would be
> > to come up with a consensus after a discussion in the group.
> > 
> > regards,
> > Torsten.
> > 
> > Am 06.03.2011 23:12, schrieb Dick Hardt:
> >> -1
> >> 
> >> Many sites are using OAuth (or something like it) in native apps now.
> >> 
> >> One of the objectives of having a standard is to bring best practices and standardization to how to solve a problem rather than "a million freakin unique snowflakes" where developers have to learn and code each mechanism to enable authorization to a native app. Brian's suggested wording may make sense in the context of where OAuth is now -- but it signals that the WG has been unable to solve what I think many viewed as an important aspect of the WG.
> >> 
> >> fwiw: I think a number of important constituents have opted out of the dialogue. An unfortunate situation.
> >> 
> >> On 2011-03-02, at 6:05 AM, Brian Campbell wrote:
> >> 
> >>> I propose that the "or native applications" text be dropped from the
> >>> first paragraph in section 4.2 Implicit Grant  [1].
> >>> 
> >>> There is clearly some disagreement about what is most appropriate for
> >>> mobile/native applications and many, including myself, don't feel that
> >>> the implicit grant works well to support them (due to the lack of a
> >>> refresh token and need to repeat the authorization steps).  I
> >>> understand that the text in section 4 is non-normative, however, I
> >>> feel that the mention of native apps in 4.2 biases thinking in a
> >>> particular way (it's already led to one lengthy internal discussion
> >>> that I'd rather not have again and again).  I believe it'd be more
> >>> appropriate for the draft to remain silent on how native apps should
> >>> acquire tokens and leave it up to implementations/deployments to
> >>> decide (or an extension draft as Marius has proposed).
> >>> 
> >>> The "or native applications" text in is also somewhat inconsistent
> >>> with the text in the following sentence that talks about the
> >>> authentication of the client being based on the user-agent's
> >>> same-origin policy.
> >>> 
> >>> Removing those three words is a small change but one that I feel would
> >>> be beneficial on a number of fronts.
> >>> 
> >>> Thanks,
> >>> Brian
> >>> 
> >>> 
> >>> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
> >>> 
> >>> On Wed, Feb 16, 2011 at 2:57 PM, Eran Hammer-Lahav<eran@hueniverse.com>  wrote:
> >>>> Feel free to propose alternative preamble for the implicit and authorization code sections, describing the characteristics of what they are good for. It should fit in a single paragraph. Such a proposal would fit right in with last call feedback to -13.
> >>>> 
> >>>> EHL
> >>>> 
> >>>>> -----Original Message-----
> >>>>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
> >>>>> Sent: Wednesday, February 16, 2011 1:39 PM
> >>>>> To: Eran Hammer-Lahav
> >>>>> Cc: Brian Campbell; OAuth WG
> >>>>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
> >>>>> 
> >>>>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
> >>>>> <eran@hueniverse.com>  wrote:
> >>>>>> The reason why we don't return a refresh token in the implicit grant is
> >>>>> exactly because there is no client authentication...
> >>>>> 
> >>>>> Not sure that's the main reason. AFAIK it is because the response is sent
> >>>>> through the user-agent and it could leak.
> >>>>> 
> >>>>> 
> >>>>>> These are all well-balanced flows with specific security properties. If you
> >>>>> need something else, even if it is just a tweak, it must be considered a
> >>>>> different flow. That doesn't mean you need to register a new grant type, just
> >>>>> that you are dealing with different implementation details unique to your
> >>>>> server.
> >>>>> 
> >>>>> The Authorization Code flow, with no client secret, is perfectly fine for Native
> >>>>> Apps IMO.
> >>>>> 
> >>>>> Marius
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> 



From jricher@mitre.org  Tue Mar  8 07:11:01 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E4D293A68CB for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 07:11:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hh2ZvrBX1oJC for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 07:10:59 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id E98513A689F for <oauth@ietf.org>; Tue,  8 Mar 2011 07:10:58 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id BA8AE2B7813B; Tue,  8 Mar 2011 10:12:12 -0500 (EST)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id B46E22B780E7; Tue,  8 Mar 2011 10:12:12 -0500 (EST)
Received: from [129.83.50.23] (129.83.50.23) by imchub2.MITRE.ORG (129.83.29.74) with Microsoft SMTP Server id 8.2.254.0; Tue, 8 Mar 2011 10:12:12 -0500
From: Justin Richer <jricher@mitre.org>
To: Brian Eaton <beaton@google.com>
In-Reply-To: <AANLkTim4HaZyaHVoP0mOQPehBmk+=0fnQWrthsz+hryO@mail.gmail.com>
References: <BA70F7F6-D902-4586-A181-CE3566559935@oracle.com> <AANLkTim4HaZyaHVoP0mOQPehBmk+=0fnQWrthsz+hryO@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"
Date: Tue, 8 Mar 2011 10:11:56 -0500
Message-ID: <1299597116.8411.14.camel@ground>
MIME-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 7bit
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 15:11:01 -0000

Very strongly agree, repeat my suggestion to name the parameter
"oauth2_token".

 -- Justin

On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:
> My two cents:
> 
> We've already taken three user visible outages because the OAuth2 spec
> reused the "oauth_token" parameter in a way that was not compatible
> with the OAuth1 spec.
> 
> Luckily they were all caught before they caused serious damage.
> 
> Generic parameter names are not useful.  They lead to confused
> developers and confused code.  If code needs to treat the values
> differently, the names should be different as well.
> 
> Cheers,
> Brian
> 
> On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt <phil.hunt@oracle.com> wrote:
> > There was some discussion on the type for the authorization header being
> > OAUTH / MAC / BEARER etc. Did we have a resolution?
> > As for section 2.2 and 2.3, should we not have a more neutral solution as
> > well and use "authorization_token" instead of oauth_token. The idea is that
> > the parameter corresponds to the authorization header and NOT the value of
> > it. The value of such a parameter an be an encoded value that corresponds to
> > the authorization header.  For example:
> > GET /resource?authorization_token=BEARER+vF9dft4qmT HTTP/1.1 Host:
> > server.example.com
> > instead of
> > GET /resource?oauth_token=vF9dft4qmT HTTP/1.1 Host: server.example.com
> > The concern is that if for some reason you switch to "MAC" tokens, then you
> > have to change parameter names. Why not keep them consistent?
> > Apologies if this was already resolved.
> > Phil
> > phil.hunt@oracle.com
> >
> >
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> >
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From wmills@yahoo-inc.com  Tue Mar  8 08:26:54 2011
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9CE2A3A692F for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 08:26:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q2-Q3X1AtVTr for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 08:26:53 -0800 (PST)
Received: from web121409.mail.ne1.yahoo.com (web121409.mail.ne1.yahoo.com [98.138.90.103]) by core3.amsl.com (Postfix) with SMTP id 51B0F3A6938 for <oauth@ietf.org>; Tue,  8 Mar 2011 08:26:46 -0800 (PST)
Received: (qmail 68905 invoked by uid 60001); 8 Mar 2011 16:27:52 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1299601672; bh=DikoN/3QO5eICuf/z7NfQmos9kYzc0pmVCoFE0RbkmU=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=atafEUDl0y19V1/8UhMGJF47mAAQ8OZorJeUqDm7FdLJ9KRnE4E++6y1xjlABYeeXrhCNJZ3hHyqp7ECs5OA6qybsT90Bjinf0uAmmqtbc1cMS8wZt1vUdyt0q8l+Y9VdXpBpgq5sTVCa1R+JCOSIrP9pTQ2E2/QCPnPZygVZaw=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=DorJHGzzFTphdKlaJ/V8fNw+0cUw4iy22pVLCxIBIklO53vV8FeRzFIciF/cRyrUFufJcET3m4733s4x/qU5Uv0jiVAdIy1dHiDz3RIUw31YU3etWuJKowo0meCkHZEvYkBRZGmuMuPfitATVAb33zCytFMLEcsupi+Ep5y7szc=;
Message-ID: <388439.68556.qm@web121409.mail.ne1.yahoo.com>
X-YMail-OSG: 2lDzAzEVM1k_vd9aoUrvXgLDZGVjpo2FiC3GuTlWXs97uFD AbfYEelWFpy4dkPILoGYqmeLzeRP5Imvj74DN9NqlLxZcKDUjmtDhXdh6Dgp .4F80_vBPx8iiiPntjCNQ2nr2r9NZhzIzgjLL9igPFDr3tXuAi5awx4d5s.k cS2H726lli3m8V7x5xPRnu6IAxTdnzbMe_D_Rd6C61KlfutIQZQjKfxmVSK. n3ISe6ArZwwHsG6dL9WXfCuYldlTHLFgwmSytz432doiEZgzWlj_XrdzEI4n PaCmWnIOR_y08myG0AMcaVa1vg5pXippBCRzGQFD9MHGrGQ--
Received: from [209.131.62.115] by web121409.mail.ne1.yahoo.com via HTTP; Tue, 08 Mar 2011 08:27:51 PST
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.109.292656
Date: Tue, 8 Mar 2011 08:27:51 -0800 (PST)
From: "William J. Mills" <wmills@yahoo-inc.com>
To: Justin Richer <jricher@mitre.org>, Brian Eaton <beaton@google.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1450758639-1299601671=:68556"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 16:26:54 -0000

--0-1450758639-1299601671=:68556
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

A major difference is now there is a scheme name that is differentiating.=
=A0 You no longer have to parse the entire variable set to figure out what =
is going on.=A0 Now the scheme name determines things.=A0 Now that we have =
schemes I don't see re-using parameter names as a problem.=0A=0A=0A=0A_____=
___________________________=0AFrom: Justin Richer <jricher@mitre.org>=0ATo:=
 Brian Eaton <beaton@google.com>=0ACc: OAuth WG <oauth@ietf.org>=0ASent: Tu=
esday, March 8, 2011 7:11 AM=0ASubject: Re: [OAUTH-WG] OAuth Bearer Token d=
raft=0A=0AVery strongly agree, repeat my suggestion to name the parameter=
=0A"oauth2_token".=0A=0A-- Justin=0A=0AOn Fri, 2011-02-25 at 14:49 -0500, B=
rian Eaton wrote:=0A> My two cents:=0A> =0A> We've already taken three user=
 visible outages because the OAuth2 spec=0A> reused the "oauth_token" param=
eter in a way that was not compatible=0A> with the OAuth1 spec.=0A> =0A> Lu=
ckily they were all caught before they caused serious damage.=0A> =0A> Gene=
ric parameter names are not useful.=A0 They lead to confused=0A> developers=
 and confused code.=A0 If code needs to treat the values=0A> differently, t=
he names should be different as well.=0A> =0A> Cheers,=0A> Brian=0A> =0A> O=
n Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt <phil.hunt@oracle.com> wrote:=0A=
> > There was some discussion on the type for the authorization header bein=
g=0A> > OAUTH / MAC / BEARER etc. Did we have a resolution?=0A> > As for se=
ction 2.2 and 2.3, should we not have a more neutral solution as=0A> > well=
 and use "authorization_token" instead of oauth_token. The idea is that=0A>=
 > the parameter corresponds to the authorization header and NOT the value =
of=0A> > it. The value of such a parameter an be an encoded value that corr=
esponds to=0A> > the authorization header.=A0 For example:=0A> > GET /resou=
rce?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host:=0A> > server.exa=
mple.com=0A> > instead of=0A> > GET /resource?oauth_token=3DvF9dft4qmT HTTP=
/1.1 Host: server.example.com=0A> > The concern is that if for some reason =
you switch to "MAC" tokens, then you=0A> > have to change parameter names. =
Why not keep them consistent?=0A> > Apologies if this was already resolved.=
=0A> > Phil=0A> > phil.hunt@oracle.com=0A> >=0A> >=0A> >=0A> >=0A> > ______=
_________________________________________=0A> > OAuth mailing list=0A> > OA=
uth@ietf.org=0A> > https://www.ietf.org/mailman/listinfo/oauth=0A> >=0A> >=
=0A> _______________________________________________=0A> OAuth mailing list=
=0A> OAuth@ietf.org=0A> https://www.ietf.org/mailman/listinfo/oauth=0A=0A=
=0A_______________________________________________=0AOAuth mailing list=0AO=
Auth@ietf.org=0Ahttps://www.ietf.org/mailman/listinfo/oauth=0A=0A=0A      
--0-1450758639-1299601671=:68556
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:ti=
mes new roman, new york, times, serif;font-size:12pt"><div><span>A major di=
fference is now there is a scheme name that is differentiating.&nbsp; You n=
o longer have to parse the entire variable set to figure out what is going =
on.&nbsp; Now the scheme name determines things.&nbsp; Now that we have sch=
emes I don't see re-using parameter names as a problem.<br></span></div><di=
v><br></div><div style=3D"font-family: times new roman,new york,times,serif=
; font-size: 12pt;"><div style=3D"font-family: times new roman,new york,tim=
es,serif; font-size: 12pt;"><font size=3D"2" face=3D"Arial"><hr size=3D"1">=
<b><span style=3D"font-weight: bold;">From:</span></b> Justin Richer &lt;jr=
icher@mitre.org&gt;<br><b><span style=3D"font-weight: bold;">To:</span></b>=
 Brian Eaton &lt;beaton@google.com&gt;<br><b><span style=3D"font-weight: bo=
ld;">Cc:</span></b> OAuth WG &lt;oauth@ietf.org&gt;<br><b><span style=3D"fo=
nt-weight:
 bold;">Sent:</span></b> Tuesday, March 8, 2011 7:11 AM<br><b><span style=
=3D"font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] OAuth Bearer Tok=
en draft<br></font><br> Very strongly agree, repeat my suggestion to name t=
he parameter<br>"oauth2_token".<br><br> -- Justin<br><br>On Fri, 2011-02-25=
 at 14:49 -0500, Brian Eaton wrote:<br>&gt; My two cents:<br>&gt; <br>&gt; =
We've already taken three user visible outages because the OAuth2 spec<br>&=
gt; reused the "oauth_token" parameter in a way that was not compatible<br>=
&gt; with the OAuth1 spec.<br>&gt; <br>&gt; Luckily they were all caught be=
fore they caused serious damage.<br>&gt; <br>&gt; Generic parameter names a=
re not useful.&nbsp; They lead to confused<br>&gt; developers and confused =
code.&nbsp; If code needs to treat the values<br>&gt; differently, the name=
s should be different as well.<br>&gt; <br>&gt; Cheers,<br>&gt; Brian<br>&g=
t; <br>&gt; On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt &lt;<a
 ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.co=
m">phil.hunt@oracle.com</a>&gt; wrote:<br>&gt; &gt; There was some discussi=
on on the type for the authorization header being<br>&gt; &gt; OAUTH / MAC =
/ BEARER etc. Did we have a resolution?<br>&gt; &gt; As for section 2.2 and=
 2.3, should we not have a more neutral solution as<br>&gt; &gt; well and u=
se "authorization_token" instead of oauth_token. The idea is that<br>&gt; &=
gt; the parameter corresponds to the authorization header and NOT the value=
 of<br>&gt; &gt; it. The value of such a parameter an be an encoded value t=
hat corresponds to<br>&gt; &gt; the authorization header.&nbsp; For example=
:<br>&gt; &gt; GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1=
.1 Host:<br>&gt; &gt; server.example.com<br>&gt; &gt; instead of<br>&gt; &g=
t; GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host: server.example.com=
<br>&gt; &gt; The concern is that if for some reason you switch to "MAC"
 tokens, then you<br>&gt; &gt; have to change parameter names. Why not keep=
 them consistent?<br>&gt; &gt; Apologies if this was already resolved.<br>&=
gt; &gt; Phil<br>&gt; &gt; <a ymailto=3D"mailto:phil.hunt@oracle.com" href=
=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt; &gt;<br>&=
gt; &gt;<br>&gt; &gt;<br>&gt; &gt;<br>&gt; &gt; ___________________________=
____________________<br>&gt; &gt; OAuth mailing list<br>&gt; &gt; <a ymailt=
o=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</=
a><br>&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" tar=
get=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; &gt;=
<br>&gt; &gt;<br>&gt; _______________________________________________<br>&g=
t; OAuth mailing list<br>&gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=3D"=
mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; <a href=3D"https://www.ie=
tf.org/mailman/listinfo/oauth"
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><=
br>_______________________________________________<br>OAuth mailing list<br=
><a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@=
ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" tar=
get=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><br><=
/div></div></div><br>=0A=0A      </body></html>
--0-1450758639-1299601671=:68556--

From jricher@mitre.org  Tue Mar  8 08:40:26 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ACDE73A6827 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 08:40:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d256huuLH1fQ for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 08:40:22 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 5E3F83A6912 for <oauth@ietf.org>; Tue,  8 Mar 2011 08:40:21 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id E7A5321B0684; Tue,  8 Mar 2011 11:41:35 -0500 (EST)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id E110521B066F; Tue,  8 Mar 2011 11:41:35 -0500 (EST)
Received: from [129.83.50.23] (129.83.50.23) by imchub2.MITRE.ORG (129.83.29.74) with Microsoft SMTP Server id 8.2.254.0; Tue, 8 Mar 2011 11:41:35 -0500
From: Justin Richer <jricher@mitre.org>
To: "William J. Mills" <wmills@yahoo-inc.com>
In-Reply-To: <388439.68556.qm@web121409.mail.ne1.yahoo.com>
References: <388439.68556.qm@web121409.mail.ne1.yahoo.com>
Content-Type: text/plain; charset="UTF-8"
Date: Tue, 8 Mar 2011 11:41:19 -0500
Message-ID: <1299602479.8411.25.camel@ground>
MIME-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 7bit
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 16:40:26 -0000

I don't understand this comment. If you're using query/form parameters,
there are no schemes involved in the process.

 -- Justin


On Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:
> A major difference is now there is a scheme name that is
> differentiating.  You no longer have to parse the entire variable set
> to figure out what is going on.  Now the scheme name determines
> things.  Now that we have schemes I don't see re-using parameter names
> as a problem.
> 
> 
> 
> 
> ______________________________________________________________________
> From: Justin Richer <jricher@mitre.org>
> To: Brian Eaton <beaton@google.com>
> Cc: OAuth WG <oauth@ietf.org>
> Sent: Tuesday, March 8, 2011 7:11 AM
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
> 
> Very strongly agree, repeat my suggestion to name the parameter
> "oauth2_token".
> 
> -- Justin
> 
> On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:
> > My two cents:
> > 
> > We've already taken three user visible outages because the OAuth2
> spec
> > reused the "oauth_token" parameter in a way that was not compatible
> > with the OAuth1 spec.
> > 
> > Luckily they were all caught before they caused serious damage.
> > 
> > Generic parameter names are not useful.  They lead to confused
> > developers and confused code.  If code needs to treat the values
> > differently, the names should be different as well.
> > 
> > Cheers,
> > Brian
> > 
> > On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt <phil.hunt@oracle.com>
> wrote:
> > > There was some discussion on the type for the authorization header
> being
> > > OAUTH / MAC / BEARER etc. Did we have a resolution?
> > > As for section 2.2 and 2.3, should we not have a more neutral
> solution as
> > > well and use "authorization_token" instead of oauth_token. The
> idea is that
> > > the parameter corresponds to the authorization header and NOT the
> value of
> > > it. The value of such a parameter an be an encoded value that
> corresponds to
> > > the authorization header.  For example:
> > > GET /resource?authorization_token=BEARER+vF9dft4qmT HTTP/1.1 Host:
> > > server.example.com
> > > instead of
> > > GET /resource?oauth_token=vF9dft4qmT HTTP/1.1 Host:
> server.example.com
> > > The concern is that if for some reason you switch to "MAC" tokens,
> then you
> > > have to change parameter names. Why not keep them consistent?
> > > Apologies if this was already resolved.
> > > Phil
> > > phil.hunt@oracle.com
> > >
> > >
> > >
> > >
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> > >
> > >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> 
> 



From wmills@yahoo-inc.com  Tue Mar  8 09:03:51 2011
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E338C3A68DC for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 09:03:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xU8HZHPtAECv for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 09:03:50 -0800 (PST)
Received: from nm15.bullet.mail.ne1.yahoo.com (nm15.bullet.mail.ne1.yahoo.com [98.138.90.78]) by core3.amsl.com (Postfix) with SMTP id 4A29D3A67FB for <oauth@ietf.org>; Tue,  8 Mar 2011 09:03:50 -0800 (PST)
Received: from [98.138.90.52] by nm15.bullet.mail.ne1.yahoo.com with NNFMP; 08 Mar 2011 17:05:02 -0000
Received: from [98.138.89.246] by tm5.bullet.mail.ne1.yahoo.com with NNFMP; 08 Mar 2011 17:05:02 -0000
Received: from [127.0.0.1] by omp1060.mail.ne1.yahoo.com with NNFMP; 08 Mar 2011 17:05:02 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 566473.43400.bm@omp1060.mail.ne1.yahoo.com
Received: (qmail 99579 invoked by uid 60001); 8 Mar 2011 17:05:02 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1299603902; bh=xd0AnWbdUNUGME1hFagmX5cjhmkH5mo7taHakoq/Tgo=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=ID1b0grq7RpbqePmOS0TLGgNcobMjInbGvFmqDBqTBeF1ebkk3CT9vjaAyjTWmRf1XVZbQ9g+gbKvqQJqFoP3NxKrBHMQ0pDnJPvZYSua8AvjEBzJvGKrplt6PtHmcmRGitEjArIO9vOQ1MRByNc1fwjdM08mNsLsgQ/jUjMwVw=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=rDaNnE/6fO40XmmrgC4gZN5NJtYPCxq4dd7g5OfInjoBt7K957a32Osj7wHwZ4DE/tZMwygmoclhppWLGtAoHmsWMYfL3zVsByQ5d7ZEHZQFuv73UX1DpDLrlSQ3w7V50Fr1SaeaZEwI5OjZ7dop8Yf9lE5HGWOLzZIlS7KetSo=;
Message-ID: <332918.97656.qm@web121403.mail.ne1.yahoo.com>
X-YMail-OSG: AG4Xxm8VM1mOR6rumN5107dJFJl62z.q.1ukRY6.a1N5Jga lymsbUPfZmjB1Eq.7nyFtlzNXX.1Crm_HqpM.Mmgc.A_aU7bzEA_gxcjt1PV tTCNsKRYNwUu_j2spoGE3RuQjtIU1CSpaNmFX5pI_RQOMQ3M1FAB2Ky7Bn5W iZ6Nx9akEQsK55x3SZwPTIGMaR_6_EUQKYfxXMG2vLF9Xk6B0jLBdXy2pB5i c88QVb4v8KW7A8Wy9QFHid2HZCWxV5ET7NgE6il4Go5Nel0vB5BfejMa2V_j orWtWT7.o5r.XjBnr..lK_PaDBWuy1eIHBSpkKurhTol.3w--
Received: from [209.131.62.115] by web121403.mail.ne1.yahoo.com via HTTP; Tue, 08 Mar 2011 09:05:02 PST
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.109.292656
Date: Tue, 8 Mar 2011 09:05:02 -0800 (PST)
From: "William J. Mills" <wmills@yahoo-inc.com>
To: Justin Richer <jricher@mitre.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-731354174-1299603902=:97656"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 17:03:52 -0000

--0-731354174-1299603902=:97656
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

That's because I'm focused on my use case, which is using the Authorization=
 header.=A0 In query args/form parameters we definitely need better differe=
ntiation.=0A=0A=0A=0A________________________________=0AFrom: Justin Richer=
 <jricher@mitre.org>=0ATo: William J. Mills <wmills@yahoo-inc.com>=0ACc: Br=
ian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>=0ASent: Tuesday, M=
arch 8, 2011 8:41 AM=0ASubject: Re: [OAUTH-WG] OAuth Bearer Token draft=0A=
=0AI don't understand this comment. If you're using query/form parameters,=
=0Athere are no schemes involved in the process.=0A=0A-- Justin=0A=0A=0AOn =
Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:=0A> A major differe=
nce is now there is a scheme name that is=0A> differentiating.=A0 You no lo=
nger have to parse the entire variable set=0A> to figure out what is going =
on.=A0 Now the scheme name determines=0A> things.=A0 Now that we have schem=
es I don't see re-using parameter names=0A> as a problem.=0A> =0A> =0A> =0A=
> =0A> ____________________________________________________________________=
__=0A> From: Justin Richer <jricher@mitre.org>=0A> To: Brian Eaton <beaton@=
google.com>=0A> Cc: OAuth WG <oauth@ietf.org>=0A> Sent: Tuesday, March 8, 2=
011 7:11 AM=0A> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft=0A> =0A> V=
ery strongly agree, repeat my suggestion to name the parameter=0A> "oauth2_=
token".=0A> =0A> -- Justin=0A> =0A> On Fri, 2011-02-25 at 14:49 -0500, Bria=
n Eaton wrote:=0A> > My two cents:=0A> > =0A> > We've already taken three u=
ser visible outages because the OAuth2=0A> spec=0A> > reused the "oauth_tok=
en" parameter in a way that was not compatible=0A> > with the OAuth1 spec.=
=0A> > =0A> > Luckily they were all caught before they caused serious damag=
e.=0A> > =0A> > Generic parameter names are not useful.=A0 They lead to con=
fused=0A> > developers and confused code.=A0 If code needs to treat the val=
ues=0A> > differently, the names should be different as well.=0A> > =0A> > =
Cheers,=0A> > Brian=0A> > =0A> > On Fri, Feb 25, 2011 at 11:38 AM, Phil Hun=
t <phil.hunt@oracle.com>=0A> wrote:=0A> > > There was some discussion on th=
e type for the authorization header=0A> being=0A> > > OAUTH / MAC / BEARER =
etc. Did we have a resolution?=0A> > > As for section 2.2 and 2.3, should w=
e not have a more neutral=0A> solution as=0A> > > well and use "authorizati=
on_token" instead of oauth_token. The=0A> idea is that=0A> > > the paramete=
r corresponds to the authorization header and NOT the=0A> value of=0A> > > =
it. The value of such a parameter an be an encoded value that=0A> correspon=
ds to=0A> > > the authorization header.=A0 For example:=0A> > > GET /resour=
ce?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host:=0A> > > server.ex=
ample.com=0A> > > instead of=0A> > > GET /resource?oauth_token=3DvF9dft4qmT=
 HTTP/1.1 Host:=0A> server.example.com=0A> > > The concern is that if for s=
ome reason you switch to "MAC" tokens,=0A> then you=0A> > > have to change =
parameter names. Why not keep them consistent?=0A> > > Apologies if this wa=
s already resolved.=0A> > > Phil=0A> > > phil.hunt@oracle.com=0A> > >=0A> >=
 >=0A> > >=0A> > >=0A> > > _______________________________________________=
=0A> > > OAuth mailing list=0A> > > OAuth@ietf.org=0A> > > https://www.ietf=
.org/mailman/listinfo/oauth=0A> > >=0A> > >=0A> > _________________________=
______________________=0A> > OAuth mailing list=0A> > OAuth@ietf.org=0A> > =
https://www.ietf.org/mailman/listinfo/oauth=0A> =0A> =0A> _________________=
______________________________=0A> OAuth mailing list=0A> OAuth@ietf.org=0A=
> https://www.ietf.org/mailman/listinfo/oauth=0A> =0A> =0A> =0A> =0A=0A=0A =
     
--0-731354174-1299603902=:97656
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:ti=
mes new roman, new york, times, serif;font-size:12pt"><div><span>That's bec=
ause I'm focused on my use case, which is using the Authorization header.&n=
bsp; In query args/form parameters we definitely need better differentiatio=
n.<br></span></div><div><br></div><div style=3D"font-family: times new roma=
n,new york,times,serif; font-size: 12pt;"><div style=3D"font-family: times =
new roman,new york,times,serif; font-size: 12pt;"><font size=3D"2" face=3D"=
Arial"><hr size=3D"1"><b><span style=3D"font-weight: bold;">From:</span></b=
> Justin Richer &lt;jricher@mitre.org&gt;<br><b><span style=3D"font-weight:=
 bold;">To:</span></b> William J. Mills &lt;wmills@yahoo-inc.com&gt;<br><b>=
<span style=3D"font-weight: bold;">Cc:</span></b> Brian Eaton &lt;beaton@go=
ogle.com&gt;; OAuth WG &lt;oauth@ietf.org&gt;<br><b><span style=3D"font-wei=
ght: bold;">Sent:</span></b> Tuesday, March 8, 2011 8:41 AM<br><b><span
 style=3D"font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] OAuth Bear=
er Token draft<br></font><br> I don't understand this comment. If you're us=
ing query/form parameters,<br>there are no schemes involved in the process.=
<br><br> -- Justin<br><br><br>On Tue, 2011-03-08 at 11:27 -0500, William J.=
 Mills wrote:<br>&gt; A major difference is now there is a scheme name that=
 is<br>&gt; differentiating.&nbsp; You no longer have to parse the entire v=
ariable set<br>&gt; to figure out what is going on.&nbsp; Now the scheme na=
me determines<br>&gt; things.&nbsp; Now that we have schemes I don't see re=
-using parameter names<br>&gt; as a problem.<br>&gt; <br>&gt; <br>&gt; <br>=
&gt; <br>&gt; _____________________________________________________________=
_________<br>&gt; From: Justin Richer &lt;<a ymailto=3D"mailto:jricher@mitr=
e.org" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br>&gt; =
To: Brian Eaton &lt;<a ymailto=3D"mailto:beaton@google.com"
 href=3D"mailto:beaton@google.com">beaton@google.com</a>&gt;<br>&gt; Cc: OA=
uth WG &lt;<a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.o=
rg">oauth@ietf.org</a>&gt;<br>&gt; Sent: Tuesday, March 8, 2011 7:11 AM<br>=
&gt; Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<br>&gt; <br>&gt; Very=
 strongly agree, repeat my suggestion to name the parameter<br>&gt; "oauth2=
_token".<br>&gt; <br>&gt; -- Justin<br>&gt; <br>&gt; On Fri, 2011-02-25 at =
14:49 -0500, Brian Eaton wrote:<br>&gt; &gt; My two cents:<br>&gt; &gt; <br=
>&gt; &gt; We've already taken three user visible outages because the OAuth=
2<br>&gt; spec<br>&gt; &gt; reused the "oauth_token" parameter in a way tha=
t was not compatible<br>&gt; &gt; with the OAuth1 spec.<br>&gt; &gt; <br>&g=
t; &gt; Luckily they were all caught before they caused serious damage.<br>=
&gt; &gt; <br>&gt; &gt; Generic parameter names are not useful.&nbsp; They =
lead to confused<br>&gt; &gt; developers and confused code.&nbsp; If code
 needs to treat the values<br>&gt; &gt; differently, the names should be di=
fferent as well.<br>&gt; &gt; <br>&gt; &gt; Cheers,<br>&gt; &gt; Brian<br>&=
gt; &gt; <br>&gt; &gt; On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt &lt;<a y=
mailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.com"=
>phil.hunt@oracle.com</a>&gt;<br>&gt; wrote:<br>&gt; &gt; &gt; There was so=
me discussion on the type for the authorization header<br>&gt; being<br>&gt=
; &gt; &gt; OAUTH / MAC / BEARER etc. Did we have a resolution?<br>&gt; &gt=
; &gt; As for section 2.2 and 2.3, should we not have a more neutral<br>&gt=
; solution as<br>&gt; &gt; &gt; well and use "authorization_token" instead =
of oauth_token. The<br>&gt; idea is that<br>&gt; &gt; &gt; the parameter co=
rresponds to the authorization header and NOT the<br>&gt; value of<br>&gt; =
&gt; &gt; it. The value of such a parameter an be an encoded value that<br>=
&gt; corresponds to<br>&gt; &gt; &gt; the authorization header.&nbsp;
 For example:<br>&gt; &gt; &gt; GET /resource?authorization_token=3DBEARER+=
vF9dft4qmT HTTP/1.1 Host:<br>&gt; &gt; &gt; server.example.com<br>&gt; &gt;=
 &gt; instead of<br>&gt; &gt; &gt; GET /resource?oauth_token=3DvF9dft4qmT H=
TTP/1.1 Host:<br>&gt; server.example.com<br>&gt; &gt; &gt; The concern is t=
hat if for some reason you switch to "MAC" tokens,<br>&gt; then you<br>&gt;=
 &gt; &gt; have to change parameter names. Why not keep them consistent?<br=
>&gt; &gt; &gt; Apologies if this was already resolved.<br>&gt; &gt; &gt; P=
hil<br>&gt; &gt; &gt; <a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"ma=
ilto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt; &gt; &gt;<br>&g=
t; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; &gt; ________=
_______________________________________<br>&gt; &gt; &gt; OAuth mailing lis=
t<br>&gt; &gt; &gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAu=
th@ietf.org">OAuth@ietf.org</a><br>&gt; &gt; &gt; <a
 href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">htt=
ps://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; &gt; &gt;<br>&gt; &gt;=
 &gt;<br>&gt; &gt; _______________________________________________<br>&gt; =
&gt; OAuth mailing list<br>&gt; &gt; <a ymailto=3D"mailto:OAuth@ietf.org" h=
ref=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; &gt; <a href=3D"ht=
tps://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ie=
tf.org/mailman/listinfo/oauth</a><br>&gt; <br>&gt; <br>&gt; _______________=
________________________________<br>&gt; OAuth mailing list<br>&gt; <a ymai=
lto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org=
</a><br>&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; <br>&gt=
; <br>&gt; <br>&gt; <br><br><br><br><br></div></div></div><br>=0A=0A      <=
/body></html>
--0-731354174-1299603902=:97656--

From wmills@yahoo-inc.com  Tue Mar  8 09:10:45 2011
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5E4BC3A6928 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 09:10:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j3IA9rqEiAge for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 09:10:38 -0800 (PST)
Received: from web121404.mail.ne1.yahoo.com (web121404.mail.ne1.yahoo.com [98.138.90.98]) by core3.amsl.com (Postfix) with SMTP id 00B8C3A68F5 for <oauth@ietf.org>; Tue,  8 Mar 2011 09:10:34 -0800 (PST)
Received: (qmail 98426 invoked by uid 60001); 8 Mar 2011 17:11:46 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1299604306; bh=2kuLDoCw6tvIdvLWl0Ssc1rOSuF3NgVC69JPo4Kf5io=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=f5ZmLSPiR8MUANV/tw5UT4KDnRInL/Fd3ufaY/h3IMxwPm0NyJvUNYVwU6r/PMuGleF29Upn2qjuSaK80zXtGi9zaZJNd70Dl7r23m15GyPSzBoclzKqh71Qlj8Xo9VMgM5kE2utKbkLZVTSbzoZosWbxtDHMH92hUPpaU0czAw=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=ba465LG59VIaf8Py0qa3i393ZCHen01E7fLIowBYv7Q3rJ3lHfNl4sk8/UvJIcZV88j4i5UQsDRWBBAcwM7WF4MNtq9mxPqhoEVJdKMrl1kFtHs5RbOEU7ma5H7/D9HH48vKXJQ9Hp43uX6TY4Fyx4s60eJBjd0100U2hvJXgnk=;
Message-ID: <836580.97993.qm@web121404.mail.ne1.yahoo.com>
X-YMail-OSG: YNisdWAVM1mawGzk7OqSDrwx5fDriuecFXS_d1ZvXGz1f6K .peSTPMdf78tIQm756AU4jIQ2YqjF.AX41ndk0kZwREPQ8Fi_Nm7QG48axI. c.mKfeJ3yu17oM4FoswDkmtdk3CxiGlvBwUoWrT4XqC3ZYBWRyaIhPoJAYfH yNbLeY0BuXu7o1d7lKs_KnoOvUQxOG0fp01_2p4QIwzPWFUGmC9cmY4fkIHy roJ3zsAA4ayAS7s_kyR_KkX3mQvDDCJj2nZfFOFgoutpoPY_owv1o.WF2pK. 6fYT_JqeExl28.uC0KUjPq3illw--
Received: from [209.131.62.115] by web121404.mail.ne1.yahoo.com via HTTP; Tue, 08 Mar 2011 09:11:46 PST
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.109.292656
Date: Tue, 8 Mar 2011 09:11:46 -0800 (PST)
From: "William J. Mills" <wmills@yahoo-inc.com>
To: Justin Richer <jricher@mitre.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1858112419-1299604306=:97993"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 17:10:45 -0000

--0-1858112419-1299604306=:97993
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

So is a different namespace for each new mechanism right, or should a param=
eter be added to parallel the authorization scheme name?=A0 Seems like it w=
ould be clean to define oauth_scheme and use the same value as defined for =
the auth scheme name.=0A=0A=0A=0A________________________________=0AFrom: J=
ustin Richer <jricher@mitre.org>=0ATo: William J. Mills <wmills@yahoo-inc.c=
om>=0ACc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>=0ASent=
: Tuesday, March 8, 2011 8:41 AM=0ASubject: Re: [OAUTH-WG] OAuth Bearer Tok=
en draft=0A=0AI don't understand this comment. If you're using query/form p=
arameters,=0Athere are no schemes involved in the process.=0A=0A-- Justin=
=0A=0A=0AOn Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:=0A> A m=
ajor difference is now there is a scheme name that is=0A> differentiating.=
=A0 You no longer have to parse the entire variable set=0A> to figure out w=
hat is going on.=A0 Now the scheme name determines=0A> things.=A0 Now that =
we have schemes I don't see re-using parameter names=0A> as a problem.=0A> =
=0A> =0A> =0A> =0A> _______________________________________________________=
_______________=0A> From: Justin Richer <jricher@mitre.org>=0A> To: Brian E=
aton <beaton@google.com>=0A> Cc: OAuth WG <oauth@ietf.org>=0A> Sent: Tuesda=
y, March 8, 2011 7:11 AM=0A> Subject: Re: [OAUTH-WG] OAuth Bearer Token dra=
ft=0A> =0A> Very strongly agree, repeat my suggestion to name the parameter=
=0A> "oauth2_token".=0A> =0A> -- Justin=0A> =0A> On Fri, 2011-02-25 at 14:4=
9 -0500, Brian Eaton wrote:=0A> > My two cents:=0A> > =0A> > We've already =
taken three user visible outages because the OAuth2=0A> spec=0A> > reused t=
he "oauth_token" parameter in a way that was not compatible=0A> > with the =
OAuth1 spec.=0A> > =0A> > Luckily they were all caught before they caused s=
erious damage.=0A> > =0A> > Generic parameter names are not useful.=A0 They=
 lead to confused=0A> > developers and confused code.=A0 If code needs to t=
reat the values=0A> > differently, the names should be different as well.=
=0A> > =0A> > Cheers,=0A> > Brian=0A> > =0A> > On Fri, Feb 25, 2011 at 11:3=
8 AM, Phil Hunt <phil.hunt@oracle.com>=0A> wrote:=0A> > > There was some di=
scussion on the type for the authorization header=0A> being=0A> > > OAUTH /=
 MAC / BEARER etc. Did we have a resolution?=0A> > > As for section 2.2 and=
 2.3, should we not have a more neutral=0A> solution as=0A> > > well and us=
e "authorization_token" instead of oauth_token. The=0A> idea is that=0A> > =
> the parameter corresponds to the authorization header and NOT the=0A> val=
ue of=0A> > > it. The value of such a parameter an be an encoded value that=
=0A> corresponds to=0A> > > the authorization header.=A0 For example:=0A> >=
 > GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host:=0A>=
 > > server.example.com=0A> > > instead of=0A> > > GET /resource?oauth_toke=
n=3DvF9dft4qmT HTTP/1.1 Host:=0A> server.example.com=0A> > > The concern is=
 that if for some reason you switch to "MAC" tokens,=0A> then you=0A> > > h=
ave to change parameter names. Why not keep them consistent?=0A> > > Apolog=
ies if this was already resolved.=0A> > > Phil=0A> > > phil.hunt@oracle.com=
=0A> > >=0A> > >=0A> > >=0A> > >=0A> > > __________________________________=
_____________=0A> > > OAuth mailing list=0A> > > OAuth@ietf.org=0A> > > htt=
ps://www.ietf.org/mailman/listinfo/oauth=0A> > >=0A> > >=0A> > ____________=
___________________________________=0A> > OAuth mailing list=0A> > OAuth@ie=
tf.org=0A> > https://www.ietf.org/mailman/listinfo/oauth=0A> =0A> =0A> ____=
___________________________________________=0A> OAuth mailing list=0A> OAut=
h@ietf.org=0A> https://www.ietf.org/mailman/listinfo/oauth=0A> =0A> =0A> =
=0A> =0A=0A=0A      
--0-1858112419-1299604306=:97993
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:ti=
mes new roman, new york, times, serif;font-size:12pt"><div><span>So is a di=
fferent namespace for each new mechanism right, or should a parameter be ad=
ded to parallel the authorization scheme name?&nbsp; Seems like it would be=
 clean to define oauth_scheme and use the same value as defined for the aut=
h scheme name.<br></span></div><div><br></div><div style=3D"font-family: ti=
mes new roman,new york,times,serif; font-size: 12pt;"><div style=3D"font-fa=
mily: times new roman,new york,times,serif; font-size: 12pt;"><font size=3D=
"2" face=3D"Arial"><hr size=3D"1"><b><span style=3D"font-weight: bold;">Fro=
m:</span></b> Justin Richer &lt;jricher@mitre.org&gt;<br><b><span style=3D"=
font-weight: bold;">To:</span></b> William J. Mills &lt;wmills@yahoo-inc.co=
m&gt;<br><b><span style=3D"font-weight: bold;">Cc:</span></b> Brian Eaton &=
lt;beaton@google.com&gt;; OAuth WG &lt;oauth@ietf.org&gt;<br><b><span
 style=3D"font-weight: bold;">Sent:</span></b> Tuesday, March 8, 2011 8:41 =
AM<br><b><span style=3D"font-weight: bold;">Subject:</span></b> Re: [OAUTH-=
WG] OAuth Bearer Token draft<br></font><br> I don't understand this comment=
. If you're using query/form parameters,<br>there are no schemes involved i=
n the process.<br><br> -- Justin<br><br><br>On Tue, 2011-03-08 at 11:27 -05=
00, William J. Mills wrote:<br>&gt; A major difference is now there is a sc=
heme name that is<br>&gt; differentiating.&nbsp; You no longer have to pars=
e the entire variable set<br>&gt; to figure out what is going on.&nbsp; Now=
 the scheme name determines<br>&gt; things.&nbsp; Now that we have schemes =
I don't see re-using parameter names<br>&gt; as a problem.<br>&gt; <br>&gt;=
 <br>&gt; <br>&gt; <br>&gt; _______________________________________________=
_______________________<br>&gt; From: Justin Richer &lt;<a ymailto=3D"mailt=
o:jricher@mitre.org"
 href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br>&gt; To: Br=
ian Eaton &lt;<a ymailto=3D"mailto:beaton@google.com" href=3D"mailto:beaton=
@google.com">beaton@google.com</a>&gt;<br>&gt; Cc: OAuth WG &lt;<a ymailto=
=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a=
>&gt;<br>&gt; Sent: Tuesday, March 8, 2011 7:11 AM<br>&gt; Subject: Re: [OA=
UTH-WG] OAuth Bearer Token draft<br>&gt; <br>&gt; Very strongly agree, repe=
at my suggestion to name the parameter<br>&gt; "oauth2_token".<br>&gt; <br>=
&gt; -- Justin<br>&gt; <br>&gt; On Fri, 2011-02-25 at 14:49 -0500, Brian Ea=
ton wrote:<br>&gt; &gt; My two cents:<br>&gt; &gt; <br>&gt; &gt; We've alre=
ady taken three user visible outages because the OAuth2<br>&gt; spec<br>&gt=
; &gt; reused the "oauth_token" parameter in a way that was not compatible<=
br>&gt; &gt; with the OAuth1 spec.<br>&gt; &gt; <br>&gt; &gt; Luckily they =
were all caught before they caused serious damage.<br>&gt; &gt; <br>&gt; &g=
t;
 Generic parameter names are not useful.&nbsp; They lead to confused<br>&gt=
; &gt; developers and confused code.&nbsp; If code needs to treat the value=
s<br>&gt; &gt; differently, the names should be different as well.<br>&gt; =
&gt; <br>&gt; &gt; Cheers,<br>&gt; &gt; Brian<br>&gt; &gt; <br>&gt; &gt; On=
 Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt &lt;<a ymailto=3D"mailto:phil.hun=
t@oracle.com" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>=
&gt;<br>&gt; wrote:<br>&gt; &gt; &gt; There was some discussion on the type=
 for the authorization header<br>&gt; being<br>&gt; &gt; &gt; OAUTH / MAC /=
 BEARER etc. Did we have a resolution?<br>&gt; &gt; &gt; As for section 2.2=
 and 2.3, should we not have a more neutral<br>&gt; solution as<br>&gt; &gt=
; &gt; well and use "authorization_token" instead of oauth_token. The<br>&g=
t; idea is that<br>&gt; &gt; &gt; the parameter corresponds to the authoriz=
ation header and NOT the<br>&gt; value of<br>&gt; &gt; &gt; it. The
 value of such a parameter an be an encoded value that<br>&gt; corresponds =
to<br>&gt; &gt; &gt; the authorization header.&nbsp; For example:<br>&gt; &=
gt; &gt; GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Hos=
t:<br>&gt; &gt; &gt; server.example.com<br>&gt; &gt; &gt; instead of<br>&gt=
; &gt; &gt; GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host:<br>&gt; s=
erver.example.com<br>&gt; &gt; &gt; The concern is that if for some reason =
you switch to "MAC" tokens,<br>&gt; then you<br>&gt; &gt; &gt; have to chan=
ge parameter names. Why not keep them consistent?<br>&gt; &gt; &gt; Apologi=
es if this was already resolved.<br>&gt; &gt; &gt; Phil<br>&gt; &gt; &gt; <=
a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.c=
om">phil.hunt@oracle.com</a><br>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &g=
t; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; &gt; _______________________________=
________________<br>&gt; &gt; &gt; OAuth mailing list<br>&gt; &gt; &gt; <a
 ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@iet=
f.org</a><br>&gt; &gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinf=
o/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><=
br>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; __________________________=
_____________________<br>&gt; &gt; OAuth mailing list<br>&gt; &gt; <a ymail=
to=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org<=
/a><br>&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; <br=
>&gt; <br>&gt; _______________________________________________<br>&gt; OAut=
h mailing list<br>&gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:=
OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; <a href=3D"https://www.ietf.org/=
mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/list=
info/oauth</a><br>&gt; <br>&gt; <br>&gt; <br>&gt; <br><br><br><br><br></div=
></div></div><br>=0A=0A      </body></html>
--0-1858112419-1299604306=:97993--

From bobaman@google.com  Tue Mar  8 10:01:24 2011
Return-Path: <bobaman@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 586C43A6928 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 10:01:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level: 
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E5ETCXvwOx3k for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 10:01:23 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [74.125.121.67]) by core3.amsl.com (Postfix) with ESMTP id 42C9D3A68F7 for <oauth@ietf.org>; Tue,  8 Mar 2011 10:01:22 -0800 (PST)
Received: from wpaz21.hot.corp.google.com (wpaz21.hot.corp.google.com [172.24.198.85]) by smtp-out.google.com with ESMTP id p28I2bVd007207 for <oauth@ietf.org>; Tue, 8 Mar 2011 10:02:37 -0800
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1299607357; bh=1+IlfViyuhjmAqPzMVqUXLD8PtQ=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type:Content-Transfer-Encoding; b=RDZsAhiTJlHRH2/dKKPzI9IvSIZVo0gzK/z7Gxal/6rXhaEyuVFRZYMOPOfcvh3oF Y7zGm3+7AXYL84da5pEbA==
Received: from qyk32 (qyk32.prod.google.com [10.241.83.160]) by wpaz21.hot.corp.google.com with ESMTP id p28I25SS026918 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Tue, 8 Mar 2011 10:02:35 -0800
Received: by qyk32 with SMTP id 32so4525446qyk.1 for <oauth@ietf.org>; Tue, 08 Mar 2011 10:02:35 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:content-transfer-encoding; bh=kEao7V2/XomtzNR+aG9HsgVOl1/Rx6h2tSJgb6Ps04o=; b=iWPj3xjWs+rQi2jQRbebTTGVLpITMXiF0adq6DUimOCGDjC87o9+ihg1xgb2E5oniM /BZetTvia2GvxCkO9ulA==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; b=XirJXe+rueZPbq5Xgi3E5yRkh/uYpy+B7xHg5ngo5lh1MPJnDDh37pNkwQA5D7dYlD zkiHvfNRaeyux9wl7CWw==
Received: by 10.229.78.32 with SMTP id i32mr4341183qck.5.1299607355278; Tue, 08 Mar 2011 10:02:35 -0800 (PST)
MIME-Version: 1.0
Received: by 10.229.105.90 with HTTP; Tue, 8 Mar 2011 10:01:55 -0800 (PST)
In-Reply-To: <836580.97993.qm@web121404.mail.ne1.yahoo.com>
References: <836580.97993.qm@web121404.mail.ne1.yahoo.com>
From: Bob Aman <bobaman@google.com>
Date: Tue, 8 Mar 2011 10:01:55 -0800
Message-ID: <AANLkTinpvwaoXu=2Yp17VjeKxr8os0bM5dcc-HWdk89-@mail.gmail.com>
To: "William J. Mills" <wmills@yahoo-inc.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 18:01:24 -0000

> So is a different namespace for each new mechanism right, or should a
> parameter be added to parallel the authorization scheme name?=C2=A0 Seems=
 like it
> would be clean to define oauth_scheme and use the same value as defined f=
or
> the auth scheme name.

I'd much rather do it this way.  There is value in reusing parameter
names (at least for my client implementation anyways), as long as the
scheme can be trivially determined.

From eran@hueniverse.com  Tue Mar  8 10:01:24 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6993F3A68F7 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 10:01:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.555
X-Spam-Level: 
X-Spam-Status: No, score=-2.555 tagged_above=-999 required=5 tests=[AWL=0.043,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QvEmUV1RcPjc for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 10:01:23 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 08ED43A68AF for <oauth@ietf.org>; Tue,  8 Mar 2011 10:01:23 -0800 (PST)
Received: (qmail 28180 invoked from network); 8 Mar 2011 18:02:37 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 8 Mar 2011 18:02:37 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Tue, 8 Mar 2011 11:02:34 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "William J. Mills" <wmills@yahoo-inc.com>, Justin Richer <jricher@mitre.org>
Date: Tue, 8 Mar 2011 11:02:29 -0700
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvduwDXv+NbJ5HCQHWeM0W1EqQ/HA==
Message-ID: <C99BAEE5.E033%eran@hueniverse.com>
In-Reply-To: <836580.97993.qm@web121404.mail.ne1.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.2.0.101115
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C99BAEE5E033eranhueniversecom_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 18:01:24 -0000

--_000_C99BAEE5E033eranhueniversecom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I hope this will be the last time we define a query parameter for deliverin=
g what should be sent via a request header field. Infringing on a service's=
 namespace is always a bad idea, no matter what prefix we put next to it.

EHL

From: "William J. Mills" <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>=
>
Reply-To: "William J. Mills" <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.=
com>>
Date: Tue, 8 Mar 2011 10:11:46 -0700
To: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

So is a different namespace for each new mechanism right, or should a param=
eter be added to parallel the authorization scheme name?  Seems like it wou=
ld be clean to define oauth_scheme and use the same value as defined for th=
e auth scheme name.

________________________________
From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
To: William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
Cc: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>; OAuth WG <oa=
uth@ietf.org<mailto:oauth@ietf.org>>
Sent: Tuesday, March 8, 2011 8:41 AM
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

I don't understand this comment. If you're using query/form parameters,
there are no schemes involved in the process.

-- Justin


On Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:
> A major difference is now there is a scheme name that is
> differentiating.  You no longer have to parse the entire variable set
> to figure out what is going on.  Now the scheme name determines
> things.  Now that we have schemes I don't see re-using parameter names
> as a problem.
>
>
>
>
> ______________________________________________________________________
> From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
> To: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>
> Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
> Sent: Tuesday, March 8, 2011 7:11 AM
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
> Very strongly agree, repeat my suggestion to name the parameter
> "oauth2_token".
>
> -- Justin
>
> On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:
> > My two cents:
> >
> > We've already taken three user visible outages because the OAuth2
> spec
> > reused the "oauth_token" parameter in a way that was not compatible
> > with the OAuth1 spec.
> >
> > Luckily they were all caught before they caused serious damage.
> >
> > Generic parameter names are not useful.  They lead to confused
> > developers and confused code.  If code needs to treat the values
> > differently, the names should be different as well.
> >
> > Cheers,
> > Brian
> >
> > On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt <phil.hunt@oracle.com<mailt=
o:phil.hunt@oracle.com>>
> wrote:
> > > There was some discussion on the type for the authorization header
> being
> > > OAUTH / MAC / BEARER etc. Did we have a resolution?
> > > As for section 2.2 and 2.3, should we not have a more neutral
> solution as
> > > well and use "authorization_token" instead of oauth_token. The
> idea is that
> > > the parameter corresponds to the authorization header and NOT the
> value of
> > > it. The value of such a parameter an be an encoded value that
> corresponds to
> > > the authorization header.  For example:
> > > GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host:
> > > server.example.com
> > > instead of
> > > GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host:
> server.example.com
> > > The concern is that if for some reason you switch to "MAC" tokens,
> then you
> > > have to change parameter names. Why not keep them consistent?
> > > Apologies if this was already resolved.
> > > Phil
> > > phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>
> > >
> > >
> > >
> > >
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org<mailto:OAuth@ietf.org>
> > > https://www.ietf.org/mailman/listinfo/oauth
> > >
> > >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org<mailto:OAuth@ietf.org>
> > https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>






--_000_C99BAEE5E033eranhueniversecom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-si=
ze: 14px; font-family: Calibri, sans-serif; "><div>I hope this will be the =
last time we define a query parameter for delivering what should be sent vi=
a a request header field. Infringing on a service's namespace is always a b=
ad idea, no matter what prefix we put next to it.</div><div><br></div><div>=
EHL</div><div><br></div><span id=3D"OLK_SRC_BODY_SECTION"><div style=3D"fon=
t-family:Calibri; font-size:11pt; text-align:left; color:black; BORDER-BOTT=
OM: medium none; BORDER-LEFT: medium none; PADDING-BOTTOM: 0in; PADDING-LEF=
T: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1pt solid; BORDER-RIGHT: me=
dium none; PADDING-TOP: 3pt"><span style=3D"font-weight:bold">From: </span>=
 "William J. Mills" &lt;<a href=3D"mailto:wmills@yahoo-inc.com">wmills@yaho=
o-inc.com</a>&gt;<br><span style=3D"font-weight:bold">Reply-To: </span> "Wi=
lliam J. Mills" &lt;<a href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-in=
c.com</a>&gt;<br><span style=3D"font-weight:bold">Date: </span> Tue, 8 Mar =
2011 10:11:46 -0700<br><span style=3D"font-weight:bold">To: </span> Justin =
Richer &lt;<a href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<b=
r><span style=3D"font-weight:bold">Cc: </span> OAuth WG &lt;<a href=3D"mail=
to:oauth@ietf.org">oauth@ietf.org</a>&gt;<br><span style=3D"font-weight:bol=
d">Subject: </span> Re: [OAUTH-WG] OAuth Bearer Token draft<br></div><div><=
br></div><div><div><div style=3D"color:#000; background-color:#fff; font-fa=
mily:times new roman, new york, times, serif;font-size:12pt"><div><span>So =
is a different namespace for each new mechanism right, or should a paramete=
r be added to parallel the authorization scheme name?&nbsp; Seems like it w=
ould be clean to define oauth_scheme and use the same value as defined for =
the auth scheme name.<br></span></div><div><br></div><div style=3D"font-fam=
ily: times new roman,new york,times,serif; font-size: 12pt;"><div style=3D"=
font-family: times new roman,new york,times,serif; font-size: 12pt;"><font =
size=3D"2" face=3D"Arial"><hr size=3D"1"><b><span style=3D"font-weight: bol=
d;">From:</span></b> Justin Richer &lt;<a href=3D"mailto:jricher@mitre.org"=
>jricher@mitre.org</a>&gt;<br><b><span style=3D"font-weight: bold;">To:</sp=
an></b> William J. Mills &lt;<a href=3D"mailto:wmills@yahoo-inc.com">wmills=
@yahoo-inc.com</a>&gt;<br><b><span style=3D"font-weight: bold;">Cc:</span><=
/b> Brian Eaton &lt;<a href=3D"mailto:beaton@google.com">beaton@google.com<=
/a>&gt;; OAuth WG &lt;<a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&=
gt;<br><b><span style=3D"font-weight: bold;">Sent:</span></b> Tuesday, Marc=
h 8, 2011 8:41 AM<br><b><span style=3D"font-weight: bold;">Subject:</span><=
/b> Re: [OAUTH-WG] OAuth Bearer Token draft<br></font><br> I don't understa=
nd this comment. If you're using query/form parameters,<br>there are no sch=
emes involved in the process.<br><br> -- Justin<br><br><br>On Tue, 2011-03-=
08 at 11:27 -0500, William J. Mills wrote:<br>&gt; A major difference is no=
w there is a scheme name that is<br>&gt; differentiating.&nbsp; You no long=
er have to parse the entire variable set<br>&gt; to figure out what is goin=
g on.&nbsp; Now the scheme name determines<br>&gt; things.&nbsp; Now that w=
e have schemes I don't see re-using parameter names<br>&gt; as a problem.<b=
r>&gt; <br>&gt; <br>&gt; <br>&gt; <br>&gt; ________________________________=
______________________________________<br>&gt; From: Justin Richer &lt;<a y=
mailto=3D"mailto:jricher@mitre.org" href=3D"mailto:jricher@mitre.org">jrich=
er@mitre.org</a>&gt;<br>&gt; To: Brian Eaton &lt;<a ymailto=3D"mailto:beato=
n@google.com" href=3D"mailto:beaton@google.com">beaton@google.com</a>&gt;<b=
r>&gt; Cc: OAuth WG &lt;<a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto=
:oauth@ietf.org">oauth@ietf.org</a>&gt;<br>&gt; Sent: Tuesday, March 8, 201=
1 7:11 AM<br>&gt; Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<br>&gt; =
<br>&gt; Very strongly agree, repeat my suggestion to name the parameter<br=
>&gt; "oauth2_token".<br>&gt; <br>&gt; -- Justin<br>&gt; <br>&gt; On Fri, 2=
011-02-25 at 14:49 -0500, Brian Eaton wrote:<br>&gt; &gt; My two cents:<br>=
&gt; &gt; <br>&gt; &gt; We've already taken three user visible outages beca=
use the OAuth2<br>&gt; spec<br>&gt; &gt; reused the "oauth_token" parameter=
 in a way that was not compatible<br>&gt; &gt; with the OAuth1 spec.<br>&gt=
; &gt; <br>&gt; &gt; Luckily they were all caught before they caused seriou=
s damage.<br>&gt; &gt; <br>&gt; &gt;
 Generic parameter names are not useful.&nbsp; They lead to confused<br>&gt=
; &gt; developers and confused code.&nbsp; If code needs to treat the value=
s<br>&gt; &gt; differently, the names should be different as well.<br>&gt; =
&gt; <br>&gt; &gt; Cheers,<br>&gt; &gt; Brian<br>&gt; &gt; <br>&gt; &gt; On=
 Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt &lt;<a ymailto=3D"mailto:phil.hun=
t@oracle.com" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>=
&gt;<br>&gt; wrote:<br>&gt; &gt; &gt; There was some discussion on the type=
 for the authorization header<br>&gt; being<br>&gt; &gt; &gt; OAUTH / MAC /=
 BEARER etc. Did we have a resolution?<br>&gt; &gt; &gt; As for section 2.2=
 and 2.3, should we not have a more neutral<br>&gt; solution as<br>&gt; &gt=
; &gt; well and use "authorization_token" instead of oauth_token. The<br>&g=
t; idea is that<br>&gt; &gt; &gt; the parameter corresponds to the authoriz=
ation header and NOT the<br>&gt; value of<br>&gt; &gt; &gt; it. The
 value of such a parameter an be an encoded value that<br>&gt; corresponds =
to<br>&gt; &gt; &gt; the authorization header.&nbsp; For example:<br>&gt; &=
gt; &gt; GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Hos=
t:<br>&gt; &gt; &gt; server.example.com<br>&gt; &gt; &gt; instead of<br>&gt=
; &gt; &gt; GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host:<br>&gt; s=
erver.example.com<br>&gt; &gt; &gt; The concern is that if for some reason =
you switch to "MAC" tokens,<br>&gt; then you<br>&gt; &gt; &gt; have to chan=
ge parameter names. Why not keep them consistent?<br>&gt; &gt; &gt; Apologi=
es if this was already resolved.<br>&gt; &gt; &gt; Phil<br>&gt; &gt; &gt; <=
a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.c=
om">phil.hunt@oracle.com</a><br>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &g=
t; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; &gt; _______________________________=
________________<br>&gt; &gt; &gt; OAuth mailing list<br>&gt; &gt; &gt; <a =
ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf=
.org</a><br>&gt; &gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo=
/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><b=
r>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; ___________________________=
____________________<br>&gt; &gt; OAuth mailing list<br>&gt; &gt; <a ymailt=
o=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</=
a><br>&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" tar=
get=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; <br>=
&gt; <br>&gt; _______________________________________________<br>&gt; OAuth=
 mailing list<br>&gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:O=
Auth@ietf.org">OAuth@ietf.org</a><br>&gt; <a href=3D"https://www.ietf.org/m=
ailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listi=
nfo/oauth</a><br>&gt; <br>&gt; <br>&gt; <br>&gt; <br><br><br><br><br></div>=
</div></div><br>

      </div></div></span></body></html>

--_000_C99BAEE5E033eranhueniversecom_--

From wmills@yahoo-inc.com  Tue Mar  8 10:45:03 2011
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 606FF3A6906 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 10:45:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BsEZs9mlURuP for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 10:45:01 -0800 (PST)
Received: from web121404.mail.ne1.yahoo.com (web121404.mail.ne1.yahoo.com [98.138.90.98]) by core3.amsl.com (Postfix) with SMTP id 083F23A68AF for <oauth@ietf.org>; Tue,  8 Mar 2011 10:44:51 -0800 (PST)
Received: (qmail 62141 invoked by uid 60001); 8 Mar 2011 18:46:06 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1299609966; bh=TfogBNiV+vqAx+RRrLhiItWpiVPHiuiOB9v2or28Lww=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=a0f8qTxRWnk6m66HTWGaANdZ/X9jd7I8FYnts7oRm1fK79vHMR8R0F5oE/o8csTdVjdUIBT6fASNOCRYWoeW/MccM8TrXUBzkCzt/f+Vbj1olMkOBy+9B6+FOEsxGQaFcJxvOWyRgPmOlYM4wZdh93pfXpUSKcKmcAn44mV/tcM=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=sATeRcG+4Qztv/d/QDYd/BK+DKl1bt4MQs84uWqckAw9fGwsSjdqj//TcLCuVru7a/q6TXjDCEjW15u1c4DfzV3mdrj8FRQtK1xf8tSpwDBOV7k/1NkTgaJthkMsiuv+KUTsV1qZp3Z8UimKcf0gEx1gQN+p9TtZbRO+4Ru7deQ=;
Message-ID: <608482.61869.qm@web121404.mail.ne1.yahoo.com>
X-YMail-OSG: JJ7kdBAVM1kBk420VIX0Cmq7tEpmeYFyezQf0wW5ckOrWqI OIt88CgVSzm78jeZWY_MFCKtpDY7U9Jmad3E3rpXASl5ti5Tv5d2UE8JUida 714d87jfWdNXm6tiaElr2qdSV1p19PQm5k0GQMyAGYf8rybtVa6y45zVqA8G tbBKQ8rh71G8MJ.d.iCT0WZ8iCbibx3FPPSVrJ9hiSYPVm93XmUynmgIXG.U m_weMIpv1QbYWjg96fOOB7l85OOp4c0.2wh1H5ULWU4bTSyRpoVEmSSlKjq1 sLeUzVqO.tp6NtBKKAyON6yKjeg--
Received: from [209.131.62.115] by web121404.mail.ne1.yahoo.com via HTTP; Tue, 08 Mar 2011 10:46:06 PST
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.109.292656
Date: Tue, 8 Mar 2011 10:46:06 -0800 (PST)
From: "William J. Mills" <wmills@yahoo-inc.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, Justin Richer <jricher@mitre.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-14006193-1299609966=:61869"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 18:45:03 -0000

--0-14006193-1299609966=:61869
Content-Type: text/plain; charset=us-ascii

Then a single extra reservation is preferable to N, yes?



From: Eran Hammer-Lahav <eran@hueniverse.com>
To: William J. Mills <wmills@yahoo-inc.com>; Justin Richer <jricher@mitre.org>
Cc: OAuth WG <oauth@ietf.org>
Sent: Tuesday, March 8, 2011 10:02 AM
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft


I hope this will be the last time we define a query parameter for delivering what should be sent via a request header field. Infringing on a service's namespace is always a bad idea, no matter what prefix we put next to it.

EHL
From:  "William J. Mills" <wmills@yahoo-inc.com>
Reply-To:  "William J. Mills" <wmills@yahoo-inc.com>
Date:  Tue, 8 Mar 2011 10:11:46 -0700
To:  Justin Richer <jricher@mitre.org>
Cc:  OAuth WG <oauth@ietf.org>
Subject:  Re: [OAUTH-WG] OAuth Bearer Token draft


So is a different namespace for each new mechanism right, or should a parameter be added to parallel the authorization scheme name?  Seems like it would be clean to define oauth_scheme and use the same value as defined for the auth scheme name.


From: Justin Richer <jricher@mitre.org>
To: William J. Mills <wmills@yahoo-inc.com>
Cc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>
Sent: Tuesday, March 8, 2011 8:41 AM
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

I don't understand this comment. If you're using query/form parameters,
there are no schemes involved in the process.

-- Justin


On Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:
> A major difference is now there is a scheme name that is
> differentiating.  You no longer have to parse the entire variable set
> to figure out what is going on.  Now the scheme name determines
> things.  Now that we have schemes I don't see re-using parameter names
> as a problem.
> 
> 
> 
> 
> ______________________________________________________________________
> From: Justin Richer <jricher@mitre.org>
> To: Brian Eaton <beaton@google.com>
> Cc: OAuth WG <oauth@ietf.org>
> Sent: Tuesday, March 8, 2011 7:11 AM
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
> 
> Very strongly agree, repeat my suggestion to name the parameter
> "oauth2_token".
> 
> -- Justin
> 
> On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:
> > My two cents:
> > 
> > We've already taken three user visible outages because the OAuth2
> spec
> > reused the "oauth_token" parameter in a way that was not compatible
> > with the OAuth1 spec.
> > 
> > Luckily they were all caught before they caused serious damage.
> > 
> > Generic parameter names are not useful.  They lead to confused
> > developers and confused code.  If code needs to treat the values
> > differently, the names should be different as well.
> > 
> > Cheers,
> > Brian
> > 
> > On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt <phil.hunt@oracle.com>
> wrote:
> > > There was some discussion on the type for the authorization header
> being
> > > OAUTH / MAC / BEARER etc. Did we have a resolution?
> > > As for section 2.2 and 2.3, should we not have a more neutral
> solution as
> > > well and use "authorization_token" instead of oauth_token. The
> idea is that
> > > the parameter corresponds to the authorization header and NOT the
> value of
> > > it. The value of such a parameter an be an encoded value that
> corresponds to
> > > the authorization header.  For example:
> > > GET /resource?authorization_token=BEARER+vF9dft4qmT HTTP/1.1 Host:
> > > server.example.com
> > > instead of
> > > GET /resource?oauth_token=vF9dft4qmT HTTP/1.1 Host:
> server.example.com
> > > The concern is that if for some reason you switch to "MAC" tokens,
> then you
> > > have to change parameter names. Why not keep them consistent?
> > > Apologies if this was already resolved.
> > > Phil
> > > phil.hunt@oracle.com
> > >
> > >
> > >
> > >
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> > >
> > >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> 
> 


      
--0-14006193-1299609966=:61869
Content-Type: text/html; charset=us-ascii

<html><body><div style="color:#000; background-color:#fff, font-family:times new roman, new york, times, serif;font-size:12pt">Then a single extra reservation is preferable to N, yes?<span><br class="yui-cursor"></span><div style="font-family: inherit; font-size: 12pt;"><br><div style="font-family: inherit; font-size: 12pt;"><font size="2" face="Arial"><div style="border: 1px solid rgb(204, 204, 204); line-height: 0pt; font-size: 0pt; margin: 5px 0px; padding: 0pt;" readonly="true" class="hr" contenteditable="false"></div><b><span style="font-weight: bold;">From:</span></b> Eran Hammer-Lahav &lt;eran@hueniverse.com&gt;<br><b><span style="font-weight: bold;">To:</span></b> William J. Mills &lt;wmills@yahoo-inc.com&gt;; Justin Richer &lt;jricher@mitre.org&gt;<br><b><span style="font-weight: bold;">Cc:</span></b> OAuth WG &lt;oauth@ietf.org&gt;<br><b><span style="font-weight: bold;">Sent:</span></b> Tuesday, March 8, 2011 10:02 AM<br><b><span
 style="font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] OAuth Bearer Token draft<br></font><br> <meta http-equiv="x-dns-prefetch-control" content="off"><div id="yiv1955601224"><div>I hope this will be the last time we define a query parameter for delivering what should be sent via a request header field. Infringing on a service's namespace is always a bad idea, no matter what prefix we put next to it.</div><div><br></div><div>EHL</div><div><br></div><span id="yiv1955601224OLK_SRC_BODY_SECTION"><div style="font-family: inherit; font-size: 11pt; text-align: left; color: black; border-width: 1pt medium medium; border-style: solid none none; border-color: rgb(181, 196, 223) -moz-use-text-color -moz-use-text-color; padding: 3pt 0in 0in;"><span style="font-weight: bold;">From: </span> "William J. Mills" &lt;<a rel="nofollow" ymailto="mailto:wmills@yahoo-inc.com" target="_blank" href="mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;<br><span
 style="font-weight: bold;">Reply-To: </span> "William J. Mills" &lt;<a rel="nofollow" ymailto="mailto:wmills@yahoo-inc.com" target="_blank" href="mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;<br><span style="font-weight: bold;">Date: </span> Tue, 8 Mar 2011 10:11:46 -0700<br><span style="font-weight: bold;">To: </span> Justin Richer &lt;<a rel="nofollow" ymailto="mailto:jricher@mitre.org" target="_blank" href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br><span style="font-weight: bold;">Cc: </span> OAuth WG &lt;<a rel="nofollow" ymailto="mailto:oauth@ietf.org" target="_blank" href="mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<br><span style="font-weight: bold;">Subject: </span> Re: [OAUTH-WG] OAuth Bearer Token draft<br></div><div><br></div><div><div><div style="color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); font-family: inherit; font-size: 12pt;"><div><span>So is a different namespace for each new mechanism right, or
 should a parameter be added to parallel the authorization scheme name?&nbsp; Seems like it would be clean to define oauth_scheme and use the same value as defined for the auth scheme name.<br></span></div><div><br></div><div style="font-family: inherit; font-size: 12pt;"><div style="font-family: inherit; font-size: 12pt;"><font size="2" face="Arial"><div style="border: 1px solid rgb(204, 204, 204); line-height: 0pt; font-size: 0pt; margin: 5px 0px; padding: 0pt;" readonly="true" class="hr" contenteditable="false"></div><b><span style="font-weight: bold;">From:</span></b> Justin Richer &lt;<a rel="nofollow" ymailto="mailto:jricher@mitre.org" target="_blank" href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br><b><span style="font-weight: bold;">To:</span></b> William J. Mills &lt;<a rel="nofollow" ymailto="mailto:wmills@yahoo-inc.com" target="_blank" href="mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;<br><b><span style="font-weight:
 bold;">Cc:</span></b> Brian Eaton &lt;<a rel="nofollow" ymailto="mailto:beaton@google.com" target="_blank" href="mailto:beaton@google.com">beaton@google.com</a>&gt;; OAuth WG &lt;<a rel="nofollow" ymailto="mailto:oauth@ietf.org" target="_blank" href="mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<br><b><span style="font-weight: bold;">Sent:</span></b> Tuesday, March 8, 2011 8:41 AM<br><b><span style="font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] OAuth Bearer Token draft<br></font><br> I don't understand this comment. If you're using query/form parameters,<br>there are no schemes involved in the process.<br><br> -- Justin<br><br><br>On Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:<br>&gt; A major difference is now there is a scheme name that is<br>&gt; differentiating.&nbsp; You no longer have to parse the entire variable set<br>&gt; to figure out what is going on.&nbsp; Now the scheme name determines<br>&gt; things.&nbsp; Now that we
 have schemes I don't see re-using parameter names<br>&gt; as a problem.<br>&gt; <br>&gt; <br>&gt; <br>&gt; <br>&gt; ______________________________________________________________________<br>&gt; From: Justin Richer &lt;<a rel="nofollow" ymailto="mailto:jricher@mitre.org" target="_blank" href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br>&gt; To: Brian Eaton &lt;<a rel="nofollow" ymailto="mailto:beaton@google.com" target="_blank" href="mailto:beaton@google.com">beaton@google.com</a>&gt;<br>&gt; Cc: OAuth WG &lt;<a rel="nofollow" ymailto="mailto:oauth@ietf.org" target="_blank" href="mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<br>&gt; Sent: Tuesday, March 8, 2011 7:11 AM<br>&gt; Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<br>&gt; <br>&gt; Very strongly agree, repeat my suggestion to name the parameter<br>&gt; "oauth2_token".<br>&gt; <br>&gt; -- Justin<br>&gt; <br>&gt; On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:<br>&gt; &gt; My
 two cents:<br>&gt; &gt; <br>&gt; &gt; We've already taken three user visible outages because the OAuth2<br>&gt; spec<br>&gt; &gt; reused the "oauth_token" parameter in a way that was not compatible<br>&gt; &gt; with the OAuth1 spec.<br>&gt; &gt; <br>&gt; &gt; Luckily they were all caught before they caused serious damage.<br>&gt; &gt; <br>&gt; &gt;
 Generic parameter names are not useful.&nbsp; They lead to confused<br>&gt; &gt; developers and confused code.&nbsp; If code needs to treat the values<br>&gt; &gt; differently, the names should be different as well.<br>&gt; &gt; <br>&gt; &gt; Cheers,<br>&gt; &gt; Brian<br>&gt; &gt; <br>&gt; &gt; On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt &lt;<a rel="nofollow" ymailto="mailto:phil.hunt@oracle.com" target="_blank" href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;<br>&gt; wrote:<br>&gt; &gt; &gt; There was some discussion on the type for the authorization header<br>&gt; being<br>&gt; &gt; &gt; OAUTH / MAC / BEARER etc. Did we have a resolution?<br>&gt; &gt; &gt; As for section 2.2 and 2.3, should we not have a more neutral<br>&gt; solution as<br>&gt; &gt; &gt; well and use "authorization_token" instead of oauth_token. The<br>&gt; idea is that<br>&gt; &gt; &gt; the parameter corresponds to the authorization header and NOT the<br>&gt; value
 of<br>&gt; &gt; &gt; it. The
 value of such a parameter an be an encoded value that<br>&gt; corresponds to<br>&gt; &gt; &gt; the authorization header.&nbsp; For example:<br>&gt; &gt; &gt; GET /resource?authorization_token=BEARER+vF9dft4qmT HTTP/1.1 Host:<br>&gt; &gt; &gt; server.example.com<br>&gt; &gt; &gt; instead of<br>&gt; &gt; &gt; GET /resource?oauth_token=vF9dft4qmT HTTP/1.1 Host:<br>&gt; server.example.com<br>&gt; &gt; &gt; The concern is that if for some reason you switch to "MAC" tokens,<br>&gt; then you<br>&gt; &gt; &gt; have to change parameter names. Why not keep them consistent?<br>&gt; &gt; &gt; Apologies if this was already resolved.<br>&gt; &gt; &gt; Phil<br>&gt; &gt; &gt; <a rel="nofollow" ymailto="mailto:phil.hunt@oracle.com" target="_blank" href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; &gt; _______________________________________________<br>&gt; &gt; &gt; OAuth
 mailing list<br>&gt; &gt; &gt; <a rel="nofollow" ymailto="mailto:OAuth@ietf.org" target="_blank" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; &gt; &gt; <a rel="nofollow" target="_blank" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; _______________________________________________<br>&gt; &gt; OAuth mailing list<br>&gt; &gt; <a rel="nofollow" ymailto="mailto:OAuth@ietf.org" target="_blank" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; &gt; <a rel="nofollow" target="_blank" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; <br>&gt; <br>&gt; _______________________________________________<br>&gt; OAuth mailing list<br>&gt; <a rel="nofollow" ymailto="mailto:OAuth@ietf.org" target="_blank" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; <a rel="nofollow" target="_blank"
 href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; <br>&gt; <br>&gt; <br>&gt; <br><br><br><br><br></div></div></div><br>

      </div></div></span></div><meta http-equiv="x-dns-prefetch-control" content="on"><br><br></div></div></div><br>

      </body></html>
--0-14006193-1299609966=:61869--

From eran@hueniverse.com  Tue Mar  8 10:59:08 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6BA9E3A69AC for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 10:59:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.555
X-Spam-Level: 
X-Spam-Status: No, score=-2.555 tagged_above=-999 required=5 tests=[AWL=0.043,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wkFJgzEtU02V for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 10:59:06 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id CA74A3A69A0 for <oauth@ietf.org>; Tue,  8 Mar 2011 10:59:06 -0800 (PST)
Received: (qmail 15685 invoked from network); 8 Mar 2011 19:00:21 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 8 Mar 2011 19:00:20 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Tue, 8 Mar 2011 12:00:06 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "William J. Mills" <wmills@yahoo-inc.com>, Justin Richer <jricher@mitre.org>
Date: Tue, 8 Mar 2011 12:00:08 -0700
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvdwwluD/8BWZTyQH+nvycFFazKeQ==
Message-ID: <C99BBB55.E058%eran@hueniverse.com>
In-Reply-To: <608482.61869.qm@web121404.mail.ne1.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.2.0.101115
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C99BBB55E058eranhueniversecom_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 18:59:08 -0000

--_000_C99BBB55E058eranhueniversecom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

If there was an actual reason to think more of these will be needed.

The only attractive feature of bearer tokens are their simplicity. There ca=
n be nothing simpler. And as such, sending them over in a query parameter h=
as obvious benefits inline with this simplicity (with the well-known securi=
ty issues that must be taken into consideration).

The reasons for supporting query GET parameters and body POST parameters ar=
e ease of use and client limitations in accessing the authorization header.=
 The second is pretty much a non-issue at this point (it was 3 years ago wh=
en 1.0 was released).

Every other token type is going to be more complex and will require more pa=
rameters than just the token. In such an environment, a single parameter na=
me will not be helpful. Using a parameter prefix might be, but it just gets=
 ugly (oauth_bearer_token, oauth_something_signature, etc.).

My point is that instead of building yet another extension point, we should=
 come up with a reasonable solution for bearer tokens and simply state that=
 we do not expect any other token type to use this method. That all other t=
oken types should use an HTTP header, or a special multi-part body.

EHL



From: "William J. Mills" <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>=
>
Reply-To: "William J. Mills" <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.=
com>>
Date: Tue, 8 Mar 2011 11:46:06 -0700
To: Eran Hammer-lahav <eran@hueniverse.com<mailto:eran@hueniverse.com>>, Ju=
stin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

Then a single extra reservation is preferable to N, yes?

From: Eran Hammer-Lahav <eran@hueniverse.com<mailto:eran@hueniverse.com>>
To: William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>; J=
ustin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
Sent: Tuesday, March 8, 2011 10:02 AM
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

I hope this will be the last time we define a query parameter for deliverin=
g what should be sent via a request header field. Infringing on a service's=
 namespace is always a bad idea, no matter what prefix we put next to it.

EHL

From: "William J. Mills" <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>=
>
Reply-To: "William J. Mills" <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.=
com>>
Date: Tue, 8 Mar 2011 10:11:46 -0700
To: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

So is a different namespace for each new mechanism right, or should a param=
eter be added to parallel the authorization scheme name?  Seems like it wou=
ld be clean to define oauth_scheme and use the same value as defined for th=
e auth scheme name.

From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
To: William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
Cc: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>; OAuth WG <oa=
uth@ietf.org<mailto:oauth@ietf.org>>
Sent: Tuesday, March 8, 2011 8:41 AM
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

I don't understand this comment. If you're using query/form parameters,
there are no schemes involved in the process.

-- Justin


On Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:
> A major difference is now there is a scheme name that is
> differentiating.  You no longer have to parse the entire variable set
> to figure out what is going on.  Now the scheme name determines
> things.  Now that we have schemes I don't see re-using parameter names
> as a problem.
>
>
>
>
> ______________________________________________________________________
> From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
> To: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>
> Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
> Sent: Tuesday, March 8, 2011 7:11 AM
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
> Very strongly agree, repeat my suggestion to name the parameter
> "oauth2_token".
>
> -- Justin
>
> On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:
> > My two cents:
> >
> > We've already taken three user visible outages because the OAuth2
> spec
> > reused the "oauth_token" parameter in a way that was not compatible
> > with the OAuth1 spec.
> >
> > Luckily they were all caught before they caused serious damage.
> >
> > Generic parameter names are not useful.  They lead to confused
> > developers and confused code.  If code needs to treat the values
> > differently, the names should be different as well.
> >
> > Cheers,
> > Brian
> >
> > On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt <phil.hunt@oracle.com<mailt=
o:phil.hunt@oracle.com>>
> wrote:
> > > There was some discussion on the type for the authorization header
> being
> > > OAUTH / MAC / BEARER etc. Did we have a resolution?
> > > As for section 2.2 and 2.3, should we not have a more neutral
> solution as
> > > well and use "authorization_token" instead of oauth_token. The
> idea is that
> > > the parameter corresponds to the authorization header and NOT the
> value of
> > > it. The value of such a parameter an be an encoded value that
> corresponds to
> > > the authorization header.  For example:
> > > GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host:
> > > server.example.com
> > > instead of
> > > GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host:
> server.example.com
> > > The concern is that if for some reason you switch to "MAC" tokens,
> then you
> > > have to change parameter names. Why not keep them consistent?
> > > Apologies if this was already resolved.
> > > Phil
> > > phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>
> > >
> > >
> > >
> > >
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org<mailto:OAuth@ietf.org>
> > > https://www.ietf.org/mailman/listinfo/oauth
> > >
> > >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org<mailto:OAuth@ietf.org>
> > https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>









--_000_C99BBB55E058eranhueniversecom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; color: rgb(0, 0, 0); font-si=
ze: 14px; font-family: Calibri, sans-serif; "><div>If there was an actual r=
eason to think more of these will be needed.</div><div><br></div><div>The o=
nly attractive feature of bearer tokens are their simplicity. There can be =
nothing simpler. And as such, sending them over in a query parameter has ob=
vious benefits inline with this simplicity (with the well-known security is=
sues that must be taken into consideration).</div><div><br></div><div>The r=
easons for supporting query GET parameters and body POST parameters are eas=
e of use and client limitations in accessing the authorization header. The =
second is pretty much a non-issue at this point (it was 3 years ago when 1.=
0 was released).</div><div><br></div><div>Every other token type is going t=
o be more complex and will require more parameters than just the token. In =
such an environment, a single parameter name will not be helpful. Using a p=
arameter prefix might be, but it just gets ugly (oauth_bearer_token, oauth_=
something_signature, etc.).</div><div><br></div><div>My point is that inste=
ad of building yet another extension point, we should come up with a reason=
able solution for bearer tokens and simply state that we do not expect any =
other token type to use this method. That all other token types should use =
an HTTP header, or a special multi-part body.</div><div><br></div><div>EHL<=
/div><div><br></div><div><br></div><div><br></div><span id=3D"OLK_SRC_BODY_=
SECTION"><div style=3D"font-family:Calibri; font-size:11pt; text-align:left=
; color:black; BORDER-BOTTOM: medium none; BORDER-LEFT: medium none; PADDIN=
G-BOTTOM: 0in; PADDING-LEFT: 0in; PADDING-RIGHT: 0in; BORDER-TOP: #b5c4df 1=
pt solid; BORDER-RIGHT: medium none; PADDING-TOP: 3pt"><span style=3D"font-=
weight:bold">From: </span> "William J. Mills" &lt;<a href=3D"mailto:wmills@=
yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;<br><span style=3D"font-weight:b=
old">Reply-To: </span> "William J. Mills" &lt;<a href=3D"mailto:wmills@yaho=
o-inc.com">wmills@yahoo-inc.com</a>&gt;<br><span style=3D"font-weight:bold"=
>Date: </span> Tue, 8 Mar 2011 11:46:06 -0700<br><span style=3D"font-weight=
:bold">To: </span> Eran Hammer-lahav &lt;<a href=3D"mailto:eran@hueniverse.=
com">eran@hueniverse.com</a>&gt;, Justin Richer &lt;<a href=3D"mailto:jrich=
er@mitre.org">jricher@mitre.org</a>&gt;<br><span style=3D"font-weight:bold"=
>Cc: </span> OAuth WG &lt;<a href=3D"mailto:oauth@ietf.org">oauth@ietf.org<=
/a>&gt;<br><span style=3D"font-weight:bold">Subject: </span> Re: [OAUTH-WG]=
 OAuth Bearer Token draft<br></div><div><br></div><div><div><div style=3D"c=
olor:#000; background-color:#fff, font-family:times new roman, new york, ti=
mes, serif;font-size:12pt">Then a single extra reservation is preferable to=
 N, yes?<span><br class=3D"yui-cursor"></span><div style=3D"font-family: in=
herit; font-size: 12pt;"><br><div style=3D"font-family: inherit; font-size:=
 12pt;"><font size=3D"2" face=3D"Arial"><div style=3D"border: 1px solid rgb=
(204, 204, 204); line-height: 0pt; font-size: 0pt; margin: 5px 0px; padding=
: 0pt;" readonly=3D"true" class=3D"hr" contenteditable=3D"false"></div><b><=
span style=3D"font-weight: bold;">From:</span></b> Eran Hammer-Lahav &lt;<a=
 href=3D"mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;<br><b><spa=
n style=3D"font-weight: bold;">To:</span></b> William J. Mills &lt;<a href=
=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;; Justin Riche=
r &lt;<a href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br><b>=
<span style=3D"font-weight: bold;">Cc:</span></b> OAuth WG &lt;<a href=3D"m=
ailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<br><b><span style=3D"font-weig=
ht: bold;">Sent:</span></b> Tuesday, March 8, 2011 10:02 AM<br><b><span sty=
le=3D"font-weight: bold;">Subject:</span></b> Re: [OAUTH-WG] OAuth Bearer T=
oken draft<br></font><br> <div id=3D"yiv1955601224"><div>I hope this will b=
e the last time we define a query parameter for delivering what should be s=
ent via a request header field. Infringing on a service's namespace is alwa=
ys a bad idea, no matter what prefix we put next to it.</div><div><br></div=
><div>EHL</div><div><br></div><span id=3D"yiv1955601224OLK_SRC_BODY_SECTION=
"><div style=3D"font-family: inherit; font-size: 11pt; text-align: left; co=
lor: black; border-width: 1pt medium medium; border-style: solid none none;=
 border-color: rgb(181, 196, 223) -moz-use-text-color -moz-use-text-color; =
padding: 3pt 0in 0in;"><span style=3D"font-weight: bold;">From: </span> "Wi=
lliam J. Mills" &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills@yahoo-inc.=
com" target=3D"_blank" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-in=
c.com</a>&gt;<br><span style=3D"font-weight: bold;">Reply-To: </span> "Will=
iam J. Mills" &lt;<a rel=3D"nofollow" ymailto=3D"mailto:wmills@yahoo-inc.co=
m" target=3D"_blank" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.=
com</a>&gt;<br><span style=3D"font-weight: bold;">Date: </span> Tue, 8 Mar =
2011 10:11:46 -0700<br><span style=3D"font-weight: bold;">To: </span> Justi=
n Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@mitre.org" targe=
t=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br=
><span style=3D"font-weight: bold;">Cc: </span> OAuth WG &lt;<a rel=3D"nofo=
llow" ymailto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oa=
uth@ietf.org">oauth@ietf.org</a>&gt;<br><span style=3D"font-weight: bold;">=
Subject: </span> Re: [OAUTH-WG] OAuth Bearer Token draft<br></div><div><br>=
</div><div><div><div style=3D"color: rgb(0, 0, 0); background-color: rgb(25=
5, 255, 255); font-family: inherit; font-size: 12pt;"><div><span>So is a di=
fferent namespace for each new mechanism right, or
 should a parameter be added to parallel the authorization scheme name?&nbs=
p; Seems like it would be clean to define oauth_scheme and use the same val=
ue as defined for the auth scheme name.<br></span></div><div><br></div><div=
 style=3D"font-family: inherit; font-size: 12pt;"><div style=3D"font-family=
: inherit; font-size: 12pt;"><font size=3D"2" face=3D"Arial"><div style=3D"=
border: 1px solid rgb(204, 204, 204); line-height: 0pt; font-size: 0pt; mar=
gin: 5px 0px; padding: 0pt;" readonly=3D"true" class=3D"hr" contenteditable=
=3D"false"></div><b><span style=3D"font-weight: bold;">From:</span></b> Jus=
tin Richer &lt;<a rel=3D"nofollow" ymailto=3D"mailto:jricher@mitre.org" tar=
get=3D"_blank" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<=
br><b><span style=3D"font-weight: bold;">To:</span></b> William J. Mills &l=
t;<a rel=3D"nofollow" ymailto=3D"mailto:wmills@yahoo-inc.com" target=3D"_bl=
ank" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;<br><=
b><span style=3D"font-weight:
 bold;">Cc:</span></b> Brian Eaton &lt;<a rel=3D"nofollow" ymailto=3D"mailt=
o:beaton@google.com" target=3D"_blank" href=3D"mailto:beaton@google.com">be=
aton@google.com</a>&gt;; OAuth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto=
:oauth@ietf.org" target=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@iet=
f.org</a>&gt;<br><b><span style=3D"font-weight: bold;">Sent:</span></b> Tue=
sday, March 8, 2011 8:41 AM<br><b><span style=3D"font-weight: bold;">Subjec=
t:</span></b> Re: [OAUTH-WG] OAuth Bearer Token draft<br></font><br> I don'=
t understand this comment. If you're using query/form parameters,<br>there =
are no schemes involved in the process.<br><br> -- Justin<br><br><br>On Tue=
, 2011-03-08 at 11:27 -0500, William J. Mills wrote:<br>&gt; A major differ=
ence is now there is a scheme name that is<br>&gt; differentiating.&nbsp; Y=
ou no longer have to parse the entire variable set<br>&gt; to figure out wh=
at is going on.&nbsp; Now the scheme name determines<br>&gt; things.&nbsp; =
Now that we
 have schemes I don't see re-using parameter names<br>&gt; as a problem.<br=
>&gt; <br>&gt; <br>&gt; <br>&gt; <br>&gt; _________________________________=
_____________________________________<br>&gt; From: Justin Richer &lt;<a re=
l=3D"nofollow" ymailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=
=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br>&gt; To: Brian E=
aton &lt;<a rel=3D"nofollow" ymailto=3D"mailto:beaton@google.com" target=3D=
"_blank" href=3D"mailto:beaton@google.com">beaton@google.com</a>&gt;<br>&gt=
; Cc: OAuth WG &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" ta=
rget=3D"_blank" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<br>&g=
t; Sent: Tuesday, March 8, 2011 7:11 AM<br>&gt; Subject: Re: [OAUTH-WG] OAu=
th Bearer Token draft<br>&gt; <br>&gt; Very strongly agree, repeat my sugge=
stion to name the parameter<br>&gt; "oauth2_token".<br>&gt; <br>&gt; -- Jus=
tin<br>&gt; <br>&gt; On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:<=
br>&gt; &gt; My
 two cents:<br>&gt; &gt; <br>&gt; &gt; We've already taken three user visib=
le outages because the OAuth2<br>&gt; spec<br>&gt; &gt; reused the "oauth_t=
oken" parameter in a way that was not compatible<br>&gt; &gt; with the OAut=
h1 spec.<br>&gt; &gt; <br>&gt; &gt; Luckily they were all caught before the=
y caused serious damage.<br>&gt; &gt; <br>&gt; &gt;
 Generic parameter names are not useful.&nbsp; They lead to confused<br>&gt=
; &gt; developers and confused code.&nbsp; If code needs to treat the value=
s<br>&gt; &gt; differently, the names should be different as well.<br>&gt; =
&gt; <br>&gt; &gt; Cheers,<br>&gt; &gt; Brian<br>&gt; &gt; <br>&gt; &gt; On=
 Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt &lt;<a rel=3D"nofollow" ymailto=
=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"mailto:phil.hunt=
@oracle.com">phil.hunt@oracle.com</a>&gt;<br>&gt; wrote:<br>&gt; &gt; &gt; =
There was some discussion on the type for the authorization header<br>&gt; =
being<br>&gt; &gt; &gt; OAUTH / MAC / BEARER etc. Did we have a resolution?=
<br>&gt; &gt; &gt; As for section 2.2 and 2.3, should we not have a more ne=
utral<br>&gt; solution as<br>&gt; &gt; &gt; well and use "authorization_tok=
en" instead of oauth_token. The<br>&gt; idea is that<br>&gt; &gt; &gt; the =
parameter corresponds to the authorization header and NOT the<br>&gt; value
 of<br>&gt; &gt; &gt; it. The
 value of such a parameter an be an encoded value that<br>&gt; corresponds =
to<br>&gt; &gt; &gt; the authorization header.&nbsp; For example:<br>&gt; &=
gt; &gt; GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Hos=
t:<br>&gt; &gt; &gt; server.example.com<br>&gt; &gt; &gt; instead of<br>&gt=
; &gt; &gt; GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host:<br>&gt; s=
erver.example.com<br>&gt; &gt; &gt; The concern is that if for some reason =
you switch to "MAC" tokens,<br>&gt; then you<br>&gt; &gt; &gt; have to chan=
ge parameter names. Why not keep them consistent?<br>&gt; &gt; &gt; Apologi=
es if this was already resolved.<br>&gt; &gt; &gt; Phil<br>&gt; &gt; &gt; <=
a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank=
" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt; &gt=
; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; &=
gt; _______________________________________________<br>&gt; &gt; &gt; OAuth
 mailing list<br>&gt; &gt; &gt; <a rel=3D"nofollow" ymailto=3D"mailto:OAuth=
@ietf.org" target=3D"_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org<=
/a><br>&gt; &gt; &gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https:/=
/www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo=
/oauth</a><br>&gt; &gt; &gt;<br>&gt; &gt; &gt;<br>&gt; &gt; _______________=
________________________________<br>&gt; &gt; OAuth mailing list<br>&gt; &g=
t; <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; &gt; <a rel=3D"no=
follow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oau=
th">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; <br>&gt; <br>&g=
t; _______________________________________________<br>&gt; OAuth mailing li=
st<br>&gt; <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"=
_blank" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt; <a rel=3D=
"nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/=
oauth">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; <br>&gt; <br=
>&gt; <br>&gt; <br><br><br><br><br></div></div></div><br>

      </div></div></span></div><br><br></div></div></div><br>

      </div></div></span></body></html>

--_000_C99BBB55E058eranhueniversecom_--

From skylar@kiva.org  Tue Mar  8 11:21:14 2011
Return-Path: <skylar@kiva.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0FEAD3A693A for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 11:21:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zdzfP28rzqbt for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 11:21:09 -0800 (PST)
Received: from na3sys010aog103.obsmtp.com (na3sys010aog103.obsmtp.com [74.125.245.74]) by core3.amsl.com (Postfix) with SMTP id 9A77A3A680F for <oauth@ietf.org>; Tue,  8 Mar 2011 11:21:07 -0800 (PST)
Received: from source ([74.125.83.50]) (using TLSv1) by na3sys010aob103.postini.com ([74.125.244.12]) with SMTP ID DSNKTXaB7l0NarSqpvng9FYGpEFA6b55/8gl@postini.com; Tue, 08 Mar 2011 11:22:24 PST
Received: by mail-gw0-f50.google.com with SMTP id a20so3288582gwa.9 for <oauth@ietf.org>; Tue, 08 Mar 2011 11:22:22 -0800 (PST)
Received: by 10.236.182.233 with SMTP id o69mr5759723yhm.30.1299612140883; Tue, 08 Mar 2011 11:22:20 -0800 (PST)
Received: from [10.0.1.4] (c-24-5-80-5.hsd1.ca.comcast.net [24.5.80.5]) by mx.google.com with ESMTPS id g63sm704807yhd.15.2011.03.08.11.22.15 (version=TLSv1/SSLv3 cipher=OTHER); Tue, 08 Mar 2011 11:22:17 -0800 (PST)
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Skylar Woodward <skylar@kiva.org>
In-Reply-To: <1299594363.8411.8.camel@ground>
Date: Tue, 8 Mar 2011 11:22:14 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <7D0E0886-92B6-4386-94C2-6CC5AF553E7B@kiva.org>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com> <A13381EF-A1D4-45C8-B716-637A1F3BB298@gmail.com> , <4D74ACB8.3040707@lodderstedt.net> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719A@IMCMBX3.MITRE.ORG> <F81348BB-1711-49C9-9FDD-148D98C116EB@kiva.org> <1299594363.8411.8.camel@ground>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1082)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 19:21:14 -0000

To clarify, when I say "can keep secrets" I mean "can be packed/shipped =
with secrets."  Good point.

I assume all OAuth clients can keep secrets in the more general sense =
you implied. Otherwise, even bearer tokens would be useless.


On Mar 8, 2011, at 6:26 AM, Justin Richer wrote:

> Also, there's a big difference between "can keep secrets" and "can be
> packed/shipped with secrets". Many native apps fit into the former
> category but not the latter, which makes storage of refresh tokens and
> other long-term credentials reasonable, but not server-issued client
> secrets.
>=20
> -- Justin
>=20
> On Mon, 2011-03-07 at 14:37 -0500, Skylar Woodward wrote:
>> Justin has well stated my view on this.  Folks here have explained =
how the flows can work for (or doesn't prohibit) a native app, but it =
also seems clear that new readers don't pick up how native apps fit into =
the flow in a 1st or 2nd pass.
>>=20
>> So, in short, I agree with Brian's suggestion of (1) removing choice =
references to native apps, and (2) as a further (and preferred) step, a =
better preamble (possibly with further supporting edits) on the role of =
native apps. It seems Justin and Torsten are suggesting the same.
>>=20
>> To go further than step 1 I agree we need some discussion on the =
story for native apps. For my part, here's how I see them fitting in:
>>=20
>> - The general assumption is that Native apps can't keep secrets. This =
is mostly true except...
>> - Native apps with secured distribution (eg, controlled access by =
corporate IT departments who also can modify app preferences w/ the =
provider) can claim the apps keep secrets.  (A sample use case are Kiva =
field partners who develop simple enterprise apps for use inside a =
firewall).
>> - In truth, the question of secrets or no secrets (can authenticate =
or spoofable) is of primary importance for choosing a flow.
>> - In the common case, Native apps without secrets, an implicit flow =
or auth-code flow can be used. If an auth-code flow is used, there =
should be no client authentication. Alternatively, providers may =
instruct such clients to authenticate with an empty secret (since such =
clients should never be issued secrets to begin with).
>> - In the uncommon case of native apps who can keep secrets, an =
implicit flow cannot be used. The app must present credentials which =
requires an auth-code (or other) flow.
>> - I think there should be some note added to the auth-code flow on =
how a native app chooses and makes use of a redirect_uri.  This was =
present in draft 10 and was (i think) key to understanding the auth-code =
story for native apps.
>>=20
>> I do not have strong opinions on the client-assertion flows for =
native apps nor the issuance of refresh tokens in an implicit flow. It =
does seem that some find it important to be able to issue refresh tokens =
to clients without secrets. I don't see a good argument to restrict this =
from a policy point of view (rather it seems more of issue of mechanics =
and/or fragment parsing), but it does seem the policy should be =
consistent. That is, if as an issue of policy, refresh tokens are not =
issued to apps without credentials, the policy applies for auth-code =
flows or implicit flows.
>>=20
>> skylar
>>=20
>>=20
>> On Mar 7, 2011, at 5:54 AM, Richer, Justin P. wrote:
>>=20
>>> Agree with Torsten - having the mention in just that one place =
doesn't make sense. It should be removed or replicated throughout, but I =
think we might want a paragraph addressing native apps more deeply in =
the introduction. We don't want to give the (incorrect) impression that =
the implicit flow is the only or even preferred flow for native apps.
>>>=20
>>> -- Justin
>>> ________________________________________
>>> From: oauth-bounces@ietf.org [oauth-bounces@ietf.org] On Behalf Of =
Torsten Lodderstedt [torsten@lodderstedt.net]
>>> Sent: Monday, March 07, 2011 5:00 AM
>>> To: Dick Hardt
>>> Cc: OAuth WG
>>> Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: =
Draft -12 feedback deadline)
>>>=20
>>> Hi Dick,
>>>=20
>>> I agree with you, the OAuth standard should offer clear patterns for
>>> native apps.
>>>=20
>>> All native apps I'm familiar with use the authorization code, which =
is
>>> because of its support for refresh tokens. But the current text of =
the
>>> spec only suggests to use the implict grant flow to implement native
>>> apps whereas previous versions mentioned authz code and password =
flow as
>>> well. So in my opinion, the text is misleading to developers. And =
that's
>>> not only a feeling since I already meet people, which have been
>>> misguided :-(.
>>>=20
>>> I think at least the misleading words shall be removed. Better would =
be
>>> to come up with a consensus after a discussion in the group.
>>>=20
>>> regards,
>>> Torsten.
>>>=20
>>> Am 06.03.2011 23:12, schrieb Dick Hardt:
>>>> -1
>>>>=20
>>>> Many sites are using OAuth (or something like it) in native apps =
now.
>>>>=20
>>>> One of the objectives of having a standard is to bring best =
practices and standardization to how to solve a problem rather than "a =
million freakin unique snowflakes" where developers have to learn and =
code each mechanism to enable authorization to a native app. Brian's =
suggested wording may make sense in the context of where OAuth is now -- =
but it signals that the WG has been unable to solve what I think many =
viewed as an important aspect of the WG.
>>>>=20
>>>> fwiw: I think a number of important constituents have opted out of =
the dialogue. An unfortunate situation.
>>>>=20
>>>> On 2011-03-02, at 6:05 AM, Brian Campbell wrote:
>>>>=20
>>>>> I propose that the "or native applications" text be dropped from =
the
>>>>> first paragraph in section 4.2 Implicit Grant  [1].
>>>>>=20
>>>>> There is clearly some disagreement about what is most appropriate =
for
>>>>> mobile/native applications and many, including myself, don't feel =
that
>>>>> the implicit grant works well to support them (due to the lack of =
a
>>>>> refresh token and need to repeat the authorization steps).  I
>>>>> understand that the text in section 4 is non-normative, however, I
>>>>> feel that the mention of native apps in 4.2 biases thinking in a
>>>>> particular way (it's already led to one lengthy internal =
discussion
>>>>> that I'd rather not have again and again).  I believe it'd be more
>>>>> appropriate for the draft to remain silent on how native apps =
should
>>>>> acquire tokens and leave it up to implementations/deployments to
>>>>> decide (or an extension draft as Marius has proposed).
>>>>>=20
>>>>> The "or native applications" text in is also somewhat inconsistent
>>>>> with the text in the following sentence that talks about the
>>>>> authentication of the client being based on the user-agent's
>>>>> same-origin policy.
>>>>>=20
>>>>> Removing those three words is a small change but one that I feel =
would
>>>>> be beneficial on a number of fronts.
>>>>>=20
>>>>> Thanks,
>>>>> Brian
>>>>>=20
>>>>>=20
>>>>> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
>>>>>=20
>>>>> On Wed, Feb 16, 2011 at 2:57 PM, Eran =
Hammer-Lahav<eran@hueniverse.com>  wrote:
>>>>>> Feel free to propose alternative preamble for the implicit and =
authorization code sections, describing the characteristics of what they =
are good for. It should fit in a single paragraph. Such a proposal would =
fit right in with last call feedback to -13.
>>>>>>=20
>>>>>> EHL
>>>>>>=20
>>>>>>> -----Original Message-----
>>>>>>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
>>>>>>> Sent: Wednesday, February 16, 2011 1:39 PM
>>>>>>> To: Eran Hammer-Lahav
>>>>>>> Cc: Brian Campbell; OAuth WG
>>>>>>> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
>>>>>>>=20
>>>>>>> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
>>>>>>> <eran@hueniverse.com>  wrote:
>>>>>>>> The reason why we don't return a refresh token in the implicit =
grant is
>>>>>>> exactly because there is no client authentication...
>>>>>>>=20
>>>>>>> Not sure that's the main reason. AFAIK it is because the =
response is sent
>>>>>>> through the user-agent and it could leak.
>>>>>>>=20
>>>>>>>=20
>>>>>>>> These are all well-balanced flows with specific security =
properties. If you
>>>>>>> need something else, even if it is just a tweak, it must be =
considered a
>>>>>>> different flow. That doesn't mean you need to register a new =
grant type, just
>>>>>>> that you are dealing with different implementation details =
unique to your
>>>>>>> server.
>>>>>>>=20
>>>>>>> The Authorization Code flow, with no client secret, is perfectly =
fine for Native
>>>>>>> Apps IMO.
>>>>>>>=20
>>>>>>> Marius
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20
>=20


From doog@google.com  Tue Mar  8 13:50:42 2011
Return-Path: <doog@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 890E43A659B for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 13:50:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.976
X-Spam-Level: 
X-Spam-Status: No, score=-105.976 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kP+4PHOW6Nx0 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 13:50:41 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [74.125.121.67]) by core3.amsl.com (Postfix) with ESMTP id A4D143A63C9 for <oauth@ietf.org>; Tue,  8 Mar 2011 13:50:40 -0800 (PST)
Received: from hpaq5.eem.corp.google.com (hpaq5.eem.corp.google.com [172.25.149.5]) by smtp-out.google.com with ESMTP id p28Lptsl010230 for <oauth@ietf.org>; Tue, 8 Mar 2011 13:51:55 -0800
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1299621115; bh=1HKUnupylag7bTmlUC52Xg/a4M8=; h=MIME-Version:From:Date:Message-ID:Subject:To:Content-Type; b=I/mH3WZSUX3+8e/5mm4xk8b0iUAe+misOEUiZXiZSAYcoF2NqkBmMGqNBx1OwRtPg VLXMZh10bLGxFPWuSJmHw==
Received: from gwj22 (gwj22.prod.google.com [10.200.10.22]) by hpaq5.eem.corp.google.com with ESMTP id p28LprtA010368 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Tue, 8 Mar 2011 13:51:54 -0800
Received: by gwj22 with SMTP id 22so2599163gwj.13 for <oauth@ietf.org>; Tue, 08 Mar 2011 13:51:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:from:date:message-id:subject:to :content-type; bh=nFn/fQuY7q9sx0cMVl48+62odG4ornDNjhgIEzk6zmQ=; b=n1QwBNuJrOkpzjXXb9E6XSzQNCyXpA5dWHeom4tGtkNnSaqI5i+WcX5A3RqwNtXcCL Q+gBwyoxsVqpH/6gHhfw==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:from:date:message-id:subject:to:content-type; b=fmfQKUobd00k/PfDpIjIaMpkvKMt/a1ic2ygfsgnCy1vOJ2a6S/d1KWUwFlajUxA1O YgUAOefTK+3XSRoMG3DQ==
Received: by 10.150.144.12 with SMTP id r12mr4081724ybd.216.1299621113202; Tue, 08 Mar 2011 13:51:53 -0800 (PST)
MIME-Version: 1.0
Received: by 10.151.79.15 with HTTP; Tue, 8 Mar 2011 13:51:33 -0800 (PST)
From: Doug Kramer <doog@google.com>
Date: Tue, 8 Mar 2011 13:51:33 -0800
Message-ID: <AANLkTinxuBgcmd7LnwQbRED0VkwbyW5iE5s47DDzSMxa@mail.gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary=000e0cd56aa8cb8b89049dff9e7d
X-System-Of-Record: true
Subject: [OAUTH-WG] Typo on 2.0 home page
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 22:08:52 -0000

--000e0cd56aa8cb8b89049dff9e7d
Content-Type: text/plain; charset=ISO-8859-1

Your 2.0 home page http://oauth.net/2/ has a typo: "is can"

The latest version of the spec is can be found at:

-Doug

--000e0cd56aa8cb8b89049dff9e7d
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Your 2.0 home page <a href=3D"http://oauth.net/2/">http://oauth.net/2/</a> =
has a typo: &quot;is can&quot;<div><br></div><div><meta charset=3D"utf-8"><=
span class=3D"Apple-style-span" style=3D"color: rgb(30, 37, 13); font-famil=
y: &#39;Lucida Grande&#39;, Calibri, Arial, sans-serif; font-size: 14px; li=
ne-height: 21px; ">The latest version of the spec <span class=3D"Apple-styl=
e-span" style=3D"background-color: rgb(255, 255, 102);">is</span> can be fo=
und at:</span></div>

<div><span class=3D"Apple-style-span" style=3D"color: rgb(30, 37, 13); font=
-family: &#39;Lucida Grande&#39;, Calibri, Arial, sans-serif; line-height: =
21px; "><br></span></div><div><span class=3D"Apple-style-span" style=3D"col=
or: rgb(30, 37, 13); font-family: &#39;Lucida Grande&#39;, Calibri, Arial, =
sans-serif; line-height: 21px; ">-Doug</span></div>


--000e0cd56aa8cb8b89049dff9e7d--

From fcorella@pomcor.com  Tue Mar  8 14:28:41 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 082503A677C for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 14:28:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.308
X-Spam-Level: 
X-Spam-Status: No, score=-2.308 tagged_above=-999 required=5 tests=[AWL=-0.025, BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_MILLIONSOF=0.315]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QJ8FSuiKVsIf for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 14:28:39 -0800 (PST)
Received: from nm3.bullet.mail.ac4.yahoo.com (nm3.bullet.mail.ac4.yahoo.com [98.139.52.200]) by core3.amsl.com (Postfix) with SMTP id 194433A6774 for <oauth@ietf.org>; Tue,  8 Mar 2011 14:28:39 -0800 (PST)
Received: from [98.139.52.194] by nm3.bullet.mail.ac4.yahoo.com with NNFMP; 08 Mar 2011 22:29:51 -0000
Received: from [98.139.52.151] by tm7.bullet.mail.ac4.yahoo.com with NNFMP; 08 Mar 2011 22:29:51 -0000
Received: from [127.0.0.1] by omp1034.mail.ac4.yahoo.com with NNFMP; 08 Mar 2011 22:29:51 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 690298.75390.bm@omp1034.mail.ac4.yahoo.com
Received: (qmail 28893 invoked by uid 60001); 8 Mar 2011 22:29:51 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1299623391; bh=GHzu5onyH0wZXJlccLttUuXIp3flyVuQobwK16mGfzs=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=3r2LFlf3JP1ggBFLPQpC8oiaULXXkHgzlPFrJY175XTszC8UkSVsFlIJqCyNN4zE4AURE3UgzffC+GRrlL6SaKGq0AZWf2u3FbCFykBcfl355X9PRFNEzVk+8hOUXoO9RsuQC8RD2KgrwfLSfcL0jiFZS/47J+nWz5f5EYv+nZc=
Message-ID: <561716.97093.qm@web55801.mail.re3.yahoo.com>
X-YMail-OSG: bqsO7DIVM1lvtUNunHxwGys2ed0LYAT5BtP30_j1F.xDcDc fkYV.aGwFN0tUjCLOVOCGZmRByrmIa6dvEOopfELJgi.ANqA5QhSd0AfqgAt Mr9SRGRMu6_1loIAYEXmNyQAY6q6CM.LUTl47_VcB_7PHgNzEyx.CCnpBRcN 3IyvS8..5s_X9OdhVd3EJaYAd28eHk7ZDH7d3FVlrV7LpNpryK6RWO21CzVa zdAef6AoP2miiL_9TY_R1PXwESqdW8WNNL0gH_pgStoeS8wONd1gD.cS5PAO 2aaOJna7bvzbGOfRf.mJn2RoDjXUTGvYItpH9dIPvH1dg18..SqaGP.t3kPh 8CPQQ
Received: from [67.91.91.101] by web55801.mail.re3.yahoo.com via HTTP; Tue, 08 Mar 2011 14:29:51 PST
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/11.4.20 YahooMailWebService/0.8.109.295617
Date: Tue, 8 Mar 2011 14:29:51 -0800 (PST)
From: Francisco Corella <fcorella@pomcor.com>
To: OAuth WG <oauth@ietf.org>, Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-604205700-1299623391=:97093"
Cc: "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 22:28:41 -0000

--0-604205700-1299623391=:97093
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

In my opinion the protocol has serious problems.

The authorization code is a credential that provides access to
protected resources via the client, as well as user authentication
when OAuth is used for social login.=A0 If an attacker observes or
intercepts the authorization code, the attacker can present the code
to the client, use the client to gain access to the user's protected
resources, and log in to the client impersonating the user.=A0 Therefore
the authorization code cannot be sent to the client without TLS
protection.=A0 The protocol must require the redirect_uri to use the
https scheme.=A0 The redirect_uri is shown as an https URI in the
examples, but examples are not enough.=A0 If TLS is not required,
implementations may use http.=A0 At this time the Facebook developer
documentation shows http rather than https in its examples, and
implementations seem to use http, as can be seen by searching the Web
for "oauth redirect_uri".

The protocol has the same well-known vulnerability to phishing attacks
as OpenID.=A0 The attack on OpenID described by Ben Laurie in
http://www.links.org/?p=3D187 is equally applicable to this protocol.
The protocol should require the use of TLS at the authorization
endpoint; without it, the user is defenseless against the attack.=A0 The
protocol should also require the user to be already logged in at the
authorization server, so that the server will not ask for credentials.

If implementors take no precautions, the protocol is vulnerable to
Login CSRF attacks.=A0 Adam Barth confirmed this in a message to the
IETF websec mailing list:

> Last time I looked into Login CSRF issues with
> OAuth, the protocol had a large problem and every implementation I
> experimented with was trivially vulnerable.

A countermeasure against Login CSRF must be provided in the security
considerations section.=A0 The security considerations section should
also suggest countermeasures against DOS attacks.=A0 But the section is
not written yet.=A0 I would think that the absence of a security
considerations section in and of itself means that the protocol is not
ready.

I also must point out the danger to the Web posed by a protocol that
is used for social login and requires registration.=A0 Millions of Web
applications already use Facebook for social login.=A0 If social login
becomes a de facto standard for user authentication, Web applications
will have to support login with Facebook just to be able to
authenticate their users.=A0 If that requires registration, then
Facebook will have the power to disable any Web application by
revoking its registration.=A0 That would be bad for all parties
involved, including Facebook, which would then face regulation by the
governments of many countries.

Francisco

--- On Wed, 3/2/11, Hannes Tschofenig <hannes.tschofenig@gmx.net> wrote:

From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: "OAuth WG" <oauth@ietf.org>
Date: Wednesday, March 2, 2011, 7:32 AM

This is a Last Call for comments on=20

http://www.ietf.org/id/draft-ietf-oauth-v2-13.txt

Please have your comments in no later than March 16.

Do remember to send a note in if you have read the document and have no=20
other comments other than "its ready to go" - we need those as much as we n=
eed "I found a problem".

Thanks!
Hannes & Blaine

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

--0-604205700-1299623391=:97093
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">In my opinion the protocol has serious proble=
ms.<br><br>The authorization code is a credential that provides access to<b=
r>protected resources via the client, as well as user authentication<br>whe=
n OAuth is used for social login.&nbsp; If an attacker observes or<br>inter=
cepts the authorization code, the attacker can present the code<br>to the c=
lient, use the client to gain access to the user's protected<br>resources, =
and log in to the client impersonating the user.&nbsp; Therefore<br>the aut=
horization code cannot be sent to the client without TLS<br>protection.&nbs=
p; The protocol must require the redirect_uri to use the<br>https scheme.&n=
bsp; The redirect_uri is shown as an https URI in the<br>examples, but exam=
ples are not enough.&nbsp; If TLS is not required,<br>implementations may u=
se http.&nbsp; At this time the Facebook developer<br>documentation shows h=
ttp
 rather than https in its examples, and<br>implementations seem to use http=
, as can be seen by searching the Web<br>for "oauth redirect_uri".<br><br>T=
he protocol has the same well-known vulnerability to phishing attacks<br>as=
 OpenID.&nbsp; The attack on OpenID described by Ben Laurie in<br>http://ww=
w.links.org/?p=3D187 is equally applicable to this protocol.<br>The protoco=
l should require the use of TLS at the authorization<br>endpoint; without i=
t, the user is defenseless against the attack.&nbsp; The<br>protocol should=
 also require the user to be already logged in at the<br>authorization serv=
er, so that the server will not ask for credentials.<br><br>If implementors=
 take no precautions, the protocol is vulnerable to<br>Login CSRF attacks.&=
nbsp; Adam Barth confirmed this in a message to the<br>IETF websec mailing =
list:<br><br>&gt; Last time I looked into Login CSRF issues with<br>&gt; OA=
uth, the protocol had a large problem and every implementation
 I<br>&gt; experimented with was trivially vulnerable.<br><br>A countermeas=
ure against Login CSRF must be provided in the security<br>considerations s=
ection.&nbsp; The security considerations section should<br>also suggest co=
untermeasures against DOS attacks.&nbsp; But the section is<br>not written =
yet.&nbsp; I would think that the absence of a security<br>considerations s=
ection in and of itself means that the protocol is not<br>ready.<br><br>I a=
lso must point out the danger to the Web posed by a protocol that<br>is use=
d for social login and requires registration.&nbsp; Millions of Web<br>appl=
ications already use Facebook for social login.&nbsp; If social login<br>be=
comes a de facto standard for user authentication, Web applications<br>will=
 have to support login with Facebook just to be able to<br>authenticate the=
ir users.&nbsp; If that requires registration, then<br>Facebook will have t=
he power to disable any Web application by<br>revoking its
 registration.&nbsp; That would be bad for all parties<br>involved, includi=
ng Facebook, which would then face regulation by the<br>governments of many=
 countries.<br><br>Francisco<br><br>--- On <b>Wed, 3/2/11, Hannes Tschofeni=
g <i>&lt;hannes.tschofenig@gmx.net&gt;</i></b> wrote:<br><blockquote style=
=3D"border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left=
: 5px;"><br>From: Hannes Tschofenig &lt;hannes.tschofenig@gmx.net&gt;<br>Su=
bject: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<br>To: "OAuth WG" &lt;=
oauth@ietf.org&gt;<br>Date: Wednesday, March 2, 2011, 7:32 AM<br><br><div c=
lass=3D"plainMail">This is a Last Call for comments on <br><br><a href=3D"h=
ttp://www.ietf.org/id/draft-ietf-oauth-v2-13.txt" target=3D"_blank">http://=
www.ietf.org/id/draft-ietf-oauth-v2-13.txt</a><br><br>Please have your comm=
ents in no later than March 16.<br><br>Do remember to send a note in if you=
 have read the document and have no <br>other comments other than "its read=
y
 to go" - we need those as much as we need "I found a problem".<br><br>Than=
ks!<br>Hannes &amp; Blaine<br><br>_________________________________________=
______<br>OAuth mailing list<br><a ymailto=3D"mailto:OAuth@ietf.org" href=
=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br><a href=3D"https=
://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.=
org/mailman/listinfo/oauth</a><br></div></blockquote></td></tr></table>
--0-604205700-1299623391=:97093--

From jricher@mitre.org  Tue Mar  8 15:49:02 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 02CF63A67D2 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 15:49:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U3iSlZAGYgMo for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 15:49:01 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id DFE913A67D1 for <oauth@ietf.org>; Tue,  8 Mar 2011 15:49:00 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id A57F121B0BAB; Tue,  8 Mar 2011 18:50:15 -0500 (EST)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 9CE2C21B071D; Tue,  8 Mar 2011 18:50:15 -0500 (EST)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub1.MITRE.ORG ([129.83.29.73]) with mapi; Tue, 8 Mar 2011 18:50:15 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Eran Hammer-Lahav <eran@hueniverse.com>, "William J. Mills" <wmills@yahoo-inc.com>
Date: Tue, 8 Mar 2011 18:48:30 -0500
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvduwDXv+NbJ5HCQHWeM0W1EqQ/HAAMFNXm
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719B@IMCMBX3.MITRE.ORG>
References: <836580.97993.qm@web121404.mail.ne1.yahoo.com>, <C99BAEE5.E033%eran@hueniverse.com>
In-Reply-To: <C99BAEE5.E033%eran@hueniverse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Mar 2011 23:49:02 -0000

Except that we're also infringing on service provider namespaces for our ot=
her endpoints as well. Not every service provider can or will create a pris=
tine endpoint for tokens or authorizations, but this working group has had =
no problems putting all kinds of parameters into that space. Unless we want=
 to say that we can't use query or form parameters in specifications ever a=
gain, this argument doesn't really hold up.

 -- Justin
________________________________________
From: Eran Hammer-Lahav [eran@hueniverse.com]
Sent: Tuesday, March 08, 2011 1:02 PM
To: William J. Mills; Richer, Justin P.
Cc: OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

I hope this will be the last time we define a query parameter for deliverin=
g what should be sent via a request header field. Infringing on a service's=
 namespace is always a bad idea, no matter what prefix we put next to it.

EHL

From: "William J. Mills" <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>=
>
Reply-To: "William J. Mills" <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.=
com>>
Date: Tue, 8 Mar 2011 10:11:46 -0700
To: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

So is a different namespace for each new mechanism right, or should a param=
eter be added to parallel the authorization scheme name?  Seems like it wou=
ld be clean to define oauth_scheme and use the same value as defined for th=
e auth scheme name.

________________________________
From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
To: William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
Cc: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>; OAuth WG <oa=
uth@ietf.org<mailto:oauth@ietf.org>>
Sent: Tuesday, March 8, 2011 8:41 AM
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

I don't understand this comment. If you're using query/form parameters,
there are no schemes involved in the process.

-- Justin


On Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:
> A major difference is now there is a scheme name that is
> differentiating.  You no longer have to parse the entire variable set
> to figure out what is going on.  Now the scheme name determines
> things.  Now that we have schemes I don't see re-using parameter names
> as a problem.
>
>
>
>
> ______________________________________________________________________
> From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
> To: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>
> Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
> Sent: Tuesday, March 8, 2011 7:11 AM
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
> Very strongly agree, repeat my suggestion to name the parameter
> "oauth2_token".
>
> -- Justin
>
> On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:
> > My two cents:
> >
> > We've already taken three user visible outages because the OAuth2
> spec
> > reused the "oauth_token" parameter in a way that was not compatible
> > with the OAuth1 spec.
> >
> > Luckily they were all caught before they caused serious damage.
> >
> > Generic parameter names are not useful.  They lead to confused
> > developers and confused code.  If code needs to treat the values
> > differently, the names should be different as well.
> >
> > Cheers,
> > Brian
> >
> > On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt <phil.hunt@oracle.com<mailt=
o:phil.hunt@oracle.com>>
> wrote:
> > > There was some discussion on the type for the authorization header
> being
> > > OAUTH / MAC / BEARER etc. Did we have a resolution?
> > > As for section 2.2 and 2.3, should we not have a more neutral
> solution as
> > > well and use "authorization_token" instead of oauth_token. The
> idea is that
> > > the parameter corresponds to the authorization header and NOT the
> value of
> > > it. The value of such a parameter an be an encoded value that
> corresponds to
> > > the authorization header.  For example:
> > > GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host:
> > > server.example.com
> > > instead of
> > > GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host:
> server.example.com
> > > The concern is that if for some reason you switch to "MAC" tokens,
> then you
> > > have to change parameter names. Why not keep them consistent?
> > > Apologies if this was already resolved.
> > > Phil
> > > phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>
> > >
> > >
> > >
> > >
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org<mailto:OAuth@ietf.org>
> > > https://www.ietf.org/mailman/listinfo/oauth
> > >
> > >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org<mailto:OAuth@ietf.org>
> > https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>






From eran@hueniverse.com  Tue Mar  8 16:07:06 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 236F43A67E6 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 16:07:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.557
X-Spam-Level: 
X-Spam-Status: No, score=-2.557 tagged_above=-999 required=5 tests=[AWL=0.042,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PkuAOvAtT538 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 16:07:05 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 029C43A67E3 for <oauth@ietf.org>; Tue,  8 Mar 2011 16:07:04 -0800 (PST)
Received: (qmail 12890 invoked from network); 9 Mar 2011 00:08:20 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 9 Mar 2011 00:08:19 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Tue, 8 Mar 2011 17:08:11 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Richer, Justin P." <jricher@mitre.org>, "William J. Mills" <wmills@yahoo-inc.com>
Date: Tue, 8 Mar 2011 17:08:10 -0700
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: Acvd7hQyUdd8tgiGQuS8mlyfqymhRw==
Message-ID: <C99C0484.E0FD%eran@hueniverse.com>
In-Reply-To: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719B@IMCMBX3.MITRE.ORG>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/14.2.0.101115
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2011 00:07:06 -0000

No.

There is a huge difference between adding parameters to protected
resources and defining parameter for OAuth specific endpoints (which may
create conflicts with existing frameworks).

One is an invasion of the provider's namespace where OAuth has no business
messing around. The other is a potential deployment issue.

EHL


On 3/8/11 3:48 PM, "Richer, Justin P." <jricher@mitre.org> wrote:

>Except that we're also infringing on service provider namespaces for our
>other endpoints as well. Not every service provider can or will create a
>pristine endpoint for tokens or authorizations, but this working group
>has had no problems putting all kinds of parameters into that space.
>Unless we want to say that we can't use query or form parameters in
>specifications ever again, this argument doesn't really hold up.
>
> -- Justin
>________________________________________
>From: Eran Hammer-Lahav [eran@hueniverse.com]
>Sent: Tuesday, March 08, 2011 1:02 PM
>To: William J. Mills; Richer, Justin P.
>Cc: OAuth WG
>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
>I hope this will be the last time we define a query parameter for
>delivering what should be sent via a request header field. Infringing on
>a service's namespace is always a bad idea, no matter what prefix we put
>next to it.
>
>EHL
>
>From: "William J. Mills"
><wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
>Reply-To: "William J. Mills"
><wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
>Date: Tue, 8 Mar 2011 10:11:46 -0700
>To: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
>So is a different namespace for each new mechanism right, or should a
>parameter be added to parallel the authorization scheme name?  Seems like
>it would be clean to define oauth_scheme and use the same value as
>defined for the auth scheme name.
>
>________________________________
>From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>To: William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
>Cc: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>; OAuth WG
><oauth@ietf.org<mailto:oauth@ietf.org>>
>Sent: Tuesday, March 8, 2011 8:41 AM
>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
>I don't understand this comment. If you're using query/form parameters,
>there are no schemes involved in the process.
>
>-- Justin
>
>
>On Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:
>> A major difference is now there is a scheme name that is
>> differentiating.  You no longer have to parse the entire variable set
>> to figure out what is going on.  Now the scheme name determines
>> things.  Now that we have schemes I don't see re-using parameter names
>> as a problem.
>>
>>
>>
>>
>> ______________________________________________________________________
>> From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>> To: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>
>> Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
>> Sent: Tuesday, March 8, 2011 7:11 AM
>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>
>> Very strongly agree, repeat my suggestion to name the parameter
>> "oauth2_token".
>>
>> -- Justin
>>
>> On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:
>> > My two cents:
>> >
>> > We've already taken three user visible outages because the OAuth2
>> spec
>> > reused the "oauth_token" parameter in a way that was not compatible
>> > with the OAuth1 spec.
>> >
>> > Luckily they were all caught before they caused serious damage.
>> >
>> > Generic parameter names are not useful.  They lead to confused
>> > developers and confused code.  If code needs to treat the values
>> > differently, the names should be different as well.
>> >
>> > Cheers,
>> > Brian
>> >
>> > On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt
>><phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>
>> wrote:
>> > > There was some discussion on the type for the authorization header
>> being
>> > > OAUTH / MAC / BEARER etc. Did we have a resolution?
>> > > As for section 2.2 and 2.3, should we not have a more neutral
>> solution as
>> > > well and use "authorization_token" instead of oauth_token. The
>> idea is that
>> > > the parameter corresponds to the authorization header and NOT the
>> value of
>> > > it. The value of such a parameter an be an encoded value that
>> corresponds to
>> > > the authorization header.  For example:
>> > > GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host:
>> > > server.example.com
>> > > instead of
>> > > GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host:
>> server.example.com
>> > > The concern is that if for some reason you switch to "MAC" tokens,
>> then you
>> > > have to change parameter names. Why not keep them consistent?
>> > > Apologies if this was already resolved.
>> > > Phil
>> > > phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>
>> > >
>> > >
>> > >
>> > >
>> > > _______________________________________________
>> > > OAuth mailing list
>> > > OAuth@ietf.org<mailto:OAuth@ietf.org>
>> > > https://www.ietf.org/mailman/listinfo/oauth
>> > >
>> > >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org<mailto:OAuth@ietf.org>
>> > https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>
>
>
>
>
>


From jricher@mitre.org  Tue Mar  8 16:16:05 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 68EEF3A67E6 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 16:16:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aoTwVlRvnnFR for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 16:16:04 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 49B7F3A67D4 for <oauth@ietf.org>; Tue,  8 Mar 2011 16:16:04 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id A95F621B06CC; Tue,  8 Mar 2011 19:17:19 -0500 (EST)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id A1CDD21B1328; Tue,  8 Mar 2011 19:17:19 -0500 (EST)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub1.MITRE.ORG ([129.83.29.73]) with mapi; Tue, 8 Mar 2011 19:17:19 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Eran Hammer-Lahav <eran@hueniverse.com>, "William J. Mills" <wmills@yahoo-inc.com>
Date: Tue, 8 Mar 2011 19:16:59 -0500
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: Acvd7hQyUdd8tgiGQuS8mlyfqymhRwAATpmO
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719C@IMCMBX3.MITRE.ORG>
References: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719B@IMCMBX3.MITRE.ORG>, <C99C0484.E0FD%eran@hueniverse.com>
In-Reply-To: <C99C0484.E0FD%eran@hueniverse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2011 00:16:05 -0000

I simply don't agree that there's much difference in practice for many peop=
le.

 -- justin
________________________________________
From: Eran Hammer-Lahav [eran@hueniverse.com]
Sent: Tuesday, March 08, 2011 7:08 PM
To: Richer, Justin P.; William J. Mills
Cc: OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

No.

There is a huge difference between adding parameters to protected
resources and defining parameter for OAuth specific endpoints (which may
create conflicts with existing frameworks).

One is an invasion of the provider's namespace where OAuth has no business
messing around. The other is a potential deployment issue.

EHL


On 3/8/11 3:48 PM, "Richer, Justin P." <jricher@mitre.org> wrote:

>Except that we're also infringing on service provider namespaces for our
>other endpoints as well. Not every service provider can or will create a
>pristine endpoint for tokens or authorizations, but this working group
>has had no problems putting all kinds of parameters into that space.
>Unless we want to say that we can't use query or form parameters in
>specifications ever again, this argument doesn't really hold up.
>
> -- Justin
>________________________________________
>From: Eran Hammer-Lahav [eran@hueniverse.com]
>Sent: Tuesday, March 08, 2011 1:02 PM
>To: William J. Mills; Richer, Justin P.
>Cc: OAuth WG
>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
>I hope this will be the last time we define a query parameter for
>delivering what should be sent via a request header field. Infringing on
>a service's namespace is always a bad idea, no matter what prefix we put
>next to it.
>
>EHL
>
>From: "William J. Mills"
><wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
>Reply-To: "William J. Mills"
><wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
>Date: Tue, 8 Mar 2011 10:11:46 -0700
>To: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
>So is a different namespace for each new mechanism right, or should a
>parameter be added to parallel the authorization scheme name?  Seems like
>it would be clean to define oauth_scheme and use the same value as
>defined for the auth scheme name.
>
>________________________________
>From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>To: William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
>Cc: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>; OAuth WG
><oauth@ietf.org<mailto:oauth@ietf.org>>
>Sent: Tuesday, March 8, 2011 8:41 AM
>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
>I don't understand this comment. If you're using query/form parameters,
>there are no schemes involved in the process.
>
>-- Justin
>
>
>On Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:
>> A major difference is now there is a scheme name that is
>> differentiating.  You no longer have to parse the entire variable set
>> to figure out what is going on.  Now the scheme name determines
>> things.  Now that we have schemes I don't see re-using parameter names
>> as a problem.
>>
>>
>>
>>
>> ______________________________________________________________________
>> From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>> To: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>
>> Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
>> Sent: Tuesday, March 8, 2011 7:11 AM
>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>
>> Very strongly agree, repeat my suggestion to name the parameter
>> "oauth2_token".
>>
>> -- Justin
>>
>> On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:
>> > My two cents:
>> >
>> > We've already taken three user visible outages because the OAuth2
>> spec
>> > reused the "oauth_token" parameter in a way that was not compatible
>> > with the OAuth1 spec.
>> >
>> > Luckily they were all caught before they caused serious damage.
>> >
>> > Generic parameter names are not useful.  They lead to confused
>> > developers and confused code.  If code needs to treat the values
>> > differently, the names should be different as well.
>> >
>> > Cheers,
>> > Brian
>> >
>> > On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt
>><phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>
>> wrote:
>> > > There was some discussion on the type for the authorization header
>> being
>> > > OAUTH / MAC / BEARER etc. Did we have a resolution?
>> > > As for section 2.2 and 2.3, should we not have a more neutral
>> solution as
>> > > well and use "authorization_token" instead of oauth_token. The
>> idea is that
>> > > the parameter corresponds to the authorization header and NOT the
>> value of
>> > > it. The value of such a parameter an be an encoded value that
>> corresponds to
>> > > the authorization header.  For example:
>> > > GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host:
>> > > server.example.com
>> > > instead of
>> > > GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host:
>> server.example.com
>> > > The concern is that if for some reason you switch to "MAC" tokens,
>> then you
>> > > have to change parameter names. Why not keep them consistent?
>> > > Apologies if this was already resolved.
>> > > Phil
>> > > phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>
>> > >
>> > >
>> > >
>> > >
>> > > _______________________________________________
>> > > OAuth mailing list
>> > > OAuth@ietf.org<mailto:OAuth@ietf.org>
>> > > https://www.ietf.org/mailman/listinfo/oauth
>> > >
>> > >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org<mailto:OAuth@ietf.org>
>> > https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>
>
>
>
>
>


From beaton@google.com  Tue Mar  8 18:24:14 2011
Return-Path: <beaton@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 114B73A6802 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 18:24:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.477
X-Spam-Level: 
X-Spam-Status: No, score=-105.477 tagged_above=-999 required=5 tests=[AWL=0.500, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e4dd1wiNNAQv for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 18:24:12 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [74.125.121.67]) by core3.amsl.com (Postfix) with ESMTP id 885183A6800 for <oauth@ietf.org>; Tue,  8 Mar 2011 18:24:12 -0800 (PST)
Received: from hpaq13.eem.corp.google.com (hpaq13.eem.corp.google.com [172.25.149.13]) by smtp-out.google.com with ESMTP id p292PRBH004399 for <oauth@ietf.org>; Tue, 8 Mar 2011 18:25:27 -0800
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1299637527; bh=gMTL/QGsAiH9x8F/MU3AB9uzM/Y=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:Subject:From: To:Cc:Content-Type:Content-Transfer-Encoding; b=vYn/uj0B4XpArHxHFrdHThMovg04upH9GQQo3Q2kkrPs63N88Q++KpgPiNGpkgAsK 53RBfkDVhUyKQghZg4siQ==
Received: from yxp4 (yxp4.prod.google.com [10.190.4.196]) by hpaq13.eem.corp.google.com with ESMTP id p292P5kD026640 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Tue, 8 Mar 2011 18:25:25 -0800
Received: by yxp4 with SMTP id 4so40584yxp.10 for <oauth@ietf.org>; Tue, 08 Mar 2011 18:25:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=1zs8iaJNRaNbugyGrkRHt6XLTDrSPFLC+mnD6M4136w=; b=ogqMEewMGfjOV9EamUrVRfFCFg6adK8hJwt89JbseaATV8j5p2XfPolGKmuJb0y1Lw BrsFhIwNIL8OHcutvCzQ==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=K+9BFJZw13fmix4pydMZkP8eoHAdLzdLhXMUnNVJ0SGhXva8kAuMsvxRd9s5CWZQj4 73ftLLT6C0uoK8OFB5rg==
MIME-Version: 1.0
Received: by 10.90.134.20 with SMTP id h20mr7851060agd.24.1299637524335; Tue, 08 Mar 2011 18:25:24 -0800 (PST)
Received: by 10.90.71.19 with HTTP; Tue, 8 Mar 2011 18:25:24 -0800 (PST)
In-Reply-To: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719C@IMCMBX3.MITRE.ORG>
References: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719B@IMCMBX3.MITRE.ORG> <C99C0484.E0FD%eran@hueniverse.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719C@IMCMBX3.MITRE.ORG>
Date: Tue, 8 Mar 2011 18:25:24 -0800
Message-ID: <AANLkTi=5BoAzHQdQMYrRZ_PDtndMPdgw5t2L3hRypgQ3@mail.gmail.com>
From: Brian Eaton <beaton@google.com>
To: "Richer, Justin P." <jricher@mitre.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2011 02:24:14 -0000

This has been proven true in our deployment as well.

On Tue, Mar 8, 2011 at 4:16 PM, Richer, Justin P. <jricher@mitre.org> wrote=
:
> I simply don't agree that there's much difference in practice for many pe=
ople.
>
> =A0-- justin
> ________________________________________
> From: Eran Hammer-Lahav [eran@hueniverse.com]
> Sent: Tuesday, March 08, 2011 7:08 PM
> To: Richer, Justin P.; William J. Mills
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
> No.
>
> There is a huge difference between adding parameters to protected
> resources and defining parameter for OAuth specific endpoints (which may
> create conflicts with existing frameworks).
>
> One is an invasion of the provider's namespace where OAuth has no busines=
s
> messing around. The other is a potential deployment issue.
>
> EHL
>
>
> On 3/8/11 3:48 PM, "Richer, Justin P." <jricher@mitre.org> wrote:
>
>>Except that we're also infringing on service provider namespaces for our
>>other endpoints as well. Not every service provider can or will create a
>>pristine endpoint for tokens or authorizations, but this working group
>>has had no problems putting all kinds of parameters into that space.
>>Unless we want to say that we can't use query or form parameters in
>>specifications ever again, this argument doesn't really hold up.
>>
>> -- Justin
>>________________________________________
>>From: Eran Hammer-Lahav [eran@hueniverse.com]
>>Sent: Tuesday, March 08, 2011 1:02 PM
>>To: William J. Mills; Richer, Justin P.
>>Cc: OAuth WG
>>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>
>>I hope this will be the last time we define a query parameter for
>>delivering what should be sent via a request header field. Infringing on
>>a service's namespace is always a bad idea, no matter what prefix we put
>>next to it.
>>
>>EHL
>>
>>From: "William J. Mills"
>><wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
>>Reply-To: "William J. Mills"
>><wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
>>Date: Tue, 8 Mar 2011 10:11:46 -0700
>>To: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>>Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
>>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>
>>So is a different namespace for each new mechanism right, or should a
>>parameter be added to parallel the authorization scheme name? =A0Seems li=
ke
>>it would be clean to define oauth_scheme and use the same value as
>>defined for the auth scheme name.
>>
>>________________________________
>>From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>>To: William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
>>Cc: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>; OAuth WG
>><oauth@ietf.org<mailto:oauth@ietf.org>>
>>Sent: Tuesday, March 8, 2011 8:41 AM
>>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>
>>I don't understand this comment. If you're using query/form parameters,
>>there are no schemes involved in the process.
>>
>>-- Justin
>>
>>
>>On Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:
>>> A major difference is now there is a scheme name that is
>>> differentiating. =A0You no longer have to parse the entire variable set
>>> to figure out what is going on. =A0Now the scheme name determines
>>> things. =A0Now that we have schemes I don't see re-using parameter name=
s
>>> as a problem.
>>>
>>>
>>>
>>>
>>> ______________________________________________________________________
>>> From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>>> To: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>
>>> Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
>>> Sent: Tuesday, March 8, 2011 7:11 AM
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>
>>> Very strongly agree, repeat my suggestion to name the parameter
>>> "oauth2_token".
>>>
>>> -- Justin
>>>
>>> On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:
>>> > My two cents:
>>> >
>>> > We've already taken three user visible outages because the OAuth2
>>> spec
>>> > reused the "oauth_token" parameter in a way that was not compatible
>>> > with the OAuth1 spec.
>>> >
>>> > Luckily they were all caught before they caused serious damage.
>>> >
>>> > Generic parameter names are not useful. =A0They lead to confused
>>> > developers and confused code. =A0If code needs to treat the values
>>> > differently, the names should be different as well.
>>> >
>>> > Cheers,
>>> > Brian
>>> >
>>> > On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt
>>><phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>
>>> wrote:
>>> > > There was some discussion on the type for the authorization header
>>> being
>>> > > OAUTH / MAC / BEARER etc. Did we have a resolution?
>>> > > As for section 2.2 and 2.3, should we not have a more neutral
>>> solution as
>>> > > well and use "authorization_token" instead of oauth_token. The
>>> idea is that
>>> > > the parameter corresponds to the authorization header and NOT the
>>> value of
>>> > > it. The value of such a parameter an be an encoded value that
>>> corresponds to
>>> > > the authorization header. =A0For example:
>>> > > GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host=
:
>>> > > server.example.com
>>> > > instead of
>>> > > GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host:
>>> server.example.com
>>> > > The concern is that if for some reason you switch to "MAC" tokens,
>>> then you
>>> > > have to change parameter names. Why not keep them consistent?
>>> > > Apologies if this was already resolved.
>>> > > Phil
>>> > > phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>
>>> > >
>>> > >
>>> > >
>>> > >
>>> > > _______________________________________________
>>> > > OAuth mailing list
>>> > > OAuth@ietf.org<mailto:OAuth@ietf.org>
>>> > > https://www.ietf.org/mailman/listinfo/oauth
>>> > >
>>> > >
>>> > _______________________________________________
>>> > OAuth mailing list
>>> > OAuth@ietf.org<mailto:OAuth@ietf.org>
>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>
>>>
>>
>>
>>
>>
>>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

From eran@hueniverse.com  Tue Mar  8 20:17:08 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8B9B73A6812 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 20:17:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.557
X-Spam-Level: 
X-Spam-Status: No, score=-2.557 tagged_above=-999 required=5 tests=[AWL=0.042,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2PBzE4EJiDaF for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 20:17:07 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 2FCDE3A6817 for <oauth@ietf.org>; Tue,  8 Mar 2011 20:17:07 -0800 (PST)
Received: (qmail 22543 invoked from network); 9 Mar 2011 04:18:22 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 9 Mar 2011 04:18:22 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Tue, 8 Mar 2011 21:18:16 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Brian Eaton <beaton@google.com>
Date: Tue, 8 Mar 2011 21:17:47 -0700
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcveEQMd3gRefu4FRrCJjO/V78skUw==
Message-ID: <92C2DBF7-B45E-4C2C-8D28-F110372DFAC6@hueniverse.com>
References: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719B@IMCMBX3.MITRE.ORG> <C99C0484.E0FD%eran@hueniverse.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C719C@IMCMBX3.MITRE.ORG> <AANLkTi=5BoAzHQdQMYrRZ_PDtndMPdgw5t2L3hRypgQ3@mail.gmail.com>
In-Reply-To: <AANLkTi=5BoAzHQdQMYrRZ_PDtndMPdgw5t2L3hRypgQ3@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2011 04:17:08 -0000

What exactly?

On Mar 8, 2011, at 18:25, "Brian Eaton" <beaton@google.com> wrote:

> This has been proven true in our deployment as well.
>=20
> On Tue, Mar 8, 2011 at 4:16 PM, Richer, Justin P. <jricher@mitre.org> wro=
te:
>> I simply don't agree that there's much difference in practice for many p=
eople.
>>=20
>>  -- justin
>> ________________________________________
>> From: Eran Hammer-Lahav [eran@hueniverse.com]
>> Sent: Tuesday, March 08, 2011 7:08 PM
>> To: Richer, Justin P.; William J. Mills
>> Cc: OAuth WG
>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>=20
>> No.
>>=20
>> There is a huge difference between adding parameters to protected
>> resources and defining parameter for OAuth specific endpoints (which may
>> create conflicts with existing frameworks).
>>=20
>> One is an invasion of the provider's namespace where OAuth has no busine=
ss
>> messing around. The other is a potential deployment issue.
>>=20
>> EHL
>>=20
>>=20
>> On 3/8/11 3:48 PM, "Richer, Justin P." <jricher@mitre.org> wrote:
>>=20
>>> Except that we're also infringing on service provider namespaces for ou=
r
>>> other endpoints as well. Not every service provider can or will create =
a
>>> pristine endpoint for tokens or authorizations, but this working group
>>> has had no problems putting all kinds of parameters into that space.
>>> Unless we want to say that we can't use query or form parameters in
>>> specifications ever again, this argument doesn't really hold up.
>>>=20
>>> -- Justin
>>> ________________________________________
>>> From: Eran Hammer-Lahav [eran@hueniverse.com]
>>> Sent: Tuesday, March 08, 2011 1:02 PM
>>> To: William J. Mills; Richer, Justin P.
>>> Cc: OAuth WG
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>=20
>>> I hope this will be the last time we define a query parameter for
>>> delivering what should be sent via a request header field. Infringing o=
n
>>> a service's namespace is always a bad idea, no matter what prefix we pu=
t
>>> next to it.
>>>=20
>>> EHL
>>>=20
>>> From: "William J. Mills"
>>> <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
>>> Reply-To: "William J. Mills"
>>> <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
>>> Date: Tue, 8 Mar 2011 10:11:46 -0700
>>> To: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>>> Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>=20
>>> So is a different namespace for each new mechanism right, or should a
>>> parameter be added to parallel the authorization scheme name?  Seems li=
ke
>>> it would be clean to define oauth_scheme and use the same value as
>>> defined for the auth scheme name.
>>>=20
>>> ________________________________
>>> From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>>> To: William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>=
>
>>> Cc: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>; OAuth WG
>>> <oauth@ietf.org<mailto:oauth@ietf.org>>
>>> Sent: Tuesday, March 8, 2011 8:41 AM
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>=20
>>> I don't understand this comment. If you're using query/form parameters,
>>> there are no schemes involved in the process.
>>>=20
>>> -- Justin
>>>=20
>>>=20
>>> On Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:
>>>> A major difference is now there is a scheme name that is
>>>> differentiating.  You no longer have to parse the entire variable set
>>>> to figure out what is going on.  Now the scheme name determines
>>>> things.  Now that we have schemes I don't see re-using parameter names
>>>> as a problem.
>>>>=20
>>>>=20
>>>>=20
>>>>=20
>>>> ______________________________________________________________________
>>>> From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>
>>>> To: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>
>>>> Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
>>>> Sent: Tuesday, March 8, 2011 7:11 AM
>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>=20
>>>> Very strongly agree, repeat my suggestion to name the parameter
>>>> "oauth2_token".
>>>>=20
>>>> -- Justin
>>>>=20
>>>> On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:
>>>>> My two cents:
>>>>>=20
>>>>> We've already taken three user visible outages because the OAuth2
>>>> spec
>>>>> reused the "oauth_token" parameter in a way that was not compatible
>>>>> with the OAuth1 spec.
>>>>>=20
>>>>> Luckily they were all caught before they caused serious damage.
>>>>>=20
>>>>> Generic parameter names are not useful.  They lead to confused
>>>>> developers and confused code.  If code needs to treat the values
>>>>> differently, the names should be different as well.
>>>>>=20
>>>>> Cheers,
>>>>> Brian
>>>>>=20
>>>>> On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt
>>>> <phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>
>>>> wrote:
>>>>>> There was some discussion on the type for the authorization header
>>>> being
>>>>>> OAUTH / MAC / BEARER etc. Did we have a resolution?
>>>>>> As for section 2.2 and 2.3, should we not have a more neutral
>>>> solution as
>>>>>> well and use "authorization_token" instead of oauth_token. The
>>>> idea is that
>>>>>> the parameter corresponds to the authorization header and NOT the
>>>> value of
>>>>>> it. The value of such a parameter an be an encoded value that
>>>> corresponds to
>>>>>> the authorization header.  For example:
>>>>>> GET /resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host:
>>>>>> server.example.com
>>>>>> instead of
>>>>>> GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host:
>>>> server.example.com
>>>>>> The concern is that if for some reason you switch to "MAC" tokens,
>>>> then you
>>>>>> have to change parameter names. Why not keep them consistent?
>>>>>> Apologies if this was already resolved.
>>>>>> Phil
>>>>>> phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>=20
>>>>>>=20
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>>=20
>>>>=20
>>>>=20
>>>=20
>>>=20
>>>=20
>>>=20
>>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20

From wmills@yahoo-inc.com  Tue Mar  8 20:48:54 2011
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E82613A6807 for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 20:48:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1qjozUJ4dPiO for <oauth@core3.amsl.com>; Tue,  8 Mar 2011 20:48:52 -0800 (PST)
Received: from web32303.mail.mud.yahoo.com (web32303.mail.mud.yahoo.com [68.142.207.151]) by core3.amsl.com (Postfix) with SMTP id AEAB73A67E1 for <oauth@ietf.org>; Tue,  8 Mar 2011 20:48:52 -0800 (PST)
Received: (qmail 36949 invoked by uid 60001); 9 Mar 2011 04:50:00 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1299646200; bh=vSrN2lRHhRiTIVpmcmOSMdbzgG7qaHv3icw9xE+aBKg=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=SVocvcDVw6EQULF8vkz6yf9gnDKtS6S/eh35rw7zMTW57neXFo26ZhuPhJxyjYqT2hxxt82CgF9KHttY87bz+x+4p6e9AIpWOy6E88gebX7LdjtzCUjOzKUm5mtPY8NffH6aXhke3XpXaIcpiZJucXg3USOJtJR84U5ax+/MIFU=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=M72HkkllOnveqAh8O+tbu5tKlygh6fiMgYQrPXwxcsDla2xSbKAvHggSL/5tD5sIjHYgMJBPgYGueDUIn+WfRDKmlJnMf3y4AFd9Oxdim8jAqXko2JHYBkOJz05knolmIByjW7JnwjiUcYQ4+VxT0cUe9CC9tcOLnP6hCXSXm8I=;
Message-ID: <42514.55268.qm@web32303.mail.mud.yahoo.com>
X-YMail-OSG: tsrxxQMVM1l4MVSLlHF5WiG3HpoRZ4fcF_4ShGRVak7y_lX wBC_ESY_.Myz5xILI1NbVXEZKunAmuU5hm.WDPhNedcDanI9aDY9HD6s0Xlm bmv8rPt4EXUHzObzjqDc1b_nUKzT8bJUo.gvZpxvTY_tdGB.7rOHQTydgqSC cmzGU7gqBSSMF6Y4dJWtASmiuNWyycrgLkc0e9UvEFMOM5YmPUTQj3XCob_q BfnA938evvnkW1xdoV947_MO0Mrm0w.YzAZt2jt9vfK8KvyKeLEgljCooHTo BsfggLXXJLEIPKdOAxndg5QwnUdI-
Received: from [99.31.212.42] by web32303.mail.mud.yahoo.com via HTTP; Tue, 08 Mar 2011 20:49:59 PST
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.110.296531
Date: Tue, 8 Mar 2011 20:49:59 -0800 (PST)
From: "William J. Mills" <wmills@yahoo-inc.com>
To: Brian Eaton <beaton@google.com>, "Richer, Justin P." <jricher@mitre.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1602634214-1299646199=:55268"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2011 04:48:55 -0000

--0-1602634214-1299646199=:55268
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Is there really a need going forward for anything beyond using the Authoriz=
ation header?=A0=A0 Do we have clients out there that just can't set that h=
eader?=A0 Putting bearer tokens in query arguments is a very bad idea for m=
any reasons, and in form variables has it's own set of badness (although no=
t to the same level).=0A=0A-bill=0A=0A=0A=0A_______________________________=
_=0AFrom: Brian Eaton <beaton@google.com>=0ATo: "Richer, Justin P." <jriche=
r@mitre.org>=0ACc: Eran Hammer-Lahav <eran@hueniverse.com>; William J. Mill=
s <wmills@yahoo-inc.com>; OAuth WG <oauth@ietf.org>=0ASent: Tuesday, March =
8, 2011 6:25 PM=0ASubject: Re: [OAUTH-WG] OAuth Bearer Token draft=0A=0AThi=
s has been proven true in our deployment as well.=0A=0AOn Tue, Mar 8, 2011 =
at 4:16 PM, Richer, Justin P. <jricher@mitre.org> wrote:=0A> I simply don't=
 agree that there's much difference in practice for many people.=0A>=0A> =
=A0-- justin=0A> ________________________________________=0A> From: Eran Ha=
mmer-Lahav [eran@hueniverse.com]=0A> Sent: Tuesday, March 08, 2011 7:08 PM=
=0A> To: Richer, Justin P.; William J. Mills=0A> Cc: OAuth WG=0A> Subject: =
Re: [OAUTH-WG] OAuth Bearer Token draft=0A>=0A> No.=0A>=0A> There is a huge=
 difference between adding parameters to protected=0A> resources and defini=
ng parameter for OAuth specific endpoints (which may=0A> create conflicts w=
ith existing frameworks).=0A>=0A> One is an invasion of the provider's name=
space where OAuth has no business=0A> messing around. The other is a potent=
ial deployment issue.=0A>=0A> EHL=0A>=0A>=0A> On 3/8/11 3:48 PM, "Richer, J=
ustin P." <jricher@mitre.org> wrote:=0A>=0A>>Except that we're also infring=
ing on service provider namespaces for our=0A>>other endpoints as well. Not=
 every service provider can or will create a=0A>>pristine endpoint for toke=
ns or authorizations, but this working group=0A>>has had no problems puttin=
g all kinds of parameters into that space.=0A>>Unless we want to say that w=
e can't use query or form parameters in=0A>>specifications ever again, this=
 argument doesn't really hold up.=0A>>=0A>> -- Justin=0A>>_________________=
_______________________=0A>>From: Eran Hammer-Lahav [eran@hueniverse.com]=
=0A>>Sent: Tuesday, March 08, 2011 1:02 PM=0A>>To: William J. Mills; Richer=
, Justin P.=0A>>Cc: OAuth WG=0A>>Subject: Re: [OAUTH-WG] OAuth Bearer Token=
 draft=0A>>=0A>>I hope this will be the last time we define a query paramet=
er for=0A>>delivering what should be sent via a request header field. Infri=
nging on=0A>>a service's namespace is always a bad idea, no matter what pre=
fix we put=0A>>next to it.=0A>>=0A>>EHL=0A>>=0A>>From: "William J. Mills"=
=0A>><wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>=0A>>Reply-To: "Wil=
liam J. Mills"=0A>><wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>=0A>>=
Date: Tue, 8 Mar 2011 10:11:46 -0700=0A>>To: Justin Richer <jricher@mitre.o=
rg<mailto:jricher@mitre.org>>=0A>>Cc: OAuth WG <oauth@ietf.org<mailto:oauth=
@ietf.org>>=0A>>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft=0A>>=0A>>S=
o is a different namespace for each new mechanism right, or should a=0A>>pa=
rameter be added to parallel the authorization scheme name? =A0Seems like=
=0A>>it would be clean to define oauth_scheme and use the same value as=0A>=
>defined for the auth scheme name.=0A>>=0A>>_______________________________=
_=0A>>From: Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>>=0A>=
>To: William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>=
=0A>>Cc: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>; OAuth W=
G=0A>><oauth@ietf.org<mailto:oauth@ietf.org>>=0A>>Sent: Tuesday, March 8, 2=
011 8:41 AM=0A>>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft=0A>>=0A>>I=
 don't understand this comment. If you're using query/form parameters,=0A>>=
there are no schemes involved in the process.=0A>>=0A>>-- Justin=0A>>=0A>>=
=0A>>On Tue, 2011-03-08 at 11:27 -0500, William J. Mills wrote:=0A>>> A maj=
or difference is now there is a scheme name that is=0A>>> differentiating. =
=A0You no longer have to parse the entire variable set=0A>>> to figure out =
what is going on. =A0Now the scheme name determines=0A>>> things. =A0Now th=
at we have schemes I don't see re-using parameter names=0A>>> as a problem.=
=0A>>>=0A>>>=0A>>>=0A>>>=0A>>> ____________________________________________=
__________________________=0A>>> From: Justin Richer <jricher@mitre.org<mai=
lto:jricher@mitre.org>>=0A>>> To: Brian Eaton <beaton@google.com<mailto:bea=
ton@google.com>>=0A>>> Cc: OAuth WG <oauth@ietf.org<mailto:oauth@ietf.org>>=
=0A>>> Sent: Tuesday, March 8, 2011 7:11 AM=0A>>> Subject: Re: [OAUTH-WG] O=
Auth Bearer Token draft=0A>>>=0A>>> Very strongly agree, repeat my suggesti=
on to name the parameter=0A>>> "oauth2_token".=0A>>>=0A>>> -- Justin=0A>>>=
=0A>>> On Fri, 2011-02-25 at 14:49 -0500, Brian Eaton wrote:=0A>>> > My two=
 cents:=0A>>> >=0A>>> > We've already taken three user visible outages beca=
use the OAuth2=0A>>> spec=0A>>> > reused the "oauth_token" parameter in a w=
ay that was not compatible=0A>>> > with the OAuth1 spec.=0A>>> >=0A>>> > Lu=
ckily they were all caught before they caused serious damage.=0A>>> >=0A>>>=
 > Generic parameter names are not useful. =A0They lead to confused=0A>>> >=
 developers and confused code. =A0If code needs to treat the values=0A>>> >=
 differently, the names should be different as well.=0A>>> >=0A>>> > Cheers=
,=0A>>> > Brian=0A>>> >=0A>>> > On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt=
=0A>>><phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>=0A>>> wrote:=0A>>=
> > > There was some discussion on the type for the authorization header=0A=
>>> being=0A>>> > > OAUTH / MAC / BEARER etc. Did we have a resolution?=0A>=
>> > > As for section 2.2 and 2.3, should we not have a more neutral=0A>>> =
solution as=0A>>> > > well and use "authorization_token" instead of oauth_t=
oken. The=0A>>> idea is that=0A>>> > > the parameter corresponds to the aut=
horization header and NOT the=0A>>> value of=0A>>> > > it. The value of suc=
h a parameter an be an encoded value that=0A>>> corresponds to=0A>>> > > th=
e authorization header. =A0For example:=0A>>> > > GET /resource?authorizati=
on_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host:=0A>>> > > server.example.com=0A=
>>> > > instead of=0A>>> > > GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.=
1 Host:=0A>>> server.example.com=0A>>> > > The concern is that if for some =
reason you switch to "MAC" tokens,=0A>>> then you=0A>>> > > have to change =
parameter names. Why not keep them consistent?=0A>>> > > Apologies if this =
was already resolved.=0A>>> > > Phil=0A>>> > > phil.hunt@oracle.com<mailto:=
phil.hunt@oracle.com>=0A>>> > >=0A>>> > >=0A>>> > >=0A>>> > >=0A>>> > > ___=
____________________________________________=0A>>> > > OAuth mailing list=
=0A>>> > > OAuth@ietf.org<mailto:OAuth@ietf.org>=0A>>> > > https://www.ietf=
.org/mailman/listinfo/oauth=0A>>> > >=0A>>> > >=0A>>> > ___________________=
____________________________=0A>>> > OAuth mailing list=0A>>> > OAuth@ietf.=
org<mailto:OAuth@ietf.org>=0A>>> > https://www.ietf.org/mailman/listinfo/oa=
uth=0A>>>=0A>>>=0A>>> _______________________________________________=0A>>>=
 OAuth mailing list=0A>>> OAuth@ietf.org<mailto:OAuth@ietf.org>=0A>>> https=
://www.ietf.org/mailman/listinfo/oauth=0A>>>=0A>>>=0A>>>=0A>>>=0A>>=0A>>=0A=
>>=0A>>=0A>>=0A>=0A> _______________________________________________=0A> OA=
uth mailing list=0A> OAuth@ietf.org=0A> https://www.ietf.org/mailman/listin=
fo/oauth=0A>=0A=0A=0A      
--0-1602634214-1299646199=:55268
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:ti=
mes new roman, new york, times, serif;font-size:12pt"><div><span>Is there r=
eally a need going forward for anything beyond using the Authorization head=
er?&nbsp;&nbsp; Do we have clients out there that just can't set that heade=
r?&nbsp; Putting bearer tokens in query arguments is a very bad idea for ma=
ny reasons, and in form variables has it's own set of badness (although not=
 to the same level).</span></div><div style=3D"color: rgb(0, 0, 0); font-si=
ze: 16px; font-family: times new roman,new york,times,serif; background-col=
or: transparent; font-style: normal;"><br><span></span></div><div style=3D"=
color: rgb(0, 0, 0); font-size: 16px; font-family: times new roman,new york=
,times,serif; background-color: transparent; font-style: normal;"><span>-bi=
ll<br></span></div><div><br></div><div style=3D"font-family: times new roma=
n,new york,times,serif; font-size: 12pt;"><div style=3D"font-family: times =
new
 roman,new york,times,serif; font-size: 12pt;"><font size=3D"2" face=3D"Ari=
al"><hr size=3D"1"><b><span style=3D"font-weight: bold;">From:</span></b> B=
rian Eaton &lt;beaton@google.com&gt;<br><b><span style=3D"font-weight: bold=
;">To:</span></b> "Richer, Justin P." &lt;jricher@mitre.org&gt;<br><b><span=
 style=3D"font-weight: bold;">Cc:</span></b> Eran Hammer-Lahav &lt;eran@hue=
niverse.com&gt;; William J. Mills &lt;wmills@yahoo-inc.com&gt;; OAuth WG &l=
t;oauth@ietf.org&gt;<br><b><span style=3D"font-weight: bold;">Sent:</span><=
/b> Tuesday, March 8, 2011 6:25 PM<br><b><span style=3D"font-weight: bold;"=
>Subject:</span></b> Re: [OAUTH-WG] OAuth Bearer Token draft<br></font><br>=
 =0AThis has been proven true in our deployment as well.<br><br>On Tue, Mar=
 8, 2011 at 4:16 PM, Richer, Justin P. &lt;<a ymailto=3D"mailto:jricher@mit=
re.org" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt; wrote:<=
br>&gt; I simply don't agree that there's much difference in practice for m=
any people.<br>&gt;<br>&gt; &nbsp;-- justin<br>&gt; _______________________=
_________________<br>&gt; From: Eran Hammer-Lahav [<a ymailto=3D"mailto:era=
n@hueniverse.com" href=3D"mailto:eran@hueniverse.com">eran@hueniverse.com</=
a>]<br>&gt; Sent: Tuesday, March 08, 2011 7:08 PM<br>&gt; To: Richer, Justi=
n P.; William J. Mills<br>&gt; Cc: OAuth WG<br>&gt; Subject: Re: [OAUTH-WG]=
 OAuth Bearer Token draft<br>&gt;<br>&gt; No.<br>&gt;<br>&gt; There is a hu=
ge difference between adding parameters to protected<br>&gt; resources and =
defining parameter for OAuth specific endpoints (which may<br>&gt; create c=
onflicts with existing frameworks).<br>&gt;<br>&gt; One is an invasion of t=
he
 provider's namespace where OAuth has no business<br>&gt; messing around. T=
he other is a potential deployment issue.<br>&gt;<br>&gt; EHL<br>&gt;<br>&g=
t;<br>&gt; On 3/8/11 3:48 PM, "Richer, Justin P." &lt;<a ymailto=3D"mailto:=
jricher@mitre.org" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&=
gt; wrote:<br>&gt;<br>&gt;&gt;Except that we're also infringing on service =
provider namespaces for our<br>&gt;&gt;other endpoints as well. Not every s=
ervice provider can or will create a<br>&gt;&gt;pristine endpoint for token=
s or authorizations, but this working group<br>&gt;&gt;has had no problems =
putting all kinds of parameters into that space.<br>&gt;&gt;Unless we want =
to say that we can't use query or form parameters in<br>&gt;&gt;specificati=
ons ever again, this argument doesn't really hold up.<br>&gt;&gt;<br>&gt;&g=
t; -- Justin<br>&gt;&gt;________________________________________<br>&gt;&gt=
;From: Eran Hammer-Lahav [<a ymailto=3D"mailto:eran@hueniverse.com"
 href=3D"mailto:eran@hueniverse.com">eran@hueniverse.com</a>]<br>&gt;&gt;Se=
nt: Tuesday, March 08, 2011 1:02 PM<br>&gt;&gt;To: William J. Mills; Richer=
, Justin P.<br>&gt;&gt;Cc: OAuth WG<br>&gt;&gt;Subject: Re: [OAUTH-WG] OAut=
h Bearer Token draft<br>&gt;&gt;<br>&gt;&gt;I hope this will be the last ti=
me we define a query parameter for<br>&gt;&gt;delivering what should be sen=
t via a request header field. Infringing on<br>&gt;&gt;a service's namespac=
e is always a bad idea, no matter what prefix we put<br>&gt;&gt;next to it.=
<br>&gt;&gt;<br>&gt;&gt;EHL<br>&gt;&gt;<br>&gt;&gt;From: "William J. Mills"=
<br>&gt;&gt;&lt;<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:w=
mills@yahoo-inc.com">wmills@yahoo-inc.com</a>&lt;mailto:<a ymailto=3D"mailt=
o:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-i=
nc.com</a>&gt;&gt;<br>&gt;&gt;Reply-To: "William J. Mills"<br>&gt;&gt;&lt;<=
a ymailto=3D"mailto:wmills@yahoo-inc.com"
 href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&lt;mailto:<a=
 ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.co=
m">wmills@yahoo-inc.com</a>&gt;&gt;<br>&gt;&gt;Date: Tue, 8 Mar 2011 10:11:=
46 -0700<br>&gt;&gt;To: Justin Richer &lt;<a ymailto=3D"mailto:jricher@mitr=
e.org" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&lt;mailto:<a=
 ymailto=3D"mailto:jricher@mitre.org" href=3D"mailto:jricher@mitre.org">jri=
cher@mitre.org</a>&gt;&gt;<br>&gt;&gt;Cc: OAuth WG &lt;<a ymailto=3D"mailto=
:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&lt;mailt=
o:<a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth=
@ietf.org</a>&gt;&gt;<br>&gt;&gt;Subject: Re: [OAUTH-WG] OAuth Bearer Token=
 draft<br>&gt;&gt;<br>&gt;&gt;So is a different namespace for each new mech=
anism right, or should a<br>&gt;&gt;parameter be added to parallel the auth=
orization scheme name? &nbsp;Seems like<br>&gt;&gt;it would be clean to def=
ine
 oauth_scheme and use the same value as<br>&gt;&gt;defined for the auth sch=
eme name.<br>&gt;&gt;<br>&gt;&gt;________________________________<br>&gt;&g=
t;From: Justin Richer &lt;<a ymailto=3D"mailto:jricher@mitre.org" href=3D"m=
ailto:jricher@mitre.org">jricher@mitre.org</a>&lt;mailto:<a ymailto=3D"mail=
to:jricher@mitre.org" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</=
a>&gt;&gt;<br>&gt;&gt;To: William J. Mills &lt;<a ymailto=3D"mailto:wmills@=
yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a=
>&lt;mailto:<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmill=
s@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;&gt;<br>&gt;&gt;Cc: Brian Eato=
n &lt;<a ymailto=3D"mailto:beaton@google.com" href=3D"mailto:beaton@google.=
com">beaton@google.com</a>&lt;mailto:<a ymailto=3D"mailto:beaton@google.com=
" href=3D"mailto:beaton@google.com">beaton@google.com</a>&gt;&gt;; OAuth WG=
<br>&gt;&gt;&lt;<a ymailto=3D"mailto:oauth@ietf.org"
 href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&lt;mailto:<a ymailto=3D"=
mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt=
;&gt;<br>&gt;&gt;Sent: Tuesday, March 8, 2011 8:41 AM<br>&gt;&gt;Subject: R=
e: [OAUTH-WG] OAuth Bearer Token draft<br>&gt;&gt;<br>&gt;&gt;I don't under=
stand this comment. If you're using query/form parameters,<br>&gt;&gt;there=
 are no schemes involved in the process.<br>&gt;&gt;<br>&gt;&gt;-- Justin<b=
r>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt;On Tue, 2011-03-08 at 11:27 -0500, Willia=
m J. Mills wrote:<br>&gt;&gt;&gt; A major difference is now there is a sche=
me name that is<br>&gt;&gt;&gt; differentiating. &nbsp;You no longer have t=
o parse the entire variable set<br>&gt;&gt;&gt; to figure out what is going=
 on. &nbsp;Now the scheme name determines<br>&gt;&gt;&gt; things. &nbsp;Now=
 that we have schemes I don't see re-using parameter names<br>&gt;&gt;&gt; =
as a
 problem.<br>&gt;&gt;&gt;<br>&gt;&gt;&gt;<br>&gt;&gt;&gt;<br>&gt;&gt;&gt;<b=
r>&gt;&gt;&gt; ____________________________________________________________=
__________<br>&gt;&gt;&gt; From: Justin Richer &lt;<a ymailto=3D"mailto:jri=
cher@mitre.org" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&lt;=
mailto:<a ymailto=3D"mailto:jricher@mitre.org" href=3D"mailto:jricher@mitre=
.org">jricher@mitre.org</a>&gt;&gt;<br>&gt;&gt;&gt; To: Brian Eaton &lt;<a =
ymailto=3D"mailto:beaton@google.com" href=3D"mailto:beaton@google.com">beat=
on@google.com</a>&lt;mailto:<a ymailto=3D"mailto:beaton@google.com" href=3D=
"mailto:beaton@google.com">beaton@google.com</a>&gt;&gt;<br>&gt;&gt;&gt; Cc=
: OAuth WG &lt;<a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ie=
tf.org">oauth@ietf.org</a>&lt;mailto:<a ymailto=3D"mailto:oauth@ietf.org" h=
ref=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;&gt;<br>&gt;&gt;&gt; Se=
nt: Tuesday, March 8, 2011 7:11 AM<br>&gt;&gt;&gt; Subject: Re: [OAUTH-WG] =
OAuth Bearer
 Token draft<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; Very strongly agree, repeat my=
 suggestion to name the parameter<br>&gt;&gt;&gt; "oauth2_token".<br>&gt;&g=
t;&gt;<br>&gt;&gt;&gt; -- Justin<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; On Fri, 20=
11-02-25 at 14:49 -0500, Brian Eaton wrote:<br>&gt;&gt;&gt; &gt; My two cen=
ts:<br>&gt;&gt;&gt; &gt;<br>&gt;&gt;&gt; &gt; We've already taken three use=
r visible outages because the OAuth2<br>&gt;&gt;&gt; spec<br>&gt;&gt;&gt; &=
gt; reused the "oauth_token" parameter in a way that was not compatible<br>=
&gt;&gt;&gt; &gt; with the OAuth1 spec.<br>&gt;&gt;&gt; &gt;<br>&gt;&gt;&gt=
; &gt; Luckily they were all caught before they caused serious damage.<br>&=
gt;&gt;&gt; &gt;<br>&gt;&gt;&gt; &gt; Generic parameter names are not usefu=
l. &nbsp;They lead to confused<br>&gt;&gt;&gt; &gt; developers and confused=
 code. &nbsp;If code needs to treat the values<br>&gt;&gt;&gt; &gt; differe=
ntly, the names should be different as well.<br>&gt;&gt;&gt;
 &gt;<br>&gt;&gt;&gt; &gt; Cheers,<br>&gt;&gt;&gt; &gt; Brian<br>&gt;&gt;&g=
t; &gt;<br>&gt;&gt;&gt; &gt; On Fri, Feb 25, 2011 at 11:38 AM, Phil Hunt<br=
>&gt;&gt;&gt;&lt;<a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:=
phil.hunt@oracle.com">phil.hunt@oracle.com</a>&lt;mailto:<a ymailto=3D"mail=
to:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@ora=
cle.com</a>&gt;&gt;<br>&gt;&gt;&gt; wrote:<br>&gt;&gt;&gt; &gt; &gt; There =
was some discussion on the type for the authorization header<br>&gt;&gt;&gt=
; being<br>&gt;&gt;&gt; &gt; &gt; OAUTH / MAC / BEARER etc. Did we have a r=
esolution?<br>&gt;&gt;&gt; &gt; &gt; As for section 2.2 and 2.3, should we =
not have a more neutral<br>&gt;&gt;&gt; solution as<br>&gt;&gt;&gt; &gt; &g=
t; well and use "authorization_token" instead of oauth_token. The<br>&gt;&g=
t;&gt; idea is that<br>&gt;&gt;&gt; &gt; &gt; the parameter corresponds to =
the authorization header and NOT the<br>&gt;&gt;&gt; value
 of<br>&gt;&gt;&gt; &gt; &gt; it. The value of such a parameter an be an en=
coded value that<br>&gt;&gt;&gt; corresponds to<br>&gt;&gt;&gt; &gt; &gt; t=
he authorization header. &nbsp;For example:<br>&gt;&gt;&gt; &gt; &gt; GET /=
resource?authorization_token=3DBEARER+vF9dft4qmT HTTP/1.1 Host:<br>&gt;&gt;=
&gt; &gt; &gt; <a target=3D"_blank" href=3D"http://server.example.com">serv=
er.example.com</a><br>&gt;&gt;&gt; &gt; &gt; instead of<br>&gt;&gt;&gt; &gt=
; &gt; GET /resource?oauth_token=3DvF9dft4qmT HTTP/1.1 Host:<br>&gt;&gt;&gt=
; server.example.com<br>&gt;&gt;&gt; &gt; &gt; The concern is that if for s=
ome reason you switch to "MAC" tokens,<br>&gt;&gt;&gt; then you<br>&gt;&gt;=
&gt; &gt; &gt; have to change parameter names. Why not keep them consistent=
?<br>&gt;&gt;&gt; &gt; &gt; Apologies if this was already resolved.<br>&gt;=
&gt;&gt; &gt; &gt; Phil<br>&gt;&gt;&gt; &gt; &gt; <a ymailto=3D"mailto:phil=
.hunt@oracle.com"
 href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&lt;mailto:<a=
 ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.co=
m">phil.hunt@oracle.com</a>&gt;<br>&gt;&gt;&gt; &gt; &gt;<br>&gt;&gt;&gt; &=
gt; &gt;<br>&gt;&gt;&gt; &gt; &gt;<br>&gt;&gt;&gt; &gt; &gt;<br>&gt;&gt;&gt=
; &gt; &gt; _______________________________________________<br>&gt;&gt;&gt;=
 &gt; &gt; OAuth mailing list<br>&gt;&gt;&gt; &gt; &gt; <a ymailto=3D"mailt=
o:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a>&lt;mail=
to:<a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAut=
h@ietf.org</a>&gt;<br>&gt;&gt;&gt; &gt; &gt; <a href=3D"https://www.ietf.or=
g/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/li=
stinfo/oauth</a><br>&gt;&gt;&gt; &gt; &gt;<br>&gt;&gt;&gt; &gt; &gt;<br>&gt=
;&gt;&gt; &gt; _______________________________________________<br>&gt;&gt;&=
gt; &gt; OAuth mailing list<br>&gt;&gt;&gt; &gt; <a ymailto=3D"mailto:OAuth=
@ietf.org"
 href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a>&lt;mailto:<a ymailto=3D"=
mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a>&gt=
;<br>&gt;&gt;&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oau=
th" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&g=
t;&gt;&gt;<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; ________________________________=
_______________<br>&gt;&gt;&gt; OAuth mailing list<br>&gt;&gt;&gt; <a ymail=
to=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org<=
/a>&lt;mailto:<a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@iet=
f.org">OAuth@ietf.org</a>&gt;<br>&gt;&gt;&gt; <a href=3D"https://www.ietf.o=
rg/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/l=
istinfo/oauth</a><br>&gt;&gt;&gt;<br>&gt;&gt;&gt;<br>&gt;&gt;&gt;<br>&gt;&g=
t;&gt;<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt;<br>&gt;<=
br>&gt; _______________________________________________<br>&gt; OAuth maili=
ng list<br>&gt;
 <a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@=
ietf.org</a><br>&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt;=
<br><br></div></div></div><br>=0A=0A      </body></html>
--0-1602634214-1299646199=:55268--

From torsten@lodderstedt.net  Wed Mar  9 12:44:27 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 774C83A6AC3 for <oauth@core3.amsl.com>; Wed,  9 Mar 2011 12:44:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.211
X-Spam-Level: 
X-Spam-Status: No, score=-2.211 tagged_above=-999 required=5 tests=[AWL=0.038,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mp7jAvm6Kaow for <oauth@core3.amsl.com>; Wed,  9 Mar 2011 12:44:26 -0800 (PST)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.31.39]) by core3.amsl.com (Postfix) with ESMTP id A1AEF3A6ABE for <oauth@ietf.org>; Wed,  9 Mar 2011 12:44:25 -0800 (PST)
Received: from [79.253.32.99] (helo=[192.168.71.26]) by smtprelay01.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1PxQGK-0000vh-EJ; Wed, 09 Mar 2011 21:45:40 +0100
Message-ID: <4D77E6F5.2060003@lodderstedt.net>
Date: Wed, 09 Mar 2011 21:45:41 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Phil Hunt <phil.hunt@oracle.com>
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com>
In-Reply-To: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2011 20:44:27 -0000

Hi Phil,

that's great help for anyone looking for advice how to use OAuth.

One remark: In my opinion, the decision process for authorization code 
vs. implicit grant involves more parameters.

refresh token required? --> authz code
client in question is a web application? --> authz code
client in question is a JavaScript app? --> implicit grant
client authentication required --> authz code
else --> implicit grant

regards,
Torsten.

Am 22.02.2011 01:45, schrieb Phil Hunt:
> FYI. I published a blog post with a flow-chart explaining the legs of OAuth.
> http://independentidentity.blogspot.com/2011/02/does-oauth-have-legs.html
>
> Please let me know if any corrections should be made, or for that matter, any improvements!
>
> Phil
> phil.hunt@oracle.com
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From phil.hunt@oracle.com  Wed Mar  9 13:01:01 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DD9F13A6AD2 for <oauth@core3.amsl.com>; Wed,  9 Mar 2011 13:01:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.506
X-Spam-Level: 
X-Spam-Status: No, score=-6.506 tagged_above=-999 required=5 tests=[AWL=0.093,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NyPXm+3sDm2U for <oauth@core3.amsl.com>; Wed,  9 Mar 2011 13:01:01 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 3A8BB3A6943 for <oauth@ietf.org>; Wed,  9 Mar 2011 13:01:00 -0800 (PST)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p29L2FiG010038 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 9 Mar 2011 21:02:16 GMT
Received: from acsmt355.oracle.com (acsmt355.oracle.com [141.146.40.155]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p29EJHWO019534; Wed, 9 Mar 2011 21:02:14 GMT
Received: from abhmt019.oracle.com by acsmt354.oracle.com with ESMTP id 1073085251299704529; Wed, 09 Mar 2011 13:02:09 -0800
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 09 Mar 2011 13:02:08 -0800
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <4D77E6F5.2060003@lodderstedt.net>
Date: Wed, 9 Mar 2011 13:02:07 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <36FA5946-EF9B-4212-ADB5-BF762EA6827A@oracle.com>
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com> <4D77E6F5.2060003@lodderstedt.net>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: Apple Mail (2.1082)
X-Source-IP: acsmt355.oracle.com [141.146.40.155]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A0B0209.4D77EAD7.000C,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2011 21:01:01 -0000

Torsten,

Thanks!  Yes...I kind of omitted some of the flow decisions to keep the =
diagram simpler.

I also note that there has been quite a lot of discussion on the =
pre-ambles to Implicit grant, etc.

That said, I'm not sure I like binding application type (web app, =
javascript app) to a particular flow. Some have said that the spec =
shouldn't deal in best-practices (what flow should be used by specific =
client types) as much as just focusing on the normative requirements for =
each flow type.=20
It seems conceivable to me that people will come up with new scenarios =
that don't fit the current definitions and the spec will 'break'.=20

With that  in mind, the only real difference I saw between 4.1 and 4.2 =
was one had client auth and an extra step, and while implicit did 2 =
steps at once with only user authentication as a requirement.

Though this has been discussed on another thread and I'll probably =
update once a decision is made (draft 14?).

Phil
phil.hunt@oracle.com




On 2011-03-09, at 12:45 PM, Torsten Lodderstedt wrote:

> Hi Phil,
>=20
> that's great help for anyone looking for advice how to use OAuth.
>=20
> One remark: In my opinion, the decision process for authorization code =
vs. implicit grant involves more parameters.
>=20
> refresh token required? --> authz code
> client in question is a web application? --> authz code
> client in question is a JavaScript app? --> implicit grant
> client authentication required --> authz code
> else --> implicit grant
>=20
> regards,
> Torsten.
>=20
> Am 22.02.2011 01:45, schrieb Phil Hunt:
>> FYI. I published a blog post with a flow-chart explaining the legs of =
OAuth.
>> =
http://independentidentity.blogspot.com/2011/02/does-oauth-have-legs.html
>>=20
>> Please let me know if any corrections should be made, or for that =
matter, any improvements!
>>=20
>> Phil
>> phil.hunt@oracle.com
>>=20
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From phil.hunt@oracle.com  Wed Mar  9 22:21:55 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D49C83A68BF for <oauth@core3.amsl.com>; Wed,  9 Mar 2011 22:21:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.203
X-Spam-Level: 
X-Spam-Status: No, score=-5.203 tagged_above=-999 required=5 tests=[AWL=0.001,  BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3fO89n4GkN2i for <oauth@core3.amsl.com>; Wed,  9 Mar 2011 22:21:53 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 6FC373A682D for <oauth@ietf.org>; Wed,  9 Mar 2011 22:21:53 -0800 (PST)
Received: from rcsinet13.oracle.com (rcsinet13.oracle.com [148.87.113.125]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2A6N84A019023 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <oauth@ietf.org>; Thu, 10 Mar 2011 06:23:09 GMT
Received: from acsmt353.oracle.com (acsmt353.oracle.com [141.146.40.153]) by rcsinet13.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2A4xRYK029205 for <oauth@ietf.org>; Thu, 10 Mar 2011 06:23:07 GMT
Received: from abhmt002.oracle.com by acsmt355.oracle.com with ESMTP id 1125036631299738135; Wed, 09 Mar 2011 22:22:15 -0800
Received: from [25.65.223.104] (/74.198.150.232) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 09 Mar 2011 22:22:15 -0800
From: Phillip Hunt <phil.hunt@oracle.com>
Content-Type: text/plain; charset=us-ascii
X-Mailer: iPhone Mail (8C148a)
Message-Id: <B19F5D82-F81A-4E3C-B006-3BC6C4FEC067@oracle.com>
Date: Wed, 9 Mar 2011 22:22:08 -0800
To: OAuth WG <oauth@ietf.org>
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (iPhone Mail 8C148a)
X-Source-IP: acsmt353.oracle.com [141.146.40.153]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090203.4D786E4B.02CC,ss=1,fgs=0
Subject: [OAUTH-WG] Lightweight web services
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 06:21:56 -0000

Thoughts on what makes up "lightweight web services" of which OAuth2 plays a=
 key role.=20

http://independentidentity.blogspot.com/2011/03/lightweight-web-services.htm=
l

Comments welcomed.=20

Phil

Sent from my phone.=20=

From lr@lukasrosenstock.net  Thu Mar 10 08:48:31 2011
Return-Path: <lr@lukasrosenstock.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F36F03A68C1 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 08:48:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.976
X-Spam-Level: 
X-Spam-Status: No, score=-2.976 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wIz8gIELiPkL for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 08:48:30 -0800 (PST)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by core3.amsl.com (Postfix) with ESMTP id 1432C3A6915 for <oauth@ietf.org>; Thu, 10 Mar 2011 08:48:29 -0800 (PST)
Received: by yxk30 with SMTP id 30so978195yxk.31 for <oauth@ietf.org>; Thu, 10 Mar 2011 08:49:47 -0800 (PST)
MIME-Version: 1.0
Received: by 10.236.180.69 with SMTP id i45mr941303yhm.32.1299775787401; Thu, 10 Mar 2011 08:49:47 -0800 (PST)
Received: by 10.146.168.16 with HTTP; Thu, 10 Mar 2011 08:49:47 -0800 (PST)
X-Originating-IP: [134.176.178.92]
In-Reply-To: <42514.55268.qm@web32303.mail.mud.yahoo.com>
References: <42514.55268.qm@web32303.mail.mud.yahoo.com>
Date: Thu, 10 Mar 2011 17:49:47 +0100
Message-ID: <AANLkTiktHjK1x2tuBFvftO41uLpj9U5rNuxRC1aT1LrP@mail.gmail.com>
From: Lukas Rosenstock <lr@lukasrosenstock.net>
To: "William J. Mills" <wmills@yahoo-inc.com>
Content-Type: multipart/alternative; boundary=20cf305641fd1882de049e23a294
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 16:48:31 -0000

--20cf305641fd1882de049e23a294
Content-Type: text/plain; charset=ISO-8859-1

JSON-P (callback) works with <script> tags where no parameters can be set;
this is used a lot in web applications that want to consume 3rd party APIs
directly on the client side. So, yes, an alternative for the Authorization
header is required - a.f.a.i.k this use case was one of the driving forces
behind WRAP and bearer tokens.

2011/3/9 William J. Mills <wmills@yahoo-inc.com>

> Is there really a need going forward for anything beyond using the
> Authorization header?   Do we have clients out there that just can't set
> that header?  Putting bearer tokens in query arguments is a very bad idea
> for many reasons, and in form variables has it's own set of badness
> (although not to the same level).
>
> -bill
>

--20cf305641fd1882de049e23a294
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

JSON-P (callback) works with &lt;script&gt; tags where no parameters can be=
 set; this is used a lot in web applications that want to consume 3rd party=
 APIs directly on the client side. So, yes, an alternative for the Authoriz=
ation header is required - a.f.a.i.k this use case was one of the driving f=
orces behind WRAP and bearer tokens.<br>
<br><div class=3D"gmail_quote">2011/3/9 William J. Mills <span dir=3D"ltr">=
&lt;<a href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;</s=
pan><br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border=
-left:1px #ccc solid;padding-left:1ex;">
<div><div style=3D"color:#000;background-color:#fff;font-family:times new r=
oman, new york, times, serif;font-size:12pt"><div><span>Is there really a n=
eed going forward for anything beyond using the Authorization header?=A0=A0=
 Do we have clients out there that just can&#39;t set that header?=A0 Putti=
ng bearer tokens in query arguments is a very bad idea for many reasons, an=
d in form variables has it&#39;s own set of badness (although not to the sa=
me level).</span></div>
<div style=3D"color:rgb(0, 0, 0);font-size:16px;font-family:times new roman=
,new york,times,serif;background-color:transparent;font-style:normal"><br><=
span></span></div><div style=3D"color:rgb(0, 0, 0);font-size:16px;font-fami=
ly:times new roman,new york,times,serif;background-color:transparent;font-s=
tyle:normal">
<span>-bill</span></div></div></div></blockquote></div><br>

--20cf305641fd1882de049e23a294--

From jricher@mitre.org  Thu Mar 10 09:47:47 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 600003A6859 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 09:47:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ETSVJ6BBNNZD for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 09:47:46 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 5BAC93A6810 for <oauth@ietf.org>; Thu, 10 Mar 2011 09:47:46 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 1E36221B0EBE; Thu, 10 Mar 2011 12:49:04 -0500 (EST)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 1682D21B0EBA; Thu, 10 Mar 2011 12:49:04 -0500 (EST)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub2.MITRE.ORG ([129.83.29.74]) with mapi; Thu, 10 Mar 2011 12:49:03 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Lukas Rosenstock <lr@lukasrosenstock.net>, "William J. Mills" <wmills@yahoo-inc.com>
Date: Thu, 10 Mar 2011 12:46:52 -0500
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvfQyrDfLkCJlgLRgizMq8QQCaohwAB/l0X
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AB@IMCMBX3.MITRE.ORG>
References: <42514.55268.qm@web32303.mail.mud.yahoo.com>, <AANLkTiktHjK1x2tuBFvftO41uLpj9U5rNuxRC1aT1LrP@mail.gmail.com>
In-Reply-To: <AANLkTiktHjK1x2tuBFvftO41uLpj9U5rNuxRC1aT1LrP@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 17:47:47 -0000

Yes, there are many development setups where all you can reasonably access =
is the URL to get. It's also much simpler to make use of the well-supported=
 syntax helpers for query parameters instead of relying on new, custom form=
atting for newly-defined headers. The bearer token makes this simple by jus=
t having the value of the token, but other schemes have their own name/valu=
e pair formats and encodings that will inevitably cause hiccups.

 -- Justin
________________________________________
From: Lukas Rosenstock [lr@lukasrosenstock.net]
Sent: Thursday, March 10, 2011 11:49 AM
To: William J. Mills
Cc: Brian Eaton; Richer, Justin P.; OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

JSON-P (callback) works with <script> tags where no parameters can be set; =
this is used a lot in web applications that want to consume 3rd party APIs =
directly on the client side. So, yes, an alternative for the Authorization =
header is required - a.f.a.i.k this use case was one of the driving forces =
behind WRAP and bearer tokens.

2011/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com=
>>
Is there really a need going forward for anything beyond using the Authoriz=
ation header?   Do we have clients out there that just can't set that heade=
r?  Putting bearer tokens in query arguments is a very bad idea for many re=
asons, and in form variables has it's own set of badness (although not to t=
he same level).

-bill


From wmills@yahoo-inc.com  Thu Mar 10 09:58:48 2011
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3448F3A65A6 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 09:58:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AW9D0Rf4v-Nm for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 09:58:46 -0800 (PST)
Received: from web32309.mail.mud.yahoo.com (web32309.mail.mud.yahoo.com [68.142.207.157]) by core3.amsl.com (Postfix) with SMTP id 56C633A68EE for <oauth@ietf.org>; Thu, 10 Mar 2011 09:58:46 -0800 (PST)
Received: (qmail 61849 invoked by uid 60001); 10 Mar 2011 17:59:59 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1299779999; bh=OfPnZg6NjiwaHkdvDCoyQTLqwPN3DvIB2bBOO+zoPsc=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=ON+E/Gp4567nLa7oj3K9cpG2XcWK3+L0hRnCC18clxtqFGYBNMEkUnucF6jLP6MbO4s9CwGXDUYs32hiqv3yLbjO1U0fS0gVT+jKDUlzfsf7mrO2bTIYqDAL9jQ9Wt4ox6fQ8B5GNcG7BvZkvohb2QfHPwzQIgLipt6MX4Q+FXw=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=ByRcYtPG0suLVkZya+mC90DXTmSOVZYPuDtgC8BkFcZb40EDjkK57dUWca1Ei3GA329BzYtyllaNNUvwq98Llc9xvxieiPgKBcSizaOcDj0HCa/xisE15BjiD1f/9DKMMndvq2WY4i65hkLDtotOZBClEsxiPGdvORGD80L64zs=;
Message-ID: <288129.60351.qm@web32309.mail.mud.yahoo.com>
X-YMail-OSG: RsGwCZcVM1lYcOCXBqwHmWKqiuwW1sEcKDRrWi23ixvcN1t lJBrwRcvBAkvjMj_t1Bh7zfVm9YvIHXyskhfycsOs8wvKqwcq0zgamndVs0h G.Ib6pZXyn_9VwZYfsWydNbhoIiJ2s5plADdqsUyApnp20UGkFyOWXalWj5X oezZGXUX7iVs1PaOeur0SBpGR.CQsp5Z8a_.XSWoPp4SKCQ0opXg4NX9rhKU ntN.l6mWqvKPHJfASPrYzd8_1aRtnrrpey0Tz6.grzrSjLPE0vFLhEs_c8Uw HGMUJ.cJe7OMhjJV361e3.Zd5ng--
Received: from [99.31.212.42] by web32309.mail.mud.yahoo.com via HTTP; Thu, 10 Mar 2011 09:59:59 PST
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.109.292656
Date: Thu, 10 Mar 2011 09:59:59 -0800 (PST)
From: "William J. Mills" <wmills@yahoo-inc.com>
To: "Richer, Justin P." <jricher@mitre.org>, Lukas Rosenstock <lr@lukasrosenstock.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1539439009-1299779999=:60351"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 17:58:48 -0000

--0-1539439009-1299779999=:60351
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Yeah, but there are serious security problems with credentials in the URL, =
is it really worth it in light of those problems?=0A=0A=0A=0A______________=
__________________=0AFrom: "Richer, Justin P." <jricher@mitre.org>=0ATo: Lu=
kas Rosenstock <lr@lukasrosenstock.net>; William J. Mills <wmills@yahoo-inc=
.com>=0ACc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>=0ASe=
nt: Thursday, March 10, 2011 9:49 AM=0ASubject: RE: [OAUTH-WG] OAuth Bearer=
 Token draft=0A=0AYes, there are many development setups where all you can =
reasonably access is the URL to get. It's also much simpler to make use of =
the well-supported syntax helpers for query parameters instead of relying o=
n new, custom formatting for newly-defined headers. The bearer token makes =
this simple by just having the value of the token, but other schemes have t=
heir own name/value pair formats and encodings that will inevitably cause h=
iccups.=0A=0A-- Justin=0A________________________________________=0AFrom: L=
ukas Rosenstock [lr@lukasrosenstock.net]=0ASent: Thursday, March 10, 2011 1=
1:49 AM=0ATo: William J. Mills=0ACc: Brian Eaton; Richer, Justin P.; OAuth =
WG=0ASubject: Re: [OAUTH-WG] OAuth Bearer Token draft=0A=0AJSON-P (callback=
) works with <script> tags where no parameters can be set; this is used a l=
ot in web applications that want to consume 3rd party APIs directly on the =
client side. So, yes, an alternative for the Authorization header is requir=
ed - a.f.a.i.k this use case was one of the driving forces behind WRAP and =
bearer tokens.=0A=0A2011/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:=
wmills@yahoo-inc.com>>=0AIs there really a need going forward for anything =
beyond using the Authorization header?=A0  Do we have clients out there tha=
t just can't set that header?=A0 Putting bearer tokens in query arguments i=
s a very bad idea for many reasons, and in form variables has it's own set =
of badness (although not to the same level).=0A=0A-bill=0A=0A=0A      
--0-1539439009-1299779999=:60351
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:ti=
mes new roman, new york, times, serif;font-size:12pt"><div><span>Yeah, but =
there are serious security problems with credentials in the URL, is it real=
ly worth it in light of those problems?<br></span></div><div><br></div><div=
 style=3D"font-family: times new roman,new york,times,serif; font-size: 12p=
t;"><div style=3D"font-family: times new roman,new york,times,serif; font-s=
ize: 12pt;"><font size=3D"2" face=3D"Arial"><hr size=3D"1"><b><span style=
=3D"font-weight: bold;">From:</span></b> "Richer, Justin P." &lt;jricher@mi=
tre.org&gt;<br><b><span style=3D"font-weight: bold;">To:</span></b> Lukas R=
osenstock &lt;lr@lukasrosenstock.net&gt;; William J. Mills &lt;wmills@yahoo=
-inc.com&gt;<br><b><span style=3D"font-weight: bold;">Cc:</span></b> Brian =
Eaton &lt;beaton@google.com&gt;; OAuth WG &lt;oauth@ietf.org&gt;<br><b><spa=
n style=3D"font-weight: bold;">Sent:</span></b> Thursday, March 10, 2011 9:=
49
 AM<br><b><span style=3D"font-weight: bold;">Subject:</span></b> RE: [OAUTH=
-WG] OAuth Bearer Token draft<br></font><br> =0AYes, there are many develop=
ment setups where all you can reasonably access is the URL to get. It's als=
o much simpler to make use of the well-supported syntax helpers for query p=
arameters instead of relying on new, custom formatting for newly-defined he=
aders. The bearer token makes this simple by just having the value of the t=
oken, but other schemes have their own name/value pair formats and encoding=
s that will inevitably cause hiccups.<br><br> -- Justin<br>________________=
________________________<br>From: Lukas Rosenstock [<a ymailto=3D"mailto:lr=
@lukasrosenstock.net" href=3D"mailto:lr@lukasrosenstock.net">lr@lukasrosens=
tock.net</a>]<br>Sent: Thursday, March 10, 2011 11:49 AM<br>To: William J. =
Mills<br>Cc: Brian Eaton; Richer, Justin P.; OAuth WG<br>Subject: Re: [OAUT=
H-WG] OAuth Bearer Token draft<br><br>JSON-P (callback) works with &lt;scri=
pt&gt; tags where no parameters can be set; this is used a lot in web appli=
cations that want to consume 3rd party APIs
 directly on the client side. So, yes, an alternative for the Authorization=
 header is required - a.f.a.i.k this use case was one of the driving forces=
 behind WRAP and bearer tokens.<br><br>2011/3/9 William J. Mills &lt;<a yma=
ilto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.com">w=
mills@yahoo-inc.com</a>&lt;mailto:<a ymailto=3D"mailto:wmills@yahoo-inc.com=
" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;&gt;<br>=
Is there really a need going forward for anything beyond using the Authoriz=
ation header?&nbsp;  Do we have clients out there that just can't set that =
header?&nbsp; Putting bearer tokens in query arguments is a very bad idea f=
or many reasons, and in form variables has it's own set of badness (althoug=
h not to the same level).<br><br>-bill<br><br><br></div></div></div><br>=0A=
=0A      </body></html>
--0-1539439009-1299779999=:60351--

From jricher@mitre.org  Thu Mar 10 10:10:23 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A310A3A6A5C for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:10:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hxZkirUuJAJa for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:10:22 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id A20283A6B33 for <oauth@ietf.org>; Thu, 10 Mar 2011 10:10:22 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 144E321B0EAF; Thu, 10 Mar 2011 13:11:40 -0500 (EST)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 0B06321B08A4; Thu, 10 Mar 2011 13:11:40 -0500 (EST)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub2.MITRE.ORG ([129.83.29.74]) with mapi; Thu, 10 Mar 2011 13:11:39 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: "William J. Mills" <wmills@yahoo-inc.com>, Lukas Rosenstock <lr@lukasrosenstock.net>
Date: Thu, 10 Mar 2011 13:07:01 -0500
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvfTPlWigJEaYGBSuiX8viz6bjwFgAAPsK2
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com>
In-Reply-To: <288129.60351.qm@web32309.mail.mud.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 18:10:23 -0000

Ah, here we run into the classic argument of usability vs. security, in whi=
ch usability will win every single time in practice. If we don't define at =
least a reasonable way to do this within the scope of OAuth, that's not goi=
ng to stop people from doing it. It's just going to make people do it in a =
million different ways, each with their own unique problems that nobody's t=
hought of. At least this way, we can enable it and have a real discussion a=
bout the security considerations. There are valid and valuable places where=
 putting credentials in the URL is a reasonable security tradeoff. Not ever=
ything functions over the public internet as well, and the security conside=
rations are different in these other environments.

In short: yes, it's necessary and good to do this.

 -- Justin
________________________________________
From: William J. Mills [wmills@yahoo-inc.com]
Sent: Thursday, March 10, 2011 12:59 PM
To: Richer, Justin P.; Lukas Rosenstock
Cc: Brian Eaton; OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

Yeah, but there are serious security problems with credentials in the URL, =
is it really worth it in light of those problems?

________________________________
From: "Richer, Justin P." <jricher@mitre.org>
To: Lukas Rosenstock <lr@lukasrosenstock.net>; William J. Mills <wmills@yah=
oo-inc.com>
Cc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>
Sent: Thursday, March 10, 2011 9:49 AM
Subject: RE: [OAUTH-WG] OAuth Bearer Token draft

Yes, there are many development setups where all you can reasonably access =
is the URL to get. It's also much simpler to make use of the well-supported=
 syntax helpers for query parameters instead of relying on new, custom form=
atting for newly-defined headers. The bearer token makes this simple by jus=
t having the value of the token, but other schemes have their own name/valu=
e pair formats and encodings that will inevitably cause hiccups.

-- Justin
________________________________________
From: Lukas Rosenstock [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.ne=
t>]
Sent: Thursday, March 10, 2011 11:49 AM
To: William J. Mills
Cc: Brian Eaton; Richer, Justin P.; OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

JSON-P (callback) works with <script> tags where no parameters can be set; =
this is used a lot in web applications that want to consume 3rd party APIs =
directly on the client side. So, yes, an alternative for the Authorization =
header is required - a.f.a.i.k this use case was one of the driving forces =
behind WRAP and bearer tokens.

2011/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com=
><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>
Is there really a need going forward for anything beyond using the Authoriz=
ation header?  Do we have clients out there that just can't set that header=
?  Putting bearer tokens in query arguments is a very bad idea for many rea=
sons, and in form variables has it's own set of badness (although not to th=
e same level).

-bill




From phil.hunt@oracle.com  Thu Mar 10 10:15:06 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 557C93A691F for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:15:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.511
X-Spam-Level: 
X-Spam-Status: No, score=-6.511 tagged_above=-999 required=5 tests=[AWL=0.087,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z1dFdh+HLjJX for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:15:05 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 108F63A68CB for <oauth@ietf.org>; Thu, 10 Mar 2011 10:15:04 -0800 (PST)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2AIGL4F010956 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 10 Mar 2011 18:16:22 GMT
Received: from acsmt355.oracle.com (acsmt355.oracle.com [141.146.40.155]) by rcsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2ABk32l018140; Thu, 10 Mar 2011 18:16:20 GMT
Received: from abhmt010.oracle.com by acsmt355.oracle.com with ESMTP id 1127176921299780931; Thu, 10 Mar 2011 10:15:31 -0800
Received: from [192.168.1.8] (/24.87.204.3) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 10 Mar 2011 10:15:31 -0800
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG>
Date: Thu, 10 Mar 2011 10:15:28 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG>
To: "Richer, Justin P." <jricher@mitre.org>
X-Mailer: Apple Mail (2.1082)
X-Source-IP: acsmt355.oracle.com [141.146.40.155]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090206.4D791575.00C5,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 18:15:06 -0000

-1.  It is a BAD security practice to pass credentials in URLs. Avoid =
it.

Phil
phil.hunt@oracle.com




On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:

> Ah, here we run into the classic argument of usability vs. security, =
in which usability will win every single time in practice. If we don't =
define at least a reasonable way to do this within the scope of OAuth, =
that's not going to stop people from doing it. It's just going to make =
people do it in a million different ways, each with their own unique =
problems that nobody's thought of. At least this way, we can enable it =
and have a real discussion about the security considerations. There are =
valid and valuable places where putting credentials in the URL is a =
reasonable security tradeoff. Not everything functions over the public =
internet as well, and the security considerations are different in these =
other environments.
>=20
> In short: yes, it's necessary and good to do this.
>=20
> -- Justin
> ________________________________________
> From: William J. Mills [wmills@yahoo-inc.com]
> Sent: Thursday, March 10, 2011 12:59 PM
> To: Richer, Justin P.; Lukas Rosenstock
> Cc: Brian Eaton; OAuth WG
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>=20
> Yeah, but there are serious security problems with credentials in the =
URL, is it really worth it in light of those problems?
>=20
> ________________________________
> From: "Richer, Justin P." <jricher@mitre.org>
> To: Lukas Rosenstock <lr@lukasrosenstock.net>; William J. Mills =
<wmills@yahoo-inc.com>
> Cc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>
> Sent: Thursday, March 10, 2011 9:49 AM
> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>=20
> Yes, there are many development setups where all you can reasonably =
access is the URL to get. It's also much simpler to make use of the =
well-supported syntax helpers for query parameters instead of relying on =
new, custom formatting for newly-defined headers. The bearer token makes =
this simple by just having the value of the token, but other schemes =
have their own name/value pair formats and encodings that will =
inevitably cause hiccups.
>=20
> -- Justin
> ________________________________________
> From: Lukas Rosenstock =
[lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>]
> Sent: Thursday, March 10, 2011 11:49 AM
> To: William J. Mills
> Cc: Brian Eaton; Richer, Justin P.; OAuth WG
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>=20
> JSON-P (callback) works with <script> tags where no parameters can be =
set; this is used a lot in web applications that want to consume 3rd =
party APIs directly on the client side. So, yes, an alternative for the =
Authorization header is required - a.f.a.i.k this use case was one of =
the driving forces behind WRAP and bearer tokens.
>=20
> 2011/3/9 William J. Mills =
<wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com><mailto:wmills@yahoo-inc=
.com<mailto:wmills@yahoo-inc.com>>>
> Is there really a need going forward for anything beyond using the =
Authorization header?  Do we have clients out there that just can't set =
that header?  Putting bearer tokens in query arguments is a very bad =
idea for many reasons, and in form variables has it's own set of badness =
(although not to the same level).
>=20
> -bill
>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From eran@hueniverse.com  Thu Mar 10 10:28:42 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 98DA13A68CB for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:28:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.558
X-Spam-Level: 
X-Spam-Status: No, score=-2.558 tagged_above=-999 required=5 tests=[AWL=0.041,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vK7GVtVCBcM7 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:28:40 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 8429C3A67EE for <oauth@ietf.org>; Thu, 10 Mar 2011 10:28:40 -0800 (PST)
Received: (qmail 18365 invoked from network); 10 Mar 2011 18:29:58 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 10 Mar 2011 18:29:58 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 10 Mar 2011 11:29:47 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phil Hunt <phil.hunt@oracle.com>, "Richer, Justin P." <jricher@mitre.org>
Date: Thu, 10 Mar 2011 11:29:25 -0700
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvfT0dpaD1X2A84R2ylDw9Uq5FLiAAAOnbA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG> <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>
In-Reply-To: <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 18:28:42 -0000

There are a few issues to consider.

1. Should the spec support sending bearer token in a query parameter?

- The argument that there are many use cases for this is unproven. JSON-P i=
s one valid example (though JSON-P usage is in decline with new methods for=
 cross-domain calls), but so far the only one given.
- I think at this point we have to include this functionality and the only =
potential open issue is if we want to rename it to something other than oau=
th_token.
- Including this functionality doesn't mean we should encourage it, and the=
 way to deal with that is to mark this as 'deprecated'.=20

2. Should the spec support sending authentication parameters in the body?

- I don't have any use cases where this is required. If the client can perf=
orm a POST with a body, it should be able to set the header. Where is this =
an issue?

3. Should the oauth_token parameter be defined as part of an extensible fra=
mework for adding parameters to protected resources endpoint?

- This was the original issue raised and so far no one has provided any use=
 cases for this. We just need to make sure we pick the right parameter name=
 for oauth_token and clearly state that it is not the right way to send tok=
ens. There should not be any more such parameters in the protected resource=
 namespace.

EHL


> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Phil Hunt
> Sent: Thursday, March 10, 2011 10:15 AM
> To: Richer, Justin P.
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>=20
> -1.  It is a BAD security practice to pass credentials in URLs. Avoid it.
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:
>=20
> > Ah, here we run into the classic argument of usability vs. security, in=
 which
> usability will win every single time in practice. If we don't define at l=
east a
> reasonable way to do this within the scope of OAuth, that's not going to =
stop
> people from doing it. It's just going to make people do it in a million d=
ifferent
> ways, each with their own unique problems that nobody's thought of. At
> least this way, we can enable it and have a real discussion about the sec=
urity
> considerations. There are valid and valuable places where putting credent=
ials
> in the URL is a reasonable security tradeoff. Not everything functions ov=
er
> the public internet as well, and the security considerations are differen=
t in
> these other environments.
> >
> > In short: yes, it's necessary and good to do this.
> >
> > -- Justin
> > ________________________________________
> > From: William J. Mills [wmills@yahoo-inc.com]
> > Sent: Thursday, March 10, 2011 12:59 PM
> > To: Richer, Justin P.; Lukas Rosenstock
> > Cc: Brian Eaton; OAuth WG
> > Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
> >
> > Yeah, but there are serious security problems with credentials in the U=
RL, is
> it really worth it in light of those problems?
> >
> > ________________________________
> > From: "Richer, Justin P." <jricher@mitre.org>
> > To: Lukas Rosenstock <lr@lukasrosenstock.net>; William J. Mills
> <wmills@yahoo-inc.com>
> > Cc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>
> > Sent: Thursday, March 10, 2011 9:49 AM
> > Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
> >
> > Yes, there are many development setups where all you can reasonably
> access is the URL to get. It's also much simpler to make use of the well-
> supported syntax helpers for query parameters instead of relying on new,
> custom formatting for newly-defined headers. The bearer token makes this
> simple by just having the value of the token, but other schemes have thei=
r
> own name/value pair formats and encodings that will inevitably cause
> hiccups.
> >
> > -- Justin
> > ________________________________________
> > From: Lukas Rosenstock
> [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>]
> > Sent: Thursday, March 10, 2011 11:49 AM
> > To: William J. Mills
> > Cc: Brian Eaton; Richer, Justin P.; OAuth WG
> > Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
> >
> > JSON-P (callback) works with <script> tags where no parameters can be
> set; this is used a lot in web applications that want to consume 3rd part=
y APIs
> directly on the client side. So, yes, an alternative for the Authorizatio=
n
> header is required - a.f.a.i.k this use case was one of the driving force=
s
> behind WRAP and bearer tokens.
> >
> > 2011/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-
> inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>
> > Is there really a need going forward for anything beyond using the
> Authorization header?  Do we have clients out there that just can't set t=
hat
> header?  Putting bearer tokens in query arguments is a very bad idea for
> many reasons, and in form variables has it's own set of badness (although
> not to the same level).
> >
> > -bill
> >
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From jricher@mitre.org  Thu Mar 10 10:29:14 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1C2653A693D for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:29:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g4GJzZF5vPFA for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:29:13 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 4A56B3A67EE for <oauth@ietf.org>; Thu, 10 Mar 2011 10:29:12 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 2F8BD21B16BF; Thu, 10 Mar 2011 13:30:30 -0500 (EST)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 2721121B16A4; Thu, 10 Mar 2011 13:30:30 -0500 (EST)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub1.MITRE.ORG ([129.83.29.73]) with mapi; Thu, 10 Mar 2011 13:30:30 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 10 Mar 2011 13:27:31 -0500
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvfT0Q+WGlKZq1rSR2Rq8ql11tC1QAAY2va
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AD@IMCMBX3.MITRE.ORG>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG>, <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>
In-Reply-To: <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 18:29:14 -0000

What about temporary credentials across a local link between controlled sys=
tems? My point is just that there are cases where the usual leakage culprit=
s (browsers, proxies, caches, logs) don't apply.=20

It's also a bad idea to not use two-way TLS, and it's arguably a bad idea t=
o look at anything on the web without using TLS to begin with, but we still=
 do. It's all about the tradeoff between security of a system and the usabi=
lity and usefulness of a system. There's an old adage that the most secure =
computer is powered off and unplugged. :)

I think it's very important to strike an appropriate balance.

 -- Justin
________________________________________
From: Phil Hunt [phil.hunt@oracle.com]
Sent: Thursday, March 10, 2011 1:15 PM
To: Richer, Justin P.
Cc: William J. Mills; Lukas Rosenstock; OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

-1.  It is a BAD security practice to pass credentials in URLs. Avoid it.

Phil
phil.hunt@oracle.com




On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:

> Ah, here we run into the classic argument of usability vs. security, in w=
hich usability will win every single time in practice. If we don't define a=
t least a reasonable way to do this within the scope of OAuth, that's not g=
oing to stop people from doing it. It's just going to make people do it in =
a million different ways, each with their own unique problems that nobody's=
 thought of. At least this way, we can enable it and have a real discussion=
 about the security considerations. There are valid and valuable places whe=
re putting credentials in the URL is a reasonable security tradeoff. Not ev=
erything functions over the public internet as well, and the security consi=
derations are different in these other environments.
>
> In short: yes, it's necessary and good to do this.
>
> -- Justin
> ________________________________________
> From: William J. Mills [wmills@yahoo-inc.com]
> Sent: Thursday, March 10, 2011 12:59 PM
> To: Richer, Justin P.; Lukas Rosenstock
> Cc: Brian Eaton; OAuth WG
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
> Yeah, but there are serious security problems with credentials in the URL=
, is it really worth it in light of those problems?
>
> ________________________________
> From: "Richer, Justin P." <jricher@mitre.org>
> To: Lukas Rosenstock <lr@lukasrosenstock.net>; William J. Mills <wmills@y=
ahoo-inc.com>
> Cc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>
> Sent: Thursday, March 10, 2011 9:49 AM
> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>
> Yes, there are many development setups where all you can reasonably acces=
s is the URL to get. It's also much simpler to make use of the well-support=
ed syntax helpers for query parameters instead of relying on new, custom fo=
rmatting for newly-defined headers. The bearer token makes this simple by j=
ust having the value of the token, but other schemes have their own name/va=
lue pair formats and encodings that will inevitably cause hiccups.
>
> -- Justin
> ________________________________________
> From: Lukas Rosenstock [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.=
net>]
> Sent: Thursday, March 10, 2011 11:49 AM
> To: William J. Mills
> Cc: Brian Eaton; Richer, Justin P.; OAuth WG
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
> JSON-P (callback) works with <script> tags where no parameters can be set=
; this is used a lot in web applications that want to consume 3rd party API=
s directly on the client side. So, yes, an alternative for the Authorizatio=
n header is required - a.f.a.i.k this use case was one of the driving force=
s behind WRAP and bearer tokens.
>
> 2011/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.c=
om><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>
> Is there really a need going forward for anything beyond using the Author=
ization header?  Do we have clients out there that just can't set that head=
er?  Putting bearer tokens in query arguments is a very bad idea for many r=
easons, and in form variables has it's own set of badness (although not to =
the same level).
>
> -bill
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From craig.heath@wacapps.net  Thu Mar 10 10:31:02 2011
Return-Path: <craig.heath@wacapps.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3C57C3A67EE for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:31:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.542
X-Spam-Level: 
X-Spam-Status: No, score=-2.542 tagged_above=-999 required=5 tests=[AWL=0.057,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NHh8Ty1ln4tZ for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:31:01 -0800 (PST)
Received: from out02.themessagecenter.com (out02.themessagecenter.com [208.113.96.229]) by core3.amsl.com (Postfix) with ESMTP id 5D90D3A6B54 for <oauth@ietf.org>; Thu, 10 Mar 2011 10:31:01 -0800 (PST)
Received: from [192.168.66.172] by out02.themessagecenter.com with ESMTP (Tumbleweed Email Firewall SMTP Relay); Thu, 10 Mar 2011 10:20:28 -0800
X-Server-Uuid: 385D78BC-A8BE-4780-80CD-A503E34C32DD
Received: from ex-be-016-sfo.shared.themessagecenter.com ( [192.168.66.102]) by EX-CH-006-SV1.shared.themessagecenter.com ( [192.168.66.172]) with mapi; Thu, 10 Mar 2011 10:32:11 -0800
From: "Craig Heath" <craig.heath@wacapps.net>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 10 Mar 2011 10:33:25 -0800
Thread-Topic: Implicit Grant Client Authentication
Thread-Index: AcvfUIidK8z3GS/uTvO/heH3kGh+Nw==
Message-ID: <4EDB411A4D566C45BE3AB6E0152BFAF92761BB6C74@EX-BE-016-SFO.shared.themessagecenter.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
MIME-Version: 1.0
X-WSS-ID: 6167C9E63PS17534194-01-01
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Subject: [OAUTH-WG] Implicit Grant Client Authentication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 18:31:02 -0000

I'm sure this has been gone over before, so apologies for that, but I haven=
't found a clear answer (is there a better way than just Google to search t=
he mailing list archive, by the way?)

I've been puzzling over this text in 4.2: "... the authentication of the cl=
ient is based on the user-agent's same-origin policy."

I get that the client can't be provisioned with secret credentials and that=
's why we're using this flow, but I'm puzzled by the implication that it mi=
ght still be possible to authenticate the client.  Isn't the point of this =
flow that you can't?

Specifically, how would you verify that the request is coming from a user a=
gent that even has a same-origin policy?

Thanks!

- Craig.


From jricher@mitre.org  Thu Mar 10 10:35:50 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5EAE83A68F5 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:35:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3v1KSxGyrpyC for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 10:35:48 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 4619D3A67EE for <oauth@ietf.org>; Thu, 10 Mar 2011 10:35:48 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 3ACB221B0962; Thu, 10 Mar 2011 13:37:06 -0500 (EST)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 334C321B0462; Thu, 10 Mar 2011 13:37:06 -0500 (EST)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub1.MITRE.ORG ([129.83.29.73]) with mapi; Thu, 10 Mar 2011 13:37:06 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Eran Hammer-Lahav <eran@hueniverse.com>, Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 10 Mar 2011 13:37:05 -0500
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvfT0dpaD1X2A84R2ylDw9Uq5FLiAAAOnbAAABMXq4=
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG> <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 18:35:50 -0000

1) Yes. And don't discount ease-of-use for developers. If I'm already sendi=
ng my parameters over the query, this becomes another parameter and is real=
ly easy to manage.
2) Yes, for parallelism to #1, when using a POST.
3) The idea of a parameter registry for this part is absurd, and the parame=
ter should be kept simple. I do think that it needs to be named something o=
ther than "oauth_token".=20

I'm happy with discouraging the use of 1 and 2 with discussion in the secur=
ity considerations, but I think that if we don't specify this behavior and =
discuss it, then people are going to do it anyway and we run more risk of t=
hings going wrong. Simply ignoring the issue in the spec (by remaining sile=
nt about it) will not make it go away.

Since all formats are optional, couldn't an AS/PR setup that wants to just =
lock things down and require auth headers for their particular setup? If in=
 two years nobody deploys it anymore, then let's deprecate it from the spec=
 and never speak of this again.

 -- Justin

________________________________________
From: Eran Hammer-Lahav [eran@hueniverse.com]
Sent: Thursday, March 10, 2011 1:29 PM
To: Phil Hunt; Richer, Justin P.
Cc: OAuth WG
Subject: RE: [OAUTH-WG] OAuth Bearer Token draft

There are a few issues to consider.

1. Should the spec support sending bearer token in a query parameter?

- The argument that there are many use cases for this is unproven. JSON-P i=
s one valid example (though JSON-P usage is in decline with new methods for=
 cross-domain calls), but so far the only one given.
- I think at this point we have to include this functionality and the only =
potential open issue is if we want to rename it to something other than oau=
th_token.
- Including this functionality doesn't mean we should encourage it, and the=
 way to deal with that is to mark this as 'deprecated'.

2. Should the spec support sending authentication parameters in the body?

- I don't have any use cases where this is required. If the client can perf=
orm a POST with a body, it should be able to set the header. Where is this =
an issue?

3. Should the oauth_token parameter be defined as part of an extensible fra=
mework for adding parameters to protected resources endpoint?

- This was the original issue raised and so far no one has provided any use=
 cases for this. We just need to make sure we pick the right parameter name=
 for oauth_token and clearly state that it is not the right way to send tok=
ens. There should not be any more such parameters in the protected resource=
 namespace.

EHL


> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Phil Hunt
> Sent: Thursday, March 10, 2011 10:15 AM
> To: Richer, Justin P.
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
> -1.  It is a BAD security practice to pass credentials in URLs. Avoid it.
>
> Phil
> phil.hunt@oracle.com
>
>
>
>
> On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:
>
> > Ah, here we run into the classic argument of usability vs. security, in=
 which
> usability will win every single time in practice. If we don't define at l=
east a
> reasonable way to do this within the scope of OAuth, that's not going to =
stop
> people from doing it. It's just going to make people do it in a million d=
ifferent
> ways, each with their own unique problems that nobody's thought of. At
> least this way, we can enable it and have a real discussion about the sec=
urity
> considerations. There are valid and valuable places where putting credent=
ials
> in the URL is a reasonable security tradeoff. Not everything functions ov=
er
> the public internet as well, and the security considerations are differen=
t in
> these other environments.
> >
> > In short: yes, it's necessary and good to do this.
> >
> > -- Justin
> > ________________________________________
> > From: William J. Mills [wmills@yahoo-inc.com]
> > Sent: Thursday, March 10, 2011 12:59 PM
> > To: Richer, Justin P.; Lukas Rosenstock
> > Cc: Brian Eaton; OAuth WG
> > Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
> >
> > Yeah, but there are serious security problems with credentials in the U=
RL, is
> it really worth it in light of those problems?
> >
> > ________________________________
> > From: "Richer, Justin P." <jricher@mitre.org>
> > To: Lukas Rosenstock <lr@lukasrosenstock.net>; William J. Mills
> <wmills@yahoo-inc.com>
> > Cc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>
> > Sent: Thursday, March 10, 2011 9:49 AM
> > Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
> >
> > Yes, there are many development setups where all you can reasonably
> access is the URL to get. It's also much simpler to make use of the well-
> supported syntax helpers for query parameters instead of relying on new,
> custom formatting for newly-defined headers. The bearer token makes this
> simple by just having the value of the token, but other schemes have thei=
r
> own name/value pair formats and encodings that will inevitably cause
> hiccups.
> >
> > -- Justin
> > ________________________________________
> > From: Lukas Rosenstock
> [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>]
> > Sent: Thursday, March 10, 2011 11:49 AM
> > To: William J. Mills
> > Cc: Brian Eaton; Richer, Justin P.; OAuth WG
> > Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
> >
> > JSON-P (callback) works with <script> tags where no parameters can be
> set; this is used a lot in web applications that want to consume 3rd part=
y APIs
> directly on the client side. So, yes, an alternative for the Authorizatio=
n
> header is required - a.f.a.i.k this use case was one of the driving force=
s
> behind WRAP and bearer tokens.
> >
> > 2011/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-
> inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>
> > Is there really a need going forward for anything beyond using the
> Authorization header?  Do we have clients out there that just can't set t=
hat
> header?  Putting bearer tokens in query arguments is a very bad idea for
> many reasons, and in form variables has it's own set of badness (although
> not to the same level).
> >
> > -bill
> >
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From phil.hunt@oracle.com  Thu Mar 10 11:01:55 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 89FFD3A6826 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:01:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.517
X-Spam-Level: 
X-Spam-Status: No, score=-6.517 tagged_above=-999 required=5 tests=[AWL=0.082,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QMTMx2FKGhIc for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:01:53 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 2A2053A6806 for <oauth@ietf.org>; Thu, 10 Mar 2011 11:01:53 -0800 (PST)
Received: from rcsinet13.oracle.com (rcsinet13.oracle.com [148.87.113.125]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2AJ37xb030667 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 10 Mar 2011 19:03:09 GMT
Received: from acsmt353.oracle.com (acsmt353.oracle.com [141.146.40.153]) by rcsinet13.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2ACGpcN017466; Thu, 10 Mar 2011 19:03:07 GMT
Received: from abhmt010.oracle.com by acsmt355.oracle.com with ESMTP id 1127322851299783688; Thu, 10 Mar 2011 11:01:28 -0800
Received: from [192.168.1.8] (/24.87.204.3) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 10 Mar 2011 11:01:28 -0800
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>
Date: Thu, 10 Mar 2011 11:01:27 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG> <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>
To: "Richer, Justin P." <jricher@mitre.org>
X-Mailer: Apple Mail (2.1082)
X-Source-IP: acsmt353.oracle.com [141.146.40.153]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090202.4D79206B.02CC,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 19:01:55 -0000

Well, for one if you promote this, it becomes general technique. Now you =
have uid/passwords in browser history etc potentially accessible to =
javascript and could be leaked/hacked in any number of ways.

Also, I would say that credentials are a higher risk item then say a =
specific API call. Why? because credentials are used universally and so =
the exposure is much higher. That said, it is still possible that =
application data can just as costly to expose. Another reason to use =
secure forms over URLs.

Phil
phil.hunt@oracle.com




On 2011-03-10, at 10:37 AM, Richer, Justin P. wrote:

> 1) Yes. And don't discount ease-of-use for developers. If I'm already =
sending my parameters over the query, this becomes another parameter and =
is really easy to manage.
> 2) Yes, for parallelism to #1, when using a POST.
> 3) The idea of a parameter registry for this part is absurd, and the =
parameter should be kept simple. I do think that it needs to be named =
something other than "oauth_token".=20
>=20
> I'm happy with discouraging the use of 1 and 2 with discussion in the =
security considerations, but I think that if we don't specify this =
behavior and discuss it, then people are going to do it anyway and we =
run more risk of things going wrong. Simply ignoring the issue in the =
spec (by remaining silent about it) will not make it go away.
>=20
> Since all formats are optional, couldn't an AS/PR setup that wants to =
just lock things down and require auth headers for their particular =
setup? If in two years nobody deploys it anymore, then let's deprecate =
it from the spec and never speak of this again.
>=20
> -- Justin
>=20
> ________________________________________
> From: Eran Hammer-Lahav [eran@hueniverse.com]
> Sent: Thursday, March 10, 2011 1:29 PM
> To: Phil Hunt; Richer, Justin P.
> Cc: OAuth WG
> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>=20
> There are a few issues to consider.
>=20
> 1. Should the spec support sending bearer token in a query parameter?
>=20
> - The argument that there are many use cases for this is unproven. =
JSON-P is one valid example (though JSON-P usage is in decline with new =
methods for cross-domain calls), but so far the only one given.
> - I think at this point we have to include this functionality and the =
only potential open issue is if we want to rename it to something other =
than oauth_token.
> - Including this functionality doesn't mean we should encourage it, =
and the way to deal with that is to mark this as 'deprecated'.
>=20
> 2. Should the spec support sending authentication parameters in the =
body?
>=20
> - I don't have any use cases where this is required. If the client can =
perform a POST with a body, it should be able to set the header. Where =
is this an issue?
>=20
> 3. Should the oauth_token parameter be defined as part of an =
extensible framework for adding parameters to protected resources =
endpoint?
>=20
> - This was the original issue raised and so far no one has provided =
any use cases for this. We just need to make sure we pick the right =
parameter name for oauth_token and clearly state that it is not the =
right way to send tokens. There should not be any more such parameters =
in the protected resource namespace.
>=20
> EHL
>=20
>=20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf
>> Of Phil Hunt
>> Sent: Thursday, March 10, 2011 10:15 AM
>> To: Richer, Justin P.
>> Cc: OAuth WG
>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>=20
>> -1.  It is a BAD security practice to pass credentials in URLs. Avoid =
it.
>>=20
>> Phil
>> phil.hunt@oracle.com
>>=20
>>=20
>>=20
>>=20
>> On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:
>>=20
>>> Ah, here we run into the classic argument of usability vs. security, =
in which
>> usability will win every single time in practice. If we don't define =
at least a
>> reasonable way to do this within the scope of OAuth, that's not going =
to stop
>> people from doing it. It's just going to make people do it in a =
million different
>> ways, each with their own unique problems that nobody's thought of. =
At
>> least this way, we can enable it and have a real discussion about the =
security
>> considerations. There are valid and valuable places where putting =
credentials
>> in the URL is a reasonable security tradeoff. Not everything =
functions over
>> the public internet as well, and the security considerations are =
different in
>> these other environments.
>>>=20
>>> In short: yes, it's necessary and good to do this.
>>>=20
>>> -- Justin
>>> ________________________________________
>>> From: William J. Mills [wmills@yahoo-inc.com]
>>> Sent: Thursday, March 10, 2011 12:59 PM
>>> To: Richer, Justin P.; Lukas Rosenstock
>>> Cc: Brian Eaton; OAuth WG
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>=20
>>> Yeah, but there are serious security problems with credentials in =
the URL, is
>> it really worth it in light of those problems?
>>>=20
>>> ________________________________
>>> From: "Richer, Justin P." <jricher@mitre.org>
>>> To: Lukas Rosenstock <lr@lukasrosenstock.net>; William J. Mills
>> <wmills@yahoo-inc.com>
>>> Cc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>
>>> Sent: Thursday, March 10, 2011 9:49 AM
>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>>=20
>>> Yes, there are many development setups where all you can reasonably
>> access is the URL to get. It's also much simpler to make use of the =
well-
>> supported syntax helpers for query parameters instead of relying on =
new,
>> custom formatting for newly-defined headers. The bearer token makes =
this
>> simple by just having the value of the token, but other schemes have =
their
>> own name/value pair formats and encodings that will inevitably cause
>> hiccups.
>>>=20
>>> -- Justin
>>> ________________________________________
>>> From: Lukas Rosenstock
>> [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>]
>>> Sent: Thursday, March 10, 2011 11:49 AM
>>> To: William J. Mills
>>> Cc: Brian Eaton; Richer, Justin P.; OAuth WG
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>=20
>>> JSON-P (callback) works with <script> tags where no parameters can =
be
>> set; this is used a lot in web applications that want to consume 3rd =
party APIs
>> directly on the client side. So, yes, an alternative for the =
Authorization
>> header is required - a.f.a.i.k this use case was one of the driving =
forces
>> behind WRAP and bearer tokens.
>>>=20
>>> 2011/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-
>> inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>
>>> Is there really a need going forward for anything beyond using the
>> Authorization header?  Do we have clients out there that just can't =
set that
>> header?  Putting bearer tokens in query arguments is a very bad idea =
for
>> many reasons, and in form variables has it's own set of badness =
(although
>> not to the same level).
>>>=20
>>> -bill
>>>=20
>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From igor.faynberg@alcatel-lucent.com  Thu Mar 10 11:15:23 2011
Return-Path: <igor.faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7C98B3A6A2E for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:15:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B1qVQr2n7Yxl for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:15:22 -0800 (PST)
Received: from ihemail4.lucent.com (ihemail4.lucent.com [135.245.0.39]) by core3.amsl.com (Postfix) with ESMTP id D635B3A6ADB for <oauth@ietf.org>; Thu, 10 Mar 2011 11:15:21 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail4.lucent.com (8.13.8/IER-o) with ESMTP id p2AJGbsT000725 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 10 Mar 2011 13:16:37 -0600 (CST)
Received: from [135.222.134.173] (faynberg-c1.mh.lucent.com [135.222.134.173]) by umail.lucent.com (8.13.8/TPES) with ESMTP id p2AJGaCZ001143; Thu, 10 Mar 2011 13:16:37 -0600 (CST)
Message-ID: <4D792394.9020606@alcatel-lucent.com>
Date: Thu, 10 Mar 2011 14:16:36 -0500
From: Igor Faynberg <igor.faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: Phil Hunt <phil.hunt@oracle.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com>	<D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG>	<B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG> <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com>
In-Reply-To: <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.39
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: igor.faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 19:15:23 -0000

I agree with Phil here.

Actually, I hoped that OAuth won't pass credentials in any case and by 
any means--including encryption, period, but I had lost this argument 
long ago. 

Igor

Phil Hunt wrote:
> Well, for one if you promote this, it becomes general technique. Now you have uid/passwords in browser history etc potentially accessible to javascript and could be leaked/hacked in any number of ways.
>
> Also, I would say that credentials are a higher risk item then say a specific API call. Why? because credentials are used universally and so the exposure is much higher. That said, it is still possible that application data can just as costly to expose. Another reason to use secure forms over URLs.
>
> Phil
> phil.hunt@oracle.com
>
>
>
>
> On 2011-03-10, at 10:37 AM, Richer, Justin P. wrote:
>
>   
>> 1) Yes. And don't discount ease-of-use for developers. If I'm already sending my parameters over the query, this becomes another parameter and is really easy to manage.
>> 2) Yes, for parallelism to #1, when using a POST.
>> 3) The idea of a parameter registry for this part is absurd, and the parameter should be kept simple. I do think that it needs to be named something other than "oauth_token". 
>>
>> I'm happy with discouraging the use of 1 and 2 with discussion in the security considerations, but I think that if we don't specify this behavior and discuss it, then people are going to do it anyway and we run more risk of things going wrong. Simply ignoring the issue in the spec (by remaining silent about it) will not make it go away.
>>
>> Since all formats are optional, couldn't an AS/PR setup that wants to just lock things down and require auth headers for their particular setup? If in two years nobody deploys it anymore, then let's deprecate it from the spec and never speak of this again.
>>
>> -- Justin
>>
>> ________________________________________
>> From: Eran Hammer-Lahav [eran@hueniverse.com]
>> Sent: Thursday, March 10, 2011 1:29 PM
>> To: Phil Hunt; Richer, Justin P.
>> Cc: OAuth WG
>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>
>> There are a few issues to consider.
>>
>> 1. Should the spec support sending bearer token in a query parameter?
>>
>> - The argument that there are many use cases for this is unproven. JSON-P is one valid example (though JSON-P usage is in decline with new methods for cross-domain calls), but so far the only one given.
>> - I think at this point we have to include this functionality and the only potential open issue is if we want to rename it to something other than oauth_token.
>> - Including this functionality doesn't mean we should encourage it, and the way to deal with that is to mark this as 'deprecated'.
>>
>> 2. Should the spec support sending authentication parameters in the body?
>>
>> - I don't have any use cases where this is required. If the client can perform a POST with a body, it should be able to set the header. Where is this an issue?
>>
>> 3. Should the oauth_token parameter be defined as part of an extensible framework for adding parameters to protected resources endpoint?
>>
>> - This was the original issue raised and so far no one has provided any use cases for this. We just need to make sure we pick the right parameter name for oauth_token and clearly state that it is not the right way to send tokens. There should not be any more such parameters in the protected resource namespace.
>>
>> EHL
>>
>>
>>     
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>>> Of Phil Hunt
>>> Sent: Thursday, March 10, 2011 10:15 AM
>>> To: Richer, Justin P.
>>> Cc: OAuth WG
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>
>>> -1.  It is a BAD security practice to pass credentials in URLs. Avoid it.
>>>
>>> Phil
>>> phil.hunt@oracle.com
>>>
>>>
>>>
>>>
>>> On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:
>>>
>>>       
>>>> Ah, here we run into the classic argument of usability vs. security, in which
>>>>         
>>> usability will win every single time in practice. If we don't define at least a
>>> reasonable way to do this within the scope of OAuth, that's not going to stop
>>> people from doing it. It's just going to make people do it in a million different
>>> ways, each with their own unique problems that nobody's thought of. At
>>> least this way, we can enable it and have a real discussion about the security
>>> considerations. There are valid and valuable places where putting credentials
>>> in the URL is a reasonable security tradeoff. Not everything functions over
>>> the public internet as well, and the security considerations are different in
>>> these other environments.
>>>       
>>>> In short: yes, it's necessary and good to do this.
>>>>
>>>> -- Justin
>>>> ________________________________________
>>>> From: William J. Mills [wmills@yahoo-inc.com]
>>>> Sent: Thursday, March 10, 2011 12:59 PM
>>>> To: Richer, Justin P.; Lukas Rosenstock
>>>> Cc: Brian Eaton; OAuth WG
>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>
>>>> Yeah, but there are serious security problems with credentials in the URL, is
>>>>         
>>> it really worth it in light of those problems?
>>>       
>>>> ________________________________
>>>> From: "Richer, Justin P." <jricher@mitre.org>
>>>> To: Lukas Rosenstock <lr@lukasrosenstock.net>; William J. Mills
>>>>         
>>> <wmills@yahoo-inc.com>
>>>       
>>>> Cc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>
>>>> Sent: Thursday, March 10, 2011 9:49 AM
>>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>>>
>>>> Yes, there are many development setups where all you can reasonably
>>>>         
>>> access is the URL to get. It's also much simpler to make use of the well-
>>> supported syntax helpers for query parameters instead of relying on new,
>>> custom formatting for newly-defined headers. The bearer token makes this
>>> simple by just having the value of the token, but other schemes have their
>>> own name/value pair formats and encodings that will inevitably cause
>>> hiccups.
>>>       
>>>> -- Justin
>>>> ________________________________________
>>>> From: Lukas Rosenstock
>>>>         
>>> [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>]
>>>       
>>>> Sent: Thursday, March 10, 2011 11:49 AM
>>>> To: William J. Mills
>>>> Cc: Brian Eaton; Richer, Justin P.; OAuth WG
>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>
>>>> JSON-P (callback) works with <script> tags where no parameters can be
>>>>         
>>> set; this is used a lot in web applications that want to consume 3rd party APIs
>>> directly on the client side. So, yes, an alternative for the Authorization
>>> header is required - a.f.a.i.k this use case was one of the driving forces
>>> behind WRAP and bearer tokens.
>>>       
>>>> 2011/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-
>>>>         
>>> inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>
>>>       
>>>> Is there really a need going forward for anything beyond using the
>>>>         
>>> Authorization header?  Do we have clients out there that just can't set that
>>> header?  Putting bearer tokens in query arguments is a very bad idea for
>>> many reasons, and in form variables has it's own set of badness (although
>>> not to the same level).
>>>       
>>>> -bill
>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>         
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>       
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>   

From jricher@mitre.org  Thu Mar 10 11:17:27 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2E8043A6A49 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:17:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6HVNJ2P+zHqt for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:17:25 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 9D3BA3A6A29 for <oauth@ietf.org>; Thu, 10 Mar 2011 11:17:25 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 83F9321B0EED; Thu, 10 Mar 2011 14:18:43 -0500 (EST)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 748D421B0EFD; Thu, 10 Mar 2011 14:18:43 -0500 (EST)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub1.MITRE.ORG ([129.83.29.73]) with mapi; Thu, 10 Mar 2011 14:18:43 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 10 Mar 2011 14:17:53 -0500
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvfVc2ktcrywL7tREyCcDqDWn6ngQAAg0zY
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B1@IMCMBX3.MITRE.ORG>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG> <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>, <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com>
In-Reply-To: <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 19:17:27 -0000

Nobody said UID and password -- we're talking about tokens here. The cost o=
f a leaked temporary token (even a straight bearer token) is much, much low=
er.

 -- Justin
________________________________________
From: Phil Hunt [phil.hunt@oracle.com]
Sent: Thursday, March 10, 2011 2:01 PM
To: Richer, Justin P.
Cc: Eran Hammer-Lahav; OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

Well, for one if you promote this, it becomes general technique. Now you ha=
ve uid/passwords in browser history etc potentially accessible to javascrip=
t and could be leaked/hacked in any number of ways.

Also, I would say that credentials are a higher risk item then say a specif=
ic API call. Why? because credentials are used universally and so the expos=
ure is much higher. That said, it is still possible that application data c=
an just as costly to expose. Another reason to use secure forms over URLs.

Phil
phil.hunt@oracle.com




On 2011-03-10, at 10:37 AM, Richer, Justin P. wrote:

> 1) Yes. And don't discount ease-of-use for developers. If I'm already sen=
ding my parameters over the query, this becomes another parameter and is re=
ally easy to manage.
> 2) Yes, for parallelism to #1, when using a POST.
> 3) The idea of a parameter registry for this part is absurd, and the para=
meter should be kept simple. I do think that it needs to be named something=
 other than "oauth_token".
>
> I'm happy with discouraging the use of 1 and 2 with discussion in the sec=
urity considerations, but I think that if we don't specify this behavior an=
d discuss it, then people are going to do it anyway and we run more risk of=
 things going wrong. Simply ignoring the issue in the spec (by remaining si=
lent about it) will not make it go away.
>
> Since all formats are optional, couldn't an AS/PR setup that wants to jus=
t lock things down and require auth headers for their particular setup? If =
in two years nobody deploys it anymore, then let's deprecate it from the sp=
ec and never speak of this again.
>
> -- Justin
>
> ________________________________________
> From: Eran Hammer-Lahav [eran@hueniverse.com]
> Sent: Thursday, March 10, 2011 1:29 PM
> To: Phil Hunt; Richer, Justin P.
> Cc: OAuth WG
> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>
> There are a few issues to consider.
>
> 1. Should the spec support sending bearer token in a query parameter?
>
> - The argument that there are many use cases for this is unproven. JSON-P=
 is one valid example (though JSON-P usage is in decline with new methods f=
or cross-domain calls), but so far the only one given.
> - I think at this point we have to include this functionality and the onl=
y potential open issue is if we want to rename it to something other than o=
auth_token.
> - Including this functionality doesn't mean we should encourage it, and t=
he way to deal with that is to mark this as 'deprecated'.
>
> 2. Should the spec support sending authentication parameters in the body?
>
> - I don't have any use cases where this is required. If the client can pe=
rform a POST with a body, it should be able to set the header. Where is thi=
s an issue?
>
> 3. Should the oauth_token parameter be defined as part of an extensible f=
ramework for adding parameters to protected resources endpoint?
>
> - This was the original issue raised and so far no one has provided any u=
se cases for this. We just need to make sure we pick the right parameter na=
me for oauth_token and clearly state that it is not the right way to send t=
okens. There should not be any more such parameters in the protected resour=
ce namespace.
>
> EHL
>
>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>> Of Phil Hunt
>> Sent: Thursday, March 10, 2011 10:15 AM
>> To: Richer, Justin P.
>> Cc: OAuth WG
>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>
>> -1.  It is a BAD security practice to pass credentials in URLs. Avoid it=
.
>>
>> Phil
>> phil.hunt@oracle.com
>>
>>
>>
>>
>> On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:
>>
>>> Ah, here we run into the classic argument of usability vs. security, in=
 which
>> usability will win every single time in practice. If we don't define at =
least a
>> reasonable way to do this within the scope of OAuth, that's not going to=
 stop
>> people from doing it. It's just going to make people do it in a million =
different
>> ways, each with their own unique problems that nobody's thought of. At
>> least this way, we can enable it and have a real discussion about the se=
curity
>> considerations. There are valid and valuable places where putting creden=
tials
>> in the URL is a reasonable security tradeoff. Not everything functions o=
ver
>> the public internet as well, and the security considerations are differe=
nt in
>> these other environments.
>>>
>>> In short: yes, it's necessary and good to do this.
>>>
>>> -- Justin
>>> ________________________________________
>>> From: William J. Mills [wmills@yahoo-inc.com]
>>> Sent: Thursday, March 10, 2011 12:59 PM
>>> To: Richer, Justin P.; Lukas Rosenstock
>>> Cc: Brian Eaton; OAuth WG
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>
>>> Yeah, but there are serious security problems with credentials in the U=
RL, is
>> it really worth it in light of those problems?
>>>
>>> ________________________________
>>> From: "Richer, Justin P." <jricher@mitre.org>
>>> To: Lukas Rosenstock <lr@lukasrosenstock.net>; William J. Mills
>> <wmills@yahoo-inc.com>
>>> Cc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>
>>> Sent: Thursday, March 10, 2011 9:49 AM
>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>>
>>> Yes, there are many development setups where all you can reasonably
>> access is the URL to get. It's also much simpler to make use of the well=
-
>> supported syntax helpers for query parameters instead of relying on new,
>> custom formatting for newly-defined headers. The bearer token makes this
>> simple by just having the value of the token, but other schemes have the=
ir
>> own name/value pair formats and encodings that will inevitably cause
>> hiccups.
>>>
>>> -- Justin
>>> ________________________________________
>>> From: Lukas Rosenstock
>> [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>]
>>> Sent: Thursday, March 10, 2011 11:49 AM
>>> To: William J. Mills
>>> Cc: Brian Eaton; Richer, Justin P.; OAuth WG
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>
>>> JSON-P (callback) works with <script> tags where no parameters can be
>> set; this is used a lot in web applications that want to consume 3rd par=
ty APIs
>> directly on the client side. So, yes, an alternative for the Authorizati=
on
>> header is required - a.f.a.i.k this use case was one of the driving forc=
es
>> behind WRAP and bearer tokens.
>>>
>>> 2011/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-
>> inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>
>>> Is there really a need going forward for anything beyond using the
>> Authorization header?  Do we have clients out there that just can't set =
that
>> header?  Putting bearer tokens in query arguments is a very bad idea for
>> many reasons, and in form variables has it's own set of badness (althoug=
h
>> not to the same level).
>>>
>>> -bill
>>>
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From phil.hunt@oracle.com  Thu Mar 10 11:22:13 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 89CE93A6A4C for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:22:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.521
X-Spam-Level: 
X-Spam-Status: No, score=-6.521 tagged_above=-999 required=5 tests=[AWL=0.078,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Px84G3cMIY8V for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:22:10 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id D975B3A6B5B for <oauth@ietf.org>; Thu, 10 Mar 2011 11:21:55 -0800 (PST)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2AJNBlb022879 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 10 Mar 2011 19:23:12 GMT
Received: from acsmt354.oracle.com (acsmt354.oracle.com [141.146.40.154]) by rcsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2AIu8Wv020918; Thu, 10 Mar 2011 19:23:08 GMT
Received: from abhmt017.oracle.com by acsmt355.oracle.com with ESMTP id 1076196751299784956; Thu, 10 Mar 2011 11:22:36 -0800
Received: from [192.168.1.8] (/24.87.204.3) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 10 Mar 2011 11:22:35 -0800
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B1@IMCMBX3.MITRE.ORG>
Date: Thu, 10 Mar 2011 11:22:33 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <0BB28BF7-0331-4C6E-ABE3-A18FB0FB71D3@oracle.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG> <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>, <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B1@IMCMBX3.MITRE.ORG>
To: "Richer, Justin P." <jricher@mitre.org>
X-Mailer: Apple Mail (2.1082)
X-Source-IP: acsmt354.oracle.com [141.146.40.154]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090205.4D79251F.00E3,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 19:22:13 -0000

I think I was confused because of the use of the term "credential" =
rather than token.

If you are calling the token service end-point then it is a big issue. =
E.g. exposing a refresh token would be as bad as a uid/pwd since it is =
long-lived.

For a resource server, I agree, the risk is lower.

Phil
phil.hunt@oracle.com




On 2011-03-10, at 11:17 AM, Richer, Justin P. wrote:

> Nobody said UID and password -- we're talking about tokens here. The =
cost of a leaked temporary token (even a straight bearer token) is much, =
much lower.
>=20
> -- Justin
> ________________________________________
> From: Phil Hunt [phil.hunt@oracle.com]
> Sent: Thursday, March 10, 2011 2:01 PM
> To: Richer, Justin P.
> Cc: Eran Hammer-Lahav; OAuth WG
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>=20
> Well, for one if you promote this, it becomes general technique. Now =
you have uid/passwords in browser history etc potentially accessible to =
javascript and could be leaked/hacked in any number of ways.
>=20
> Also, I would say that credentials are a higher risk item then say a =
specific API call. Why? because credentials are used universally and so =
the exposure is much higher. That said, it is still possible that =
application data can just as costly to expose. Another reason to use =
secure forms over URLs.
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> On 2011-03-10, at 10:37 AM, Richer, Justin P. wrote:
>=20
>> 1) Yes. And don't discount ease-of-use for developers. If I'm already =
sending my parameters over the query, this becomes another parameter and =
is really easy to manage.
>> 2) Yes, for parallelism to #1, when using a POST.
>> 3) The idea of a parameter registry for this part is absurd, and the =
parameter should be kept simple. I do think that it needs to be named =
something other than "oauth_token".
>>=20
>> I'm happy with discouraging the use of 1 and 2 with discussion in the =
security considerations, but I think that if we don't specify this =
behavior and discuss it, then people are going to do it anyway and we =
run more risk of things going wrong. Simply ignoring the issue in the =
spec (by remaining silent about it) will not make it go away.
>>=20
>> Since all formats are optional, couldn't an AS/PR setup that wants to =
just lock things down and require auth headers for their particular =
setup? If in two years nobody deploys it anymore, then let's deprecate =
it from the spec and never speak of this again.
>>=20
>> -- Justin
>>=20
>> ________________________________________
>> From: Eran Hammer-Lahav [eran@hueniverse.com]
>> Sent: Thursday, March 10, 2011 1:29 PM
>> To: Phil Hunt; Richer, Justin P.
>> Cc: OAuth WG
>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>=20
>> There are a few issues to consider.
>>=20
>> 1. Should the spec support sending bearer token in a query parameter?
>>=20
>> - The argument that there are many use cases for this is unproven. =
JSON-P is one valid example (though JSON-P usage is in decline with new =
methods for cross-domain calls), but so far the only one given.
>> - I think at this point we have to include this functionality and the =
only potential open issue is if we want to rename it to something other =
than oauth_token.
>> - Including this functionality doesn't mean we should encourage it, =
and the way to deal with that is to mark this as 'deprecated'.
>>=20
>> 2. Should the spec support sending authentication parameters in the =
body?
>>=20
>> - I don't have any use cases where this is required. If the client =
can perform a POST with a body, it should be able to set the header. =
Where is this an issue?
>>=20
>> 3. Should the oauth_token parameter be defined as part of an =
extensible framework for adding parameters to protected resources =
endpoint?
>>=20
>> - This was the original issue raised and so far no one has provided =
any use cases for this. We just need to make sure we pick the right =
parameter name for oauth_token and clearly state that it is not the =
right way to send tokens. There should not be any more such parameters =
in the protected resource namespace.
>>=20
>> EHL
>>=20
>>=20
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf
>>> Of Phil Hunt
>>> Sent: Thursday, March 10, 2011 10:15 AM
>>> To: Richer, Justin P.
>>> Cc: OAuth WG
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>=20
>>> -1.  It is a BAD security practice to pass credentials in URLs. =
Avoid it.
>>>=20
>>> Phil
>>> phil.hunt@oracle.com
>>>=20
>>>=20
>>>=20
>>>=20
>>> On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:
>>>=20
>>>> Ah, here we run into the classic argument of usability vs. =
security, in which
>>> usability will win every single time in practice. If we don't define =
at least a
>>> reasonable way to do this within the scope of OAuth, that's not =
going to stop
>>> people from doing it. It's just going to make people do it in a =
million different
>>> ways, each with their own unique problems that nobody's thought of. =
At
>>> least this way, we can enable it and have a real discussion about =
the security
>>> considerations. There are valid and valuable places where putting =
credentials
>>> in the URL is a reasonable security tradeoff. Not everything =
functions over
>>> the public internet as well, and the security considerations are =
different in
>>> these other environments.
>>>>=20
>>>> In short: yes, it's necessary and good to do this.
>>>>=20
>>>> -- Justin
>>>> ________________________________________
>>>> From: William J. Mills [wmills@yahoo-inc.com]
>>>> Sent: Thursday, March 10, 2011 12:59 PM
>>>> To: Richer, Justin P.; Lukas Rosenstock
>>>> Cc: Brian Eaton; OAuth WG
>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>=20
>>>> Yeah, but there are serious security problems with credentials in =
the URL, is
>>> it really worth it in light of those problems?
>>>>=20
>>>> ________________________________
>>>> From: "Richer, Justin P." <jricher@mitre.org>
>>>> To: Lukas Rosenstock <lr@lukasrosenstock.net>; William J. Mills
>>> <wmills@yahoo-inc.com>
>>>> Cc: Brian Eaton <beaton@google.com>; OAuth WG <oauth@ietf.org>
>>>> Sent: Thursday, March 10, 2011 9:49 AM
>>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>>>=20
>>>> Yes, there are many development setups where all you can reasonably
>>> access is the URL to get. It's also much simpler to make use of the =
well-
>>> supported syntax helpers for query parameters instead of relying on =
new,
>>> custom formatting for newly-defined headers. The bearer token makes =
this
>>> simple by just having the value of the token, but other schemes have =
their
>>> own name/value pair formats and encodings that will inevitably cause
>>> hiccups.
>>>>=20
>>>> -- Justin
>>>> ________________________________________
>>>> From: Lukas Rosenstock
>>> [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>]
>>>> Sent: Thursday, March 10, 2011 11:49 AM
>>>> To: William J. Mills
>>>> Cc: Brian Eaton; Richer, Justin P.; OAuth WG
>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>=20
>>>> JSON-P (callback) works with <script> tags where no parameters can =
be
>>> set; this is used a lot in web applications that want to consume 3rd =
party APIs
>>> directly on the client side. So, yes, an alternative for the =
Authorization
>>> header is required - a.f.a.i.k this use case was one of the driving =
forces
>>> behind WRAP and bearer tokens.
>>>>=20
>>>> 2011/3/9 William J. Mills =
<wmills@yahoo-inc.com<mailto:wmills@yahoo-
>>> inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>
>>>> Is there really a need going forward for anything beyond using the
>>> Authorization header?  Do we have clients out there that just can't =
set that
>>> header?  Putting bearer tokens in query arguments is a very bad idea =
for
>>> many reasons, and in form variables has it's own set of badness =
(although
>>> not to the same level).
>>>>=20
>>>> -bill
>>>>=20
>>>>=20
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20


From wmills@yahoo-inc.com  Thu Mar 10 11:35:57 2011
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6E7DA3A68B1 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:35:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id beY-Jw7ISLnQ for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:35:55 -0800 (PST)
Received: from web32314.mail.mud.yahoo.com (web32314.mail.mud.yahoo.com [68.142.207.162]) by core3.amsl.com (Postfix) with SMTP id C69C63A6826 for <oauth@ietf.org>; Thu, 10 Mar 2011 11:35:54 -0800 (PST)
Received: (qmail 5024 invoked by uid 60001); 10 Mar 2011 19:37:10 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1299785830; bh=sd1ixDIhB0dr45TSuIYpeKgZle1zs3V4kiapCiepPaQ=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=FG+aiIRXXIflBCjdLMUXcH8sEMIpqPzl6aR0nPf9zb/llkRYNv0tD0zRfpbDGses6L9iD9wwnN0gH4mx2gF0P6c/Ycn5aSCGI4w9Us4mKBDA6uddtwP5GGrRrqLg9CYYM3LUug9E4upH5WzqmrJWDCGwwzABvX6BHwJ/BSCo5HU=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=jicbAfESSsHp/8o7ezEFm2HZxVb4Lo0vxsG1utj4uI8DXpgZuAAvSd0990lIsAhzG01jKlISzQigua8tcqBnoWAxUuPGJm/68KAMCn748uLAiX8S9amy0/GbA665dLDGh2fwkyI0BUX1hulPTHB1tNXm1jyj1xP7uO0ucWzOG9Q=;
Message-ID: <294015.79670.qm@web32314.mail.mud.yahoo.com>
X-YMail-OSG: vAzzyrQVM1lVHzdaqOHqXvytIHlnV.DzuMDcfAnvbobn7D1 Ku3CK8xe7ZzDAPNiNJ2M71efAOd1hilrc5jI_gE2KNydFKFR1XpR3hiRzK_D tCWuQKaI.1aAHxkPrwEb7IWrOZWKfYNqv7fLBiJJaZzGe77eIIqpZ6VDvTmo zfrWug21zc8eDc.znnWwVZF0XQOzGxpdBX2JeeAyTquQINqeq4O0W_9kq3aA cErkF0iqR9N.BvGy4aKnOFdd9rGldSfC0bTdrSlsH8kG6Ct43lcoM8fIuBRc ZH5OqjsPe_BC_0uBVb4t_U6o19bwfbWilXX1h4pcIdokN05A-
Received: from [209.131.62.115] by web32314.mail.mud.yahoo.com via HTTP; Thu, 10 Mar 2011 11:37:10 PST
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.110.296531
Date: Thu, 10 Mar 2011 11:37:10 -0800 (PST)
From: "William J. Mills" <wmills@yahoo-inc.com>
To: "Richer, Justin P." <jricher@mitre.org>, Phil Hunt <phil.hunt@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1137179515-1299785830=:79670"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 19:35:57 -0000

--0-1137179515-1299785830=:79670
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

If people are doign a one-poff internal solution they can do whatever they =
want, that doesn't mean it shoudl be part of a security related standard.=
=0A=0A=0A=0A________________________________=0AFrom: "Richer, Justin P." <j=
richer@mitre.org>=0ATo: Phil Hunt <phil.hunt@oracle.com>=0ACc: William J. M=
ills <wmills@yahoo-inc.com>; Lukas Rosenstock <lr@lukasrosenstock.net>; OAu=
th WG <oauth@ietf.org>=0ASent: Thursday, March 10, 2011 10:30 AM=0ASubject:=
 RE: [OAUTH-WG] OAuth Bearer Token draft=0A=0AWhat about temporary credenti=
als across a local link between controlled systems? My point is just that t=
here are cases where the usual leakage culprits (browsers, proxies, caches,=
 logs) don't apply. =0A=0AIt's also a bad idea to not use two-way TLS, and =
it's arguably a bad idea to look at anything on the web without using TLS t=
o begin with, but we still do. It's all about the tradeoff between security=
 of a system and the usability and usefulness of a system. There's an old a=
dage that the most secure computer is powered off and unplugged. :)=0A=0AI =
think it's very important to strike an appropriate balance.=0A=0A-- Justin=
=0A________________________________________=0AFrom: Phil Hunt [phil.hunt@or=
acle.com]=0ASent: Thursday, March 10, 2011 1:15 PM=0ATo: Richer, Justin P.=
=0ACc: William J. Mills; Lukas Rosenstock; OAuth WG=0ASubject: Re: [OAUTH-W=
G] OAuth Bearer Token draft=0A=0A-1.=A0 It is a BAD security practice to pa=
ss credentials in URLs. Avoid it.=0A=0APhil=0Aphil.hunt@oracle.com=0A=0A=0A=
=0A=0AOn 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:=0A=0A> Ah, here =
we run into the classic argument of usability vs. security, in which usabil=
ity will win every single time in practice. If we don't define at least a r=
easonable way to do this within the scope of OAuth, that's not going to sto=
p people from doing it. It's just going to make people do it in a million d=
ifferent ways, each with their own unique problems that nobody's thought of=
. At least this way, we can enable it and have a real discussion about the =
security considerations. There are valid and valuable places where putting =
credentials in the URL is a reasonable security tradeoff. Not everything fu=
nctions over the public internet as well, and the security considerations a=
re different in these other environments.=0A>=0A> In short: yes, it's neces=
sary and good to do this.=0A>=0A> -- Justin=0A> ___________________________=
_____________=0A> From: William J. Mills [wmills@yahoo-inc.com]=0A> Sent: T=
hursday, March 10, 2011 12:59 PM=0A> To: Richer, Justin P.; Lukas Rosenstoc=
k=0A> Cc: Brian Eaton; OAuth WG=0A> Subject: Re: [OAUTH-WG] OAuth Bearer To=
ken draft=0A>=0A> Yeah, but there are serious security problems with creden=
tials in the URL, is it really worth it in light of those problems?=0A>=0A>=
 ________________________________=0A> From: "Richer, Justin P." <jricher@mi=
tre.org>=0A> To: Lukas Rosenstock <lr@lukasrosenstock.net>; William J. Mill=
s <wmills@yahoo-inc.com>=0A> Cc: Brian Eaton <beaton@google.com>; OAuth WG =
<oauth@ietf.org>=0A> Sent: Thursday, March 10, 2011 9:49 AM=0A> Subject: RE=
: [OAUTH-WG] OAuth Bearer Token draft=0A>=0A> Yes, there are many developme=
nt setups where all you can reasonably access is the URL to get. It's also =
much simpler to make use of the well-supported syntax helpers for query par=
ameters instead of relying on new, custom formatting for newly-defined head=
ers. The bearer token makes this simple by just having the value of the tok=
en, but other schemes have their own name/value pair formats and encodings =
that will inevitably cause hiccups.=0A>=0A> -- Justin=0A> _________________=
_______________________=0A> From: Lukas Rosenstock [lr@lukasrosenstock.net<=
mailto:lr@lukasrosenstock.net>]=0A> Sent: Thursday, March 10, 2011 11:49 AM=
=0A> To: William J. Mills=0A> Cc: Brian Eaton; Richer, Justin P.; OAuth WG=
=0A> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft=0A>=0A> JSON-P (callb=
ack) works with <script> tags where no parameters can be set; this is used =
a lot in web applications that want to consume 3rd party APIs directly on t=
he client side. So, yes, an alternative for the Authorization header is req=
uired - a.f.a.i.k this use case was one of the driving forces behind WRAP a=
nd bearer tokens.=0A>=0A> 2011/3/9 William J. Mills <wmills@yahoo-inc.com<m=
ailto:wmills@yahoo-inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo=
-inc.com>>>=0A> Is there really a need going forward for anything beyond us=
ing the Authorization header?=A0 Do we have clients out there that just can=
't set that header?=A0 Putting bearer tokens in query arguments is a very b=
ad idea for many reasons, and in form variables has it's own set of badness=
 (although not to the same level).=0A>=0A> -bill=0A>=0A>=0A>=0A> __________=
_____________________________________=0A> OAuth mailing list=0A> OAuth@ietf=
.org=0A> https://www.ietf.org/mailman/listinfo/oauth=0A=0A=0A      
--0-1137179515-1299785830=:79670
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:ti=
mes new roman, new york, times, serif;font-size:12pt"><div><span>If people =
are doign a one-poff internal solution they can do whatever they want, that=
 doesn't mean it shoudl be part of a security related standard.<br></span><=
/div><div><br></div><div style=3D"font-family: times new roman,new york,tim=
es,serif; font-size: 12pt;"><div style=3D"font-family: times new roman,new =
york,times,serif; font-size: 12pt;"><font size=3D"2" face=3D"Arial"><hr siz=
e=3D"1"><b><span style=3D"font-weight: bold;">From:</span></b> "Richer, Jus=
tin P." &lt;jricher@mitre.org&gt;<br><b><span style=3D"font-weight: bold;">=
To:</span></b> Phil Hunt &lt;phil.hunt@oracle.com&gt;<br><b><span style=3D"=
font-weight: bold;">Cc:</span></b> William J. Mills &lt;wmills@yahoo-inc.co=
m&gt;; Lukas Rosenstock &lt;lr@lukasrosenstock.net&gt;; OAuth WG &lt;oauth@=
ietf.org&gt;<br><b><span style=3D"font-weight: bold;">Sent:</span></b> Thur=
sday, March
 10, 2011 10:30 AM<br><b><span style=3D"font-weight: bold;">Subject:</span>=
</b> RE: [OAUTH-WG] OAuth Bearer Token draft<br></font><br> What about temp=
orary credentials across a local link between controlled systems? My point =
is just that there are cases where the usual leakage culprits (browsers, pr=
oxies, caches, logs) don't apply. <br><br>It's also a bad idea to not use t=
wo-way TLS, and it's arguably a bad idea to look at anything on the web wit=
hout using TLS to begin with, but we still do. It's all about the tradeoff =
between security of a system and the usability and usefulness of a system. =
There's an old adage that the most secure computer is powered off and unplu=
gged. :)<br><br>I think it's very important to strike an appropriate balanc=
e.<br><br> -- Justin<br>________________________________________<br>From: P=
hil Hunt [<a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil.hu=
nt@oracle.com">phil.hunt@oracle.com</a>]<br>Sent: Thursday, March 10, 2011
 1:15 PM<br>To: Richer, Justin P.<br>Cc: William J. Mills; Lukas Rosenstock=
; OAuth WG<br>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<br><br>-1.&n=
bsp; It is a BAD security practice to pass credentials in URLs. Avoid it.<b=
r><br>Phil<br><a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phi=
l.hunt@oracle.com">phil.hunt@oracle.com</a><br><br><br><br><br>On 2011-03-1=
0, at 10:07 AM, Richer, Justin P. wrote:<br><br>&gt; Ah, here we run into t=
he classic argument of usability vs. security, in which usability will win =
every single time in practice. If we don't define at least a reasonable way=
 to do this within the scope of OAuth, that's not going to stop people from=
 doing it. It's just going to make people do it in a million different ways=
, each with their own unique problems that nobody's thought of. At least th=
is way, we can enable it and have a real discussion about the security cons=
iderations. There are valid and valuable places where putting
 credentials in the URL is a reasonable security tradeoff. Not everything f=
unctions over the public internet as well, and the security considerations =
are different in these other environments.<br>&gt;<br>&gt; In short: yes, i=
t's necessary and good to do this.<br>&gt;<br>&gt; -- Justin<br>&gt; ______=
__________________________________<br>&gt; From: William J. Mills [<a ymail=
to=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.com">wmi=
lls@yahoo-inc.com</a>]<br>&gt; Sent: Thursday, March 10, 2011 12:59 PM<br>&=
gt; To: Richer, Justin P.; Lukas Rosenstock<br>&gt; Cc: Brian Eaton; OAuth =
WG<br>&gt; Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<br>&gt;<br>&gt;=
 Yeah, but there are serious security problems with credentials in the URL,=
 is it really worth it in light of those problems?<br>&gt;<br>&gt; ________=
________________________<br>&gt; From: "Richer, Justin P." &lt;<a ymailto=
=3D"mailto:jricher@mitre.org"
 href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br>&gt; To: Lu=
kas Rosenstock &lt;<a ymailto=3D"mailto:lr@lukasrosenstock.net" href=3D"mai=
lto:lr@lukasrosenstock.net">lr@lukasrosenstock.net</a>&gt;; William J. Mill=
s &lt;<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills@yaho=
o-inc.com">wmills@yahoo-inc.com</a>&gt;<br>&gt; Cc: Brian Eaton &lt;<a ymai=
lto=3D"mailto:beaton@google.com" href=3D"mailto:beaton@google.com">beaton@g=
oogle.com</a>&gt;; OAuth WG &lt;<a ymailto=3D"mailto:oauth@ietf.org" href=
=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<br>&gt; Sent: Thursday, M=
arch 10, 2011 9:49 AM<br>&gt; Subject: RE: [OAUTH-WG] OAuth Bearer Token dr=
aft<br>&gt;<br>&gt; Yes, there are many development setups where all you ca=
n reasonably access is the URL to get. It's also much simpler to make use o=
f the well-supported syntax helpers for query parameters instead of relying=
 on new, custom formatting for newly-defined headers. The bearer token make=
s this simple
 by just having the value of the token, but other schemes have their own na=
me/value pair formats and encodings that will inevitably cause hiccups.<br>=
&gt;<br>&gt; -- Justin<br>&gt; ________________________________________<br>=
&gt; From: Lukas Rosenstock [<a ymailto=3D"mailto:lr@lukasrosenstock.net" h=
ref=3D"mailto:lr@lukasrosenstock.net">lr@lukasrosenstock.net</a>&lt;mailto:=
<a ymailto=3D"mailto:lr@lukasrosenstock.net" href=3D"mailto:lr@lukasrosenst=
ock.net">lr@lukasrosenstock.net</a>&gt;]<br>&gt; Sent: Thursday, March 10, =
2011 11:49 AM<br>&gt; To: William J. Mills<br>&gt; Cc: Brian Eaton; Richer,=
 Justin P.; OAuth WG<br>&gt; Subject: Re: [OAUTH-WG] OAuth Bearer Token dra=
ft<br>&gt;<br>&gt; JSON-P (callback) works with &lt;script&gt; tags where n=
o parameters can be set; this is used a lot in web applications that want t=
o consume 3rd party APIs directly on the client side. So, yes, an alternati=
ve for the Authorization header is required - a.f.a.i.k this use case was
 one of the driving forces behind WRAP and bearer tokens.<br>&gt;<br>&gt; 2=
011/3/9 William J. Mills &lt;<a ymailto=3D"mailto:wmills@yahoo-inc.com" hre=
f=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&lt;mailto:<a yma=
ilto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.com">w=
mills@yahoo-inc.com</a>&gt;&lt;mailto:<a ymailto=3D"mailto:wmills@yahoo-inc=
.com" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&lt;mail=
to:<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-i=
nc.com">wmills@yahoo-inc.com</a>&gt;&gt;&gt;<br>&gt; Is there really a need=
 going forward for anything beyond using the Authorization header?&nbsp; Do=
 we have clients out there that just can't set that header?&nbsp; Putting b=
earer tokens in query arguments is a very bad idea for many reasons, and in=
 form variables has it's own set of badness (although not to the same level=
).<br>&gt;<br>&gt; -bill<br>&gt;<br>&gt;<br>&gt;<br>&gt;
 _______________________________________________<br>&gt; OAuth mailing list=
<br>&gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org=
">OAuth@ietf.org</a><br>&gt; <a href=3D"https://www.ietf.org/mailman/listin=
fo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a>=
<br><br><br></div></div></div><br>=0A=0A      </body></html>
--0-1137179515-1299785830=:79670--

From jricher@mitre.org  Thu Mar 10 11:40:30 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9FB043A698C for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:40:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vZz6FQIJkiX0 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:40:29 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 7A3043A683C for <oauth@ietf.org>; Thu, 10 Mar 2011 11:40:29 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 7C25921B0EEA; Thu, 10 Mar 2011 14:41:47 -0500 (EST)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 725B521B0462; Thu, 10 Mar 2011 14:41:47 -0500 (EST)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub2.MITRE.ORG ([129.83.29.74]) with mapi; Thu, 10 Mar 2011 14:41:47 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: "William J. Mills" <wmills@yahoo-inc.com>, Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 10 Mar 2011 14:41:12 -0500
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvfWpND5dPnc4u9Q5Sn8jivbPoG3wAAIl7O
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B4@IMCMBX3.MITRE.ORG>
References: <294015.79670.qm@web32314.mail.mud.yahoo.com>
In-Reply-To: <294015.79670.qm@web32314.mail.mud.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 19:40:30 -0000

The entire purpose of a standard is to codify the one-off solutions out the=
re into best practices in different contexts.

 -- Justin
________________________________________
From: William J. Mills [wmills@yahoo-inc.com]
Sent: Thursday, March 10, 2011 2:37 PM
To: Richer, Justin P.; Phil Hunt
Cc: Lukas Rosenstock; OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

If people are doign a one-poff internal solution they can do whatever they =
want, that doesn't mean it shoudl be part of a security related standard.

________________________________
From: "Richer, Justin P." <jricher@mitre.org>
To: Phil Hunt <phil.hunt@oracle.com>
Cc: William J. Mills <wmills@yahoo-inc.com>; Lukas Rosenstock <lr@lukasrose=
nstock.net>; OAuth WG <oauth@ietf.org>
Sent: Thursday, March 10, 2011 10:30 AM
Subject: RE: [OAUTH-WG] OAuth Bearer Token draft

What about temporary credentials across a local link between controlled sys=
tems? My point is just that there are cases where the usual leakage culprit=
s (browsers, proxies, caches, logs) don't apply.

It's also a bad idea to not use two-way TLS, and it's arguably a bad idea t=
o look at anything on the web without using TLS to begin with, but we still=
 do. It's all about the tradeoff between security of a system and the usabi=
lity and usefulness of a system. There's an old adage that the most secure =
computer is powered off and unplugged. :)

I think it's very important to strike an appropriate balance.

-- Justin
________________________________________
From: Phil Hunt [phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>]
Sent: Thursday, March 10, 2011 1:15 PM
To: Richer, Justin P.
Cc: William J. Mills; Lukas Rosenstock; OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

-1.  It is a BAD security practice to pass credentials in URLs. Avoid it.

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>




On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:

> Ah, here we run into the classic argument of usability vs. security, in w=
hich usability will win every single time in practice. If we don't define a=
t least a reasonable way to do this within the scope of OAuth, that's not g=
oing to stop people from doing it. It's just going to make people do it in =
a million different ways, each with their own unique problems that nobody's=
 thought of. At least this way, we can enable it and have a real discussion=
 about the security considerations. There are valid and valuable places whe=
re putting credentials in the URL is a reasonable security tradeoff. Not ev=
erything functions over the public internet as well, and the security consi=
derations are different in these other environments.
>
> In short: yes, it's necessary and good to do this.
>
> -- Justin
> ________________________________________
> From: William J. Mills [wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>=
]
> Sent: Thursday, March 10, 2011 12:59 PM
> To: Richer, Justin P.; Lukas Rosenstock
> Cc: Brian Eaton; OAuth WG
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
> Yeah, but there are serious security problems with credentials in the URL=
, is it really worth it in light of those problems?
>
> ________________________________
> From: "Richer, Justin P." <jricher@mitre.org<mailto:jricher@mitre.org>>
> To: Lukas Rosenstock <lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.ne=
t>>; William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>
> Cc: Brian Eaton <beaton@google.com<mailto:beaton@google.com>>; OAuth WG <=
oauth@ietf.org<mailto:oauth@ietf.org>>
> Sent: Thursday, March 10, 2011 9:49 AM
> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>
> Yes, there are many development setups where all you can reasonably acces=
s is the URL to get. It's also much simpler to make use of the well-support=
ed syntax helpers for query parameters instead of relying on new, custom fo=
rmatting for newly-defined headers. The bearer token makes this simple by j=
ust having the value of the token, but other schemes have their own name/va=
lue pair formats and encodings that will inevitably cause hiccups.
>
> -- Justin
> ________________________________________
> From: Lukas Rosenstock [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.=
net><mailto:lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>>]
> Sent: Thursday, March 10, 2011 11:49 AM
> To: William J. Mills
> Cc: Brian Eaton; Richer, Justin P.; OAuth WG
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
> JSON-P (callback) works with <script> tags where no parameters can be set=
; this is used a lot in web applications that want to consume 3rd party API=
s directly on the client side. So, yes, an alternative for the Authorizatio=
n header is required - a.f.a.i.k this use case was one of the driving force=
s behind WRAP and bearer tokens.
>
> 2011/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.c=
om><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>><mailto:wmills=
@yahoo-inc.com<mailto:wmills@yahoo-inc.com><mailto:wmills@yahoo-inc.com<mai=
lto:wmills@yahoo-inc.com>>>>
> Is there really a need going forward for anything beyond using the Author=
ization header?  Do we have clients out there that just can't set that head=
er?  Putting bearer tokens in query arguments is a very bad idea for many r=
easons, and in form variables has it's own set of badness (although not to =
the same level).
>
> -bill
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth




From wmills@yahoo-inc.com  Thu Mar 10 11:44:00 2011
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2FD903A6B5C for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:44:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yWYhmqG7HzHg for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:43:57 -0800 (PST)
Received: from web32303.mail.mud.yahoo.com (web32303.mail.mud.yahoo.com [68.142.207.151]) by core3.amsl.com (Postfix) with SMTP id 820B43A683C for <oauth@ietf.org>; Thu, 10 Mar 2011 11:43:57 -0800 (PST)
Received: (qmail 61054 invoked by uid 60001); 10 Mar 2011 19:45:12 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1299786312; bh=nv7Rn5q/Zci3MI8Ls/uDFEwDPK6qu0DllV0clK8g2dA=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=cklr9/I5b5Mw4KrkAxmRau2//U1IZFk/8hlZzVGSVDCqC6vNDcz75YeBmEVAXrV0GW/Tpj2PadpI96E/5Pcpe5QWedOlhAbiKtBsOYkS83F5NtoCzeqUSFL5OJbiWLYbSYZwM0aWEZU+RK2tYt4hyoJH8Zj/rneoP0amX/BMovQ=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=afmrL9ynyjF09dkrdegacjhaPh1FUqCnp2F8SBXiRkiTb6UrW7T6xXpd3wauLjnNPObygiyb0jHPy/NExrl/UM4wOW7EQ9ZKNH5Cia7c2s2navYvtVjQfQLWpbZGOrkbz35LmvQaS4vzTunj/owEUkwQkMzv1i5fkiPNenZ9WNY=;
Message-ID: <138113.39380.qm@web32303.mail.mud.yahoo.com>
X-YMail-OSG: TCBlPMsVM1mWF_ixjGStmhuenCUpw3J0lh.tO6dj52tOonx tqf0I4xLI62PnC841gQjOUGo5XKBycjzGNu5Qm2EDpPCs138YLmkPEJ0yzou UM6pVyoMtw4NMrnQhC9nWxSkjL5vAtIaOeJVSDSp0uzP9uKfoeQyDdKupsZ7 X5fj5unArF5VcRo0Nd74hSv2oqRovI6w9LS_ms_2HWRgAnT7aMhjZTYdYgJR aKPFr4ipyfmYliSsPx4POG1Yc66z0_D1wcLA1NL2ZfoHD39hHoaEiYCGeO5q FGK3CqrQ_ly1WGEmLKP5TsFv0QRY4tQXeSoIl8kFqCVi3kQ--
Received: from [209.131.62.115] by web32303.mail.mud.yahoo.com via HTTP; Thu, 10 Mar 2011 11:45:12 PST
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.110.296531
Date: Thu, 10 Mar 2011 11:45:12 -0800 (PST)
From: "William J. Mills" <wmills@yahoo-inc.com>
To: "Richer, Justin P." <jricher@mitre.org>, Phil Hunt <phil.hunt@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-280116495-1299786312=:39380"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 19:44:00 -0000

--0-280116495-1299786312=:39380
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Yes, a token is a less priveledged thing that uid/password.=A0 Some of the =
big problems are browser cache (being able to get back to a signed in state=
 after a sign out), server side logging of credentials because they log the=
 URL, and proxies caching credentials in URLs.=A0 POST variables are signif=
icantly better but still not great, and suffer from being cached in the bro=
wser history.=0A=0AI'm not saying we should break existing implementations,=
 but I agree we should not sanction them by putting them as part of the spe=
c.=A0=A0 SASL TEXT/PLAIN authentication exists, people still use it without=
 SSL; a very bad idea, but conforms to most of the spec (PLAIN now says you=
 must use SSL).=0A=0A=0A=0A________________________________=0AFrom: "Richer=
, Justin P." <jricher@mitre.org>=0ATo: Phil Hunt <phil.hunt@oracle.com>=0AC=
c: OAuth WG <oauth@ietf.org>=0ASent: Thursday, March 10, 2011 11:18 AM=0ASu=
bject: Re: [OAUTH-WG] OAuth Bearer Token draft=0A=0ANobody said UID and pas=
sword -- we're talking about tokens here. The cost of a leaked temporary to=
ken (even a straight bearer token) is much, much lower.=0A=0A-- Justin=0A__=
______________________________________=0AFrom: Phil Hunt [phil.hunt@oracle.=
com]=0ASent: Thursday, March 10, 2011 2:01 PM=0ATo: Richer, Justin P.=0ACc:=
 Eran Hammer-Lahav; OAuth WG=0ASubject: Re: [OAUTH-WG] OAuth Bearer Token d=
raft=0A=0AWell, for one if you promote this, it becomes general technique. =
Now you have uid/passwords in browser history etc potentially accessible to=
 javascript and could be leaked/hacked in any number of ways.=0A=0AAlso, I =
would say that credentials are a higher risk item then say a specific API c=
all. Why? because credentials are used universally and so the exposure is m=
uch higher. That said, it is still possible that application data can just =
as costly to expose. Another reason to use secure forms over URLs.=0A=0APhi=
l=0Aphil.hunt@oracle.com=0A=0A=0A=0A=0AOn 2011-03-10, at 10:37 AM, Richer, =
Justin P. wrote:=0A=0A> 1) Yes. And don't discount ease-of-use for develope=
rs. If I'm already sending my parameters over the query, this becomes anoth=
er parameter and is really easy to manage.=0A> 2) Yes, for parallelism to #=
1, when using a POST.=0A> 3) The idea of a parameter registry for this part=
 is absurd, and the parameter should be kept simple. I do think that it nee=
ds to be named something other than "oauth_token".=0A>=0A> I'm happy with d=
iscouraging the use of 1 and 2 with discussion in the security consideratio=
ns, but I think that if we don't specify this behavior and discuss it, then=
 people are going to do it anyway and we run more risk of things going wron=
g. Simply ignoring the issue in the spec (by remaining silent about it) wil=
l not make it go away.=0A>=0A> Since all formats are optional, couldn't an =
AS/PR setup that wants to just lock things down and require auth headers fo=
r their particular setup? If in two years nobody deploys it anymore, then l=
et's deprecate it from the spec and never speak of this again.=0A>=0A> -- J=
ustin=0A>=0A> ________________________________________=0A> From: Eran Hamme=
r-Lahav [eran@hueniverse.com]=0A> Sent: Thursday, March 10, 2011 1:29 PM=0A=
> To: Phil Hunt; Richer, Justin P.=0A> Cc: OAuth WG=0A> Subject: RE: [OAUTH=
-WG] OAuth Bearer Token draft=0A>=0A> There are a few issues to consider.=
=0A>=0A> 1. Should the spec support sending bearer token in a query paramet=
er?=0A>=0A> - The argument that there are many use cases for this is unprov=
en. JSON-P is one valid example (though JSON-P usage is in decline with new=
 methods for cross-domain calls), but so far the only one given.=0A> - I th=
ink at this point we have to include this functionality and the only potent=
ial open issue is if we want to rename it to something other than oauth_tok=
en.=0A> - Including this functionality doesn't mean we should encourage it,=
 and the way to deal with that is to mark this as 'deprecated'.=0A>=0A> 2. =
Should the spec support sending authentication parameters in the body?=0A>=
=0A> - I don't have any use cases where this is required. If the client can=
 perform a POST with a body, it should be able to set the header. Where is =
this an issue?=0A>=0A> 3. Should the oauth_token parameter be defined as pa=
rt of an extensible framework for adding parameters to protected resources =
endpoint?=0A>=0A> - This was the original issue raised and so far no one ha=
s provided any use cases for this. We just need to make sure we pick the ri=
ght parameter name for oauth_token and clearly state that it is not the rig=
ht way to send tokens. There should not be any more such parameters in the =
protected resource namespace.=0A>=0A> EHL=0A>=0A>=0A>> -----Original Messag=
e-----=0A>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On=
 Behalf=0A>> Of Phil Hunt=0A>> Sent: Thursday, March 10, 2011 10:15 AM=0A>>=
 To: Richer, Justin P.=0A>> Cc: OAuth WG=0A>> Subject: Re: [OAUTH-WG] OAuth=
 Bearer Token draft=0A>>=0A>> -1.=A0 It is a BAD security practice to pass =
credentials in URLs. Avoid it.=0A>>=0A>> Phil=0A>> phil.hunt@oracle.com=0A>=
>=0A>>=0A>>=0A>>=0A>> On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:=
=0A>>=0A>>> Ah, here we run into the classic argument of usability vs. secu=
rity, in which=0A>> usability will win every single time in practice. If we=
 don't define at least a=0A>> reasonable way to do this within the scope of=
 OAuth, that's not going to stop=0A>> people from doing it. It's just going=
 to make people do it in a million different=0A>> ways, each with their own=
 unique problems that nobody's thought of. At=0A>> least this way, we can e=
nable it and have a real discussion about the security=0A>> considerations.=
 There are valid and valuable places where putting credentials=0A>> in the =
URL is a reasonable security tradeoff. Not everything functions over=0A>> t=
he public internet as well, and the security considerations are different i=
n=0A>> these other environments.=0A>>>=0A>>> In short: yes, it's necessary =
and good to do this.=0A>>>=0A>>> -- Justin=0A>>> __________________________=
______________=0A>>> From: William J. Mills [wmills@yahoo-inc.com]=0A>>> Se=
nt: Thursday, March 10, 2011 12:59 PM=0A>>> To: Richer, Justin P.; Lukas Ro=
senstock=0A>>> Cc: Brian Eaton; OAuth WG=0A>>> Subject: Re: [OAUTH-WG] OAut=
h Bearer Token draft=0A>>>=0A>>> Yeah, but there are serious security probl=
ems with credentials in the URL, is=0A>> it really worth it in light of tho=
se problems?=0A>>>=0A>>> ________________________________=0A>>> From: "Rich=
er, Justin P." <jricher@mitre.org>=0A>>> To: Lukas Rosenstock <lr@lukasrose=
nstock.net>; William J. Mills=0A>> <wmills@yahoo-inc.com>=0A>>> Cc: Brian E=
aton <beaton@google.com>; OAuth WG <oauth@ietf.org>=0A>>> Sent: Thursday, M=
arch 10, 2011 9:49 AM=0A>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draf=
t=0A>>>=0A>>> Yes, there are many development setups where all you can reas=
onably=0A>> access is the URL to get. It's also much simpler to make use of=
 the well-=0A>> supported syntax helpers for query parameters instead of re=
lying on new,=0A>> custom formatting for newly-defined headers. The bearer =
token makes this=0A>> simple by just having the value of the token, but oth=
er schemes have their=0A>> own name/value pair formats and encodings that w=
ill inevitably cause=0A>> hiccups.=0A>>>=0A>>> -- Justin=0A>>> ____________=
____________________________=0A>>> From: Lukas Rosenstock=0A>> [lr@lukasros=
enstock.net<mailto:lr@lukasrosenstock.net>]=0A>>> Sent: Thursday, March 10,=
 2011 11:49 AM=0A>>> To: William J. Mills=0A>>> Cc: Brian Eaton; Richer, Ju=
stin P.; OAuth WG=0A>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft=0A=
>>>=0A>>> JSON-P (callback) works with <script> tags where no parameters ca=
n be=0A>> set; this is used a lot in web applications that want to consume =
3rd party APIs=0A>> directly on the client side. So, yes, an alternative fo=
r the Authorization=0A>> header is required - a.f.a.i.k this use case was o=
ne of the driving forces=0A>> behind WRAP and bearer tokens.=0A>>>=0A>>> 20=
11/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:wmills@yahoo-=0A>> inc=
.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>=0A>>> Is t=
here really a need going forward for anything beyond using the=0A>> Authori=
zation header?=A0 Do we have clients out there that just can't set that=0A>=
> header?=A0 Putting bearer tokens in query arguments is a very bad idea fo=
r=0A>> many reasons, and in form variables has it's own set of badness (alt=
hough=0A>> not to the same level).=0A>>>=0A>>> -bill=0A>>>=0A>>>=0A>>>=0A>>=
> _______________________________________________=0A>>> OAuth mailing list=
=0A>>> OAuth@ietf.org=0A>>> https://www.ietf.org/mailman/listinfo/oauth=0A>=
>=0A>> _______________________________________________=0A>> OAuth mailing l=
ist=0A>> OAuth@ietf.org=0A>> https://www.ietf.org/mailman/listinfo/oauth=0A=
=0A_______________________________________________=0AOAuth mailing list=0AO=
Auth@ietf.org=0Ahttps://www.ietf.org/mailman/listinfo/oauth=0A=0A=0A      
--0-280116495-1299786312=:39380
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:ti=
mes new roman, new york, times, serif;font-size:12pt"><div>Yes, a token is =
a less priveledged thing that uid/password.&nbsp; Some of the big problems =
are browser cache (being able to get back to a signed in state after a sign=
 out), server side logging of credentials because they log the URL, and pro=
xies caching credentials in URLs.&nbsp; POST variables are significantly be=
tter but still not great, and suffer from being cached in the browser histo=
ry.</div><div><br></div><div style=3D"color: rgb(0, 0, 0); font-size: 16px;=
 font-family: times new roman,new york,times,serif; background-color: trans=
parent; font-style: normal;">I'm not saying we should break existing implem=
entations, but I agree we should not sanction them by putting them as part =
of the spec.&nbsp;&nbsp; SASL TEXT/PLAIN authentication exists, people stil=
l use it without SSL; a very bad idea, but conforms to most of the spec
 (PLAIN now says you must use SSL).<br></div><div style=3D"color: rgb(0, 0,=
 0); font-size: 16px; font-family: times new roman,new york,times,serif; ba=
ckground-color: transparent; font-style: normal;"><br></div><div style=3D"f=
ont-family: times new roman,new york,times,serif; font-size: 12pt;"><div st=
yle=3D"font-family: times new roman,new york,times,serif; font-size: 12pt;"=
><font size=3D"2" face=3D"Arial"><hr size=3D"1"><b><span style=3D"font-weig=
ht: bold;">From:</span></b> "Richer, Justin P." &lt;jricher@mitre.org&gt;<b=
r><b><span style=3D"font-weight: bold;">To:</span></b> Phil Hunt &lt;phil.h=
unt@oracle.com&gt;<br><b><span style=3D"font-weight: bold;">Cc:</span></b> =
OAuth WG &lt;oauth@ietf.org&gt;<br><b><span style=3D"font-weight: bold;">Se=
nt:</span></b> Thursday, March 10, 2011 11:18 AM<br><b><span style=3D"font-=
weight: bold;">Subject:</span></b> Re: [OAUTH-WG] OAuth Bearer Token draft<=
br></font><br> Nobody said UID and password -- we're talking about tokens h=
ere. The cost
 of a leaked temporary token (even a straight bearer token) is much, much l=
ower.<br><br> -- Justin<br>________________________________________<br>From=
: Phil Hunt [<a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil=
.hunt@oracle.com">phil.hunt@oracle.com</a>]<br>Sent: Thursday, March 10, 20=
11 2:01 PM<br>To: Richer, Justin P.<br>Cc: Eran Hammer-Lahav; OAuth WG<br>S=
ubject: Re: [OAUTH-WG] OAuth Bearer Token draft<br><br>Well, for one if you=
 promote this, it becomes general technique. Now you have uid/passwords in =
browser history etc potentially accessible to javascript and could be leake=
d/hacked in any number of ways.<br><br>Also, I would say that credentials a=
re a higher risk item then say a specific API call. Why? because credential=
s are used universally and so the exposure is much higher. That said, it is=
 still possible that application data can just as costly to expose. Another=
 reason to use secure forms over URLs.<br><br>Phil<br><a
 ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil.hunt@oracle.co=
m">phil.hunt@oracle.com</a><br><br><br><br><br>On 2011-03-10, at 10:37 AM, =
Richer, Justin P. wrote:<br><br>&gt; 1) Yes. And don't discount ease-of-use=
 for developers. If I'm already sending my parameters over the query, this =
becomes another parameter and is really easy to manage.<br>&gt; 2) Yes, for=
 parallelism to #1, when using a POST.<br>&gt; 3) The idea of a parameter r=
egistry for this part is absurd, and the parameter should be kept simple. I=
 do think that it needs to be named something other than "oauth_token".<br>=
&gt;<br>&gt; I'm happy with discouraging the use of 1 and 2 with discussion=
 in the security considerations, but I think that if we don't specify this =
behavior and discuss it, then people are going to do it anyway and we run m=
ore risk of things going wrong. Simply ignoring the issue in the spec (by r=
emaining silent about it) will not make it go away.<br>&gt;<br>&gt;
 Since all formats are optional, couldn't an AS/PR setup that wants to just=
 lock things down and require auth headers for their particular setup? If i=
n two years nobody deploys it anymore, then let's deprecate it from the spe=
c and never speak of this again.<br>&gt;<br>&gt; -- Justin<br>&gt;<br>&gt; =
________________________________________<br>&gt; From: Eran Hammer-Lahav [<=
a ymailto=3D"mailto:eran@hueniverse.com" href=3D"mailto:eran@hueniverse.com=
">eran@hueniverse.com</a>]<br>&gt; Sent: Thursday, March 10, 2011 1:29 PM<b=
r>&gt; To: Phil Hunt; Richer, Justin P.<br>&gt; Cc: OAuth WG<br>&gt; Subjec=
t: RE: [OAUTH-WG] OAuth Bearer Token draft<br>&gt;<br>&gt; There are a few =
issues to consider.<br>&gt;<br>&gt; 1. Should the spec support sending bear=
er token in a query parameter?<br>&gt;<br>&gt; - The argument that there ar=
e many use cases for this is unproven. JSON-P is one valid example (though =
JSON-P usage is in decline with new methods for cross-domain calls), but
 so far the only one given.<br>&gt; - I think at this point we have to incl=
ude this functionality and the only potential open issue is if we want to r=
ename it to something other than oauth_token.<br>&gt; - Including this func=
tionality doesn't mean we should encourage it, and the way to deal with tha=
t is to mark this as 'deprecated'.<br>&gt;<br>&gt; 2. Should the spec suppo=
rt sending authentication parameters in the body?<br>&gt;<br>&gt; - I don't=
 have any use cases where this is required. If the client can perform a POS=
T with a body, it should be able to set the header. Where is this an issue?=
<br>&gt;<br>&gt; 3. Should the oauth_token parameter be defined as part of =
an extensible framework for adding parameters to protected resources endpoi=
nt?<br>&gt;<br>&gt; - This was the original issue raised and so far no one =
has provided any use cases for this. We just need to make sure we pick the =
right parameter name for oauth_token and clearly state that it is
 not the right way to send tokens. There should not be any more such parame=
ters in the protected resource namespace.<br>&gt;<br>&gt; EHL<br>&gt;<br>&g=
t;<br>&gt;&gt; -----Original Message-----<br>&gt;&gt; From: <a ymailto=3D"m=
ailto:oauth-bounces@ietf.org" href=3D"mailto:oauth-bounces@ietf.org">oauth-=
bounces@ietf.org</a> [mailto:<a ymailto=3D"mailto:oauth-bounces@ietf.org" h=
ref=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a>] On Behalf=
<br>&gt;&gt; Of Phil Hunt<br>&gt;&gt; Sent: Thursday, March 10, 2011 10:15 =
AM<br>&gt;&gt; To: Richer, Justin P.<br>&gt;&gt; Cc: OAuth WG<br>&gt;&gt; S=
ubject: Re: [OAUTH-WG] OAuth Bearer Token draft<br>&gt;&gt;<br>&gt;&gt; -1.=
&nbsp; It is a BAD security practice to pass credentials in URLs. Avoid it.=
<br>&gt;&gt;<br>&gt;&gt; Phil<br>&gt;&gt; <a ymailto=3D"mailto:phil.hunt@or=
acle.com" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>=
&gt;&gt;<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt;<br>&gt;&gt; On 2011-03-10, at =
10:07
 AM, Richer, Justin P. wrote:<br>&gt;&gt;<br>&gt;&gt;&gt; Ah, here we run i=
nto the classic argument of usability vs. security, in which<br>&gt;&gt; us=
ability will win every single time in practice. If we don't define at least=
 a<br>&gt;&gt; reasonable way to do this within the scope of OAuth, that's =
not going to stop<br>&gt;&gt; people from doing it. It's just going to make=
 people do it in a million different<br>&gt;&gt; ways, each with their own =
unique problems that nobody's thought of. At<br>&gt;&gt; least this way, we=
 can enable it and have a real discussion about the security<br>&gt;&gt; co=
nsiderations. There are valid and valuable places where putting credentials=
<br>&gt;&gt; in the URL is a reasonable security tradeoff. Not everything f=
unctions over<br>&gt;&gt; the public internet as well, and the security con=
siderations are different in<br>&gt;&gt; these other environments.<br>&gt;&=
gt;&gt;<br>&gt;&gt;&gt; In short: yes, it's necessary and good to do
 this.<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; -- Justin<br>&gt;&gt;&gt; __________=
______________________________<br>&gt;&gt;&gt; From: William J. Mills [<a y=
mailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.com"=
>wmills@yahoo-inc.com</a>]<br>&gt;&gt;&gt; Sent: Thursday, March 10, 2011 1=
2:59 PM<br>&gt;&gt;&gt; To: Richer, Justin P.; Lukas Rosenstock<br>&gt;&gt;=
&gt; Cc: Brian Eaton; OAuth WG<br>&gt;&gt;&gt; Subject: Re: [OAUTH-WG] OAut=
h Bearer Token draft<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; Yeah, but there are se=
rious security problems with credentials in the URL, is<br>&gt;&gt; it real=
ly worth it in light of those problems?<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; ___=
_____________________________<br>&gt;&gt;&gt; From: "Richer, Justin P." &lt=
;<a ymailto=3D"mailto:jricher@mitre.org" href=3D"mailto:jricher@mitre.org">=
jricher@mitre.org</a>&gt;<br>&gt;&gt;&gt; To: Lukas Rosenstock &lt;<a ymail=
to=3D"mailto:lr@lukasrosenstock.net"
 href=3D"mailto:lr@lukasrosenstock.net">lr@lukasrosenstock.net</a>&gt;; Wil=
liam J. Mills<br>&gt;&gt; &lt;<a ymailto=3D"mailto:wmills@yahoo-inc.com" hr=
ef=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;<br>&gt;&gt;=
&gt; Cc: Brian Eaton &lt;<a ymailto=3D"mailto:beaton@google.com" href=3D"ma=
ilto:beaton@google.com">beaton@google.com</a>&gt;; OAuth WG &lt;<a ymailto=
=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a=
>&gt;<br>&gt;&gt;&gt; Sent: Thursday, March 10, 2011 9:49 AM<br>&gt;&gt;&gt=
; Subject: RE: [OAUTH-WG] OAuth Bearer Token draft<br>&gt;&gt;&gt;<br>&gt;&=
gt;&gt; Yes, there are many development setups where all you can reasonably=
<br>&gt;&gt; access is the URL to get. It's also much simpler to make use o=
f the well-<br>&gt;&gt; supported syntax helpers for query parameters inste=
ad of relying on new,<br>&gt;&gt; custom formatting for newly-defined heade=
rs. The bearer token makes this<br>&gt;&gt; simple by just having the value=
 of the
 token, but other schemes have their<br>&gt;&gt; own name/value pair format=
s and encodings that will inevitably cause<br>&gt;&gt; hiccups.<br>&gt;&gt;=
&gt;<br>&gt;&gt;&gt; -- Justin<br>&gt;&gt;&gt; ____________________________=
____________<br>&gt;&gt;&gt; From: Lukas Rosenstock<br>&gt;&gt; [<a ymailto=
=3D"mailto:lr@lukasrosenstock.net" href=3D"mailto:lr@lukasrosenstock.net">l=
r@lukasrosenstock.net</a>&lt;mailto:<a ymailto=3D"mailto:lr@lukasrosenstock=
.net" href=3D"mailto:lr@lukasrosenstock.net">lr@lukasrosenstock.net</a>&gt;=
]<br>&gt;&gt;&gt; Sent: Thursday, March 10, 2011 11:49 AM<br>&gt;&gt;&gt; T=
o: William J. Mills<br>&gt;&gt;&gt; Cc: Brian Eaton; Richer, Justin P.; OAu=
th WG<br>&gt;&gt;&gt; Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<br>&=
gt;&gt;&gt;<br>&gt;&gt;&gt; JSON-P (callback) works with &lt;script&gt; tag=
s where no parameters can be<br>&gt;&gt; set; this is used a lot in web app=
lications that want to consume 3rd party APIs<br>&gt;&gt; directly on the
 client side. So, yes, an alternative for the Authorization<br>&gt;&gt; hea=
der is required - a.f.a.i.k this use case was one of the driving forces<br>=
&gt;&gt; behind WRAP and bearer tokens.<br>&gt;&gt;&gt;<br>&gt;&gt;&gt; 201=
1/3/9 William J. Mills &lt;<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=
=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&lt;mailto:<a ymai=
lto=3D"mailto:wmills@yahoo-" href=3D"mailto:wmills@yahoo-">wmills@yahoo-</a=
><br>&gt;&gt; inc.com&gt;&lt;mailto:<a ymailto=3D"mailto:wmills@yahoo-inc.c=
om" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&lt;mailto=
:<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc=
.com">wmills@yahoo-inc.com</a>&gt;&gt;&gt;<br>&gt;&gt;&gt; Is there really =
a need going forward for anything beyond using the<br>&gt;&gt; Authorizatio=
n header?&nbsp; Do we have clients out there that just can't set that<br>&g=
t;&gt; header?&nbsp; Putting bearer tokens in query arguments is a very bad=
 idea
 for<br>&gt;&gt; many reasons, and in form variables has it's own set of ba=
dness (although<br>&gt;&gt; not to the same level).<br>&gt;&gt;&gt;<br>&gt;=
&gt;&gt; -bill<br>&gt;&gt;&gt;<br>&gt;&gt;&gt;<br>&gt;&gt;&gt;<br>&gt;&gt;&=
gt; _______________________________________________<br>&gt;&gt;&gt; OAuth m=
ailing list<br>&gt;&gt;&gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=3D"ma=
ilto:OAuth@ietf.org">OAuth@ietf.org</a><br>&gt;&gt;&gt; <a href=3D"https://=
www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org=
/mailman/listinfo/oauth</a><br>&gt;&gt;<br>&gt;&gt; _______________________=
________________________<br>&gt;&gt; OAuth mailing list<br>&gt;&gt; <a ymai=
lto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org=
</a><br>&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br>____=
___________________________________________<br>OAuth mailing list<br><a
 ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@iet=
f.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><br></di=
v></div></div><br>=0A=0A=0A=0A=0A=0A=0A=0A      </body></html>
--0-280116495-1299786312=:39380--

From wmills@yahoo-inc.com  Thu Mar 10 11:45:50 2011
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 21A813A6A4E for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:45:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tt+72pCXlNAS for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 11:45:48 -0800 (PST)
Received: from web32314.mail.mud.yahoo.com (web32314.mail.mud.yahoo.com [68.142.207.162]) by core3.amsl.com (Postfix) with SMTP id 6C3E63A691A for <oauth@ietf.org>; Thu, 10 Mar 2011 11:45:48 -0800 (PST)
Received: (qmail 9098 invoked by uid 60001); 10 Mar 2011 19:47:03 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1299786423; bh=lFY3HBxUfK9LVoHht0cwNUVxq35JIiYWvjw7DIFOr8s=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=YCvH/lcYOdjhV+8ARzPkkUPSmU22Ae3ax4RZeGXHynXUYpeb5rn9a0Wuw7bl1952CZ7I4yc7RVqbcX8GaR9XPUWdqKrXNhSM1UqJN0geOXhzQj2XAxh2tTfixTGxHYApFqWz1R7ryEItb+4g08EvphcRGsT0aBPvxVe5/fbPd3Y=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:MIME-Version:Content-Type; b=iY3X4X5zCRqCd9IF4kz+KevQUgp06pYM7THXEp2YAvBOVRYq/4qzxKDKzF8agyaQRHhAwUkYpIq5ByUHdXc/dKe7vrDUfiqt0d0dYbc3epOk0paR76Qmn1fCU3w0SGlSXWw+0UFhpGaHGTx23QzNJuIB4vOVtvuUhkwWG75oOzc=;
Message-ID: <838256.46653.qm@web32314.mail.mud.yahoo.com>
X-YMail-OSG: 5xTmTxYVM1lXsoJgsoi8XEZCfkc_VQ1oqxXZ6Y6MjaFTOS. Ff27lHUh2uLLdOuQeXXSm86qZEU1VwvwEwKCldbRFFebtIYaBOx9Bnco3dus ArYUvTCngplQhi2ellvT5ryxGR02uvuEethlSden2NaIvvSbhdyK0FFNcRSb gaG9F_42JTQa4l4v79ehON0xtNF1meZxl0rBprRsdpSbx3X7IQKMoD0ajRiU aT..yxg7KFuGSnOzMN4SHufDE1SUntG0KFZ_QdPubM.KWN5y9TIUPDuA_PaV d.wCOmshOKCWJaxOMZuTXyVSMU60NMAEBrMAOcUktQBdC3VdvZM6mOjw5IgS n1jlGGcpILHBzgpcYxVrrNbbrcBkCENAZvzXdR676
Received: from [209.131.62.115] by web32314.mail.mud.yahoo.com via HTTP; Thu, 10 Mar 2011 11:47:03 PST
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.110.296531
Date: Thu, 10 Mar 2011 11:47:03 -0800 (PST)
From: "William J. Mills" <wmills@yahoo-inc.com>
To: "Richer, Justin P." <jricher@mitre.org>, Phil Hunt <phil.hunt@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-2095265887-1299786423=:46653"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 19:45:50 -0000

--0-2095265887-1299786423=:46653
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

We disagree on whether bearer credentials carried in GET parameters can be =
considered a best practice.=0A=0A=0A=0A________________________________=0AF=
rom: "Richer, Justin P." <jricher@mitre.org>=0ATo: William J. Mills <wmills=
@yahoo-inc.com>; Phil Hunt <phil.hunt@oracle.com>=0ACc: Lukas Rosenstock <l=
r@lukasrosenstock.net>; OAuth WG <oauth@ietf.org>=0ASent: Thursday, March 1=
0, 2011 11:41 AM=0ASubject: RE: [OAUTH-WG] OAuth Bearer Token draft=0A=0ATh=
e entire purpose of a standard is to codify the one-off solutions out there=
 into best practices in different contexts.=0A=0A-- Justin=0A______________=
__________________________=0AFrom: William J. Mills [wmills@yahoo-inc.com]=
=0ASent: Thursday, March 10, 2011 2:37 PM=0ATo: Richer, Justin P.; Phil Hun=
t=0ACc: Lukas Rosenstock; OAuth WG=0ASubject: Re: [OAUTH-WG] OAuth Bearer T=
oken draft=0A=0AIf people are doign a one-poff internal solution they can d=
o whatever they want, that doesn't mean it shoudl be part of a security rel=
ated standard.=0A=0A________________________________=0AFrom: "Richer, Justi=
n P." <jricher@mitre.org>=0ATo: Phil Hunt <phil.hunt@oracle.com>=0ACc: Will=
iam J. Mills <wmills@yahoo-inc.com>; Lukas Rosenstock <lr@lukasrosenstock.n=
et>; OAuth WG <oauth@ietf.org>=0ASent: Thursday, March 10, 2011 10:30 AM=0A=
Subject: RE: [OAUTH-WG] OAuth Bearer Token draft=0A=0AWhat about temporary =
credentials across a local link between controlled systems? My point is jus=
t that there are cases where the usual leakage culprits (browsers, proxies,=
 caches, logs) don't apply.=0A=0AIt's also a bad idea to not use two-way TL=
S, and it's arguably a bad idea to look at anything on the web without usin=
g TLS to begin with, but we still do. It's all about the tradeoff between s=
ecurity of a system and the usability and usefulness of a system. There's a=
n old adage that the most secure computer is powered off and unplugged. :)=
=0A=0AI think it's very important to strike an appropriate balance.=0A=0A--=
 Justin=0A________________________________________=0AFrom: Phil Hunt [phil.=
hunt@oracle.com<mailto:phil.hunt@oracle.com>]=0ASent: Thursday, March 10, 2=
011 1:15 PM=0ATo: Richer, Justin P.=0ACc: William J. Mills; Lukas Rosenstoc=
k; OAuth WG=0ASubject: Re: [OAUTH-WG] OAuth Bearer Token draft=0A=0A-1.=A0 =
It is a BAD security practice to pass credentials in URLs. Avoid it.=0A=0AP=
hil=0Aphil.hunt@oracle.com<mailto:phil.hunt@oracle.com>=0A=0A=0A=0A=0AOn 20=
11-03-10, at 10:07 AM, Richer, Justin P. wrote:=0A=0A> Ah, here we run into=
 the classic argument of usability vs. security, in which usability will wi=
n every single time in practice. If we don't define at least a reasonable w=
ay to do this within the scope of OAuth, that's not going to stop people fr=
om doing it. It's just going to make people do it in a million different wa=
ys, each with their own unique problems that nobody's thought of. At least =
this way, we can enable it and have a real discussion about the security co=
nsiderations. There are valid and valuable places where putting credentials=
 in the URL is a reasonable security tradeoff. Not everything functions ove=
r the public internet as well, and the security considerations are differen=
t in these other environments.=0A>=0A> In short: yes, it's necessary and go=
od to do this.=0A>=0A> -- Justin=0A> ______________________________________=
__=0A> From: William J. Mills [wmills@yahoo-inc.com<mailto:wmills@yahoo-inc=
.com>]=0A> Sent: Thursday, March 10, 2011 12:59 PM=0A> To: Richer, Justin P=
.; Lukas Rosenstock=0A> Cc: Brian Eaton; OAuth WG=0A> Subject: Re: [OAUTH-W=
G] OAuth Bearer Token draft=0A>=0A> Yeah, but there are serious security pr=
oblems with credentials in the URL, is it really worth it in light of those=
 problems?=0A>=0A> ________________________________=0A> From: "Richer, Just=
in P." <jricher@mitre.org<mailto:jricher@mitre.org>>=0A> To: Lukas Rosensto=
ck <lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>>; William J. Mill=
s <wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>=0A> Cc: Brian Eaton <=
beaton@google.com<mailto:beaton@google.com>>; OAuth WG <oauth@ietf.org<mail=
to:oauth@ietf.org>>=0A> Sent: Thursday, March 10, 2011 9:49 AM=0A> Subject:=
 RE: [OAUTH-WG] OAuth Bearer Token draft=0A>=0A> Yes, there are many develo=
pment setups where all you can reasonably access is the URL to get. It's al=
so much simpler to make use of the well-supported syntax helpers for query =
parameters instead of relying on new, custom formatting for newly-defined h=
eaders. The bearer token makes this simple by just having the value of the =
token, but other schemes have their own name/value pair formats and encodin=
gs that will inevitably cause hiccups.=0A>=0A> -- Justin=0A> ______________=
__________________________=0A> From: Lukas Rosenstock [lr@lukasrosenstock.n=
et<mailto:lr@lukasrosenstock.net><mailto:lr@lukasrosenstock.net<mailto:lr@l=
ukasrosenstock.net>>]=0A> Sent: Thursday, March 10, 2011 11:49 AM=0A> To: W=
illiam J. Mills=0A> Cc: Brian Eaton; Richer, Justin P.; OAuth WG=0A> Subjec=
t: Re: [OAUTH-WG] OAuth Bearer Token draft=0A>=0A> JSON-P (callback) works =
with <script> tags where no parameters can be set; this is used a lot in we=
b applications that want to consume 3rd party APIs directly on the client s=
ide. So, yes, an alternative for the Authorization header is required - a.f=
.a.i.k this use case was one of the driving forces behind WRAP and bearer t=
okens.=0A>=0A> 2011/3/9 William J. Mills <wmills@yahoo-inc.com<mailto:wmill=
s@yahoo-inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>><=
mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com><mailto:wmills@yaho=
o-inc.com<mailto:wmills@yahoo-inc.com>>>>=0A> Is there really a need going =
forward for anything beyond using the Authorization header?=A0 Do we have c=
lients out there that just can't set that header?=A0 Putting bearer tokens =
in query arguments is a very bad idea for many reasons, and in form variabl=
es has it's own set of badness (although not to the same level).=0A>=0A> -b=
ill=0A>=0A>=0A>=0A> _______________________________________________=0A> OAu=
th mailing list=0A> OAuth@ietf.org<mailto:OAuth@ietf.org>=0A> https://www.i=
etf.org/mailman/listinfo/oauth=0A=0A=0A      
--0-2095265887-1299786423=:46653
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:ti=
mes new roman, new york, times, serif;font-size:12pt"><div><span>We disagre=
e on whether bearer credentials carried in GET parameters can be considered=
 a best practice.<br></span></div><div><br></div><div style=3D"font-family:=
 times new roman,new york,times,serif; font-size: 12pt;"><div style=3D"font=
-family: times new roman,new york,times,serif; font-size: 12pt;"><font size=
=3D"2" face=3D"Arial"><hr size=3D"1"><b><span style=3D"font-weight: bold;">=
From:</span></b> "Richer, Justin P." &lt;jricher@mitre.org&gt;<br><b><span =
style=3D"font-weight: bold;">To:</span></b> William J. Mills &lt;wmills@yah=
oo-inc.com&gt;; Phil Hunt &lt;phil.hunt@oracle.com&gt;<br><b><span style=3D=
"font-weight: bold;">Cc:</span></b> Lukas Rosenstock &lt;lr@lukasrosenstock=
.net&gt;; OAuth WG &lt;oauth@ietf.org&gt;<br><b><span style=3D"font-weight:=
 bold;">Sent:</span></b> Thursday, March 10, 2011 11:41 AM<br><b><span
 style=3D"font-weight: bold;">Subject:</span></b> RE: [OAUTH-WG] OAuth Bear=
er Token draft<br></font><br> The entire purpose of a standard is to codify=
 the one-off solutions out there into best practices in different contexts.=
<br><br> -- Justin<br>________________________________________<br>From: Wil=
liam J. Mills [<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wm=
ills@yahoo-inc.com">wmills@yahoo-inc.com</a>]<br>Sent: Thursday, March 10, =
2011 2:37 PM<br>To: Richer, Justin P.; Phil Hunt<br>Cc: Lukas Rosenstock; O=
Auth WG<br>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<br><br>If peopl=
e are doign a one-poff internal solution they can do whatever they want, th=
at doesn't mean it shoudl be part of a security related standard.<br><br>__=
______________________________<br>From: "Richer, Justin P." &lt;<a ymailto=
=3D"mailto:jricher@mitre.org" href=3D"mailto:jricher@mitre.org">jricher@mit=
re.org</a>&gt;<br>To: Phil Hunt &lt;<a ymailto=3D"mailto:phil.hunt@oracle.c=
om"
 href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;<br>Cc: W=
illiam J. Mills &lt;<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mail=
to:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;; Lukas Rosenstock &lt=
;<a ymailto=3D"mailto:lr@lukasrosenstock.net" href=3D"mailto:lr@lukasrosens=
tock.net">lr@lukasrosenstock.net</a>&gt;; OAuth WG &lt;<a ymailto=3D"mailto=
:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<br>S=
ent: Thursday, March 10, 2011 10:30 AM<br>Subject: RE: [OAUTH-WG] OAuth Bea=
rer Token draft<br><br>What about temporary credentials across a local link=
 between controlled systems? My point is just that there are cases where th=
e usual leakage culprits (browsers, proxies, caches, logs) don't apply.<br>=
<br>It's also a bad idea to not use two-way TLS, and it's arguably a bad id=
ea to look at anything on the web without using TLS to begin with, but we s=
till do. It's all about the tradeoff between security of a system and the
 usability and usefulness of a system. There's an old adage that the most s=
ecure computer is powered off and unplugged. :)<br><br>I think it's very im=
portant to strike an appropriate balance.<br><br>-- Justin<br>_____________=
___________________________<br>From: Phil Hunt [<a ymailto=3D"mailto:phil.h=
unt@oracle.com" href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</=
a>&lt;mailto:<a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mailto:phil=
.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;]<br>Sent: Thursday, March 10=
, 2011 1:15 PM<br>To: Richer, Justin P.<br>Cc: William J. Mills; Lukas Rose=
nstock; OAuth WG<br>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<br><br=
>-1.&nbsp; It is a BAD security practice to pass credentials in URLs. Avoid=
 it.<br><br>Phil<br><a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"mail=
to:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&lt;mailto:<a ymailto=3D"m=
ailto:phil.hunt@oracle.com"
 href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;<br><br><=
br><br><br>On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:<br><br>&gt;=
 Ah, here we run into the classic argument of usability vs. security, in wh=
ich usability will win every single time in practice. If we don't define at=
 least a reasonable way to do this within the scope of OAuth, that's not go=
ing to stop people from doing it. It's just going to make people do it in a=
 million different ways, each with their own unique problems that nobody's =
thought of. At least this way, we can enable it and have a real discussion =
about the security considerations. There are valid and valuable places wher=
e putting credentials in the URL is a reasonable security tradeoff. Not eve=
rything functions over the public internet as well, and the security consid=
erations are different in these other environments.<br>&gt;<br>&gt; In shor=
t: yes, it's necessary and good to do this.<br>&gt;<br>&gt; --
 Justin<br>&gt; ________________________________________<br>&gt; From: Will=
iam J. Mills [<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmi=
lls@yahoo-inc.com">wmills@yahoo-inc.com</a>&lt;mailto:<a ymailto=3D"mailto:=
wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc=
.com</a>&gt;]<br>&gt; Sent: Thursday, March 10, 2011 12:59 PM<br>&gt; To: R=
icher, Justin P.; Lukas Rosenstock<br>&gt; Cc: Brian Eaton; OAuth WG<br>&gt=
; Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<br>&gt;<br>&gt; Yeah, bu=
t there are serious security problems with credentials in the URL, is it re=
ally worth it in light of those problems?<br>&gt;<br>&gt; _________________=
_______________<br>&gt; From: "Richer, Justin P." &lt;<a ymailto=3D"mailto:=
jricher@mitre.org" href=3D"mailto:jricher@mitre.org">jricher@mitre.org</a>&=
lt;mailto:<a ymailto=3D"mailto:jricher@mitre.org" href=3D"mailto:jricher@mi=
tre.org">jricher@mitre.org</a>&gt;&gt;<br>&gt; To: Lukas Rosenstock &lt;<a
 ymailto=3D"mailto:lr@lukasrosenstock.net" href=3D"mailto:lr@lukasrosenstoc=
k.net">lr@lukasrosenstock.net</a>&lt;mailto:<a ymailto=3D"mailto:lr@lukasro=
senstock.net" href=3D"mailto:lr@lukasrosenstock.net">lr@lukasrosenstock.net=
</a>&gt;&gt;; William J. Mills &lt;<a ymailto=3D"mailto:wmills@yahoo-inc.co=
m" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&lt;mailto:=
<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.=
com">wmills@yahoo-inc.com</a>&gt;&gt;<br>&gt; Cc: Brian Eaton &lt;<a ymailt=
o=3D"mailto:beaton@google.com" href=3D"mailto:beaton@google.com">beaton@goo=
gle.com</a>&lt;mailto:<a ymailto=3D"mailto:beaton@google.com" href=3D"mailt=
o:beaton@google.com">beaton@google.com</a>&gt;&gt;; OAuth WG &lt;<a ymailto=
=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a=
>&lt;mailto:<a ymailto=3D"mailto:oauth@ietf.org" href=3D"mailto:oauth@ietf.=
org">oauth@ietf.org</a>&gt;&gt;<br>&gt; Sent: Thursday, March 10, 2011 9:49=
 AM<br>&gt; Subject: RE:
 [OAUTH-WG] OAuth Bearer Token draft<br>&gt;<br>&gt; Yes, there are many de=
velopment setups where all you can reasonably access is the URL to get. It'=
s also much simpler to make use of the well-supported syntax helpers for qu=
ery parameters instead of relying on new, custom formatting for newly-defin=
ed headers. The bearer token makes this simple by just having the value of =
the token, but other schemes have their own name/value pair formats and enc=
odings that will inevitably cause hiccups.<br>&gt;<br>&gt; -- Justin<br>&gt=
; ________________________________________<br>&gt; From: Lukas Rosenstock [=
<a ymailto=3D"mailto:lr@lukasrosenstock.net" href=3D"mailto:lr@lukasrosenst=
ock.net">lr@lukasrosenstock.net</a>&lt;mailto:<a ymailto=3D"mailto:lr@lukas=
rosenstock.net" href=3D"mailto:lr@lukasrosenstock.net">lr@lukasrosenstock.n=
et</a>&gt;&lt;mailto:<a ymailto=3D"mailto:lr@lukasrosenstock.net" href=3D"m=
ailto:lr@lukasrosenstock.net">lr@lukasrosenstock.net</a>&lt;mailto:<a
 ymailto=3D"mailto:lr@lukasrosenstock.net" href=3D"mailto:lr@lukasrosenstoc=
k.net">lr@lukasrosenstock.net</a>&gt;&gt;]<br>&gt; Sent: Thursday, March 10=
, 2011 11:49 AM<br>&gt; To: William J. Mills<br>&gt; Cc: Brian Eaton; Riche=
r, Justin P.; OAuth WG<br>&gt; Subject: Re: [OAUTH-WG] OAuth Bearer Token d=
raft<br>&gt;<br>&gt; JSON-P (callback) works with &lt;script&gt; tags where=
 no parameters can be set; this is used a lot in web applications that want=
 to consume 3rd party APIs directly on the client side. So, yes, an alterna=
tive for the Authorization header is required - a.f.a.i.k this use case was=
 one of the driving forces behind WRAP and bearer tokens.<br>&gt;<br>&gt; 2=
011/3/9 William J. Mills &lt;<a ymailto=3D"mailto:wmills@yahoo-inc.com" hre=
f=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&lt;mailto:<a yma=
ilto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.com">w=
mills@yahoo-inc.com</a>&gt;&lt;mailto:<a ymailto=3D"mailto:wmills@yahoo-inc=
.com"
 href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&lt;mailto:<a=
 ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.co=
m">wmills@yahoo-inc.com</a>&gt;&gt;&lt;mailto:<a ymailto=3D"mailto:wmills@y=
ahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>=
&lt;mailto:<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mailto:wmills=
@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;&lt;mailto:<a ymailto=3D"mailto=
:wmills@yahoo-inc.com" href=3D"mailto:wmills@yahoo-inc.com">wmills@yahoo-in=
c.com</a>&lt;mailto:<a ymailto=3D"mailto:wmills@yahoo-inc.com" href=3D"mail=
to:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&gt;&gt;&gt;&gt;<br>&gt; I=
s there really a need going forward for anything beyond using the Authoriza=
tion header?&nbsp; Do we have clients out there that just can't set that he=
ader?&nbsp; Putting bearer tokens in query arguments is a very bad idea for=
 many reasons, and in form variables has it's own set of badness (although =
not to the same
 level).<br>&gt;<br>&gt; -bill<br>&gt;<br>&gt;<br>&gt;<br>&gt; ____________=
___________________________________<br>&gt; OAuth mailing list<br>&gt; <a y=
mailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.=
org</a>&lt;mailto:<a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth=
@ietf.org">OAuth@ietf.org</a>&gt;<br>&gt; <a href=3D"https://www.ietf.org/m=
ailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listi=
nfo/oauth</a><br><br><br><br><br></div></div></div><br>=0A=0A      </body><=
/html>
--0-2095265887-1299786423=:46653--

From torsten@lodderstedt.net  Thu Mar 10 13:42:43 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B24EE3A6ABE for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 13:42:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.214
X-Spam-Level: 
X-Spam-Status: No, score=-2.214 tagged_above=-999 required=5 tests=[AWL=0.035,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r4SylfL8GpuA for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 13:42:41 -0800 (PST)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.31.29]) by core3.amsl.com (Postfix) with ESMTP id 751003A6AB1 for <oauth@ietf.org>; Thu, 10 Mar 2011 13:42:39 -0800 (PST)
Received: from [79.253.32.116] (helo=[192.168.71.26]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1PxneF-0007wj-UY; Thu, 10 Mar 2011 22:43:56 +0100
Message-ID: <4D79461C.1020200@lodderstedt.net>
Date: Thu, 10 Mar 2011 22:43:56 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Phil Hunt <phil.hunt@oracle.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com>	<D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG>	<B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>, <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com>	<D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B1@IMCMBX3.MITRE.ORG> <0BB28BF7-0331-4C6E-ABE3-A18FB0FB71D3@oracle.com>
In-Reply-To: <0BB28BF7-0331-4C6E-ABE3-A18FB0FB71D3@oracle.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 21:42:43 -0000

I would assume refresh token exposure to be less dangerous than the 
leakage of uid/password since a refresh tokens is restricted to a scope.

regards,
Torsten.

Am 10.03.2011 20:22, schrieb Phil Hunt:
> I think I was confused because of the use of the term "credential" rather than token.
>
> If you are calling the token service end-point then it is a big issue. E.g. exposing a refresh token would be as bad as a uid/pwd since it is long-lived.
>
> For a resource server, I agree, the risk is lower.
>
> Phil
> phil.hunt@oracle.comer
>
>
>
>
> On 2011-03-10, at 11:17 AM, Richer, Justin P. wrote:
>
>> Nobody said UID and password -- we're talking about tokens here. The cost of a leaked temporary token (even a straight bearer token) is much, much lower.
>>
>> -- Justin
>> ________________________________________
>> From: Phil Hunt [phil.hunt@oracle.com]
>> Sent: Thursday, March 10, 2011 2:01 PM
>> To: Richer, Justin P.
>> Cc: Eran Hammer-Lahav; OAuth WG
>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>
>> Well, for one if you promote this, it becomes general technique. Now you have uid/passwords in browser history etc potentially accessible to javascript and could be leaked/hacked in any number of ways.
>>
>> Also, I would say that credentials are a higher risk item then say a specific API call. Why? because credentials are used universally and so the exposure is much higher. That said, it is still possible that application data can just as costly to expose. Another reason to use secure forms over URLs.
>>
>> Phil
>> phil.hunt@oracle.com
>>
>>
>>
>>
>> On 2011-03-10, at 10:37 AM, Richer, Justin P. wrote:
>>
>>> 1) Yes. And don't discount ease-of-use for developers. If I'm already sending my parameters over the query, this becomes another parameter and is really easy to manage.
>>> 2) Yes, for parallelism to #1, when using a POST.
>>> 3) The idea of a parameter registry for this part is absurd, and the parameter should be kept simple. I do think that it needs to be named something other than "oauth_token".
>>>
>>> I'm happy with discouraging the use of 1 and 2 with discussion in the security considerations, but I think that if we don't specify this behavior and discuss it, then people are going to do it anyway and we run more risk of things going wrong. Simply ignoring the issue in the spec (by remaining silent about it) will not make it go away.
>>>
>>> Since all formats are optional, couldn't an AS/PR setup that wants to just lock things down and require auth headers for their particular setup? If in two years nobody deploys it anymore, then let's deprecate it from the spec and never speak of this again.
>>>
>>> -- Justin
>>>
>>> ________________________________________
>>> From: Eran Hammer-Lahav [eran@hueniverse.com]
>>> Sent: Thursday, March 10, 2011 1:29 PM
>>> To: Phil Hunt; Richer, Justin P.
>>> Cc: OAuth WG
>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>>
>>> There are a few issues to consider.
>>>
>>> 1. Should the spec support sending bearer token in a query parameter?
>>>
>>> - The argument that there are many use cases for this is unproven. JSON-P is one valid example (though JSON-P usage is in decline with new methods for cross-domain calls), but so far the only one given.
>>> - I think at this point we have to include this functionality and the only potential open issue is if we want to rename it to something other than oauth_token.
>>> - Including this functionality doesn't mean we should encourage it, and the way to deal with that is to mark this as 'deprecated'.
>>>
>>> 2. Should the spec support sending authentication parameters in the body?
>>>
>>> - I don't have any use cases where this is required. If the client can perform a POST with a body, it should be able to set the header. Where is this an issue?
>>>
>>> 3. Should the oauth_token parameter be defined as part of an extensible framework for adding parameters to protected resources endpoint?
>>>
>>> - This was the original issue raised and so far no one has provided any use cases for this. We just need to make sure we pick the right parameter name for oauth_token and clearly state that it is not the right way to send tokens. There should not be any more such parameters in the protected resource namespace.
>>>
>>> EHL
>>>
>>>
>>>> -----Original Message-----
>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>>>> Of Phil Hunt
>>>> Sent: Thursday, March 10, 2011 10:15 AM
>>>> To: Richer, Justin P.
>>>> Cc: OAuth WG
>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>
>>>> -1.  It is a BAD security practice to pass credentials in URLs. Avoid it.
>>>>
>>>> Phil
>>>> phil.hunt@oracle.com
>>>>
>>>>
>>>>
>>>>
>>>> On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:
>>>>
>>>>> Ah, here we run into the classic argument of usability vs. security, in which
>>>> usability will win every single time in practice. If we don't define at least a
>>>> reasonable way to do this within the scope of OAuth, that's not going to stop
>>>> people from doing it. It's just going to make people do it in a million different
>>>> ways, each with their own unique problems that nobody's thought of. At
>>>> least this way, we can enable it and have a real discussion about the security
>>>> considerations. There are valid and valuable places where putting credentials
>>>> in the URL is a reasonable security tradeoff. Not everything functions over
>>>> the public internet as well, and the security considerations are different in
>>>> these other environments.
>>>>> In short: yes, it's necessary and good to do this.
>>>>>
>>>>> -- Justin
>>>>> ________________________________________
>>>>> From: William J. Mills [wmills@yahoo-inc.com]
>>>>> Sent: Thursday, March 10, 2011 12:59 PM
>>>>> To: Richer, Justin P.; Lukas Rosenstock
>>>>> Cc: Brian Eaton; OAuth WG
>>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>>
>>>>> Yeah, but there are serious security problems with credentials in the URL, is
>>>> it really worth it in light of those problems?
>>>>> ________________________________
>>>>> From: "Richer, Justin P."<jricher@mitre.org>
>>>>> To: Lukas Rosenstock<lr@lukasrosenstock.net>; William J. Mills
>>>> <wmills@yahoo-inc.com>
>>>>> Cc: Brian Eaton<beaton@google.com>; OAuth WG<oauth@ietf.org>
>>>>> Sent: Thursday, March 10, 2011 9:49 AM
>>>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>>>>
>>>>> Yes, there are many development setups where all you can reasonably
>>>> access is the URL to get. It's also much simpler to make use of the well-
>>>> supported syntax helpers for query parameters instead of relying on new,
>>>> custom formatting for newly-defined headers. The bearer token makes this
>>>> simple by just having the value of the token, but other schemes have their
>>>> own name/value pair formats and encodings that will inevitably cause
>>>> hiccups.
>>>>> -- Justin
>>>>> ________________________________________
>>>>> From: Lukas Rosenstock
>>>> [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>]
>>>>> Sent: Thursday, March 10, 2011 11:49 AM
>>>>> To: William J. Mills
>>>>> Cc: Brian Eaton; Richer, Justin P.; OAuth WG
>>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>>
>>>>> JSON-P (callback) works with<script>  tags where no parameters can be
>>>> set; this is used a lot in web applications that want to consume 3rd party APIs
>>>> directly on the client side. So, yes, an alternative for the Authorization
>>>> header is required - a.f.a.i.k this use case was one of the driving forces
>>>> behind WRAP and bearer tokens.
>>>>> 2011/3/9 William J. Mills<wmills@yahoo-inc.com<mailto:wmills@yahoo-
>>>> inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>
>>>>> Is there really a need going forward for anything beyond using the
>>>> Authorization header?  Do we have clients out there that just can't set that
>>>> header?  Putting bearer tokens in query arguments is a very bad idea for
>>>> many reasons, and in form variables has it's own set of badness (although
>>>> not to the same level).
>>>>> -bill
>>>>>
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From phil.hunt@oracle.com  Thu Mar 10 14:31:06 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 265AF3A6AD4 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 14:31:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.525
X-Spam-Level: 
X-Spam-Status: No, score=-6.525 tagged_above=-999 required=5 tests=[AWL=0.074,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dr3EWYi53vg3 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 14:31:00 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 89B1F3A6866 for <oauth@ietf.org>; Thu, 10 Mar 2011 14:31:00 -0800 (PST)
Received: from rcsinet13.oracle.com (rcsinet13.oracle.com [148.87.113.125]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2AMWFb9013064 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 10 Mar 2011 22:32:17 GMT
Received: from acsmt353.oracle.com (acsmt353.oracle.com [141.146.40.153]) by rcsinet13.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2AFpZBg017800; Thu, 10 Mar 2011 22:32:14 GMT
Received: from abhmt019.oracle.com by acsmt355.oracle.com with ESMTP id 1076808981299796284; Thu, 10 Mar 2011 14:31:24 -0800
Received: from [192.168.1.8] (/24.87.204.3) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 10 Mar 2011 14:31:24 -0800
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <4D79461C.1020200@lodderstedt.net>
Date: Thu, 10 Mar 2011 14:31:23 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <5A61CBCB-F644-4B43-937C-1BE59AC9B013@oracle.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com>	<D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG>	<B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>, <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com>	<D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B1@IMCMBX3.MITRE.ORG> <0BB28BF7-0331-4C6E-ABE3-A18FB0FB71D3@oracle.com> <4D79461C.1020200@lodderstedt.net>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: Apple Mail (2.1082)
X-Source-IP: acsmt353.oracle.com [141.146.40.153]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090201.4D79516F.0055,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2011 22:31:06 -0000

In theory yes, sometimes a token has limited scope. But since a token =
will often have unlimited scope, it carries the same potential for risk.

I would say one-time use tokens (e.g. grant codes) are really the only =
things that should be passed by URL.

Note that if the client was able to obtain a token from a token server, =
then it must have been previously been able to send data as headers or =
forms to obtain a token. So why can't it pass the authorization token =
using the HTTP Authorization header?  I'm missing what the problem is =
here that leads to needing this security compromise.

Phil
phil.hunt@oracle.com




On 2011-03-10, at 1:43 PM, Torsten Lodderstedt wrote:

> I would assume refresh token exposure to be less dangerous than the =
leakage of uid/password since a refresh tokens is restricted to a scope.
>=20
> regards,
> Torsten.
>=20
> Am 10.03.2011 20:22, schrieb Phil Hunt:
>> I think I was confused because of the use of the term "credential" =
rather than token.
>>=20
>> If you are calling the token service end-point then it is a big =
issue. E.g. exposing a refresh token would be as bad as a uid/pwd since =
it is long-lived.
>>=20
>> For a resource server, I agree, the risk is lower.
>>=20
>> Phil
>> phil.hunt@oracle.comer
>>=20
>>=20
>>=20
>>=20
>> On 2011-03-10, at 11:17 AM, Richer, Justin P. wrote:
>>=20
>>> Nobody said UID and password -- we're talking about tokens here. The =
cost of a leaked temporary token (even a straight bearer token) is much, =
much lower.
>>>=20
>>> -- Justin
>>> ________________________________________
>>> From: Phil Hunt [phil.hunt@oracle.com]
>>> Sent: Thursday, March 10, 2011 2:01 PM
>>> To: Richer, Justin P.
>>> Cc: Eran Hammer-Lahav; OAuth WG
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>=20
>>> Well, for one if you promote this, it becomes general technique. Now =
you have uid/passwords in browser history etc potentially accessible to =
javascript and could be leaked/hacked in any number of ways.
>>>=20
>>> Also, I would say that credentials are a higher risk item then say a =
specific API call. Why? because credentials are used universally and so =
the exposure is much higher. That said, it is still possible that =
application data can just as costly to expose. Another reason to use =
secure forms over URLs.
>>>=20
>>> Phil
>>> phil.hunt@oracle.com
>>>=20
>>>=20
>>>=20
>>>=20
>>> On 2011-03-10, at 10:37 AM, Richer, Justin P. wrote:
>>>=20
>>>> 1) Yes. And don't discount ease-of-use for developers. If I'm =
already sending my parameters over the query, this becomes another =
parameter and is really easy to manage.
>>>> 2) Yes, for parallelism to #1, when using a POST.
>>>> 3) The idea of a parameter registry for this part is absurd, and =
the parameter should be kept simple. I do think that it needs to be =
named something other than "oauth_token".
>>>>=20
>>>> I'm happy with discouraging the use of 1 and 2 with discussion in =
the security considerations, but I think that if we don't specify this =
behavior and discuss it, then people are going to do it anyway and we =
run more risk of things going wrong. Simply ignoring the issue in the =
spec (by remaining silent about it) will not make it go away.
>>>>=20
>>>> Since all formats are optional, couldn't an AS/PR setup that wants =
to just lock things down and require auth headers for their particular =
setup? If in two years nobody deploys it anymore, then let's deprecate =
it from the spec and never speak of this again.
>>>>=20
>>>> -- Justin
>>>>=20
>>>> ________________________________________
>>>> From: Eran Hammer-Lahav [eran@hueniverse.com]
>>>> Sent: Thursday, March 10, 2011 1:29 PM
>>>> To: Phil Hunt; Richer, Justin P.
>>>> Cc: OAuth WG
>>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>>>=20
>>>> There are a few issues to consider.
>>>>=20
>>>> 1. Should the spec support sending bearer token in a query =
parameter?
>>>>=20
>>>> - The argument that there are many use cases for this is unproven. =
JSON-P is one valid example (though JSON-P usage is in decline with new =
methods for cross-domain calls), but so far the only one given.
>>>> - I think at this point we have to include this functionality and =
the only potential open issue is if we want to rename it to something =
other than oauth_token.
>>>> - Including this functionality doesn't mean we should encourage it, =
and the way to deal with that is to mark this as 'deprecated'.
>>>>=20
>>>> 2. Should the spec support sending authentication parameters in the =
body?
>>>>=20
>>>> - I don't have any use cases where this is required. If the client =
can perform a POST with a body, it should be able to set the header. =
Where is this an issue?
>>>>=20
>>>> 3. Should the oauth_token parameter be defined as part of an =
extensible framework for adding parameters to protected resources =
endpoint?
>>>>=20
>>>> - This was the original issue raised and so far no one has provided =
any use cases for this. We just need to make sure we pick the right =
parameter name for oauth_token and clearly state that it is not the =
right way to send tokens. There should not be any more such parameters =
in the protected resource namespace.
>>>>=20
>>>> EHL
>>>>=20
>>>>=20
>>>>> -----Original Message-----
>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf
>>>>> Of Phil Hunt
>>>>> Sent: Thursday, March 10, 2011 10:15 AM
>>>>> To: Richer, Justin P.
>>>>> Cc: OAuth WG
>>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>>=20
>>>>> -1.  It is a BAD security practice to pass credentials in URLs. =
Avoid it.
>>>>>=20
>>>>> Phil
>>>>> phil.hunt@oracle.com
>>>>>=20
>>>>>=20
>>>>>=20
>>>>>=20
>>>>> On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:
>>>>>=20
>>>>>> Ah, here we run into the classic argument of usability vs. =
security, in which
>>>>> usability will win every single time in practice. If we don't =
define at least a
>>>>> reasonable way to do this within the scope of OAuth, that's not =
going to stop
>>>>> people from doing it. It's just going to make people do it in a =
million different
>>>>> ways, each with their own unique problems that nobody's thought =
of. At
>>>>> least this way, we can enable it and have a real discussion about =
the security
>>>>> considerations. There are valid and valuable places where putting =
credentials
>>>>> in the URL is a reasonable security tradeoff. Not everything =
functions over
>>>>> the public internet as well, and the security considerations are =
different in
>>>>> these other environments.
>>>>>> In short: yes, it's necessary and good to do this.
>>>>>>=20
>>>>>> -- Justin
>>>>>> ________________________________________
>>>>>> From: William J. Mills [wmills@yahoo-inc.com]
>>>>>> Sent: Thursday, March 10, 2011 12:59 PM
>>>>>> To: Richer, Justin P.; Lukas Rosenstock
>>>>>> Cc: Brian Eaton; OAuth WG
>>>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>>>=20
>>>>>> Yeah, but there are serious security problems with credentials in =
the URL, is
>>>>> it really worth it in light of those problems?
>>>>>> ________________________________
>>>>>> From: "Richer, Justin P."<jricher@mitre.org>
>>>>>> To: Lukas Rosenstock<lr@lukasrosenstock.net>; William J. Mills
>>>>> <wmills@yahoo-inc.com>
>>>>>> Cc: Brian Eaton<beaton@google.com>; OAuth WG<oauth@ietf.org>
>>>>>> Sent: Thursday, March 10, 2011 9:49 AM
>>>>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>>>>>=20
>>>>>> Yes, there are many development setups where all you can =
reasonably
>>>>> access is the URL to get. It's also much simpler to make use of =
the well-
>>>>> supported syntax helpers for query parameters instead of relying =
on new,
>>>>> custom formatting for newly-defined headers. The bearer token =
makes this
>>>>> simple by just having the value of the token, but other schemes =
have their
>>>>> own name/value pair formats and encodings that will inevitably =
cause
>>>>> hiccups.
>>>>>> -- Justin
>>>>>> ________________________________________
>>>>>> From: Lukas Rosenstock
>>>>> [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>]
>>>>>> Sent: Thursday, March 10, 2011 11:49 AM
>>>>>> To: William J. Mills
>>>>>> Cc: Brian Eaton; Richer, Justin P.; OAuth WG
>>>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>>>=20
>>>>>> JSON-P (callback) works with<script>  tags where no parameters =
can be
>>>>> set; this is used a lot in web applications that want to consume =
3rd party APIs
>>>>> directly on the client side. So, yes, an alternative for the =
Authorization
>>>>> header is required - a.f.a.i.k this use case was one of the =
driving forces
>>>>> behind WRAP and bearer tokens.
>>>>>> 2011/3/9 William J. =
Mills<wmills@yahoo-inc.com<mailto:wmills@yahoo-
>>>>> =
inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>
>>>>>> Is there really a need going forward for anything beyond using =
the
>>>>> Authorization header?  Do we have clients out there that just =
can't set that
>>>>> header?  Putting bearer tokens in query arguments is a very bad =
idea for
>>>>> many reasons, and in form variables has it's own set of badness =
(although
>>>>> not to the same level).
>>>>>> -bill
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


From gffletch@aol.com  Thu Mar 10 16:27:15 2011
Return-Path: <gffletch@aol.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BB9573A6AE3 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 16:27:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1ZmgSA9bCa-O for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 16:27:13 -0800 (PST)
Received: from imr-ma05.mx.aol.com (imr-ma05.mx.aol.com [64.12.100.31]) by core3.amsl.com (Postfix) with ESMTP id DD8E33A6811 for <oauth@ietf.org>; Thu, 10 Mar 2011 16:27:12 -0800 (PST)
Received: from mtaout-da06.r1000.mx.aol.com (mtaout-da06.r1000.mx.aol.com [172.29.51.134]) by imr-ma05.mx.aol.com (8.14.1/8.14.1) with ESMTP id p2B0SHMA023009; Thu, 10 Mar 2011 19:28:17 -0500
Received: from palantir.local (unknown [10.172.2.119]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mtaout-da06.r1000.mx.aol.com (MUA/Third Party Client Interface) with ESMTPSA id 436AEE0000A2; Thu, 10 Mar 2011 19:28:16 -0500 (EST)
Message-ID: <4D796C9E.1070507@aol.com>
Date: Thu, 10 Mar 2011 19:28:14 -0500
From: George Fletcher <gffletch@aol.com>
Organization: AOL LLC
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Phil Hunt <phil.hunt@oracle.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com>	<D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG>	<B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>, <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com>	<D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B1@IMCMBX3.MITRE.ORG>	<0BB28BF7-0331-4C6E-ABE3-A18FB0FB71D3@oracle.com>	<4D79461C.1020200@lodderstedt.net> <5A61CBCB-F644-4B43-937C-1BE59AC9B013@oracle.com>
In-Reply-To: <5A61CBCB-F644-4B43-937C-1BE59AC9B013@oracle.com>
Content-Type: multipart/alternative; boundary="------------010807060503020408030003"
x-aol-global-disposition: G
X-AOL-SCOLL-SCORE: 0:2:475955488:93952408  
X-AOL-SCOLL-URL_COUNT: 0  
x-aol-sid: 3039ac1d33864d796ca013ca
X-AOL-IP: 10.172.2.119
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 00:27:15 -0000

This is a multi-part message in MIME format.
--------------010807060503020408030003
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

I'm not crazy about the compromise either, but it's not possible for a 
site using JSONP and it's cross-domain tricks to set the Authorization 
header out of the browser or POST the data out of the browser in a 
cross-domain way (due to the same origin browser policy).

Quoting Eran from a previous message

    JSON-P is one valid example (though JSON-P usage is in decline with new methods for cross-domain calls)

I do agree we need to give the url parameter a different name than 
oauth_token.

Thanks,
George

On 3/10/11 5:31 PM, Phil Hunt wrote:
> In theory yes, sometimes a token has limited scope. But since a token will often have unlimited scope, it carries the same potential for risk.
>
> I would say one-time use tokens (e.g. grant codes) are really the only things that should be passed by URL.
>
> Note that if the client was able to obtain a token from a token server, then it must have been previously been able to send data as headers or forms to obtain a token. So why can't it pass the authorization token using the HTTP Authorization header?  I'm missing what the problem is here that leads to needing this security compromise.
>
> Phil
> phil.hunt@oracle.com
>
>
>
>
> On 2011-03-10, at 1:43 PM, Torsten Lodderstedt wrote:
>
>> I would assume refresh token exposure to be less dangerous than the leakage of uid/password since a refresh tokens is restricted to a scope.
>>
>> regards,
>> Torsten.
>>
>> Am 10.03.2011 20:22, schrieb Phil Hunt:
>>> I think I was confused because of the use of the term "credential" rather than token.
>>>
>>> If you are calling the token service end-point then it is a big issue. E.g. exposing a refresh token would be as bad as a uid/pwd since it is long-lived.
>>>
>>> For a resource server, I agree, the risk is lower.
>>>
>>> Phil
>>> phil.hunt@oracle.comer
>>>
>>>
>>>
>>>
>>> On 2011-03-10, at 11:17 AM, Richer, Justin P. wrote:
>>>
>>>> Nobody said UID and password -- we're talking about tokens here. The cost of a leaked temporary token (even a straight bearer token) is much, much lower.
>>>>
>>>> -- Justin
>>>> ________________________________________
>>>> From: Phil Hunt [phil.hunt@oracle.com]
>>>> Sent: Thursday, March 10, 2011 2:01 PM
>>>> To: Richer, Justin P.
>>>> Cc: Eran Hammer-Lahav; OAuth WG
>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>
>>>> Well, for one if you promote this, it becomes general technique. Now you have uid/passwords in browser history etc potentially accessible to javascript and could be leaked/hacked in any number of ways.
>>>>
>>>> Also, I would say that credentials are a higher risk item then say a specific API call. Why? because credentials are used universally and so the exposure is much higher. That said, it is still possible that application data can just as costly to expose. Another reason to use secure forms over URLs.
>>>>
>>>> Phil
>>>> phil.hunt@oracle.com
>>>>
>>>>
>>>>
>>>>
>>>> On 2011-03-10, at 10:37 AM, Richer, Justin P. wrote:
>>>>
>>>>> 1) Yes. And don't discount ease-of-use for developers. If I'm already sending my parameters over the query, this becomes another parameter and is really easy to manage.
>>>>> 2) Yes, for parallelism to #1, when using a POST.
>>>>> 3) The idea of a parameter registry for this part is absurd, and the parameter should be kept simple. I do think that it needs to be named something other than "oauth_token".
>>>>>
>>>>> I'm happy with discouraging the use of 1 and 2 with discussion in the security considerations, but I think that if we don't specify this behavior and discuss it, then people are going to do it anyway and we run more risk of things going wrong. Simply ignoring the issue in the spec (by remaining silent about it) will not make it go away.
>>>>>
>>>>> Since all formats are optional, couldn't an AS/PR setup that wants to just lock things down and require auth headers for their particular setup? If in two years nobody deploys it anymore, then let's deprecate it from the spec and never speak of this again.
>>>>>
>>>>> -- Justin
>>>>>
>>>>> ________________________________________
>>>>> From: Eran Hammer-Lahav [eran@hueniverse.com]
>>>>> Sent: Thursday, March 10, 2011 1:29 PM
>>>>> To: Phil Hunt; Richer, Justin P.
>>>>> Cc: OAuth WG
>>>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>>>>
>>>>> There are a few issues to consider.
>>>>>
>>>>> 1. Should the spec support sending bearer token in a query parameter?
>>>>>
>>>>> - The argument that there are many use cases for this is unproven. JSON-P is one valid example (though JSON-P usage is in decline with new methods for cross-domain calls), but so far the only one given.
>>>>> - I think at this point we have to include this functionality and the only potential open issue is if we want to rename it to something other than oauth_token.
>>>>> - Including this functionality doesn't mean we should encourage it, and the way to deal with that is to mark this as 'deprecated'.
>>>>>
>>>>> 2. Should the spec support sending authentication parameters in the body?
>>>>>
>>>>> - I don't have any use cases where this is required. If the client can perform a POST with a body, it should be able to set the header. Where is this an issue?
>>>>>
>>>>> 3. Should the oauth_token parameter be defined as part of an extensible framework for adding parameters to protected resources endpoint?
>>>>>
>>>>> - This was the original issue raised and so far no one has provided any use cases for this. We just need to make sure we pick the right parameter name for oauth_token and clearly state that it is not the right way to send tokens. There should not be any more such parameters in the protected resource namespace.
>>>>>
>>>>> EHL
>>>>>
>>>>>
>>>>>> -----Original Message-----
>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>>>>>> Of Phil Hunt
>>>>>> Sent: Thursday, March 10, 2011 10:15 AM
>>>>>> To: Richer, Justin P.
>>>>>> Cc: OAuth WG
>>>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>>>
>>>>>> -1.  It is a BAD security practice to pass credentials in URLs. Avoid it.
>>>>>>
>>>>>> Phil
>>>>>> phil.hunt@oracle.com
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:
>>>>>>
>>>>>>> Ah, here we run into the classic argument of usability vs. security, in which
>>>>>> usability will win every single time in practice. If we don't define at least a
>>>>>> reasonable way to do this within the scope of OAuth, that's not going to stop
>>>>>> people from doing it. It's just going to make people do it in a million different
>>>>>> ways, each with their own unique problems that nobody's thought of. At
>>>>>> least this way, we can enable it and have a real discussion about the security
>>>>>> considerations. There are valid and valuable places where putting credentials
>>>>>> in the URL is a reasonable security tradeoff. Not everything functions over
>>>>>> the public internet as well, and the security considerations are different in
>>>>>> these other environments.
>>>>>>> In short: yes, it's necessary and good to do this.
>>>>>>>
>>>>>>> -- Justin
>>>>>>> ________________________________________
>>>>>>> From: William J. Mills [wmills@yahoo-inc.com]
>>>>>>> Sent: Thursday, March 10, 2011 12:59 PM
>>>>>>> To: Richer, Justin P.; Lukas Rosenstock
>>>>>>> Cc: Brian Eaton; OAuth WG
>>>>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>>>>
>>>>>>> Yeah, but there are serious security problems with credentials in the URL, is
>>>>>> it really worth it in light of those problems?
>>>>>>> ________________________________
>>>>>>> From: "Richer, Justin P."<jricher@mitre.org>
>>>>>>> To: Lukas Rosenstock<lr@lukasrosenstock.net>; William J. Mills
>>>>>> <wmills@yahoo-inc.com>
>>>>>>> Cc: Brian Eaton<beaton@google.com>; OAuth WG<oauth@ietf.org>
>>>>>>> Sent: Thursday, March 10, 2011 9:49 AM
>>>>>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>>>>>>
>>>>>>> Yes, there are many development setups where all you can reasonably
>>>>>> access is the URL to get. It's also much simpler to make use of the well-
>>>>>> supported syntax helpers for query parameters instead of relying on new,
>>>>>> custom formatting for newly-defined headers. The bearer token makes this
>>>>>> simple by just having the value of the token, but other schemes have their
>>>>>> own name/value pair formats and encodings that will inevitably cause
>>>>>> hiccups.
>>>>>>> -- Justin
>>>>>>> ________________________________________
>>>>>>> From: Lukas Rosenstock
>>>>>> [lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net>]
>>>>>>> Sent: Thursday, March 10, 2011 11:49 AM
>>>>>>> To: William J. Mills
>>>>>>> Cc: Brian Eaton; Richer, Justin P.; OAuth WG
>>>>>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>>>>>
>>>>>>> JSON-P (callback) works with<script>   tags where no parameters can be
>>>>>> set; this is used a lot in web applications that want to consume 3rd party APIs
>>>>>> directly on the client side. So, yes, an alternative for the Authorization
>>>>>> header is required - a.f.a.i.k this use case was one of the driving forces
>>>>>> behind WRAP and bearer tokens.
>>>>>>> 2011/3/9 William J. Mills<wmills@yahoo-inc.com<mailto:wmills@yahoo-
>>>>>> inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>>>
>>>>>>> Is there really a need going forward for anything beyond using the
>>>>>> Authorization header?  Do we have clients out there that just can't set that
>>>>>> header?  Putting bearer tokens in query arguments is a very bad idea for
>>>>>> many reasons, and in form variables has it's own set of badness (although
>>>>>> not to the same level).
>>>>>>> -bill
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

-- 
Chief Architect                   AIM:  gffletch
Identity Services Engineering     Work: george.fletcher@teamaol.com
AOL Inc.                          Home: gffletch@aol.com
Mobile: +1-703-462-3494           Blog: http://practicalid.blogspot.com
Office: +1-703-265-2544           Twitter: http://twitter.com/gffletch


--------------010807060503020408030003
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=us-ascii"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#ffffff" text="#000000">
    <font face="Helvetica, Arial, sans-serif">I'm not crazy about the
      compromise either, but it's not possible for a site using JSONP
      and it's cross-domain tricks to set the Authorization header out
      of the browser or POST the data out of the browser in a
      cross-domain way (due to the same origin browser policy).<br>
      <br>
      Quoting Eran from a previous message<br>
    </font>
    <blockquote>
      <pre wrap="">JSON-P is one valid example (though JSON-P usage is in decline with new methods for cross-domain calls)</pre>
    </blockquote>
    <font face="Helvetica, Arial, sans-serif">I do agree we need to give
      the url parameter a different name than oauth_token.<br>
      <br>
      Thanks,<br>
      George</font><br>
    <br>
    On 3/10/11 5:31 PM, Phil Hunt wrote:
    <blockquote
      cite="mid:5A61CBCB-F644-4B43-937C-1BE59AC9B013@oracle.com"
      type="cite">
      <pre wrap="">In theory yes, sometimes a token has limited scope. But since a token will often have unlimited scope, it carries the same potential for risk.

I would say one-time use tokens (e.g. grant codes) are really the only things that should be passed by URL.

Note that if the client was able to obtain a token from a token server, then it must have been previously been able to send data as headers or forms to obtain a token. So why can't it pass the authorization token using the HTTP Authorization header?  I'm missing what the problem is here that leads to needing this security compromise.

Phil
<a class="moz-txt-link-abbreviated" href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>




On 2011-03-10, at 1:43 PM, Torsten Lodderstedt wrote:

</pre>
      <blockquote type="cite">
        <pre wrap="">I would assume refresh token exposure to be less dangerous than the leakage of uid/password since a refresh tokens is restricted to a scope.

regards,
Torsten.

Am 10.03.2011 20:22, schrieb Phil Hunt:
</pre>
        <blockquote type="cite">
          <pre wrap="">I think I was confused because of the use of the term "credential" rather than token.

If you are calling the token service end-point then it is a big issue. E.g. exposing a refresh token would be as bad as a uid/pwd since it is long-lived.

For a resource server, I agree, the risk is lower.

Phil
<a class="moz-txt-link-abbreviated" href="mailto:phil.hunt@oracle.comer">phil.hunt@oracle.comer</a>




On 2011-03-10, at 11:17 AM, Richer, Justin P. wrote:

</pre>
          <blockquote type="cite">
            <pre wrap="">Nobody said UID and password -- we're talking about tokens here. The cost of a leaked temporary token (even a straight bearer token) is much, much lower.

-- Justin
________________________________________
From: Phil Hunt [<a class="moz-txt-link-abbreviated" href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>]
Sent: Thursday, March 10, 2011 2:01 PM
To: Richer, Justin P.
Cc: Eran Hammer-Lahav; OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

Well, for one if you promote this, it becomes general technique. Now you have uid/passwords in browser history etc potentially accessible to javascript and could be leaked/hacked in any number of ways.

Also, I would say that credentials are a higher risk item then say a specific API call. Why? because credentials are used universally and so the exposure is much higher. That said, it is still possible that application data can just as costly to expose. Another reason to use secure forms over URLs.

Phil
<a class="moz-txt-link-abbreviated" href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>




On 2011-03-10, at 10:37 AM, Richer, Justin P. wrote:

</pre>
            <blockquote type="cite">
              <pre wrap="">1) Yes. And don't discount ease-of-use for developers. If I'm already sending my parameters over the query, this becomes another parameter and is really easy to manage.
2) Yes, for parallelism to #1, when using a POST.
3) The idea of a parameter registry for this part is absurd, and the parameter should be kept simple. I do think that it needs to be named something other than "oauth_token".

I'm happy with discouraging the use of 1 and 2 with discussion in the security considerations, but I think that if we don't specify this behavior and discuss it, then people are going to do it anyway and we run more risk of things going wrong. Simply ignoring the issue in the spec (by remaining silent about it) will not make it go away.

Since all formats are optional, couldn't an AS/PR setup that wants to just lock things down and require auth headers for their particular setup? If in two years nobody deploys it anymore, then let's deprecate it from the spec and never speak of this again.

-- Justin

________________________________________
From: Eran Hammer-Lahav [<a class="moz-txt-link-abbreviated" href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>]
Sent: Thursday, March 10, 2011 1:29 PM
To: Phil Hunt; Richer, Justin P.
Cc: OAuth WG
Subject: RE: [OAUTH-WG] OAuth Bearer Token draft

There are a few issues to consider.

1. Should the spec support sending bearer token in a query parameter?

- The argument that there are many use cases for this is unproven. JSON-P is one valid example (though JSON-P usage is in decline with new methods for cross-domain calls), but so far the only one given.
- I think at this point we have to include this functionality and the only potential open issue is if we want to rename it to something other than oauth_token.
- Including this functionality doesn't mean we should encourage it, and the way to deal with that is to mark this as 'deprecated'.

2. Should the spec support sending authentication parameters in the body?

- I don't have any use cases where this is required. If the client can perform a POST with a body, it should be able to set the header. Where is this an issue?

3. Should the oauth_token parameter be defined as part of an extensible framework for adding parameters to protected resources endpoint?

- This was the original issue raised and so far no one has provided any use cases for this. We just need to make sure we pick the right parameter name for oauth_token and clearly state that it is not the right way to send tokens. There should not be any more such parameters in the protected resource namespace.

EHL


</pre>
              <blockquote type="cite">
                <pre wrap="">-----Original Message-----
From: <a class="moz-txt-link-abbreviated" href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<a class="moz-txt-link-freetext" href="mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>] On Behalf
Of Phil Hunt
Sent: Thursday, March 10, 2011 10:15 AM
To: Richer, Justin P.
Cc: OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

-1.  It is a BAD security practice to pass credentials in URLs. Avoid it.

Phil
<a class="moz-txt-link-abbreviated" href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>




On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:

</pre>
                <blockquote type="cite">
                  <pre wrap="">Ah, here we run into the classic argument of usability vs. security, in which
</pre>
                </blockquote>
                <pre wrap="">usability will win every single time in practice. If we don't define at least a
reasonable way to do this within the scope of OAuth, that's not going to stop
people from doing it. It's just going to make people do it in a million different
ways, each with their own unique problems that nobody's thought of. At
least this way, we can enable it and have a real discussion about the security
considerations. There are valid and valuable places where putting credentials
in the URL is a reasonable security tradeoff. Not everything functions over
the public internet as well, and the security considerations are different in
these other environments.
</pre>
                <blockquote type="cite">
                  <pre wrap="">In short: yes, it's necessary and good to do this.

-- Justin
________________________________________
From: William J. Mills [<a class="moz-txt-link-abbreviated" href="mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>]
Sent: Thursday, March 10, 2011 12:59 PM
To: Richer, Justin P.; Lukas Rosenstock
Cc: Brian Eaton; OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

Yeah, but there are serious security problems with credentials in the URL, is
</pre>
                </blockquote>
                <pre wrap="">it really worth it in light of those problems?
</pre>
                <blockquote type="cite">
                  <pre wrap="">________________________________
From: "Richer, Justin P."<a class="moz-txt-link-rfc2396E" href="mailto:jricher@mitre.org">&lt;jricher@mitre.org&gt;</a>
To: Lukas Rosenstock<a class="moz-txt-link-rfc2396E" href="mailto:lr@lukasrosenstock.net">&lt;lr@lukasrosenstock.net&gt;</a>; William J. Mills
</pre>
                </blockquote>
                <pre wrap=""><a class="moz-txt-link-rfc2396E" href="mailto:wmills@yahoo-inc.com">&lt;wmills@yahoo-inc.com&gt;</a>
</pre>
                <blockquote type="cite">
                  <pre wrap="">Cc: Brian Eaton<a class="moz-txt-link-rfc2396E" href="mailto:beaton@google.com">&lt;beaton@google.com&gt;</a>; OAuth WG<a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a>
Sent: Thursday, March 10, 2011 9:49 AM
Subject: RE: [OAUTH-WG] OAuth Bearer Token draft

Yes, there are many development setups where all you can reasonably
</pre>
                </blockquote>
                <pre wrap="">access is the URL to get. It's also much simpler to make use of the well-
supported syntax helpers for query parameters instead of relying on new,
custom formatting for newly-defined headers. The bearer token makes this
simple by just having the value of the token, but other schemes have their
own name/value pair formats and encodings that will inevitably cause
hiccups.
</pre>
                <blockquote type="cite">
                  <pre wrap="">-- Justin
________________________________________
From: Lukas Rosenstock
</pre>
                </blockquote>
                <pre wrap="">[<a class="moz-txt-link-abbreviated" href="mailto:lr@lukasrosenstock.net">lr@lukasrosenstock.net</a><a class="moz-txt-link-rfc2396E" href="mailto:lr@lukasrosenstock.net">&lt;mailto:lr@lukasrosenstock.net&gt;</a>]
</pre>
                <blockquote type="cite">
                  <pre wrap="">Sent: Thursday, March 10, 2011 11:49 AM
To: William J. Mills
Cc: Brian Eaton; Richer, Justin P.; OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

JSON-P (callback) works with&lt;script&gt;  tags where no parameters can be
</pre>
                </blockquote>
                <pre wrap="">set; this is used a lot in web applications that want to consume 3rd party APIs
directly on the client side. So, yes, an alternative for the Authorization
header is required - a.f.a.i.k this use case was one of the driving forces
behind WRAP and bearer tokens.
</pre>
                <blockquote type="cite">
                  <pre wrap="">2011/3/9 William J. Mills&lt;<a class="moz-txt-link-abbreviated" href="mailto:wmills@yahoo-inc.com">wmills@yahoo-inc.com</a>&lt;<a class="moz-txt-link-freetext" href="mailto:wmills@yahoo">mailto:wmills@yahoo</a>-
</pre>
                </blockquote>
                <pre wrap="">inc.com&gt;&lt;<a class="moz-txt-link-freetext" href="mailto:wmills@yahoo-inc.com">mailto:wmills@yahoo-inc.com</a><a class="moz-txt-link-rfc2396E" href="mailto:wmills@yahoo-inc.com">&lt;mailto:wmills@yahoo-inc.com&gt;</a>&gt;&gt;
</pre>
                <blockquote type="cite">
                  <pre wrap="">Is there really a need going forward for anything beyond using the
</pre>
                </blockquote>
                <pre wrap="">Authorization header?  Do we have clients out there that just can't set that
header?  Putting bearer tokens in query arguments is a very bad idea for
many reasons, and in form variables has it's own set of badness (although
not to the same level).
</pre>
                <blockquote type="cite">
                  <pre wrap="">-bill



_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
                </blockquote>
                <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
              </blockquote>
            </blockquote>
          </blockquote>
          <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
        </blockquote>
      </blockquote>
      <pre wrap="">
_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>

</pre>
    </blockquote>
    <br>
    <pre class="moz-signature" cols="72">-- 
Chief Architect                   AIM:  gffletch
Identity Services Engineering     Work: <a class="moz-txt-link-abbreviated" href="mailto:george.fletcher@teamaol.com">george.fletcher@teamaol.com</a>
AOL Inc.                          Home: <a class="moz-txt-link-abbreviated" href="mailto:gffletch@aol.com">gffletch@aol.com</a>
Mobile: +1-703-462-3494           Blog: <a class="moz-txt-link-freetext" href="http://practicalid.blogspot.com">http://practicalid.blogspot.com</a>
Office: +1-703-265-2544           Twitter: <a class="moz-txt-link-freetext" href="http://twitter.com/gffletch">http://twitter.com/gffletch</a>
</pre>
  </body>
</html>

--------------010807060503020408030003--

From Michael.Jones@microsoft.com  Thu Mar 10 17:52:46 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 877143A68C9 for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 17:52:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q2j5fDakw4xh for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 17:52:43 -0800 (PST)
Received: from smtp.microsoft.com (mailb.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 5EF173A67E3 for <oauth@ietf.org>; Thu, 10 Mar 2011 17:52:43 -0800 (PST)
Received: from TK5EX14MLTC101.redmond.corp.microsoft.com (157.54.79.178) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 10 Mar 2011 17:54:01 -0800
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14MLTC101.redmond.corp.microsoft.com ([157.54.79.178]) with mapi id 14.01.0270.002; Thu, 10 Mar 2011 17:54:01 -0800
From: Mike Jones <Michael.Jones@microsoft.com>
To: OAuth WG <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AQHL30z4fzL8bQ1cOkyjlBw2nes6cZQnY2qAgAACXACAAAPmgIAAAiSAgAAGz4CAAASYgIAAAU2AgAAngQCAAA1CgIAAIKYA//+Rc9A=
Date: Fri, 11 Mar 2011 01:54:00 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739432528C8AB@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG> <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>, <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B1@IMCMBX3.MITRE.ORG> <0BB28BF7-0331-4C6E-ABE3-A18FB0FB71D3@oracle.com> <4D79461C.1020200@lodderstedt.net> <5A61CBCB-F644-4B43-937C-1BE59AC9B013@oracle.com> <4D796C9E.1070507@aol.com>
In-Reply-To: <4D796C9E.1070507@aol.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739432528C8ABTK5EX14MBXC207r_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 01:52:46 -0000

--_000_4E1F6AAD24975D4BA5B16804296739432528C8ABTK5EX14MBXC207r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Several people have asked for this parameter name to be changed to oauth2_t=
oken.  If a change is made, it would seem to me that that would be the logi=
cal name to use.

Is anyone strongly opposed to making this change?

                                                            -- Mike

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of G=
eorge Fletcher
Sent: Thursday, March 10, 2011 4:28 PM
To: Phil Hunt
Cc: OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

I'm not crazy about the compromise either, but it's not possible for a site=
 using JSONP and it's cross-domain tricks to set the Authorization header o=
ut of the browser or POST the data out of the browser in a cross-domain way=
 (due to the same origin browser policy).

Quoting Eran from a previous message

JSON-P is one valid example (though JSON-P usage is in decline with new met=
hods for cross-domain calls)
I do agree we need to give the url parameter a different name than oauth_to=
ken.

Thanks,
George

On 3/10/11 5:31 PM, Phil Hunt wrote:

In theory yes, sometimes a token has limited scope. But since a token will =
often have unlimited scope, it carries the same potential for risk.



I would say one-time use tokens (e.g. grant codes) are really the only thin=
gs that should be passed by URL.



Note that if the client was able to obtain a token from a token server, the=
n it must have been previously been able to send data as headers or forms t=
o obtain a token. So why can't it pass the authorization token using the HT=
TP Authorization header?  I'm missing what the problem is here that leads t=
o needing this security compromise.



Phil

phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>









On 2011-03-10, at 1:43 PM, Torsten Lodderstedt wrote:



I would assume refresh token exposure to be less dangerous than the leakage=
 of uid/password since a refresh tokens is restricted to a scope.



regards,

Torsten.



Am 10.03.2011 20:22, schrieb Phil Hunt:

I think I was confused because of the use of the term "credential" rather t=
han token.



If you are calling the token service end-point then it is a big issue. E.g.=
 exposing a refresh token would be as bad as a uid/pwd since it is long-liv=
ed.



For a resource server, I agree, the risk is lower.



Phil

phil.hunt@oracle.comer<mailto:phil.hunt@oracle.comer>









On 2011-03-10, at 11:17 AM, Richer, Justin P. wrote:



Nobody said UID and password -- we're talking about tokens here. The cost o=
f a leaked temporary token (even a straight bearer token) is much, much low=
er.



-- Justin

________________________________________

From: Phil Hunt [phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>]

Sent: Thursday, March 10, 2011 2:01 PM

To: Richer, Justin P.

Cc: Eran Hammer-Lahav; OAuth WG

Subject: Re: [OAUTH-WG] OAuth Bearer Token draft



Well, for one if you promote this, it becomes general technique. Now you ha=
ve uid/passwords in browser history etc potentially accessible to javascrip=
t and could be leaked/hacked in any number of ways.



Also, I would say that credentials are a higher risk item then say a specif=
ic API call. Why? because credentials are used universally and so the expos=
ure is much higher. That said, it is still possible that application data c=
an just as costly to expose. Another reason to use secure forms over URLs.



Phil

phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>









On 2011-03-10, at 10:37 AM, Richer, Justin P. wrote:



1) Yes. And don't discount ease-of-use for developers. If I'm already sendi=
ng my parameters over the query, this becomes another parameter and is real=
ly easy to manage.

2) Yes, for parallelism to #1, when using a POST.

3) The idea of a parameter registry for this part is absurd, and the parame=
ter should be kept simple. I do think that it needs to be named something o=
ther than "oauth_token".



I'm happy with discouraging the use of 1 and 2 with discussion in the secur=
ity considerations, but I think that if we don't specify this behavior and =
discuss it, then people are going to do it anyway and we run more risk of t=
hings going wrong. Simply ignoring the issue in the spec (by remaining sile=
nt about it) will not make it go away.



Since all formats are optional, couldn't an AS/PR setup that wants to just =
lock things down and require auth headers for their particular setup? If in=
 two years nobody deploys it anymore, then let's deprecate it from the spec=
 and never speak of this again.



-- Justin



________________________________________

From: Eran Hammer-Lahav [eran@hueniverse.com<mailto:eran@hueniverse.com>]

Sent: Thursday, March 10, 2011 1:29 PM

To: Phil Hunt; Richer, Justin P.

Cc: OAuth WG

Subject: RE: [OAUTH-WG] OAuth Bearer Token draft



There are a few issues to consider.



1. Should the spec support sending bearer token in a query parameter?



- The argument that there are many use cases for this is unproven. JSON-P i=
s one valid example (though JSON-P usage is in decline with new methods for=
 cross-domain calls), but so far the only one given.

- I think at this point we have to include this functionality and the only =
potential open issue is if we want to rename it to something other than oau=
th_token.

- Including this functionality doesn't mean we should encourage it, and the=
 way to deal with that is to mark this as 'deprecated'.



2. Should the spec support sending authentication parameters in the body?



- I don't have any use cases where this is required. If the client can perf=
orm a POST with a body, it should be able to set the header. Where is this =
an issue?



3. Should the oauth_token parameter be defined as part of an extensible fra=
mework for adding parameters to protected resources endpoint?



- This was the original issue raised and so far no one has provided any use=
 cases for this. We just need to make sure we pick the right parameter name=
 for oauth_token and clearly state that it is not the right way to send tok=
ens. There should not be any more such parameters in the protected resource=
 namespace.



EHL





-----Original Message-----

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org] On Behalf

Of Phil Hunt

Sent: Thursday, March 10, 2011 10:15 AM

To: Richer, Justin P.

Cc: OAuth WG

Subject: Re: [OAUTH-WG] OAuth Bearer Token draft



-1.  It is a BAD security practice to pass credentials in URLs. Avoid it.



Phil

phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>









On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:



Ah, here we run into the classic argument of usability vs. security, in whi=
ch

usability will win every single time in practice. If we don't define at lea=
st a

reasonable way to do this within the scope of OAuth, that's not going to st=
op

people from doing it. It's just going to make people do it in a million dif=
ferent

ways, each with their own unique problems that nobody's thought of. At

least this way, we can enable it and have a real discussion about the secur=
ity

considerations. There are valid and valuable places where putting credentia=
ls

in the URL is a reasonable security tradeoff. Not everything functions over

the public internet as well, and the security considerations are different =
in

these other environments.

In short: yes, it's necessary and good to do this.



-- Justin

________________________________________

From: William J. Mills [wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>]

Sent: Thursday, March 10, 2011 12:59 PM

To: Richer, Justin P.; Lukas Rosenstock

Cc: Brian Eaton; OAuth WG

Subject: Re: [OAUTH-WG] OAuth Bearer Token draft



Yeah, but there are serious security problems with credentials in the URL, =
is

it really worth it in light of those problems?

________________________________

From: "Richer, Justin P."<jricher@mitre.org><mailto:jricher@mitre.org>

To: Lukas Rosenstock<lr@lukasrosenstock.net><mailto:lr@lukasrosenstock.net>=
; William J. Mills

<wmills@yahoo-inc.com><mailto:wmills@yahoo-inc.com>

Cc: Brian Eaton<beaton@google.com><mailto:beaton@google.com>; OAuth WG<oaut=
h@ietf.org><mailto:oauth@ietf.org>

Sent: Thursday, March 10, 2011 9:49 AM

Subject: RE: [OAUTH-WG] OAuth Bearer Token draft



Yes, there are many development setups where all you can reasonably

access is the URL to get. It's also much simpler to make use of the well-

supported syntax helpers for query parameters instead of relying on new,

custom formatting for newly-defined headers. The bearer token makes this

simple by just having the value of the token, but other schemes have their

own name/value pair formats and encodings that will inevitably cause

hiccups.

-- Justin

________________________________________

From: Lukas Rosenstock

[lr@lukasrosenstock.net<mailto:lr@lukasrosenstock.net><mailto:lr@lukasrosen=
stock.net><mailto:lr@lukasrosenstock.net>]

Sent: Thursday, March 10, 2011 11:49 AM

To: William J. Mills

Cc: Brian Eaton; Richer, Justin P.; OAuth WG

Subject: Re: [OAUTH-WG] OAuth Bearer Token draft



JSON-P (callback) works with<script>  tags where no parameters can be

set; this is used a lot in web applications that want to consume 3rd party =
APIs

directly on the client side. So, yes, an alternative for the Authorization

header is required - a.f.a.i.k this use case was one of the driving forces

behind WRAP and bearer tokens.

2011/3/9 William J. Mills<wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com>=
<mailto:wmills@yahoo-

inc.com><mailto:wmills@yahoo-inc.com<mailto:wmills@yahoo-inc.com><mailto:wm=
ills@yahoo-inc.com>>>

Is there really a need going forward for anything beyond using the

Authorization header?  Do we have clients out there that just can't set tha=
t

header?  Putting bearer tokens in query arguments is a very bad idea for

many reasons, and in form variables has it's own set of badness (although

not to the same level).

-bill







_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth



_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth





--

Chief Architect                   AIM:  gffletch

Identity Services Engineering     Work: george.fletcher@teamaol.com<mailto:=
george.fletcher@teamaol.com>

AOL Inc.                          Home: gffletch@aol.com<mailto:gffletch@ao=
l.com>

Mobile: +1-703-462-3494           Blog: http://practicalid.blogspot.com

Office: +1-703-265-2544           Twitter: http://twitter.com/gffletch

--_000_4E1F6AAD24975D4BA5B16804296739432528C8ABTK5EX14MBXC207r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#002060;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";
	color:black;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">Several people have asked=
 for this parameter name to be changed to oauth2_token.&nbsp; If a change i=
s made, it would seem to me that that would be the logical name
 to use.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">Is anyone strongly oppose=
d to making this change?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><spa=
n style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif=
&quot;;color:windowtext"> oauth-bounces@ietf.org [mailto:oauth-bounces@ietf=
.org]
<b>On Behalf Of </b>George Fletcher<br>
<b>Sent:</b> Thursday, March 10, 2011 4:28 PM<br>
<b>To:</b> Phil Hunt<br>
<b>Cc:</b> OAuth WG<br>
<b>Subject:</b> Re: [OAUTH-WG] OAuth Bearer Token draft<o:p></o:p></span></=
p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Helvetica&quot;,&qu=
ot;sans-serif&quot;">I'm not crazy about the compromise either, but it's no=
t possible for a site using JSONP and it's cross-domain tricks to set the A=
uthorization header out of the browser or POST the data
 out of the browser in a cross-domain way (due to the same origin browser p=
olicy).<br>
<br>
Quoting Eran from a previous message</span><o:p></o:p></p>
<pre>JSON-P is one valid example (though JSON-P usage is in decline with ne=
w methods for cross-domain calls)<o:p></o:p></pre>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Helvetica&quot;,&qu=
ot;sans-serif&quot;">I do agree we need to give the url parameter a differe=
nt name than oauth_token.<br>
<br>
Thanks,<br>
George</span><br>
<br>
On 3/10/11 5:31 PM, Phil Hunt wrote: <o:p></o:p></p>
<pre>In theory yes, sometimes a token has limited scope. But since a token =
will often have unlimited scope, it carries the same potential for risk.<o:=
p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>I would say one-time use tokens (e.g. grant codes) are really the only=
 things that should be passed by URL.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Note that if the client was able to obtain a token from a token server=
, then it must have been previously been able to send data as headers or fo=
rms to obtain a token. So why can't it pass the authorization token using t=
he HTTP Authorization header?&nbsp; I'm missing what the problem is here th=
at leads to needing this security compromise.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Phil<o:p></o:p></pre>
<pre><a href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><o:p><=
/o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>On 2011-03-10, at 1:43 PM, Torsten Lodderstedt wrote:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>I would assume refresh token exposure to be less dangerous than the le=
akage of uid/password since a refresh tokens is restricted to a scope.<o:p>=
</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>regards,<o:p></o:p></pre>
<pre>Torsten.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Am 10.03.2011 20:22, schrieb Phil Hunt:<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>I think I was confused because of the use of the term &quot;credential=
&quot; rather than token.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>If you are calling the token service end-point then it is a big issue.=
 E.g. exposing a refresh token would be as bad as a uid/pwd since it is lon=
g-lived.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>For a resource server, I agree, the risk is lower.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Phil<o:p></o:p></pre>
<pre><a href=3D"mailto:phil.hunt@oracle.comer">phil.hunt@oracle.comer</a><o=
:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>On 2011-03-10, at 11:17 AM, Richer, Justin P. wrote:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Nobody said UID and password -- we're talking about tokens here. The c=
ost of a leaked temporary token (even a straight bearer token) is much, muc=
h lower.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>-- Justin<o:p></o:p></pre>
<pre>________________________________________<o:p></o:p></pre>
<pre>From: Phil Hunt [<a href=3D"mailto:phil.hunt@oracle.com">phil.hunt@ora=
cle.com</a>]<o:p></o:p></pre>
<pre>Sent: Thursday, March 10, 2011 2:01 PM<o:p></o:p></pre>
<pre>To: Richer, Justin P.<o:p></o:p></pre>
<pre>Cc: Eran Hammer-Lahav; OAuth WG<o:p></o:p></pre>
<pre>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Well, for one if you promote this, it becomes general technique. Now y=
ou have uid/passwords in browser history etc potentially accessible to java=
script and could be leaked/hacked in any number of ways.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Also, I would say that credentials are a higher risk item then say a s=
pecific API call. Why? because credentials are used universally and so the =
exposure is much higher. That said, it is still possible that application d=
ata can just as costly to expose. Another reason to use secure forms over U=
RLs.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Phil<o:p></o:p></pre>
<pre><a href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><o:p><=
/o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>On 2011-03-10, at 10:37 AM, Richer, Justin P. wrote:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>1) Yes. And don't discount ease-of-use for developers. If I'm already =
sending my parameters over the query, this becomes another parameter and is=
 really easy to manage.<o:p></o:p></pre>
<pre>2) Yes, for parallelism to #1, when using a POST.<o:p></o:p></pre>
<pre>3) The idea of a parameter registry for this part is absurd, and the p=
arameter should be kept simple. I do think that it needs to be named someth=
ing other than &quot;oauth_token&quot;.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>I'm happy with discouraging the use of 1 and 2 with discussion in the =
security considerations, but I think that if we don't specify this behavior=
 and discuss it, then people are going to do it anyway and we run more risk=
 of things going wrong. Simply ignoring the issue in the spec (by remaining=
 silent about it) will not make it go away.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Since all formats are optional, couldn't an AS/PR setup that wants to =
just lock things down and require auth headers for their particular setup? =
If in two years nobody deploys it anymore, then let's deprecate it from the=
 spec and never speak of this again.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>-- Justin<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>________________________________________<o:p></o:p></pre>
<pre>From: Eran Hammer-Lahav [<a href=3D"mailto:eran@hueniverse.com">eran@h=
ueniverse.com</a>]<o:p></o:p></pre>
<pre>Sent: Thursday, March 10, 2011 1:29 PM<o:p></o:p></pre>
<pre>To: Phil Hunt; Richer, Justin P.<o:p></o:p></pre>
<pre>Cc: OAuth WG<o:p></o:p></pre>
<pre>Subject: RE: [OAUTH-WG] OAuth Bearer Token draft<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>There are a few issues to consider.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>1. Should the spec support sending bearer token in a query parameter?<=
o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>- The argument that there are many use cases for this is unproven. JSO=
N-P is one valid example (though JSON-P usage is in decline with new method=
s for cross-domain calls), but so far the only one given.<o:p></o:p></pre>
<pre>- I think at this point we have to include this functionality and the =
only potential open issue is if we want to rename it to something other tha=
n oauth_token.<o:p></o:p></pre>
<pre>- Including this functionality doesn't mean we should encourage it, an=
d the way to deal with that is to mark this as 'deprecated'.<o:p></o:p></pr=
e>
<pre><o:p>&nbsp;</o:p></pre>
<pre>2. Should the spec support sending authentication parameters in the bo=
dy?<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>- I don't have any use cases where this is required. If the client can=
 perform a POST with a body, it should be able to set the header. Where is =
this an issue?<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>3. Should the oauth_token parameter be defined as part of an extensibl=
e framework for adding parameters to protected resources endpoint?<o:p></o:=
p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>- This was the original issue raised and so far no one has provided an=
y use cases for this. We just need to make sure we pick the right parameter=
 name for oauth_token and clearly state that it is not the right way to sen=
d tokens. There should not be any more such parameters in the protected res=
ource namespace.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>EHL<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>-----Original Message-----<o:p></o:p></pre>
<pre>From: <a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org=
</a> [<a href=3D"mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.o=
rg</a>] On Behalf<o:p></o:p></pre>
<pre>Of Phil Hunt<o:p></o:p></pre>
<pre>Sent: Thursday, March 10, 2011 10:15 AM<o:p></o:p></pre>
<pre>To: Richer, Justin P.<o:p></o:p></pre>
<pre>Cc: OAuth WG<o:p></o:p></pre>
<pre>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>-1.&nbsp; It is a BAD security practice to pass credentials in URLs. A=
void it.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Phil<o:p></o:p></pre>
<pre><a href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><o:p><=
/o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote:<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Ah, here we run into the classic argument of usability vs. security, i=
n which<o:p></o:p></pre>
</blockquote>
<pre>usability will win every single time in practice. If we don't define a=
t least a<o:p></o:p></pre>
<pre>reasonable way to do this within the scope of OAuth, that's not going =
to stop<o:p></o:p></pre>
<pre>people from doing it. It's just going to make people do it in a millio=
n different<o:p></o:p></pre>
<pre>ways, each with their own unique problems that nobody's thought of. At=
<o:p></o:p></pre>
<pre>least this way, we can enable it and have a real discussion about the =
security<o:p></o:p></pre>
<pre>considerations. There are valid and valuable places where putting cred=
entials<o:p></o:p></pre>
<pre>in the URL is a reasonable security tradeoff. Not everything functions=
 over<o:p></o:p></pre>
<pre>the public internet as well, and the security considerations are diffe=
rent in<o:p></o:p></pre>
<pre>these other environments.<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>In short: yes, it's necessary and good to do this.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>-- Justin<o:p></o:p></pre>
<pre>________________________________________<o:p></o:p></pre>
<pre>From: William J. Mills [<a href=3D"mailto:wmills@yahoo-inc.com">wmills=
@yahoo-inc.com</a>]<o:p></o:p></pre>
<pre>Sent: Thursday, March 10, 2011 12:59 PM<o:p></o:p></pre>
<pre>To: Richer, Justin P.; Lukas Rosenstock<o:p></o:p></pre>
<pre>Cc: Brian Eaton; OAuth WG<o:p></o:p></pre>
<pre>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Yeah, but there are serious security problems with credentials in the =
URL, is<o:p></o:p></pre>
</blockquote>
<pre>it really worth it in light of those problems?<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>________________________________<o:p></o:p></pre>
<pre>From: &quot;Richer, Justin P.&quot;<a href=3D"mailto:jricher@mitre.org=
">&lt;jricher@mitre.org&gt;</a><o:p></o:p></pre>
<pre>To: Lukas Rosenstock<a href=3D"mailto:lr@lukasrosenstock.net">&lt;lr@l=
ukasrosenstock.net&gt;</a>; William J. Mills<o:p></o:p></pre>
</blockquote>
<pre><a href=3D"mailto:wmills@yahoo-inc.com">&lt;wmills@yahoo-inc.com&gt;</=
a><o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Cc: Brian Eaton<a href=3D"mailto:beaton@google.com">&lt;beaton@google.=
com&gt;</a>; OAuth WG<a href=3D"mailto:oauth@ietf.org">&lt;oauth@ietf.org&g=
t;</a><o:p></o:p></pre>
<pre>Sent: Thursday, March 10, 2011 9:49 AM<o:p></o:p></pre>
<pre>Subject: RE: [OAUTH-WG] OAuth Bearer Token draft<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>Yes, there are many development setups where all you can reasonably<o:=
p></o:p></pre>
</blockquote>
<pre>access is the URL to get. It's also much simpler to make use of the we=
ll-<o:p></o:p></pre>
<pre>supported syntax helpers for query parameters instead of relying on ne=
w,<o:p></o:p></pre>
<pre>custom formatting for newly-defined headers. The bearer token makes th=
is<o:p></o:p></pre>
<pre>simple by just having the value of the token, but other schemes have t=
heir<o:p></o:p></pre>
<pre>own name/value pair formats and encodings that will inevitably cause<o=
:p></o:p></pre>
<pre>hiccups.<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>-- Justin<o:p></o:p></pre>
<pre>________________________________________<o:p></o:p></pre>
<pre>From: Lukas Rosenstock<o:p></o:p></pre>
</blockquote>
<pre>[<a href=3D"mailto:lr@lukasrosenstock.net">lr@lukasrosenstock.net</a><=
a href=3D"mailto:lr@lukasrosenstock.net">&lt;mailto:lr@lukasrosenstock.net&=
gt;</a>]<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Sent: Thursday, March 10, 2011 11:49 AM<o:p></o:p></pre>
<pre>To: William J. Mills<o:p></o:p></pre>
<pre>Cc: Brian Eaton; Richer, Justin P.; OAuth WG<o:p></o:p></pre>
<pre>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>JSON-P (callback) works with&lt;script&gt;&nbsp; tags where no paramet=
ers can be<o:p></o:p></pre>
</blockquote>
<pre>set; this is used a lot in web applications that want to consume 3rd p=
arty APIs<o:p></o:p></pre>
<pre>directly on the client side. So, yes, an alternative for the Authoriza=
tion<o:p></o:p></pre>
<pre>header is required - a.f.a.i.k this use case was one of the driving fo=
rces<o:p></o:p></pre>
<pre>behind WRAP and bearer tokens.<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>2011/3/9 William J. Mills&lt;<a href=3D"mailto:wmills@yahoo-inc.com">w=
mills@yahoo-inc.com</a>&lt;<a href=3D"mailto:wmills@yahoo">mailto:wmills@ya=
hoo</a>-<o:p></o:p></pre>
</blockquote>
<pre>inc.com&gt;&lt;<a href=3D"mailto:wmills@yahoo-inc.com">mailto:wmills@y=
ahoo-inc.com</a><a href=3D"mailto:wmills@yahoo-inc.com">&lt;mailto:wmills@y=
ahoo-inc.com&gt;</a>&gt;&gt;<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>Is there really a need going forward for anything beyond using the<o:p=
></o:p></pre>
</blockquote>
<pre>Authorization header?&nbsp; Do we have clients out there that just can=
't set that<o:p></o:p></pre>
<pre>header?&nbsp; Putting bearer tokens in query arguments is a very bad i=
dea for<o:p></o:p></pre>
<pre>many reasons, and in form variables has it's own set of badness (altho=
ugh<o:p></o:p></pre>
<pre>not to the same level).<o:p></o:p></pre>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<pre>-bill<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>OAuth mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ie=
tf.org/mailman/listinfo/oauth</a><o:p></o:p></pre>
</blockquote>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>OAuth mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ie=
tf.org/mailman/listinfo/oauth</a><o:p></o:p></pre>
</blockquote>
</blockquote>
</blockquote>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>OAuth mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ie=
tf.org/mailman/listinfo/oauth</a><o:p></o:p></pre>
</blockquote>
</blockquote>
<pre><o:p>&nbsp;</o:p></pre>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>OAuth mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ie=
tf.org/mailman/listinfo/oauth</a><o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<pre>-- <o:p></o:p></pre>
<pre>Chief Architect&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AIM:&nbsp; gffletch<o=
:p></o:p></pre>
<pre>Identity Services Engineering&nbsp;&nbsp;&nbsp;&nbsp; Work: <a href=3D=
"mailto:george.fletcher@teamaol.com">george.fletcher@teamaol.com</a><o:p></=
o:p></pre>
<pre>AOL Inc.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp; Home: <a href=3D"mailto:gffletch@aol.com">gffletch@aol.com</a=
><o:p></o:p></pre>
<pre>Mobile: &#43;1-703-462-3494&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; Blog: <a href=3D"http://practicalid.blogspot.com">http://=
practicalid.blogspot.com</a><o:p></o:p></pre>
<pre>Office: &#43;1-703-265-2544&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; Twitter: <a href=3D"http://twitter.com/gffletch">http://t=
witter.com/gffletch</a><o:p></o:p></pre>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739432528C8ABTK5EX14MBXC207r_--

From James.H.Manger@team.telstra.com  Thu Mar 10 22:04:35 2011
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A627B3A68AC for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 22:04:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.518
X-Spam-Level: 
X-Spam-Status: No, score=-0.518 tagged_above=-999 required=5 tests=[AWL=0.383,  BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7flsPfAyGGwf for <oauth@core3.amsl.com>; Thu, 10 Mar 2011 22:04:34 -0800 (PST)
Received: from ipxavo.tcif.telstra.com.au (ipxavo.tcif.telstra.com.au [203.35.135.200]) by core3.amsl.com (Postfix) with ESMTP id 3C5FF3A687D for <oauth@ietf.org>; Thu, 10 Mar 2011 22:04:34 -0800 (PST)
X-IronPort-AV: E=Sophos;i="4.62,301,1296997200"; d="scan'208";a="26987096"
Received: from unknown (HELO ipcdvi.tcif.telstra.com.au) ([10.97.217.212]) by ipoavi.tcif.telstra.com.au with ESMTP; 11 Mar 2011 17:05:52 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6281"; a="21058413"
Received: from wsmsg3706.srv.dir.telstra.com ([172.49.40.80]) by ipcdvi.tcif.telstra.com.au with ESMTP; 11 Mar 2011 17:05:52 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by wsmsg3706.srv.dir.telstra.com ([172.49.40.80]) with mapi; Fri, 11 Mar 2011 17:05:52 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: "Richer, Justin P." <jricher@mitre.org>, OAuth WG <oauth@ietf.org>
Date: Fri, 11 Mar 2011 17:05:50 +1100
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvfT0dpaD1X2A84R2ylDw9Uq5FLiAAAOnbAAABMXq4AF/Ja0A==
Message-ID: <255B9BB34FB7D647A506DC292726F6E1127F9E5D31@WSMSG3153V.srv.dir.telstra.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG> <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>
In-Reply-To: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 06:04:35 -0000

Justin Richer said: "Since all formats are optional,..."

No they aren't.
draft-ietf-oauth-v2-bearer-03 says
"Resource servers MUST accept [the Authorization header], and MAY support [=
body & query parameters]"


--
James Manger

From SRS0=6tHpo6=WE=lodderstedt.net=torsten@srs.bis7.eu.blackberry.com  Thu Mar 10 23:55:39 2011
Return-Path: <SRS0=6tHpo6=WE=lodderstedt.net=torsten@srs.bis7.eu.blackberry.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F17983A6BD2; Thu, 10 Mar 2011 23:55:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.846
X-Spam-Level: 
X-Spam-Status: No, score=-4.846 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_BASE64_TEXT=1.753, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A0DNSFeIL5Qp; Thu, 10 Mar 2011 23:55:38 -0800 (PST)
Received: from smtp10.bis7.eu.blackberry.com (smtp10.bis7.eu.blackberry.com [178.239.85.15]) by core3.amsl.com (Postfix) with ESMTP id CA5923A6BCE; Thu, 10 Mar 2011 23:55:37 -0800 (PST)
Received: from b1.c11.bise7.blackberry ([192.168.0.101]) by srs.bis7.eu.blackberry.com (8.13.7 TEAMON/8.13.7) with ESMTP id p2B7usAS030725; Fri, 11 Mar 2011 07:56:54 GMT
Received: from ups31.c11.bise7.blackberry (cmp31.c11.bise7.blackberry [172.18.204.201]) by b1.c11.bise7.blackberry (8.13.7 TEAMON/8.13.7) with ESMTP id p2B7usgN002463; Fri, 11 Mar 2011 07:56:54 GMT
X-rim-org-msg-ref-id: 1986667044
Message-ID: <1986667044-1299830172-cardhu_decombobulator_blackberry.rim.net-393558361-@b1.c11.bise7.blackberry>
Content-Transfer-Encoding: base64
X-Priority: Normal
References: <288129.60351.qm@web32309.mail.mud.yahoo.com><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG><B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>, <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B1@IMCMBX3.MITRE.ORG><0BB28BF7-0331-4C6E-ABE3-A18FB0FB71D3@oracle.com><4D79461C.1020200@lodderstedt.net><5A61CBCB-F644-4B43-937C-1BE59AC9B013@oracle.com><4D796C9E.1070507@aol.com><4E1F6AAD24975D4BA5B16804296739432528C8AB@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432528C8AB@TK5EX14MBXC207.redmond.corp.microsoft.com>
Sensitivity: Normal
Importance: Normal
To: "Mike Jones" <Michael.Jones@microsoft.com>, oauth-bounces@ietf.org, "OAuth WG" <oauth@ietf.org>
From: torsten@lodderstedt.net
Date: Fri, 11 Mar 2011 07:56:07 +0000
Content-Type: text/plain; charset="Windows-1252"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: torsten@lodderstedt.net
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 08:00:58 -0000
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From SRS0=6tHpo6=WE=lodderstedt.net=torsten@srs.bis7.eu.blackberry.com  Fri Mar 11 00:00:58 2011
Return-Path: <SRS0=6tHpo6=WE=lodderstedt.net=torsten@srs.bis7.eu.blackberry.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1B55F3A6BBD for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 00:00:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.114
X-Spam-Level: 
X-Spam-Status: No, score=-4.114 tagged_above=-999 required=5 tests=[AWL=-0.468, BAYES_00=-2.599, J_CHICKENPOX_25=0.6, J_CHICKENPOX_26=0.6, MIME_BASE64_TEXT=1.753, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RUfeBW3yqczO for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 00:00:56 -0800 (PST)
Received: from smtp09.bis7.eu.blackberry.com (smtp09.bis7.eu.blackberry.com [178.239.85.14]) by core3.amsl.com (Postfix) with ESMTP id 362B33A6BBB for <oauth@ietf.org>; Fri, 11 Mar 2011 00:00:56 -0800 (PST)
Received: from b1.c11.bise7.blackberry ([192.168.0.101]) by srs.bis7.eu.blackberry.com (8.13.7 TEAMON/8.13.7) with ESMTP id p2B82DoL007457; Fri, 11 Mar 2011 08:02:13 GMT
Received: from ups31.c11.bise7.blackberry (cmp31.c11.bise7.blackberry [172.18.204.201]) by b1.c11.bise7.blackberry (8.13.7 TEAMON/8.13.7) with ESMTP id p2B82A3d003346; Fri, 11 Mar 2011 08:02:10 GMT
X-rim-org-msg-ref-id: 78736385
Message-ID: <78736385-1299830487-cardhu_decombobulator_blackberry.rim.net-745222449-@b1.c11.bise7.blackberry>
Content-Transfer-Encoding: base64
X-Priority: Normal
Sensitivity: Normal
Importance: Normal
To: "Phil Hunt" <phil.hunt@oracle.com>
From: torsten@lodderstedt.net
Date: Fri, 11 Mar 2011 08:01:21 +0000
Content-Type: text/plain; charset="Windows-1252"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: torsten@lodderstedt.net
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 08:00:58 -0000
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From torsten@lodderstedt.net  Fri Mar 11 01:13:50 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 30C063A6886 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 01:13:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level: 
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id waNDC-unM725 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 01:13:49 -0800 (PST)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.95]) by core3.amsl.com (Postfix) with ESMTP id 6AFC43A686A for <oauth@ietf.org>; Fri, 11 Mar 2011 01:13:48 -0800 (PST)
Received: from [80.67.16.114] (helo=webmailfront03.ispgateway.de) by smtprelay06.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1PxyR8-0004Qx-JM for oauth@ietf.org; Fri, 11 Mar 2011 10:15:06 +0100
Received: from proxy1.t-online.net (proxy1.t-online.net [195.243.113.249]) by webmail.df.eu (Horde Framework) with HTTP; Fri, 11 Mar 2011 10:15:06 +0100
Message-ID: <20110311101506.74534cfncraei3gg@webmail.df.eu>
Date: Fri, 11 Mar 2011 10:15:06 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
To: OAuth WG <oauth@ietf.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; DelSp="Yes"; format="flowed"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit
User-Agent: Dynamic Internet Messaging Program (DIMP) H3 (1.1.2)
X-Originating-IP: 195.243.113.249
X-Df-Sender: 141509
Subject: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 09:13:50 -0000

Hi all,

who of the WG will attend IETF-80 and during which days?

I'm uncertain yet whether it makes sense to arrive before Friday as  
there is only a single OAuth session on this day. If others will be  
available earlier we could probably setup some discussion of topics of  
common interest, e.g. native apps.

regards,
Torsten.



From torsten@lodderstedt.net  Fri Mar 11 01:23:00 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0A8813A681F for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 01:23:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level: 
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fFwzStXfcvmu for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 01:22:59 -0800 (PST)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.96]) by core3.amsl.com (Postfix) with ESMTP id 3A17F3A68DA for <oauth@ietf.org>; Fri, 11 Mar 2011 01:22:59 -0800 (PST)
Received: from [80.67.16.114] (helo=webmailfront03.ispgateway.de) by smtprelay06.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Pxya0-0002MO-M1; Fri, 11 Mar 2011 10:24:16 +0100
Received: from proxy1.t-online.net (proxy1.t-online.net [195.243.113.249]) by webmail.df.eu (Horde Framework) with HTTP; Fri, 11 Mar 2011 10:24:16 +0100
Message-ID: <20110311102416.19404vwkoo86g6ck@webmail.df.eu>
Date: Fri, 11 Mar 2011 10:24:16 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
To: Craig Heath <craig.heath@wacapps.net>
References: <4EDB411A4D566C45BE3AB6E0152BFAF92761BB6C74@EX-BE-016-SFO.shared.themessagecenter.com>
In-Reply-To: <4EDB411A4D566C45BE3AB6E0152BFAF92761BB6C74@EX-BE-016-SFO.shared.themessagecenter.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; DelSp="Yes"; format="flowed"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit
User-Agent: Dynamic Internet Messaging Program (DIMP) H3 (1.1.2)
X-Originating-IP: 195.243.113.249
X-Df-Sender: 141509
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Implicit Grant Client Authentication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 09:23:00 -0000

Hi Craig,

> I've been puzzling over this text in 4.2: "... the authentication of  
> the client is based on the user-agent's same-origin policy."

I consider this a a relict from the original User-Agent Flow  
description. This flow was dedicated to JavaScript apps running  
embedded in a webpage.

>
> I get that the client can't be provisioned with secret credentials  
> and that's why we're using this flow, but I'm puzzled by the  
> implication that it might still be possible to authenticate the  
> client.  Isn't the point of this flow that you can't?

Such a client can be validated based on its redirect URI if this URI  
(or the base URI) has been registered previously.

>
> Specifically, how would you verify that the request is coming from a  
> user agent that even has a same-origin policy?

Good question :-)!

regards,
Torsten.
>
> Thanks!
>
> - Craig.
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>





From jricher@mitre.org  Fri Mar 11 05:20:51 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4B0D53A6BB0 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 05:20:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zxT8oZuLgH6Z for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 05:20:50 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 075093A69C0 for <oauth@ietf.org>; Fri, 11 Mar 2011 05:20:49 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id E3FDD21B110A; Fri, 11 Mar 2011 08:22:08 -0500 (EST)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id DD75D21B0289; Fri, 11 Mar 2011 08:22:08 -0500 (EST)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub2.MITRE.ORG ([129.83.29.74]) with mapi; Fri, 11 Mar 2011 08:22:08 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: "Manger, James H" <James.H.Manger@team.telstra.com>, OAuth WG <oauth@ietf.org>
Date: Fri, 11 Mar 2011 08:21:36 -0500
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvfT0dpaD1X2A84R2ylDw9Uq5FLiAAAOnbAAABMXq4AF/Ja0AAPhP7G
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71BB@IMCMBX3.MITRE.ORG>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG> <B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET> <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>, <255B9BB34FB7D647A506DC292726F6E1127F9E5D31@WSMSG3153V.srv.dir.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E1127F9E5D31@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 13:20:51 -0000

Allow me to rephrase more precisely:

"All formats that people are complaining about are optional".

 -- Justin

________________________________________
From: Manger, James H [James.H.Manger@team.telstra.com]
Sent: Friday, March 11, 2011 1:05 AM
To: Richer, Justin P.; OAuth WG
Subject: RE: [OAUTH-WG] OAuth Bearer Token draft

Justin Richer said: "Since all formats are optional,..."

No they aren't.
draft-ietf-oauth-v2-bearer-03 says
"Resource servers MUST accept [the Authorization header], and MAY support [=
body & query parameters]"


--
James Manger=

From jricher@mitre.org  Fri Mar 11 05:21:38 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1FFA03A69C0 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 05:21:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[AWL=-0.600, BAYES_00=-2.599, J_CHICKENPOX_25=0.6, J_CHICKENPOX_26=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uniHrC6NygmD for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 05:21:37 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id E2DB73A6835 for <oauth@ietf.org>; Fri, 11 Mar 2011 05:21:36 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 0297B21B114F; Fri, 11 Mar 2011 08:22:56 -0500 (EST)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id EE04B21B1703; Fri, 11 Mar 2011 08:22:55 -0500 (EST)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub1.MITRE.ORG ([129.83.29.73]) with mapi; Fri, 11 Mar 2011 08:22:56 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: "torsten@lodderstedt.net" <torsten@lodderstedt.net>, Phil Hunt <phil.hunt@oracle.com>
Date: Fri, 11 Mar 2011 08:22:17 -0500
Thread-Topic: Re: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AcvfwqLaiLZTX2TFQSeg4l7/P983HQALLVwS
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71BC@IMCMBX3.MITRE.ORG>
References: <78736385-1299830487-cardhu_decombobulator_blackberry.rim.net-745222449-@b1.c11.bise7.blackberry>
In-Reply-To: <78736385-1299830487-cardhu_decombobulator_blackberry.rim.net-745222449-@b1.c11.bise7.blackberry>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 13:21:38 -0000

It's not just scoped in the oauth-sense, it's also scoped to the issuing si=
te and can't be replayed against other AS/PR domains in the way that a user=
name/password pair can.

 -- Justin

________________________________________
From: torsten@lodderstedt.net [torsten@lodderstedt.net]
Sent: Friday, March 11, 2011 3:01 AM
To: Phil Hunt
Cc: Richer, Justin P.; OAuth WG
Subject: AW: Re: [OAUTH-WG] OAuth Bearer Token draft

To scope a refresh token is good practice (IMHO).

I agree with wrt URI query parameters. This should be used carefully and on=
ly if no other option exists.

Regards,
Torsten.
------Originalnachricht------
Von: Phil Hunt
An:Lodderstedt, Torsten
Cc:Richer, Justin P.
Cc:OAuth WG
Betreff: Re: [OAUTH-WG] OAuth Bearer Token draft
Gesendet: 10. Mrz. 2011 23:31

In theory yes, sometimes a token has limited scope. But since a token will =
often have unlimited scope, it carries the same potential for risk.

I would say one-time use tokens (e.g. grant codes) are really the only thin=
gs that should be passed by URL.

Note that if the client was able to obtain a token from a token server, the=
n it must have been previously been able to send data as headers or forms t=
o obtain a token. So why can't it pass the authorization token using the HT=
TP Authorization header?  I'm missing what the problem is here that leads t=
o needing this security compromise.

Phil
phil.hunt@oracle.com




On 2011-03-10, at 1:43 PM, Torsten Lodderstedt wrote:

> I would assume refresh token exposure to be less dangerous than the leaka=
ge of uid/password since a refresh tokens is restricted to a scope.
>
> regards,
> Torsten.
>
> Am 10.03.2011 20:22, schrieb Phil Hunt:
>> I think I was confused because of the use of the term "credential" rathe=
r than token.
>>
>> If you are calling the token service end-point then it is a big issue. E=
.g. exposing a refresh token would be as bad as a uid/pwd since it is long-=
lived.
>>
>> For a resource server, I agree, the risk is lower.
>>
>> Phil
>> phil.hunt@oracle.comer
>>
>>
>>
>>
>> On 2011-03-10, at 11:17 AM, Richer, Justin P. wrote:
>>
>>> Nobody said UID and password -- we're talking about tokens here. The co=
st of a leaked temporary token (even a straight bearer token) is much, much=
 lower.
>>>
>>> -- Justin
>>>________________________________________
>>> From: Phil Hunt [phil.hunt@oracle.com]
>>> Sent: Thursday, March 10, 2011 2:01 PM
>>> To: Richer, Justin P.
>>> Cc: Eran Hammer-Lahav; OAuth WG
>>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>>
>>> Well, for one if you promote this, it becomes general technique. Now yo=
u have uid/passwords in browser history etc potentially accessible to javas=
cript and could be leaked/hacked in any number of ways.
>>>
>>> Also, I would say that credentials are a higher risk item then say a sp=
ecific API call. Why? because credentials are used universally and so the e=
xposure is much higher. That said, it is still possible that application da=
ta can just as costly to expose. Another reason to use secure forms over UR=
Ls.
>>>
>>> Phil
>>> phil.hunt@oracle.com
>>>
>>>
>>>
>>>
>>> On 2011-03-10, at 10:37 AM, Richer, Justin P. wrote:
>>>
>>>> 1) Yes. And don't discount ease-of-use for developers. If I'm already =
sending my parameters over the query, this becomes another parameter and is=
 really easy to manage.
>>>> 2) Yes, for parallelism to #1, when using a POST.
>>>> 3) The idea of a parameter registry for this part is absurd, and the p=
arameter should be kept simple. I do think that it needs to be named someth=
ing other than "oauth_token".
>>>>
>>>> I'm happy with discouraging the use of 1 and 2 with discussion in the =
security considerations, but I think that if we don't specify this behavior=
 and discuss it, then people are going to do it anyway and we run more risk=
 of things going wrong. Simply ignoring the issue in the spec (by remaining=
 silent about it) will not make it go away.
>>>>
>>>> Since all formats are optional, couldn't an AS/PR setup that wants to =
just lock things down and require auth headers for their particular setup? =
If in two years nobody deploys it anymore, then let's deprecate it from the=
 spec and never speak of this again.
>>>>
>>>> -- Justin
>>>>
>>>>________________________________________
>>>> From: Eran Hammer-Lahav [eran@hueniverse.com]
>>>> Sent: Thursday, March 10, 2011 1:29 PM
>>>> To: Phil Hunt; Richer, Justin P.
>>>> Cc: OAuth WG
>>>> Subject: RE: [OAUTH-WG] OAuth Bearer Token draft
>>>>
>>>> There are a few issues to consider.
>>>>
>>>> 1. Should the spec support sending bearer token in a query parameter?
>>>>
>>>> - The argument that there are many use cases for this is unproven. JSO=
N-P is one valid example (though JSON-P usage is in decline with new method=
s for cross-domain calls), but so far the only one given.


Gesendet mit BlackBerry=AE Webmail von Telekom Deutschland=

From ron.monzillo@oracle.com  Fri Mar 11 06:34:07 2011
Return-Path: <ron.monzillo@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A175B3A6948 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 06:34:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YF5mKV90T9NM for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 06:34:06 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 8DAF33A690F for <oauth@ietf.org>; Fri, 11 Mar 2011 06:34:06 -0800 (PST)
Received: from rcsinet13.oracle.com (rcsinet13.oracle.com [148.87.113.125]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2BEZM4q002992 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 11 Mar 2011 14:35:23 GMT
Received: from acsmt355.oracle.com (acsmt355.oracle.com [141.146.40.155]) by rcsinet13.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2BEZKuj013657; Fri, 11 Mar 2011 14:35:20 GMT
Received: from abhmt012.oracle.com by acsmt353.oracle.com with ESMTP id 1130081091299854101; Fri, 11 Mar 2011 06:35:01 -0800
Received: from dhcp-burlington9-3rd-A-west-10-152-22-195.usdhcp.oraclecorp.com (/10.152.22.195) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 11 Mar 2011 06:35:01 -0800
Message-ID: <4D7A3314.2090600@oracle.com>
Date: Fri, 11 Mar 2011 09:35:00 -0500
From: Ron Monzillo <ron.monzillo@oracle.com>
User-Agent: Thunderbird 2.0.0.23 (Macintosh/20090812)
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>, Michael.Jones@microsoft.com
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Source-IP: acsmt355.oracle.com [141.146.40.155]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090209.4D7A332A.0043,ss=1,fgs=0
Subject: [OAUTH-WG] editorial comment on section 2 of bearer token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 14:34:08 -0000

 http://tools.ietf.org/html/draft-ietf-oauth-v2-bearer-03

the doc's stated purpose is to describe "how to use bearer tokens when 
accessing OAuth 2.0 protected resources".

but then in section 2 and 2.1, it describes how clients make 
"authenticated token requests"; which can be read as an authenticated  
request for a (e.g., access) token, where, imv, what is being described 
is the use of a (bearer) token to access a protected resource.

Ron


From tonynad@microsoft.com  Fri Mar 11 08:09:43 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DE5073A6A30 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 08:09:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.428
X-Spam-Level: 
X-Spam-Status: No, score=-6.428 tagged_above=-999 required=5 tests=[AWL=-1.038, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, SUBJ_ALL_CAPS=2.077, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QSjxOp2rrhB0 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 08:09:42 -0800 (PST)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id 543D13A68D1 for <oauth@ietf.org>; Fri, 11 Mar 2011 08:09:42 -0800 (PST)
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (157.54.80.48) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 11 Mar 2011 08:11:01 -0800
Received: from ch1outboundpool.messaging.microsoft.com (157.54.51.113) by mail.microsoft.com (157.54.80.48) with Microsoft SMTP Server (TLS) id 14.1.270.2; Fri, 11 Mar 2011 08:11:01 -0800
Received: from mail164-ch1-R.bigfish.com (216.32.181.173) by CH1EHSOBE017.bigfish.com (10.43.70.67) with Microsoft SMTP Server id 14.1.225.8; Fri, 11 Mar 2011 16:11:00 +0000
Received: from mail164-ch1 (localhost.localdomain [127.0.0.1])	by mail164-ch1-R.bigfish.com (Postfix) with ESMTP id B6025BA8528	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Fri, 11 Mar 2011 16:11:00 +0000 (UTC)
X-SpamScore: -43
X-BigFish: PS-43(zz542N14ffO9371PzzdafM1202h1082kzz8275dh1033ILz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT003.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail164-ch1 (localhost.localdomain [127.0.0.1]) by mail164-ch1 (MessageSwitch) id 1299859860591441_18757; Fri, 11 Mar 2011 16:11:00 +0000 (UTC)
Received: from CH1EHSMHS013.bigfish.com (snatpool1.int.messaging.microsoft.com [10.43.68.245])	by mail164-ch1.bigfish.com (Postfix) with ESMTP id 8C2E514B0050;	Fri, 11 Mar 2011 16:11:00 +0000 (UTC)
Received: from SN1PRD0302HT003.namprd03.prod.outlook.com (65.55.94.9) by CH1EHSMHS013.bigfish.com (10.43.70.13) with Microsoft SMTP Server (TLS) id 14.1.225.8; Fri, 11 Mar 2011 16:11:00 +0000
Received: from SN1PRD0302MB097.namprd03.prod.outlook.com ([169.254.8.16]) by SN1PRD0302HT003.namprd03.prod.outlook.com ([10.14.148.113]) with mapi id 14.01.0225.027; Fri, 11 Mar 2011 16:10:59 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>, OAuth WG <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] IETF-80
Thread-Index: AQHL38ziGs39sNZxvEWswybV9ALIBJQoTeTQ
Date: Fri, 11 Mar 2011 16:10:59 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E707FB7CE7@SN1PRD0302MB097.namprd03.prod.outlook.com>
References: <20110311101506.74534cfncraei3gg@webmail.df.eu>
In-Reply-To: <20110311101506.74534cfncraei3gg@webmail.df.eu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [131.107.0.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT003.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%LODDERSTEDT.NET$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14HUBC105.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC105.redmond.corp.microsoft.com
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 16:09:44 -0000

Torsten, Mike Jones and I will be there all week, it might be good to setup=
 some time to go through the Security Considerations draft

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of T=
orsten Lodderstedt
Sent: Friday, March 11, 2011 1:15 AM
To: OAuth WG
Subject: [OAUTH-WG] IETF-80


Hi all,

who of the WG will attend IETF-80 and during which days?

I'm uncertain yet whether it makes sense to arrive before Friday as there i=
s only a single OAuth session on this day. If others will be available earl=
ier we could probably setup some discussion of topics of common interest, e=
.g. native apps.

regards,
Torsten.


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth





From stpeter@stpeter.im  Fri Mar 11 08:16:47 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D1F003A6B1A for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 08:16:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.608
X-Spam-Level: 
X-Spam-Status: No, score=-102.608 tagged_above=-999 required=5 tests=[AWL=-0.009, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s5JLNFRdQ-g1 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 08:16:47 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id DBCCC3A6A32 for <oauth@ietf.org>; Fri, 11 Mar 2011 08:16:46 -0800 (PST)
Received: from dhcp-64-101-72-185.cisco.com (dhcp-64-101-72-185.cisco.com [64.101.72.185]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id A553940022; Fri, 11 Mar 2011 09:18:10 -0700 (MST)
Message-ID: <4D7A4B3B.7090600@stpeter.im>
Date: Fri, 11 Mar 2011 09:18:03 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Anthony Nadalin <tonynad@microsoft.com>
References: <20110311101506.74534cfncraei3gg@webmail.df.eu> <B26C1EF377CB694EAB6BDDC8E624B6E707FB7CE7@SN1PRD0302MB097.namprd03.prod.outlook.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E707FB7CE7@SN1PRD0302MB097.namprd03.prod.outlook.com>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms000606070908070506030909"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 16:16:47 -0000

This is a cryptographically signed message in MIME format.

--------------ms000606070908070506030909
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/11/11 9:10 AM, Anthony Nadalin wrote:
> Torsten, Mike Jones and I will be there all week, it might be good to
> setup some time to go through the Security Considerations draft

Yes, we can reserve a room for document editors (etc.) to complete some
focused work on the specs.

Peter

--
Peter Saint-Andre
https://stpeter.im/


--------------ms000606070908070506030909
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms000606070908070506030909--

From igor.faynberg@alcatel-lucent.com  Fri Mar 11 10:43:07 2011
Return-Path: <igor.faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D6FA83A68F1 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 10:43:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id blbFAEvpUiyF for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 10:43:06 -0800 (PST)
Received: from ihemail3.lucent.com (ihemail3.lucent.com [135.245.0.37]) by core3.amsl.com (Postfix) with ESMTP id C93A33A67EE for <oauth@ietf.org>; Fri, 11 Mar 2011 10:43:06 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail3.lucent.com (8.13.8/IER-o) with ESMTP id p2BIiPPr000624 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 11 Mar 2011 12:44:25 -0600 (CST)
Received: from [135.244.2.175] (faynberg.lra.lucent.com [135.244.2.175]) by umail.lucent.com (8.13.8/TPES) with ESMTP id p2BIiOAt020256; Fri, 11 Mar 2011 12:44:25 -0600 (CST)
Message-ID: <4D7A6D8D.20408@alcatel-lucent.com>
Date: Fri, 11 Mar 2011 13:44:29 -0500
From: Igor Faynberg <igor.faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: Peter Saint-Andre <stpeter@stpeter.im>
References: <20110311101506.74534cfncraei3gg@webmail.df.eu>	<B26C1EF377CB694EAB6BDDC8E624B6E707FB7CE7@SN1PRD0302MB097.namprd03.prod.outlook.com> <4D7A4B3B.7090600@stpeter.im>
In-Reply-To: <4D7A4B3B.7090600@stpeter.im>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.37
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: igor.faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 18:43:07 -0000

Peter,

Could you please advertise the room when it is reserved?

With thanks,

Igor

Peter Saint-Andre wrote:
> On 3/11/11 9:10 AM, Anthony Nadalin wrote:
>   
>> Torsten, Mike Jones and I will be there all week, it might be good to
>> setup some time to go through the Security Considerations draft
>>     
>
> Yes, we can reserve a room for document editors (etc.) to complete some
> focused work on the specs.
>
> Peter
>
> --
> Peter Saint-Andre
> https://stpeter.im/
>
>   
> ------------------------------------------------------------------------
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>   

From stpeter@stpeter.im  Fri Mar 11 11:09:40 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D7C733A6966 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 11:09:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.633
X-Spam-Level: 
X-Spam-Status: No, score=-102.633 tagged_above=-999 required=5 tests=[AWL=-0.034, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zd1EnVFhs5qr for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 11:09:40 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 1849C3A698F for <oauth@ietf.org>; Fri, 11 Mar 2011 11:09:40 -0800 (PST)
Received: from dhcp-64-101-72-185.cisco.com (dhcp-64-101-72-185.cisco.com [64.101.72.185]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 68E9B40022; Fri, 11 Mar 2011 12:11:04 -0700 (MST)
Message-ID: <4D7A73BE.1000209@stpeter.im>
Date: Fri, 11 Mar 2011 12:10:54 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: igor.faynberg@alcatel-lucent.com
References: <20110311101506.74534cfncraei3gg@webmail.df.eu>	<B26C1EF377CB694EAB6BDDC8E624B6E707FB7CE7@SN1PRD0302MB097.namprd03.prod.outlook.com> <4D7A4B3B.7090600@stpeter.im> <4D7A6D8D.20408@alcatel-lucent.com>
In-Reply-To: <4D7A6D8D.20408@alcatel-lucent.com>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms060302090301020609090905"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 19:09:41 -0000

This is a cryptographically signed message in MIME format.

--------------ms060302090301020609090905
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/11/11 11:44 AM, Igor Faynberg wrote:
> Peter,
>=20
> Could you please advertise the room when it is reserved?

Certainly.

I'd appreciate it if those who want to join this working session could
speak up on the list so that I can assign a "point person" and so that
we can figure out how big a room we need (and when).

Peter


--------------ms060302090301020609090905
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms060302090301020609090905--

From huilan.lu@alcatel-lucent.com  Fri Mar 11 11:18:13 2011
Return-Path: <huilan.lu@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 824AE3A6B48 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 11:18:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.41
X-Spam-Level: 
X-Spam-Status: No, score=-5.41 tagged_above=-999 required=5 tests=[AWL=-0.888,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SUBJ_ALL_CAPS=2.077]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9af2yckriwyB for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 11:18:12 -0800 (PST)
Received: from ihemail4.lucent.com (ihemail4.lucent.com [135.245.0.39]) by core3.amsl.com (Postfix) with ESMTP id 867CE3A698D for <oauth@ietf.org>; Fri, 11 Mar 2011 11:18:11 -0800 (PST)
Received: from usnavsmail2.ndc.alcatel-lucent.com (usnavsmail2.ndc.alcatel-lucent.com [135.3.39.10]) by ihemail4.lucent.com (8.13.8/IER-o) with ESMTP id p2BJJQeY006837 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 11 Mar 2011 13:19:26 -0600 (CST)
Received: from USNAVSXCHHUB02.ndc.alcatel-lucent.com (usnavsxchhub02.ndc.alcatel-lucent.com [135.3.39.111]) by usnavsmail2.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p2BJJQNM012111 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Fri, 11 Mar 2011 13:19:26 -0600
Received: from USNAVSXCHMBSB3.ndc.alcatel-lucent.com ([135.3.39.135]) by USNAVSXCHHUB02.ndc.alcatel-lucent.com ([135.3.39.111]) with mapi; Fri, 11 Mar 2011 13:19:26 -0600
From: "Lu, Hui-Lan (Huilan)" <huilan.lu@alcatel-lucent.com>
To: "'Peter Saint-Andre'" <stpeter@stpeter.im>, "Faynberg, Igor (Igor)" <igor.faynberg@alcatel-lucent.com>
Date: Fri, 11 Mar 2011 13:19:25 -0600
Thread-Topic: [OAUTH-WG] IETF-80
Thread-Index: AcvgIBQd2X2OxFnhRxKHjkYtB08ndAAAPbDA
Message-ID: <0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DDD@USNAVSXCHMBSB3.ndc.alcatel-lucent.com>
References: <20110311101506.74534cfncraei3gg@webmail.df.eu> <B26C1EF377CB694EAB6BDDC8E624B6E707FB7CE7@SN1PRD0302MB097.namprd03.prod.outlook.com> <4D7A4B3B.7090600@stpeter.im> <4D7A6D8D.20408@alcatel-lucent.com> <4D7A73BE.1000209@stpeter.im>
In-Reply-To: <4D7A73BE.1000209@stpeter.im>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.39
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.10
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 19:18:13 -0000

+1

Best regards,

Huilan LU

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org]=20
> On Behalf Of Peter Saint-Andre
> Sent: Friday, March 11, 2011 2:11 PM
> To: Faynberg, Igor (Igor)
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] IETF-80
>=20
> On 3/11/11 11:44 AM, Igor Faynberg wrote:
> > Peter,
> >=20
> > Could you please advertise the room when it is reserved?
>=20
> Certainly.
>=20
> I'd appreciate it if those who want to join this working=20
> session could speak up on the list so that I can assign a=20
> "point person" and so that we can figure out how big a room=20
> we need (and when).
>=20
> Peter
>=20
> =

From stpeter@stpeter.im  Fri Mar 11 12:03:07 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7F6723A693D for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 12:03:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.632
X-Spam-Level: 
X-Spam-Status: No, score=-102.632 tagged_above=-999 required=5 tests=[AWL=-0.033, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gOE+IMdtdo57 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 12:03:06 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 60A9A3A68B1 for <oauth@ietf.org>; Fri, 11 Mar 2011 12:03:06 -0800 (PST)
Received: from dhcp-64-101-72-185.cisco.com (dhcp-64-101-72-185.cisco.com [64.101.72.185]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 9717B40022 for <oauth@ietf.org>; Fri, 11 Mar 2011 13:04:31 -0700 (MST)
Message-ID: <4D7A8048.3060505@stpeter.im>
Date: Fri, 11 Mar 2011 13:04:24 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
References: <20110311101506.74534cfncraei3gg@webmail.df.eu>	<B26C1EF377CB694EAB6BDDC8E624B6E707FB7CE7@SN1PRD0302MB097.namprd03.prod.outlook.com>	<4D7A4B3B.7090600@stpeter.im> <4D7A6D8D.20408@alcatel-lucent.com> <4D7A73BE.1000209@stpeter.im>
In-Reply-To: <4D7A73BE.1000209@stpeter.im>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms000701070208030009000809"
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 20:03:07 -0000

This is a cryptographically signed message in MIME format.

--------------ms000701070208030009000809
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/11/11 12:10 PM, Peter Saint-Andre wrote:
> On 3/11/11 11:44 AM, Igor Faynberg wrote:
>> Peter,
>>
>> Could you please advertise the room when it is reserved?
>=20
> Certainly.
>=20
> I'd appreciate it if those who want to join this working session could
> speak up on the list so that I can assign a "point person" and so that
> we can figure out how big a room we need (and when).

Based on discussion so far, probably it would be good to find a room for
5-10 people on Thursday afternoon or Friday afternoon. Torsten, when
will you arrive?

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms000701070208030009000809
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms000701070208030009000809--

From zachary.zeltsan@alcatel-lucent.com  Fri Mar 11 12:49:56 2011
Return-Path: <zachary.zeltsan@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 79D5B3A6A4C for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 12:49:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.561
X-Spam-Level: 
X-Spam-Status: No, score=-5.561 tagged_above=-999 required=5 tests=[AWL=-1.038, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SUBJ_ALL_CAPS=2.077]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gL-Z+QJR+zGB for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 12:49:55 -0800 (PST)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by core3.amsl.com (Postfix) with ESMTP id 843863A691A for <oauth@ietf.org>; Fri, 11 Mar 2011 12:49:55 -0800 (PST)
Received: from usnavsmail1.ndc.alcatel-lucent.com (usnavsmail1.ndc.alcatel-lucent.com [135.3.39.9]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id p2BKpEB4020565 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 11 Mar 2011 14:51:14 -0600 (CST)
Received: from USNAVSXCHHUB01.ndc.alcatel-lucent.com (usnavsxchhub01.ndc.alcatel-lucent.com [135.3.39.110]) by usnavsmail1.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p2BKpD7v020055 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Fri, 11 Mar 2011 14:51:13 -0600
Received: from USNAVSXCHMBSA3.ndc.alcatel-lucent.com ([135.3.39.119]) by USNAVSXCHHUB01.ndc.alcatel-lucent.com ([135.3.39.110]) with mapi; Fri, 11 Mar 2011 14:51:13 -0600
From: "Zeltsan, Zachary (Zachary)" <zachary.zeltsan@alcatel-lucent.com>
To: "'Torsten Lodderstedt'" <torsten@lodderstedt.net>, OAuth WG <oauth@ietf.org>
Date: Fri, 11 Mar 2011 14:51:11 -0600
Thread-Topic: [OAUTH-WG] IETF-80
Thread-Index: AcvfzNRH1DeVBh6+RduLpqvHS46feQAYNm9g
Message-ID: <5710F82C0E73B04FA559560098BF95B12505F04157@USNAVSXCHMBSA3.ndc.alcatel-lucent.com>
References: <20110311101506.74534cfncraei3gg@webmail.df.eu>
In-Reply-To: <20110311101506.74534cfncraei3gg@webmail.df.eu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.9
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 20:49:56 -0000

Torsten,

I will attend the IETF 80 starting on Monday.

Zachary

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of T=
orsten Lodderstedt
Sent: Friday, March 11, 2011 4:15 AM
To: OAuth WG
Subject: [OAUTH-WG] IETF-80


Hi all,

who of the WG will attend IETF-80 and during which days?

I'm uncertain yet whether it makes sense to arrive before Friday as =20
there is only a single OAuth session on this day. If others will be =20
available earlier we could probably setup some discussion of topics of =20
common interest, e.g. native apps.

regards,
Torsten.


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From igor.faynberg@alcatel-lucent.com  Fri Mar 11 14:20:55 2011
Return-Path: <igor.faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DCC2D3A6A6B for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 14:20:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gR+KavSWk3zy for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 14:20:53 -0800 (PST)
Received: from ihemail3.lucent.com (ihemail3.lucent.com [135.245.0.37]) by core3.amsl.com (Postfix) with ESMTP id D08703A6814 for <oauth@ietf.org>; Fri, 11 Mar 2011 14:20:52 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail3.lucent.com (8.13.8/IER-o) with ESMTP id p2BMMBqi017873 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 11 Mar 2011 16:22:11 -0600 (CST)
Received: from [135.244.2.175] (faynberg.lra.lucent.com [135.244.2.175]) by umail.lucent.com (8.13.8/TPES) with ESMTP id p2BMMAZg014692; Fri, 11 Mar 2011 16:22:11 -0600 (CST)
Message-ID: <4D7AA098.5070207@alcatel-lucent.com>
Date: Fri, 11 Mar 2011 17:22:16 -0500
From: Igor Faynberg <igor.faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: Peter Saint-Andre <stpeter@stpeter.im>
References: <20110311101506.74534cfncraei3gg@webmail.df.eu>	<B26C1EF377CB694EAB6BDDC8E624B6E707FB7CE7@SN1PRD0302MB097.namprd03.prod.outlook.com>	<4D7A4B3B.7090600@stpeter.im>	<4D7A6D8D.20408@alcatel-lucent.com> <4D7A73BE.1000209@stpeter.im> <4D7A8048.3060505@stpeter.im>
In-Reply-To: <4D7A8048.3060505@stpeter.im>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.37
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: igor.faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 22:20:55 -0000

Peter,

First, thank you very much for being so responsive! 

My hope was that we could start much earlier than on Thursday, and I've 
been trying to coax Torsten to arrive no later than Monday. He should 
lead the security discussion, and the earlier that starts -- the 
better...  (And there are many interesting and important things related 
to IdM in both Applications and Security Area meetings.)

In case there is any problem with the room, Just a thought. Prague has 
been known for  basement beer halls divided into small walled 
partitions--just perfect to fit the OAuth security interest group. In 
the past 120 years or so those have been used for plotting major 
revolutions, discussing and creating art, and--most recently--writing 
Internet Drafts (i.e., the three major activities within the OAuth charter).

I think we would have no problem finding a partition to ourselves in 
between or after the meetings. (We did  that a few years ago when the 
IETF met in Prague.)

Just a thought...

Igor



Peter Saint-Andre wrote:
> On 3/11/11 12:10 PM, Peter Saint-Andre wrote:
>   
>> On 3/11/11 11:44 AM, Igor Faynberg wrote:
>>     
>>> Peter,
>>>
>>> Could you please advertise the room when it is reserved?
>>>       
>> Certainly.
>>
>> I'd appreciate it if those who want to join this working session could
>> speak up on the list so that I can assign a "point person" and so that
>> we can figure out how big a room we need (and when).
>>     
>
> Based on discussion so far, probably it would be good to find a room for
> 5-10 people on Thursday afternoon or Friday afternoon. Torsten, when
> will you arrive?
>
> Peter
>
>   
> ------------------------------------------------------------------------
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>   

From stpeter@stpeter.im  Fri Mar 11 14:49:04 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E77A63A6A37 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 14:49:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.632
X-Spam-Level: 
X-Spam-Status: No, score=-102.632 tagged_above=-999 required=5 tests=[AWL=-0.033, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1UTfnrurSSVB for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 14:49:04 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 00FF93A6A33 for <oauth@ietf.org>; Fri, 11 Mar 2011 14:49:04 -0800 (PST)
Received: from dhcp-64-101-72-185.cisco.com (dhcp-64-101-72-185.cisco.com [64.101.72.185]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id AE5A340022; Fri, 11 Mar 2011 15:50:29 -0700 (MST)
Message-ID: <4D7AA72D.7030407@stpeter.im>
Date: Fri, 11 Mar 2011 15:50:21 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: igor.faynberg@alcatel-lucent.com
References: <20110311101506.74534cfncraei3gg@webmail.df.eu>	<B26C1EF377CB694EAB6BDDC8E624B6E707FB7CE7@SN1PRD0302MB097.namprd03.prod.outlook.com>	<4D7A4B3B.7090600@stpeter.im>	<4D7A6D8D.20408@alcatel-lucent.com> <4D7A73BE.1000209@stpeter.im> <4D7A8048.3060505@stpeter.im> <4D7AA098.5070207@alcatel-lucent.com>
In-Reply-To: <4D7AA098.5070207@alcatel-lucent.com>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms000102050808020203010105"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 22:49:05 -0000

This is a cryptographically signed message in MIME format.

--------------ms000102050808020203010105
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/11/11 3:22 PM, Igor Faynberg wrote:
> Peter,
>=20
> First, thank you very much for being so responsive!

I'm not always so responsive. You got lucky. :)

> My hope was that we could start much earlier than on Thursday, and I've=

> been trying to coax Torsten to arrive no later than Monday. He should
> lead the security discussion, and the earlier that starts -- the
> better...=20

OK, let's wait to hear from Torsten.

> (And there are many interesting and important things related
> to IdM in both Applications and Security Area meetings.)
>=20
> In case there is any problem with the room, Just a thought. Prague has
> been known for  basement beer halls divided into small walled
> partitions--just perfect to fit the OAuth security interest group. In
> the past 120 years or so those have been used for plotting major
> revolutions, discussing and creating art, and--most recently--writing
> Internet Drafts (i.e., the three major activities within the OAuth
> charter).
>=20
> I think we would have no problem finding a partition to ourselves in
> between or after the meetings. (We did  that a few years ago when the
> IETF met in Prague.)
>=20
> Just a thought...

And a good thought! Probably we won't have trouble finding a room at the
hotel because the IETF usually reserves all the meeting rooms for the
week, but once we know the dates and times I will follow up with the
Secretariat and let you know.

Peter



--------------ms000102050808020203010105
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms000102050808020203010105--

From Michael.Jones@microsoft.com  Fri Mar 11 15:02:49 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ED3893A6A58 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 15:02:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jr6PKHaW+vb2 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 15:02:46 -0800 (PST)
Received: from smtp.microsoft.com (mailc.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id 496403A6A25 for <oauth@ietf.org>; Fri, 11 Mar 2011 15:02:46 -0800 (PST)
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (157.54.80.48) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 11 Mar 2011 15:04:05 -0800
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14HUBC105.redmond.corp.microsoft.com ([157.54.80.48]) with mapi id 14.01.0270.002; Fri, 11 Mar 2011 15:04:05 -0800
From: Mike Jones <Michael.Jones@microsoft.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AcvgQJ6IA17FgLiXShex/HElNNZqMg==
Date: Fri, 11 Mar 2011 23:04:05 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.79]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739432528F007TK5EX14MBXC207r_"
MIME-Version: 1.0
Subject: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 23:02:49 -0000

--_000_4E1F6AAD24975D4BA5B16804296739432528F007TK5EX14MBXC207r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

As you know, the OAuth 2.0 Bearer Token draft -03 established the OAuth Err=
ors Registry<http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.htm=
l#errors-registry> to increase interoperability among implementations using=
 the related OAuth specifications.  As you also know, there has been some d=
iscussion about whether:

A)  The OAuth Errors Registry belongs in in the Framework specification rat=
her than the bearer token specification,
B)  The OAuth Errors Registry should continue to be defined in the Bearer T=
oken specification and apply to all OAuth specifications,
C)  The OAuth Errors Registry should reside in the Bearer Token specificati=
on but be scoped back to only apply to that specification, or
D)  The OAuth Errors Registry should be deleted because the set of errors s=
hould not be extensible.

Please vote for A, B, C, or D by Friday, March 18th.

I personally believe that A makes the most sense, but given that other poin=
ts of view have also been voiced, this consensus call is needed to resolve =
the issue.

                                                                Cheers,
                                                                -- Mike


--_000_4E1F6AAD24975D4BA5B16804296739432528F007TK5EX14MBXC207r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">As you know, the OAuth 2.0 Bearer Token draft -03 es=
tablished the
<a href=3D"http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.html#=
errors-registry">
OAuth Errors Registry</a> to increase interoperability among implementation=
s using the related OAuth specifications.&nbsp; As you also know, there has=
 been some discussion about whether:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">A)&nbsp; The OAuth Errors Registry belongs in in the=
 Framework specification rather than the bearer token specification,<o:p></=
o:p></p>
<p class=3D"MsoNormal">B)&nbsp; The OAuth Errors Registry should continue t=
o be defined in the Bearer Token specification and apply to all OAuth speci=
fications,<o:p></o:p></p>
<p class=3D"MsoNormal">C)&nbsp; The OAuth Errors Registry should reside in =
the Bearer Token specification but be scoped back to only apply to that spe=
cification, or<o:p></o:p></p>
<p class=3D"MsoNormal">D)&nbsp; The OAuth Errors Registry should be deleted=
 because the set of errors should not be extensible.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Please vote for A, B, C, or D by Friday, March 18<su=
p>th</sup>.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I personally believe that A makes the most sense, bu=
t given that other points of view have also been voiced, this consensus cal=
l is needed to resolve the issue.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; Cheers,<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739432528F007TK5EX14MBXC207r_--

From phil.hunt@oracle.com  Fri Mar 11 15:33:56 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BE02C3A6A25 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 15:33:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.529
X-Spam-Level: 
X-Spam-Status: No, score=-6.529 tagged_above=-999 required=5 tests=[AWL=0.069,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W1CQrlzL8WZI for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 15:33:54 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 7DDB83A6A33 for <oauth@ietf.org>; Fri, 11 Mar 2011 15:33:54 -0800 (PST)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2BNZCLC025835 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 11 Mar 2011 23:35:13 GMT
Received: from acsmt353.oracle.com (acsmt353.oracle.com [141.146.40.153]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2BFPNvR003425; Fri, 11 Mar 2011 23:35:11 GMT
Received: from abhmt003.oracle.com by acsmt354.oracle.com with ESMTP id 1080622161299886503; Fri, 11 Mar 2011 15:35:03 -0800
Received: from [192.168.1.8] (/24.87.204.3) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 11 Mar 2011 15:35:02 -0800
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: multipart/alternative; boundary=Apple-Mail-14--543245939
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
Date: Fri, 11 Mar 2011 15:35:01 -0800
Message-Id: <81FAF2C3-D452-4B41-B97A-A49F154FE1DD@oracle.com>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.1082)
X-Source-IP: acsmt353.oracle.com [141.146.40.153]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090204.4D7AB1AF.00F1,ss=1,fgs=0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 23:33:56 -0000

--Apple-Mail-14--543245939
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Should option C read: No OAuth Errors Registry, but each specification =
may specify its own set of errors. Or is this another option and C is =
different?

Phil
phil.hunt@oracle.com




On 2011-03-11, at 3:04 PM, Mike Jones wrote:

> As you know, the OAuth 2.0 Bearer Token draft -03 established the =
OAuth Errors Registry to increase interoperability among implementations =
using the related OAuth specifications.  As you also know, there has =
been some discussion about whether:
> =20
> A)  The OAuth Errors Registry belongs in in the Framework =
specification rather than the bearer token specification,
> B)  The OAuth Errors Registry should continue to be defined in the =
Bearer Token specification and apply to all OAuth specifications,
> C)  The OAuth Errors Registry should reside in the Bearer Token =
specification but be scoped back to only apply to that specification, or
> D)  The OAuth Errors Registry should be deleted because the set of =
errors should not be extensible.
> =20
> Please vote for A, B, C, or D by Friday, March 18th.
> =20
> I personally believe that A makes the most sense, but given that other =
points of view have also been voiced, this consensus call is needed to =
resolve the issue.
> =20
>                                                                 =
Cheers,
>                                                                 -- =
Mike
> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail-14--543245939
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div>Should option C read: No OAuth Errors Registry, but each =
specification may specify its own set of errors. Or is this another =
option and C is different?</div><div><br><div>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-11, at 3:04 PM, Mike Jones wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; ">As you know, the OAuth 2.0 =
Bearer Token draft -03 established the<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.html#er=
rors-registry" style=3D"color: blue; text-decoration: underline; ">OAuth =
Errors Registry</a><span class=3D"Apple-converted-space">&nbsp;</span>to =
increase interoperability among implementations using the related OAuth =
specifications.&nbsp; As you also know, there has been some discussion =
about whether:<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">A)&nbsp; The OAuth Errors Registry belongs in in the Framework =
specification rather than the bearer token =
specification,<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; ">B)&nbsp; The OAuth Errors =
Registry should continue to be defined in the Bearer Token specification =
and apply to all OAuth specifications,<o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">C)&nbsp; The OAuth Errors Registry should reside in the Bearer Token =
specification but be scoped back to only apply to that specification, =
or<o:p></o:p></div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: =
Calibri, sans-serif; ">D)&nbsp; The OAuth Errors Registry should be =
deleted because the set of errors should not be =
extensible.<o:p></o:p></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; =
font-family: Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">Please vote for A, B, C, or D by Friday, March =
18<sup>th</sup>.<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; ">I =
personally believe that A makes the most sense, but given that other =
points of view have also been voiced, this consensus call is needed to =
resolve the issue.<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; Cheers,<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; -- Mike<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; =
"><o:p>&nbsp;</o:p></div></div>___________________________________________=
____<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" =
style=3D"color: blue; text-decoration: underline; =
">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: =
blue; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><br></div></span></blockq=
uote></div><br></div></body></html>=

--Apple-Mail-14--543245939--

From Michael.Jones@microsoft.com  Fri Mar 11 15:40:29 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3DBF73A6A25 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 15:40:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rv85oyiCexwz for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 15:40:28 -0800 (PST)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id E81123A6AB4 for <oauth@ietf.org>; Fri, 11 Mar 2011 15:40:27 -0800 (PST)
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (157.54.80.67) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 11 Mar 2011 15:41:47 -0800
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14HUBC107.redmond.corp.microsoft.com ([157.54.80.67]) with mapi id 14.01.0270.002; Fri, 11 Mar 2011 15:41:47 -0800
From: Mike Jones <Michael.Jones@microsoft.com>
To: Phil Hunt <phil.hunt@oracle.com>
Thread-Topic: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AcvgQJ6IA17FgLiXShex/HElNNZqMgAR2BCAABC7bmA=
Date: Fri, 11 Mar 2011 23:41:46 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739432528F147@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <81FAF2C3-D452-4B41-B97A-A49F154FE1DD@oracle.com>
In-Reply-To: <81FAF2C3-D452-4B41-B97A-A49F154FE1DD@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.79]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739432528F147TK5EX14MBXC207r_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2011 23:40:29 -0000

--_000_4E1F6AAD24975D4BA5B16804296739432528F147TK5EX14MBXC207r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

That would be yet a different option.  With (C), the initial set of errors =
registered by the bearer token spec {invalid_request, invalid_token, insuff=
icient_scope} could be extended by registering new errors.  With your alter=
native wording, this set would not be extensible.

                                                                -- Mike

From: Phil Hunt [mailto:phil.hunt@oracle.com]
Sent: Friday, March 11, 2011 3:35 PM
To: Mike Jones
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline F=
riday, March 18

Should option C read: No OAuth Errors Registry, but each specification may =
specify its own set of errors. Or is this another option and C is different=
?

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>




On 2011-03-11, at 3:04 PM, Mike Jones wrote:


As you know, the OAuth 2.0 Bearer Token draft -03 established the OAuth Err=
ors Registry<http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.htm=
l#errors-registry> to increase interoperability among implementations using=
 the related OAuth specifications.  As you also know, there has been some d=
iscussion about whether:

A)  The OAuth Errors Registry belongs in in the Framework specification rat=
her than the bearer token specification,
B)  The OAuth Errors Registry should continue to be defined in the Bearer T=
oken specification and apply to all OAuth specifications,
C)  The OAuth Errors Registry should reside in the Bearer Token specificati=
on but be scoped back to only apply to that specification, or
D)  The OAuth Errors Registry should be deleted because the set of errors s=
hould not be extensible.

Please vote for A, B, C, or D by Friday, March 18th.

I personally believe that A makes the most sense, but given that other poin=
ts of view have also been voiced, this consensus call is needed to resolve =
the issue.

                                                                Cheers,
                                                                -- Mike

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_4E1F6AAD24975D4BA5B16804296739432528F147TK5EX14MBXC207r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#002060;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">That would be yet a diffe=
rent option.&nbsp; With (C), the initial set of errors registered by the be=
arer token spec {invalid_request, invalid_token, insufficient_scope}
 could be extended by registering new errors.&nbsp; With your alternative w=
ording, this set would not be extensible.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Phil Hun=
t [mailto:phil.hunt@oracle.com]
<br>
<b>Sent:</b> Friday, March 11, 2011 3:35 PM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> oauth@ietf.org<br>
<b>Subject:</b> Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, dea=
dline Friday, March 18<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">Should option C read: No OAuth Errors Registry, but =
each specification may specify its own set of errors. Or is this another op=
tion and C is different?<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;;color:black">Phil<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"mailto:phil.hun=
t@oracle.com">phil.hunt@oracle.com</a><o:p></o:p></span></p>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span><=
/p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;;color:black"><br>
<br>
</span><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On 2011-03-11, at 3:04 PM, Mike Jones wrote:<o:p></o=
:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">As you know, the OAuth 2.0 Bearer Token=
 draft -03 established the<span class=3D"apple-converted-space">&nbsp;</spa=
n><a href=3D"http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.htm=
l#errors-registry">OAuth
 Errors Registry</a><span class=3D"apple-converted-space">&nbsp;</span>to i=
ncrease interoperability among implementations using the related OAuth spec=
ifications.&nbsp; As you also know, there has been some discussion about wh=
ether:<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">A)&nbsp; The OAuth Errors Registry belo=
ngs in in the Framework specification rather than the bearer token specific=
ation,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">B)&nbsp; The OAuth Errors Registry shou=
ld continue to be defined in the Bearer Token specification and apply to al=
l OAuth specifications,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">C)&nbsp; The OAuth Errors Registry shou=
ld reside in the Bearer Token specification but be scoped back to only appl=
y to that specification, or<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">D)&nbsp; The OAuth Errors Registry shou=
ld be deleted because the set of errors should not be extensible.<o:p></o:p=
></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Please vote for A, B, C, or D by Friday=
, March 18<sup>th</sup>.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I personally believe that A makes the m=
ost sense, but given that other points of view have also been voiced, this =
consensus call is needed to resolve the issue.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cheers,<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;">_____________________________________=
__________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.or=
g/mailman/listinfo/oauth</a><o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739432528F147TK5EX14MBXC207r_--

From phil.hunt@oracle.com  Fri Mar 11 16:30:53 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 447863A67B6 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 16:30:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.202
X-Spam-Level: 
X-Spam-Status: No, score=-5.202 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bNy4UrXVYMJV for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 16:30:52 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 7A2143A6ADB for <oauth@ietf.org>; Fri, 11 Mar 2011 16:30:51 -0800 (PST)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2C0W9vR030838 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Sat, 12 Mar 2011 00:32:11 GMT
Received: from acsmt355.oracle.com (acsmt355.oracle.com [141.146.40.155]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2BN1bQa013201; Sat, 12 Mar 2011 00:32:09 GMT
Received: from abhmt010.oracle.com by acsmt355.oracle.com with ESMTP id 1080737591299889909; Fri, 11 Mar 2011 16:31:49 -0800
Received: from [25.67.126.57] (/74.198.150.185) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 11 Mar 2011 16:31:47 -0800
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <81FAF2C3-D452-4B41-B97A-A49F154FE1DD@oracle.com> <4E1F6AAD24975D4BA5B16804296739432528F147@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432528F147@TK5EX14MBXC207.redmond.corp.microsoft.com>
Mime-Version: 1.0 (iPhone Mail 8F190)
Content-Type: multipart/alternative; boundary=Apple-Mail-6--539842871
Message-Id: <23895287-9B96-4A63-9CE4-4B9201E06145@oracle.com>
Content-Transfer-Encoding: 7bit
X-Mailer: iPhone Mail (8F190)
From: Phillip Hunt <phil.hunt@oracle.com>
Date: Fri, 11 Mar 2011 16:31:41 -0800
To: Mike Jones <Michael.Jones@microsoft.com>
X-Source-IP: acsmt355.oracle.com [141.146.40.155]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090207.4D7ABF09.0068,ss=1,fgs=0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Mar 2011 00:30:53 -0000

--Apple-Mail-6--539842871
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Extensibility for the new option would be defined within each spec.

It doesn't seem right to put registry in bearer spec. What if one is definin=
g a non-bearer spec?

Phil

Sent from my phone.=20

On 2011-03-11, at 15:41, Mike Jones <Michael.Jones@microsoft.com> wrote:

> That would be yet a different option.  With (C), the initial set of errors=
 registered by the bearer token spec {invalid_request, invalid_token, insuff=
icient_scope} could be extended by registering new errors.  With your altern=
ative wording, this set would not be extensible.
>=20
> =20
>=20
>                                                                 -- Mike
>=20
> =20
>=20
> From: Phil Hunt [mailto:phil.hunt@oracle.com]=20
> Sent: Friday, March 11, 2011 3:35 PM
> To: Mike Jones
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline =
Friday, March 18
>=20
> =20
>=20
> Should option C read: No OAuth Errors Registry, but each specification may=
 specify its own set of errors. Or is this another option and C is different=
?
>=20
> =20
>=20
> Phil
>=20
> phil.hunt@oracle.com
>=20
> =20
>=20
>=20
>=20
>=20
> =20
>=20
> On 2011-03-11, at 3:04 PM, Mike Jones wrote:
>=20
>=20
>=20
>=20
> As you know, the OAuth 2.0 Bearer Token draft -03 established the OAuth Er=
rors Registry to increase interoperability among implementations using the r=
elated OAuth specifications.  As you also know, there has been some discussi=
on about whether:
>=20
> =20
>=20
> A)  The OAuth Errors Registry belongs in in the Framework specification ra=
ther than the bearer token specification,
>=20
> B)  The OAuth Errors Registry should continue to be defined in the Bearer T=
oken specification and apply to all OAuth specifications,
>=20
> C)  The OAuth Errors Registry should reside in the Bearer Token specificat=
ion but be scoped back to only apply to that specification, or
>=20
> D)  The OAuth Errors Registry should be deleted because the set of errors s=
hould not be extensible.
>=20
> =20
>=20
> Please vote for A, B, C, or D by Friday, March 18th.
>=20
> =20
>=20
> I personally believe that A makes the most sense, but given that other poi=
nts of view have also been voiced, this consensus call is needed to resolve t=
he issue.
>=20
> =20
>=20
>                                                                 Cheers,
>=20
>                                                                 -- Mike
>=20
> =20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
> =20

--Apple-Mail-6--539842871
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=utf-8

<html><body bgcolor="#FFFFFF"><div>Extensibility for the new option would be defined within each spec.</div><div><br></div><div>It doesn't seem right to put registry in bearer spec. What if one is defining a non-bearer spec?<br><br>Phil<div><br></div><div>Sent from my phone.&nbsp;</div></div><div><br>On 2011-03-11, at 15:41, Mike Jones &lt;<a href="mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt; wrote:<br><br></div><div></div><blockquote type="cite"><div>
<div class="WordSection1">
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#002060">That would be yet a different option.&nbsp; With (C), the initial set of errors registered by the bearer token spec {invalid_request, invalid_token, insufficient_scope}
 could be extended by registering new errors.&nbsp; With your alternative wording, this set would not be extensible.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span></p>
<div>
<div style="border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in">
<p class="MsoNormal"><b><span style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Phil Hunt [mailto:phil.hunt@oracle.com]
<br>
<b>Sent:</b> Friday, March 11, 2011 3:35 PM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> <a href="mailto:oauth@ietf.org"><a href="mailto:oauth@ietf.org">oauth@ietf.org</a></a><br>
<b>Subject:</b> Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18<o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class="MsoNormal">Should option C read: No OAuth Errors Registry, but each specification may specify its own set of errors. Or is this another option and C is different?<o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<div>
<div>
<div>
<div>
<p class="MsoNormal"><span style="font-size:9.0pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:black">Phil<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:9.0pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:black"><a href="mailto:phil.hunt@oracle.com"><a href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></a><o:p></o:p></span></p>
</div>
</div>
</div>
</div>
<p class="MsoNormal"><span style="font-size:13.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span></p>
</div>
<p class="MsoNormal"><span style="font-size:13.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:black"><br>
<br>
</span><o:p></o:p></p>
</div>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class="MsoNormal">On 2011-03-11, at 3:04 PM, Mike Jones wrote:<o:p></o:p></p>
</div>
<p class="MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">As you know, the OAuth 2.0 Bearer Token draft -03 established the<span class="apple-converted-space">&nbsp;</span><a href="http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.html#errors-registry">OAuth
 Errors Registry</a><span class="apple-converted-space">&nbsp;</span>to increase interoperability among implementations using the related OAuth specifications.&nbsp; As you also know, there has been some discussion about whether:<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">A)&nbsp; The OAuth Errors Registry belongs in in the Framework specification rather than the bearer token specification,<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">B)&nbsp; The OAuth Errors Registry should continue to be defined in the Bearer Token specification and apply to all OAuth specifications,<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">C)&nbsp; The OAuth Errors Registry should reside in the Bearer Token specification but be scoped back to only apply to that specification, or<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">D)&nbsp; The OAuth Errors Registry should be deleted because the set of errors should not be extensible.<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">Please vote for A, B, C, or D by Friday, March 18<sup>th</sup>.<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">I personally believe that A makes the most sense, but given that other points of view have also been voiced, this consensus call is needed to resolve the issue.<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cheers,<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
</div>
<div>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<p class="MsoNormal"><span style="font-size:13.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;">_______________________________________________<br>
OAuth mailing list<br>
<a href="mailto:OAuth@ietf.org"><a href="mailto:OAuth@ietf.org">OAuth@ietf.org</a></a><br>
<a href="https://www.ietf.org/mailman/listinfo/oauth"><a href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></a><o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>


</div></blockquote></body></html>
--Apple-Mail-6--539842871--

From Michael.Jones@microsoft.com  Fri Mar 11 16:57:26 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 522F33A6AE4 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 16:57:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I-zbIry6Sny0 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 16:57:24 -0800 (PST)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id AEAEB3A6A7C for <oauth@ietf.org>; Fri, 11 Mar 2011 16:57:24 -0800 (PST)
Received: from TK5EX14MLTC102.redmond.corp.microsoft.com (157.54.79.180) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 11 Mar 2011 16:58:44 -0800
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14MLTC102.redmond.corp.microsoft.com ([157.54.79.180]) with mapi id 14.01.0270.002; Fri, 11 Mar 2011 16:58:44 -0800
From: Mike Jones <Michael.Jones@microsoft.com>
To: Phillip Hunt <phil.hunt@oracle.com>
Thread-Topic: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AcvgQJ6IA17FgLiXShex/HElNNZqMgAR2BCAABC7bmD//4n5gIAAf+YQ
Date: Sat, 12 Mar 2011 00:58:42 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739432528F318@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <81FAF2C3-D452-4B41-B97A-A49F154FE1DD@oracle.com> <4E1F6AAD24975D4BA5B16804296739432528F147@TK5EX14MBXC207.redmond.corp.microsoft.com> <23895287-9B96-4A63-9CE4-4B9201E06145@oracle.com>
In-Reply-To: <23895287-9B96-4A63-9CE4-4B9201E06145@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.79]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739432528F318TK5EX14MBXC207r_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Mar 2011 00:57:26 -0000

--_000_4E1F6AAD24975D4BA5B16804296739432528F318TK5EX14MBXC207r_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_4E1F6AAD24975D4BA5B16804296739432528F318TK5EX14MBXC207r_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_4E1F6AAD24975D4BA5B16804296739432528F318TK5EX14MBXC207r_--

From eran@hueniverse.com  Fri Mar 11 17:05:28 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 44F563A6AF8 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 17:05:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.558
X-Spam-Level: 
X-Spam-Status: No, score=-2.558 tagged_above=-999 required=5 tests=[AWL=0.040,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mwlDRQWyVNaW for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 17:05:27 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 0E0233A6A7C for <oauth@ietf.org>; Fri, 11 Mar 2011 17:05:26 -0800 (PST)
Received: (qmail 20049 invoked from network); 12 Mar 2011 01:06:46 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 12 Mar 2011 01:06:46 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Fri, 11 Mar 2011 18:06:37 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Mike Jones <Michael.Jones@microsoft.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Fri, 11 Mar 2011 18:06:13 -0700
Thread-Topic: Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AcvgQJ6IA17FgLiXShex/HElNNZqMgAEJBJw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F3376BE@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234464F3376BEP3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Mar 2011 01:05:28 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F3376BEP3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

D (not objection to C).

So far, not a single use case or technical rational has been presented to j=
ustify option A.

Option B is not a valid option per IETF process (for option B to be valid, =
the protocol spec must first be published as an RFC, and they the bearer to=
ken spec updates it).

This entire proposal received practically no support or interest and callin=
g for a vote on it is a bit overreaching.

EHL

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of M=
ike Jones
Sent: Friday, March 11, 2011 3:04 PM
To: oauth@ietf.org
Subject: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Frida=
y, March 18

As you know, the OAuth 2.0 Bearer Token draft -03 established the OAuth Err=
ors Registry<http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.htm=
l#errors-registry> to increase interoperability among implementations using=
 the related OAuth specifications.  As you also know, there has been some d=
iscussion about whether:

A)  The OAuth Errors Registry belongs in in the Framework specification rat=
her than the bearer token specification,
B)  The OAuth Errors Registry should continue to be defined in the Bearer T=
oken specification and apply to all OAuth specifications,
C)  The OAuth Errors Registry should reside in the Bearer Token specificati=
on but be scoped back to only apply to that specification, or
D)  The OAuth Errors Registry should be deleted because the set of errors s=
hould not be extensible.

Please vote for A, B, C, or D by Friday, March 18th.

I personally believe that A makes the most sense, but given that other poin=
ts of view have also been voiced, this consensus call is needed to resolve =
the issue.

                                                                Cheers,
                                                                -- Mike


--_000_90C41DD21FB7C64BB94121FBBC2E7234464F3376BEP3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'c=
olor:#1F497D'>D (not objection to C).<o:p></o:p></span></p><p class=3DMsoNo=
rmal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DM=
soNormal><span style=3D'color:#1F497D'>So far, not a single use case or tec=
hnical rational has been presented to justify option A.<o:p></o:p></span></=
p><p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></spa=
n></p><p class=3DMsoNormal><span style=3D'color:#1F497D'>Option B is not a =
valid option per IETF process (for option B to be valid, the protocol spec =
must first be published as an RFC, and they the bearer token spec updates i=
t).<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'=
><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F4=
97D'>This entire proposal received practically no support or interest and c=
alling for a vote on it is a bit overreaching.<o:p></o:p></span></p><p clas=
s=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'color:#1F497D'>EHL<o:p></o:p></span></p><p=
 class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></=
p><div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0i=
n 4.0pt'><div><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padd=
ing:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span style=3D'font-size:10.=
0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span style=3D'font-=
size:10.0pt;font-family:"Tahoma","sans-serif"'> oauth-bounces@ietf.org [mai=
lto:oauth-bounces@ietf.org] <b>On Behalf Of </b>Mike Jones<br><b>Sent:</b> =
Friday, March 11, 2011 3:04 PM<br><b>To:</b> oauth@ietf.org<br><b>Subject:<=
/b> [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, Ma=
rch 18<o:p></o:p></span></p></div></div><p class=3DMsoNormal><o:p>&nbsp;</o=
:p></p><p class=3DMsoNormal>As you know, the OAuth 2.0 Bearer Token draft -=
03 established the <a href=3D"http://self-issued.info/docs/draft-ietf-oauth=
-v2-bearer-03.html#errors-registry">OAuth Errors Registry</a> to increase i=
nteroperability among implementations using the related OAuth specification=
s.&nbsp; As you also know, there has been some discussion about whether:<o:=
p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>=
A)&nbsp; The OAuth Errors Registry belongs in in the Framework specificatio=
n rather than the bearer token specification,<o:p></o:p></p><p class=3DMsoN=
ormal>B)&nbsp; The OAuth Errors Registry should continue to be defined in t=
he Bearer Token specification and apply to all OAuth specifications,<o:p></=
o:p></p><p class=3DMsoNormal>C)&nbsp; The OAuth Errors Registry should resi=
de in the Bearer Token specification but be scoped back to only apply to th=
at specification, or<o:p></o:p></p><p class=3DMsoNormal>D)&nbsp; The OAuth =
Errors Registry should be deleted because the set of errors should not be e=
xtensible.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=
=3DMsoNormal>Please vote for A, B, C, or D by Friday, March 18<sup>th</sup>=
.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNor=
mal>I personally believe that A makes the most sense, but given that other =
points of view have also been voiced, this consensus call is needed to reso=
lve the issue.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p c=
lass=3DMsoNormal>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp; Cheers,<o:p></o:p></p><p class=3DMsoNormal>&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike=
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></body=
></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F3376BEP3PW5EX1MB01E_--

From llynch@civil-tongue.net  Fri Mar 11 17:39:47 2011
Return-Path: <llynch@civil-tongue.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E049E3A6B4C for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 17:39:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.217
X-Spam-Level: 
X-Spam-Status: No, score=-102.217 tagged_above=-999 required=5 tests=[AWL=0.382, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KlruN-v+df55 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 17:39:46 -0800 (PST)
Received: from hiroshima.bogus.com (hiroshima.bogus.com [IPv6:2001:418:1::80]) by core3.amsl.com (Postfix) with ESMTP id 4220A3A6AF8 for <oauth@ietf.org>; Fri, 11 Mar 2011 17:39:45 -0800 (PST)
Received: from hiroshima.bogus.com (localhost [127.0.0.1]) by hiroshima.bogus.com (8.14.3/8.14.3) with ESMTP id p2C1f4tT053973 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Fri, 11 Mar 2011 17:41:04 -0800 (PST) (envelope-from llynch@civil-tongue.net)
Received: from localhost (llynch@localhost) by hiroshima.bogus.com (8.14.3/8.14.3/Submit) with ESMTP id p2C1f35V053970; Fri, 11 Mar 2011 17:41:03 -0800 (PST) (envelope-from llynch@civil-tongue.net)
Date: Fri, 11 Mar 2011 17:41:03 -0800 (PST)
From: Lucy Lynch <llynch@civil-tongue.net>
X-X-Sender: llynch@hiroshima.bogus.com
To: Mike Jones <Michael.Jones@microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
Message-ID: <alpine.BSF.2.00.1103111709080.24744@hiroshima.bogus.com>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: MULTIPART/MIXED; BOUNDARY="===============1055171076=="
Content-ID: <alpine.BSF.2.00.1103111737090.24744@hiroshima.bogus.com>
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Mar 2011 01:39:48 -0000

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--===============1055171076==
Content-Type: TEXT/PLAIN; FORMAT=flowed; CHARSET=US-ASCII
Content-ID: <alpine.BSF.2.00.1103111737091.24744@hiroshima.bogus.com>

On Fri, 11 Mar 2011, Mike Jones wrote:

> As you know, the OAuth 2.0 Bearer Token draft -03 established the OAuth 
> Errors 
> Registry<http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.html#errors-registry> 
> to increase interoperability among implementations using the related 
> OAuth specifications.  As you also know, there has been some discussion 
> about whether:
>
> A)  The OAuth Errors Registry belongs in in the Framework specification 
> rather than the bearer token specification,
> B)  The OAuth Errors Registry should continue to be defined in the 
> Bearer Token specification and apply to all OAuth specifications,
> C)  The OAuth Errors Registry should reside in the Bearer Token 
> specification but be scoped back to only apply to that specification, or
> D)  The OAuth Errors Registry should be deleted because the set of 
> errors should not be extensible.
>
> Please vote for A, B, C, or D by Friday, March 18th.

Why the early cut-off date? As this is in advance of IETF 80, changes will
wait until after Prague in any case.

> I personally believe that A makes the most sense, but given that other 
> points of view have also been voiced, this consensus call is needed to 
> resolve the issue.

Consensus isn't achieved by voting so all you'll get is poll data but that 
may be useful here. While I agree that there has been some discussion, I 
don't think the relative merits of the models have been made clear to the 
group. A fuller discussion of the need for an extensible registry for 
errors (before decided where to home the text) might be more helpful.

- Lucy


>                                                                Cheers,
>                                                                -- Mike
>
>
--===============1055171076==
Content-Type: TEXT/PLAIN; CHARSET=us-ascii
Content-ID: <alpine.BSF.2.00.1103111709081.24744@hiroshima.bogus.com>
Content-Description: 
Content-Disposition: INLINE

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

--===============1055171076==--

From tonynad@microsoft.com  Fri Mar 11 17:45:14 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D6B023A6BCA for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 17:45:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.121
X-Spam-Level: 
X-Spam-Status: No, score=-7.121 tagged_above=-999 required=5 tests=[AWL=0.346,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pbdzeNhW-NRD for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 17:45:13 -0800 (PST)
Received: from smtp.microsoft.com (mail2.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 5159E3A6B96 for <oauth@ietf.org>; Fri, 11 Mar 2011 17:45:13 -0800 (PST)
Received: from TK5EX14HUBC104.redmond.corp.microsoft.com (157.54.80.25) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 11 Mar 2011 17:46:33 -0800
Received: from DB3EHSOBE006.bigfish.com (157.54.51.113) by mail.microsoft.com (157.54.80.25) with Microsoft SMTP Server (TLS) id 14.1.270.2; Fri, 11 Mar 2011 17:46:32 -0800
Received: from mail68-db3-R.bigfish.com (10.3.81.244) by DB3EHSOBE006.bigfish.com (10.3.84.26) with Microsoft SMTP Server id 14.1.225.8; Sat, 12 Mar 2011 01:46:31 +0000
Received: from mail68-db3 (localhost.localdomain [127.0.0.1])	by mail68-db3-R.bigfish.com (Postfix) with ESMTP id 355509F0400	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Sat, 12 Mar 2011 01:46:31 +0000 (UTC)
X-SpamScore: -47
X-BigFish: PS-47(zz542N1432N98dN9371PzzdafM1202h1082kzz8275eh8275dh1033ILa1495iz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT002.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail68-db3 (localhost.localdomain [127.0.0.1]) by mail68-db3 (MessageSwitch) id 1299894390665940_26306; Sat, 12 Mar 2011 01:46:30 +0000 (UTC)
Received: from DB3EHSMHS002.bigfish.com (unknown [10.3.81.242])	by mail68-db3.bigfish.com (Postfix) with ESMTP id 958FA14E8050; Sat, 12 Mar 2011 01:46:30 +0000 (UTC)
Received: from SN1PRD0302HT002.namprd03.prod.outlook.com (65.55.94.9) by DB3EHSMHS002.bigfish.com (10.3.87.102) with Microsoft SMTP Server (TLS) id 14.1.225.22; Sat, 12 Mar 2011 01:46:26 +0000
Received: from SN1PRD0302MB097.namprd03.prod.outlook.com ([169.254.8.16]) by SN1PRD0302HT002.namprd03.prod.outlook.com ([10.14.149.46]) with mapi id 14.01.0225.027; Sat, 12 Mar 2011 01:46:24 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Lucy Lynch <llynch@civil-tongue.net>, Mike Jones <Michael.Jones@microsoft.com>
Thread-Topic: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AQHL4Fa1o09qZ2XxYES5AGnxdCUHUZQo7Xfg
Date: Sat, 12 Mar 2011 01:46:23 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E707FB821F@SN1PRD0302MB097.namprd03.prod.outlook.com>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <alpine.BSF.2.00.1103111709080.24744@hiroshima.bogus.com>
In-Reply-To: <alpine.BSF.2.00.1103111709080.24744@hiroshima.bogus.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.46.124.183]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT002.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%CIVIL-TONGUE.NET$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14HUBC104.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC104.redmond.corp.microsoft.com
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Mar 2011 01:45:15 -0000

> Why the early cut-off date? As this is in advance of IETF 80, changes wil=
l wait until after Prague in any case.
To inform the discussions @ IETF 80 to determine what else might be needed,=
 which goes to your second comment

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of L=
ucy Lynch
Sent: Friday, March 11, 2011 5:41 PM
To: Mike Jones
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline F=
riday, March 18

On Fri, 11 Mar 2011, Mike Jones wrote:

> As you know, the OAuth 2.0 Bearer Token draft -03 established the=20
> OAuth Errors=20
> Registry<http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.ht
> ml#errors-registry> to increase interoperability among implementations=20
> using the related OAuth specifications.  As you also know, there has=20
> been some discussion about whether:
>
> A)  The OAuth Errors Registry belongs in in the Framework=20
> specification rather than the bearer token specification,
> B)  The OAuth Errors Registry should continue to be defined in the=20
> Bearer Token specification and apply to all OAuth specifications,
> C)  The OAuth Errors Registry should reside in the Bearer Token=20
> specification but be scoped back to only apply to that specification,=20
> or
> D)  The OAuth Errors Registry should be deleted because the set of=20
> errors should not be extensible.
>
> Please vote for A, B, C, or D by Friday, March 18th.

Why the early cut-off date? As this is in advance of IETF 80, changes will =
wait until after Prague in any case.

> I personally believe that A makes the most sense, but given that other=20
> points of view have also been voiced, this consensus call is needed to=20
> resolve the issue.

Consensus isn't achieved by voting so all you'll get is poll data but that =
may be useful here. While I agree that there has been some discussion, I do=
n't think the relative merits of the models have been made clear to the gro=
up. A fuller discussion of the need for an extensible registry for errors (=
before decided where to home the text) might be more helpful.

- Lucy


>                                                                Cheers,
>                                                                -- Mike
>
>


From llynch@civil-tongue.net  Fri Mar 11 17:54:09 2011
Return-Path: <llynch@civil-tongue.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8A2683A6B6E for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 17:54:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.272
X-Spam-Level: 
X-Spam-Status: No, score=-102.272 tagged_above=-999 required=5 tests=[AWL=0.327, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z+LeEjJA8Q6O for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 17:54:07 -0800 (PST)
Received: from hiroshima.bogus.com (hiroshima.bogus.com [IPv6:2001:418:1::80]) by core3.amsl.com (Postfix) with ESMTP id E6E9C3A6AA7 for <oauth@ietf.org>; Fri, 11 Mar 2011 17:54:06 -0800 (PST)
Received: from hiroshima.bogus.com (localhost [127.0.0.1]) by hiroshima.bogus.com (8.14.3/8.14.3) with ESMTP id p2C1tPwV055172 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Fri, 11 Mar 2011 17:55:25 -0800 (PST) (envelope-from llynch@civil-tongue.net)
Received: from localhost (llynch@localhost) by hiroshima.bogus.com (8.14.3/8.14.3/Submit) with ESMTP id p2C1tPlV055169; Fri, 11 Mar 2011 17:55:25 -0800 (PST) (envelope-from llynch@civil-tongue.net)
Date: Fri, 11 Mar 2011 17:55:25 -0800 (PST)
From: Lucy Lynch <llynch@civil-tongue.net>
X-X-Sender: llynch@hiroshima.bogus.com
To: Anthony Nadalin <tonynad@microsoft.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E707FB821F@SN1PRD0302MB097.namprd03.prod.outlook.com>
Message-ID: <alpine.BSF.2.00.1103111754540.24744@hiroshima.bogus.com>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <alpine.BSF.2.00.1103111709080.24744@hiroshima.bogus.com> <B26C1EF377CB694EAB6BDDC8E624B6E707FB821F@SN1PRD0302MB097.namprd03.prod.outlook.com>
User-Agent: Alpine 2.00 (BSF 1167 2008-08-23)
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Mar 2011 01:54:09 -0000

On Sat, 12 Mar 2011, Anthony Nadalin wrote:

>> Why the early cut-off date? As this is in advance of IETF 80, changes 
>> will wait until after Prague in any case.

> To inform the discussions @ IETF 80 to determine what else might be 
> needed, which goes to your second comment

ack - thanks!

>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Lucy Lynch
> Sent: Friday, March 11, 2011 5:41 PM
> To: Mike Jones
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
>
> On Fri, 11 Mar 2011, Mike Jones wrote:
>
>> As you know, the OAuth 2.0 Bearer Token draft -03 established the
>> OAuth Errors
>> Registry<http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.ht
>> ml#errors-registry> to increase interoperability among implementations
>> using the related OAuth specifications.  As you also know, there has
>> been some discussion about whether:
>>
>> A)  The OAuth Errors Registry belongs in in the Framework
>> specification rather than the bearer token specification,
>> B)  The OAuth Errors Registry should continue to be defined in the
>> Bearer Token specification and apply to all OAuth specifications,
>> C)  The OAuth Errors Registry should reside in the Bearer Token
>> specification but be scoped back to only apply to that specification,
>> or
>> D)  The OAuth Errors Registry should be deleted because the set of
>> errors should not be extensible.
>>
>> Please vote for A, B, C, or D by Friday, March 18th.
>
> Why the early cut-off date? As this is in advance of IETF 80, changes will wait until after Prague in any case.
>
>> I personally believe that A makes the most sense, but given that other
>> points of view have also been voiced, this consensus call is needed to
>> resolve the issue.
>
> Consensus isn't achieved by voting so all you'll get is poll data but that may be useful here. While I agree that there has been some discussion, I don't think the relative merits of the models have been made clear to the group. A fuller discussion of the need for an extensible registry for errors (before decided where to home the text) might be more helpful.
>
> - Lucy
>
>
>>                                                                Cheers,
>>                                                                -- Mike
>>
>>
>

From igor.faynberg@alcatel-lucent.com  Fri Mar 11 18:01:54 2011
Return-Path: <igor.faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 61A423A6B6E for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 18:01:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id caD0fdCexlzH for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 18:01:53 -0800 (PST)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by core3.amsl.com (Postfix) with ESMTP id 06B6B3A6AA7 for <oauth@ietf.org>; Fri, 11 Mar 2011 18:01:52 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id p2C23C9Q018941 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 11 Mar 2011 20:03:12 -0600 (CST)
Received: from [135.244.34.119] (faynberg.lra.lucent.com [135.244.34.119]) by umail.lucent.com (8.13.8/TPES) with ESMTP id p2C23BLM005380; Fri, 11 Mar 2011 20:03:12 -0600 (CST)
Message-ID: <4D7AD45E.8070906@alcatel-lucent.com>
Date: Fri, 11 Mar 2011 21:03:10 -0500
From: Igor Faynberg <igor.faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: igor.faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Mar 2011 02:01:54 -0000

I vote (A) because 1) I strongly believe in modularity and 2) I disagree 
with D.  Hence what applies to all specifications must be defined at the 
highest level, rather than in a self-contained specification. So, this 
looked like a simple matter to me.

Having said that, I note that Lucy has a different opinion, and this  
may very well mean that I simply don't understand the issue fully.   If 
convinced otherwise, I will change my "vote."

I would like to have this discussion in Prague, indeed, if Hannes can 
put it on the agenda. (As a former WG chair, I know how hard it is to 
get everything that came up as an issue discussed in a short time of one 
meeting.) Alternatively, if there is a strong argument against A, I 
would like to see it now. Maybe everything can be resolved on the list.

Igor

Mike Jones wrote:
>
> As you know, the OAuth 2.0 Bearer Token draft -03 established the 
> OAuth Errors Registry 
> <http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.html#errors-registry> 
> to increase interoperability among implementations using the related 
> OAuth specifications.  As you also know, there has been some 
> discussion about whether:
>
>  
>
> A)  The OAuth Errors Registry belongs in in the Framework 
> specification rather than the bearer token specification,
>
> B)  The OAuth Errors Registry should continue to be defined in the 
> Bearer Token specification and apply to all OAuth specifications,
>
> C)  The OAuth Errors Registry should reside in the Bearer Token 
> specification but be scoped back to only apply to that specification, or
>
> D)  The OAuth Errors Registry should be deleted because the set of 
> errors should not be extensible.
>
>  
>
> Please vote for A, B, C, or D by Friday, March 18^th .
>
>  
>
> I personally believe that A makes the most sense, but given that other 
> points of view have also been voiced, this consensus call is needed to 
> resolve the issue.
>
>  
>
>                                                                 Cheers,
>
>                                                                 -- Mike
>
>  
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>   

From phil.hunt@oracle.com  Fri Mar 11 22:18:21 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A15AF3A6AD5 for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 22:18:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.834
X-Spam-Level: 
X-Spam-Status: No, score=-5.834 tagged_above=-999 required=5 tests=[AWL=-0.631, BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4VHvDk0LCRwz for <oauth@core3.amsl.com>; Fri, 11 Mar 2011 22:18:14 -0800 (PST)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 968CD3A6878 for <oauth@ietf.org>; Fri, 11 Mar 2011 22:18:14 -0800 (PST)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2C6JQwP020376 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Sat, 12 Mar 2011 06:19:27 GMT
Received: from acsmt353.oracle.com (acsmt353.oracle.com [141.146.40.153]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2BFPN85003425; Sat, 12 Mar 2011 06:19:25 GMT
Received: from abhmt019.oracle.com by acsmt354.oracle.com with ESMTP id 1081069291299910742; Fri, 11 Mar 2011 22:19:02 -0800
Received: from [192.168.1.71] (/24.87.204.3) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 11 Mar 2011 22:19:02 -0800
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <alpine.BSF.2.00.1103111709080.24744@hiroshima.bogus.com> <B26C1EF377CB694EAB6BDDC8E624B6E707FB821F@SN1PRD0302MB097.namprd03.prod.outlook.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E707FB821F@SN1PRD0302MB097.namprd03.prod.outlook.com>
Mime-Version: 1.0 (iPhone Mail 8F190)
Content-Type: text/plain; charset=us-ascii
Message-Id: <AFB2C33B-B730-4BE7-8E50-F3F01786A137@oracle.com>
Content-Transfer-Encoding: quoted-printable
X-Mailer: iPhone Mail (8F190)
From: Phillip Hunt <phil.hunt@oracle.com>
Date: Fri, 11 Mar 2011 22:18:55 -0800
To: Anthony Nadalin <tonynad@microsoft.com>
X-Source-IP: acsmt353.oracle.com [141.146.40.153]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090203.4D7B106E.0044,ss=1,fgs=0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Mar 2011 06:18:21 -0000

I have not seen any detailed agenda for IETF 80. If there will be votes that=
 override email votes all participant should so be informed.=20

Phil

Sent from my phone.=20

On 2011-03-11, at 17:46, Anthony Nadalin <tonynad@microsoft.com> wrote:

>> Why the early cut-off date? As this is in advance of IETF 80, changes wil=
l wait until after Prague in any case.
> To inform the discussions @ IETF 80 to determine what else might be needed=
, which goes to your second comment
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of L=
ucy Lynch
> Sent: Friday, March 11, 2011 5:41 PM
> To: Mike Jones
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline =
Friday, March 18
>=20
> On Fri, 11 Mar 2011, Mike Jones wrote:
>=20
>> As you know, the OAuth 2.0 Bearer Token draft -03 established the=20
>> OAuth Errors=20
>> Registry<http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.ht
>> ml#errors-registry> to increase interoperability among implementations=20=

>> using the related OAuth specifications.  As you also know, there has=20
>> been some discussion about whether:
>>=20
>> A)  The OAuth Errors Registry belongs in in the Framework=20
>> specification rather than the bearer token specification,
>> B)  The OAuth Errors Registry should continue to be defined in the=20
>> Bearer Token specification and apply to all OAuth specifications,
>> C)  The OAuth Errors Registry should reside in the Bearer Token=20
>> specification but be scoped back to only apply to that specification,=20
>> or
>> D)  The OAuth Errors Registry should be deleted because the set of=20
>> errors should not be extensible.
>>=20
>> Please vote for A, B, C, or D by Friday, March 18th.
>=20
> Why the early cut-off date? As this is in advance of IETF 80, changes will=
 wait until after Prague in any case.
>=20
>> I personally believe that A makes the most sense, but given that other=20=

>> points of view have also been voiced, this consensus call is needed to=20=

>> resolve the issue.
>=20
> Consensus isn't achieved by voting so all you'll get is poll data but that=
 may be useful here. While I agree that there has been some discussion, I do=
n't think the relative merits of the models have been made clear to the grou=
p. A fuller discussion of the need for an extensible registry for errors (be=
fore decided where to home the text) might be more helpful.
>=20
> - Lucy
>=20
>=20
>>                                                               Cheers,
>>                                                               -- Mike
>>=20
>>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From eran@hueniverse.com  Sat Mar 12 00:15:40 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 39E363A694C for <oauth@core3.amsl.com>; Sat, 12 Mar 2011 00:15:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.559
X-Spam-Level: 
X-Spam-Status: No, score=-2.559 tagged_above=-999 required=5 tests=[AWL=0.040,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rfe7JGCt6Td1 for <oauth@core3.amsl.com>; Sat, 12 Mar 2011 00:15:38 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 89B293A68D3 for <oauth@ietf.org>; Sat, 12 Mar 2011 00:15:38 -0800 (PST)
Received: (qmail 28949 invoked from network); 12 Mar 2011 08:16:57 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 12 Mar 2011 08:16:57 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Sat, 12 Mar 2011 01:16:08 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phillip Hunt <phil.hunt@oracle.com>, Anthony Nadalin <tonynad@microsoft.com>
Date: Sat, 12 Mar 2011 01:15:45 -0700
Thread-Topic: [OAUTH-WG] Vote:  Location of OAuth Errors Registry,	deadline Friday, March 18
Thread-Index: AcvgfXwIsUmkH2MXQEmtMXGifOshHgAECQOQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F3376DE@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <alpine.BSF.2.00.1103111709080.24744@hiroshima.bogus.com> <B26C1EF377CB694EAB6BDDC8E624B6E707FB821F@SN1PRD0302MB097.namprd03.prod.outlook.com> <AFB2C33B-B730-4BE7-8E50-F3F01786A137@oracle.com>
In-Reply-To: <AFB2C33B-B730-4BE7-8E50-F3F01786A137@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Mar 2011 08:15:40 -0000

Decisions are never made outside the list.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Phillip Hunt
> Sent: Friday, March 11, 2011 10:19 PM
> To: Anthony Nadalin
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline
> Friday, March 18
>=20
> I have not seen any detailed agenda for IETF 80. If there will be votes t=
hat
> override email votes all participant should so be informed.
>=20
> Phil
>=20
> Sent from my phone.
>=20
> On 2011-03-11, at 17:46, Anthony Nadalin <tonynad@microsoft.com> wrote:
>=20
> >> Why the early cut-off date? As this is in advance of IETF 80, changes =
will
> wait until after Prague in any case.
> > To inform the discussions @ IETF 80 to determine what else might be
> > needed, which goes to your second comment
> >
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > Of Lucy Lynch
> > Sent: Friday, March 11, 2011 5:41 PM
> > To: Mike Jones
> > Cc: oauth@ietf.org
> > Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry,
> > deadline Friday, March 18
> >
> > On Fri, 11 Mar 2011, Mike Jones wrote:
> >
> >> As you know, the OAuth 2.0 Bearer Token draft -03 established the
> >> OAuth Errors
> >> Registry<http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.h
> >> t ml#errors-registry> to increase interoperability among
> >> implementations using the related OAuth specifications.  As you also
> >> know, there has been some discussion about whether:
> >>
> >> A)  The OAuth Errors Registry belongs in in the Framework
> >> specification rather than the bearer token specification,
> >> B)  The OAuth Errors Registry should continue to be defined in the
> >> Bearer Token specification and apply to all OAuth specifications,
> >> C)  The OAuth Errors Registry should reside in the Bearer Token
> >> specification but be scoped back to only apply to that specification,
> >> or
> >> D)  The OAuth Errors Registry should be deleted because the set of
> >> errors should not be extensible.
> >>
> >> Please vote for A, B, C, or D by Friday, March 18th.
> >
> > Why the early cut-off date? As this is in advance of IETF 80, changes w=
ill
> wait until after Prague in any case.
> >
> >> I personally believe that A makes the most sense, but given that
> >> other points of view have also been voiced, this consensus call is
> >> needed to resolve the issue.
> >
> > Consensus isn't achieved by voting so all you'll get is poll data but t=
hat may
> be useful here. While I agree that there has been some discussion, I don'=
t
> think the relative merits of the models have been made clear to the group=
. A
> fuller discussion of the need for an extensible registry for errors (befo=
re
> decided where to home the text) might be more helpful.
> >
> > - Lucy
> >
> >
> >>                                                               Cheers,
> >>                                                               -- Mike
> >>
> >>
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From torsten@lodderstedt.net  Sun Mar 13 15:49:50 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 383A53A690A for <oauth@core3.amsl.com>; Sun, 13 Mar 2011 15:49:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level: 
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r1vbt2cTUx7s for <oauth@core3.amsl.com>; Sun, 13 Mar 2011 15:49:48 -0700 (PDT)
Received: from smtprelay04.ispgateway.de (smtprelay04.ispgateway.de [80.67.31.27]) by core3.amsl.com (Postfix) with ESMTP id 57C513A68AB for <oauth@ietf.org>; Sun, 13 Mar 2011 15:49:48 -0700 (PDT)
Received: from [87.142.249.38] (helo=[192.168.71.49]) by smtprelay04.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Pyu7x-0006oT-KF; Sun, 13 Mar 2011 23:51:09 +0100
Message-ID: <4D7D4A5C.8050406@lodderstedt.net>
Date: Sun, 13 Mar 2011 23:51:08 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
In-Reply-To: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Mar 2011 22:49:50 -0000

Overall, I'm very happy with this draft. Excellent work, Eran!

A couple of comments though:

section 1.4: "An authorization grant is a general term used to describe the
intermediate credentials ..."

Since passwords represent authorization grants as well, I would suggest 
to adjust the wording to „intermediate or permanent“

section 1.4.3: "Unlike
the HTTP Basic authentication scheme defined in [RFC2617], this grant
type eliminates the need for the client to store the resource-owner
credentials for future use"

I would suggest to add "if used in combination with refresh tokens."

section 1.4.4:

"The client credentials can be used as an authorization grant ..., or to 
protected resources previously arranged
with the authorization server."

Does this mean, the client is not the resource owner but gets access 
because of an existing authorization? How does this differ from an 
implicit grant?

"Client credentials are used as an
authorization grant typically when the client is acting on its own
behalf (the client is also the resource owner)."

What are the alternatives? I would suggest to remove „typically“.

section 2.1:

4. paragraph: "If the response does not include an access token, the 
authorization server SHOULD
require TLS 1.2 and any additional transport-layer mechanism meeting its 
security requirements."

Why only „SHOULD“ and not "MUST"? Otherwise, alternative means for 
preventing abuse of the response parameters MUST be required, e.g. 
client authentication for authorization code exchange.

Moreover, this is about the redirect_uri, isn't it? What about the 
endpoint's security itself, i.e. requests to this endpoint?

section 2.1.1:

3. paragraph: "The authorization server SHOULD require the client to 
pre-register
their redirection URI or at least certain components such as the
scheme, host, port and path."

Pre-registered redirect_uri facilitate client authentication while tying 
a client to a certain deployment. Although this is typical practice 
nowdays I expect this to change if OAuth really gains traction for 
standard client software, such as mail clients.
Proposal: Should by MAY in my opinion + some explanation on the purpose 
of redirect_uri registration.

section 2.2:

4. paragraph: "The token endpoint requires client authentication as 
described in Section 3."

That's to restrictive, probably client identification but not 
authentication. Otherwise, this endpoint cannot be used for most native 
apps.

section 3:
"Client credentials are used to identify and authenticate the client."

I think it would be helpful for the reader to explain the purposes 
client identitification and authentication serve in OAuth. I see the 
following use cases (more text can be found in 
http://tools.ietf.org/html/draft-lodderstedt-oauth-security-00#section-3.8):

In the context of delegated authorization, client identity is used to:
- Establish trust to the client and display relevant registration 
information to a user when requesting consent for authorization
- Authorize clients for certain authorization server features
- Collate associated request to the same originator (e.g. a particular 
end-user authorization process and the corresponding request on the 
tokens endpoint to exchange the authorization code for tokens)

Moreover, client credentials can also be used to authenticate the client 
as a resource owner (see client credentials grant type)

Requirements regarding the client security policy and the data 
associated with the client identity may vary among the purposes.

"The authorization server SHOULD NOT issue client credentials to clients 
incapable of keeping
their secrets confidential."

I would suggest to add some explanation here. Proposal "For example, the 
same client credentials should not be used for multiple installations of 
the same software, e.g. all instances of the same native app running on 
different PCs or smartphones."

section 3.2:
"In addition, the
authorization server MAY allow unauthenticated access token requests
when the client identity does not matter (e.g. anonymous client) or
when the client identity is established via other means."

I would suggest to move this sentence after the BASIC authentication 
example.

section 4.1:

In my opinion, the introduction of this section over-emphasizes the 
aspect of client secrets & authentication while neglecting the other 
properties of the authorization code flow. Moreover, it encourages the 
impression this flow can only be used by clients equipped with a secret. 
This is wrong as this flow should be usable by clients w/o client 
secrets as well because it offers unique properties beside its aibility 
to support client authentication. In my opinion these are:

- user identity and credentials are not exposed to client (in contrast 
to resource owner password grant)
- user authentication and consent controlled by authorization server (in 
contrast to resource owner password grant)
- flow is especially suited for clients which are web applications (in 
contrast to implicit grant)
- refresh token issuance (in contrast to implicit grant)
- client credentials and tokens are sent over protected, direct 
communication channels between client and authorization server (no 
browser caches and HTTP referers involved)
- aibility to authenticate clients (for completeness)

The introduction should explain all properties of the flow and offer 
some guidance when and how to use the flow.

section 4.1.3:
Why is the name of the response type „code“ whereas the name of the 
grant type is „authorization_code“?

"redirect_uri" should only be required if it was an input parameter to 
the corresponding authz request.

last paragraph: "Validate the client credentials and ensure they match 
the authorization code." should be "Validate the client credentials (if 
present) and ensure they match the
authorization code." (see also: 
http://www.mail-archive.com/oauth@ietf.org/msg04540.html)

section 4.1.4:

"If the request failed due to failed client authentication or is 
invalid" - Some words missing here?

example response: The JSON document contains a field 
"example_parameter":"example-value". Some copy and paste remainings? - 
The same holds true for other example JSON documents.

section 4.2.:

I'm struggeling with the name "implicit grant". Why not just stick with 
"User Agent Flow"? It has been designed for that kind of app.

As already mentioned for section 4.1., also this introduction puts to 
much emphasize on the client secret story. I don't think this was the 
original driver of its development. I would expect the intro to focus on 
the functional properties of the flow:

As I understand, it has been designed with JavaScript clients in mind, 
which due to the same origin policy, are unable to send requests 
directly to an authorization server outside of its origin. So instead of 
obtaining tokens through a POST request (via authz code), the access 
token is delivered directly via the redirect URI. In order to reduce the 
exposure of the token (and because it is sufficient), the access token 
is sent via the fragment. As a consequence of the design this flow does 
not support client authentication via secrets. The client's identity can 
nevertheless be validated using pre-registered redirect_uri's.

This flow cannot be used with web applications. And as long as the flow 
does not support refresh tokens, the same holds true for native apps 
(see also http://tools.ietf.org/html/draft-zeltsan-oauth-use-cases-01). 
So please remove "or native applications" from the text (see 
http://www.ietf.org/mail-archive/web/oauth/current/msg05551.html).

section 4.3:

2. paragraph: I suggest to add "It is even possible to migrate from 
stored credentials to stored refresh tokens. Leakage of the later would 
have less impact."

Figure 5/ Step C) I suggest to add ", and optionally a refresh token."

section 4.3.3

"If the access token request is valid and authorized, the
authorization server issues an access token and optional refresh
token as described in Section 5.1."

How is determined and by whom whether a refresh token is being issued? 
Since this is not an interactive flow, the authorization server cannot 
ask the resource owner.

section 6:
"The authorization server MUST validate the client credentials, ..." 
should be "The authorization server MUST validate the client credentials 
(if present), ..."

regards,
Torsten.

Am 02.03.2011 08:32, schrieb Hannes Tschofenig:
> This is a Last Call for comments on
>
> http://www.ietf.org/id/draft-ietf-oauth-v2-13.txt
>
> Please have your comments in no later than March 16.
>
> Do remember to send a note in if you have read the document and have no
> other comments other than "its ready to go" - we need those as much as we need "I found a problem".
>
> Thanks!
> Hannes&  Blaine
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oaut

From hannes.tschofenig@gmx.net  Mon Mar 14 00:09:26 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1AC983A6B07 for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 00:09:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DBFN1IMZkoN5 for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 00:09:25 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.22]) by core3.amsl.com (Postfix) with SMTP id E65BF3A6A4C for <oauth@ietf.org>; Mon, 14 Mar 2011 00:09:24 -0700 (PDT)
Received: (qmail invoked by alias); 14 Mar 2011 07:10:46 -0000
Received: from a88-115-222-204.elisa-laajakaista.fi (EHLO [192.168.1.3]) [88.115.222.204] by mail.gmx.net (mp022) with SMTP; 14 Mar 2011 08:10:46 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX18lIkkiTS4lRsiEhUN/AEtPMDsWVIwMq6FcCkdjqf R5pW8rN1QqHVa6
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
Date: Mon, 14 Mar 2011 09:10:44 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <55B479C9-59A9-4182-AB64-19FDA7671F22@gmx.net>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.1082)
X-Y-GMX-Trusted: 0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: [OAUTH-WG] HUM - was Re:  Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 07:09:26 -0000

Hi Mike,=20
Hi all,=20

As some of you had notice we do not vote.=20
Soliciting the feedback from the working group on this issue is, =
however, a good idea.=20

Ciao
Hannes

On Mar 12, 2011, at 1:04 AM, Mike Jones wrote:

> As you know, the OAuth 2.0 Bearer Token draft -03 established the =
OAuth Errors Registry to increase interoperability among implementations =
using the related OAuth specifications.  As you also know, there has =
been some discussion about whether:
> =20
> A)  The OAuth Errors Registry belongs in in the Framework =
specification rather than the bearer token specification,
> B)  The OAuth Errors Registry should continue to be defined in the =
Bearer Token specification and apply to all OAuth specifications,
> C)  The OAuth Errors Registry should reside in the Bearer Token =
specification but be scoped back to only apply to that specification, or
> D)  The OAuth Errors Registry should be deleted because the set of =
errors should not be extensible.
> =20
> Please vote for A, B, C, or D by Friday, March 18th.
> =20
> I personally believe that A makes the most sense, but given that other =
points of view have also been voiced, this consensus call is needed to =
resolve the issue.
> =20
>                                                                 =
Cheers,
>                                                                 -- =
Mike
> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From hannes.tschofenig@gmx.net  Mon Mar 14 00:11:48 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CCA7F3A6C31 for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 00:11:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VOuSIH4HzMS6 for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 00:11:48 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.23]) by core3.amsl.com (Postfix) with SMTP id 690AA3A6C35 for <oauth@ietf.org>; Mon, 14 Mar 2011 00:11:46 -0700 (PDT)
Received: (qmail invoked by alias); 14 Mar 2011 07:13:09 -0000
Received: from a88-115-222-204.elisa-laajakaista.fi (EHLO [192.168.1.3]) [88.115.222.204] by mail.gmx.net (mp013) with SMTP; 14 Mar 2011 08:13:09 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX19hcKx+aJdhDE5fE5y8b+tzGP1Kxg+qG8111tqcE7 pZGbe6GsPhDA/X
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Mon, 14 Mar 2011 09:13:05 +0200
Message-Id: <E56AB32F-240F-49DB-B545-A0E574004AD9@gmx.net>
To: OAuth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1082)
X-Mailer: Apple Mail (2.1082)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] Prague IETF Meeting: Soliciting OAuth WG Presentations
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 07:11:49 -0000

Hi all,=20

the IETF meeting in Prague is just around the corner and we need to put =
the agenda for the face-to-face meeting together.=20
If you plan to give a presentation please drop us a mail ASAP.

Ciao
Hannes & Blaine


From eran@hueniverse.com  Mon Mar 14 00:38:40 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C87E33A6942 for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 00:38:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.56
X-Spam-Level: 
X-Spam-Status: No, score=-2.56 tagged_above=-999 required=5 tests=[AWL=0.039,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id msXnv8zpvu7s for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 00:38:39 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 82A7E3A6860 for <oauth@ietf.org>; Mon, 14 Mar 2011 00:38:39 -0700 (PDT)
Received: (qmail 17970 invoked from network); 14 Mar 2011 07:40:01 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 14 Mar 2011 07:40:01 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Mon, 14 Mar 2011 00:40:02 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, OAuth WG <oauth@ietf.org>
Date: Mon, 14 Mar 2011 00:39:58 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvYq/VRfyCqRH/sTkq26EXkRBWSkwJbvUzw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F337781@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
In-Reply-To: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 07:38:40 -0000

2 more days. Please reserve some time to read the entire document and provi=
de detailed feedback.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Hannes Tschofenig
> Sent: Tuesday, March 01, 2011 11:32 PM
> To: OAuth WG
> Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> This is a Last Call for comments on
>=20
> http://www.ietf.org/id/draft-ietf-oauth-v2-13.txt
>=20
> Please have your comments in no later than March 16.
>=20
> Do remember to send a note in if you have read the document and have no
> other comments other than "its ready to go" - we need those as much as we
> need "I found a problem".
>=20
> Thanks!
> Hannes & Blaine
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From mark.mcgloin@ie.ibm.com  Mon Mar 14 02:09:44 2011
Return-Path: <mark.mcgloin@ie.ibm.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5D47B3A68E9; Mon, 14 Mar 2011 02:09:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nCNr7S17tvhB; Mon, 14 Mar 2011 02:09:43 -0700 (PDT)
Received: from mtagate1.uk.ibm.com (mtagate1.uk.ibm.com [194.196.100.161]) by core3.amsl.com (Postfix) with ESMTP id 241133A68E0; Mon, 14 Mar 2011 02:09:42 -0700 (PDT)
Received: from d06nrmr1806.portsmouth.uk.ibm.com (d06nrmr1806.portsmouth.uk.ibm.com [9.149.39.193]) by mtagate1.uk.ibm.com (8.13.1/8.13.1) with ESMTP id p2E9B2aq006925; Mon, 14 Mar 2011 09:11:02 GMT
Received: from d06av07.portsmouth.uk.ibm.com (d06av07.portsmouth.uk.ibm.com [9.149.37.248]) by d06nrmr1806.portsmouth.uk.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p2E9BKN71519618; Mon, 14 Mar 2011 09:11:20 GMT
Received: from d06av07.portsmouth.uk.ibm.com (loopback [127.0.0.1]) by d06av07.portsmouth.uk.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p2E9B1eu019110; Mon, 14 Mar 2011 03:11:01 -0600
Received: from d06ml093.portsmouth.uk.ibm.com (d06ml093.portsmouth.uk.ibm.com [9.149.104.171]) by d06av07.portsmouth.uk.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p2E9B1Jp019100; Mon, 14 Mar 2011 03:11:01 -0600
In-Reply-To: <4D7AA098.5070207@alcatel-lucent.com>
References: <20110311101506.74534cfncraei3gg@webmail.df.eu>	<B26C1EF377CB694EAB6BDDC8E624B6E707FB7CE7@SN1PRD0302MB097.namprd03.prod.outlook.com> <4D7A4B3B.7090600@stpeter.im>	<4D7A6D8D.20408@alcatel-lucent.com>	<4D7A73BE.1000209@stpeter.im> <4D7A8048.3060505@stpeter.im> <4D7AA098.5070207@alcatel-lucent.com>
X-KeepSent: FA5F931D:DEF51391-80257853:00322DFF; type=4; name=$KeepSent
To: igor.faynberg@alcatel-lucent.com
X-Mailer: Lotus Notes Release 8.5.1FP5 SHF29 November 12, 2010
Message-ID: <OFFA5F931D.DEF51391-ON80257853.00322DFF-80257853.0032723D@ie.ibm.com>
From: Mark Mcgloin <mark.mcgloin@ie.ibm.com>
Date: Mon, 14 Mar 2011 09:10:26 +0000
X-MIMETrack: Serialize by Router on D06ML093/06/M/IBM(Release 8.0.2FP6|July 15, 2010) at 14/03/2011 09:10:26
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Cc: OAuth WG <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 09:09:44 -0000

Can we rule out Friday afternoon as people will be getting return flights.

I am trying to get approval at the moment but will definitely not be able
to attend all week. If we are discussing security considerations, can we
make Thursday the focus day - this does not mean it can't be discussed
before that too

thanks
Mark McGloin


oauth-bounces@ietf.org wrote on 11/03/2011 22:22:16:

> Igor Faynberg <igor.faynberg@alcatel-lucent.com>
> Sent by: oauth-bounces@ietf.org
>
> 11/03/2011 22:22
>
> Please respond to
> igor.faynberg@alcatel-lucent.com
>
> To
>
> Peter Saint-Andre <stpeter@stpeter.im>
>
> cc
>
> OAuth WG <oauth@ietf.org>
>
> Subject
>
> Re: [OAUTH-WG] IETF-80
>
> Peter,
>
> First, thank you very much for being so responsive!
>
> My hope was that we could start much earlier than on Thursday, and I've
> been trying to coax Torsten to arrive no later than Monday. He should
> lead the security discussion, and the earlier that starts -- the
> better...  (And there are many interesting and important things related
> to IdM in both Applications and Security Area meetings.)
>
> In case there is any problem with the room, Just a thought. Prague has
> been known for  basement beer halls divided into small walled
> partitions--just perfect to fit the OAuth security interest group. In
> the past 120 years or so those have been used for plotting major
> revolutions, discussing and creating art, and--most recently--writing
> Internet Drafts (i.e., the three major activities within the OAuth
charter).
>
> I think we would have no problem finding a partition to ourselves in
> between or after the meetings. (We did  that a few years ago when the
> IETF met in Prague.)
>
> Just a thought...
>
> Igor
>
>
>
> Peter Saint-Andre wrote:
> > On 3/11/11 12:10 PM, Peter Saint-Andre wrote:
> >
> >> On 3/11/11 11:44 AM, Igor Faynberg wrote:
> >>
> >>> Peter,
> >>>
> >>> Could you please advertise the room when it is reserved?
> >>>
> >> Certainly.
> >>
> >> I'd appreciate it if those who want to join this working session could
> >> speak up on the list so that I can assign a "point person" and so that
> >> we can figure out how big a room we need (and when).
> >>
> >
> > Based on discussion so far, probably it would be good to find a room
for
> > 5-10 people on Thursday afternoon or Friday afternoon. Torsten, when
> > will you arrive?
> >
> > Peter
> >
> >
> >
------------------------------------------------------------------------
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From torsten@lodderstedt.net  Mon Mar 14 03:42:37 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7B08C3A6953 for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 03:42:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.248
X-Spam-Level: 
X-Spam-Status: No, score=-2.248 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cOJViozpLUut for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 03:42:36 -0700 (PDT)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.31.36]) by core3.amsl.com (Postfix) with ESMTP id 611F13A6B31 for <oauth@ietf.org>; Mon, 14 Mar 2011 03:42:36 -0700 (PDT)
Received: from [87.142.251.225] (helo=[192.168.71.49]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Pz5Fl-0003rI-LQ for oauth@ietf.org; Mon, 14 Mar 2011 11:43:57 +0100
Message-ID: <4D7DF16C.20108@lodderstedt.net>
Date: Mon, 14 Mar 2011 11:43:56 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="------------020306070909090806050604"
X-Df-Sender: torsten@lodderstedt-online.de
Subject: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-security-01
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 10:42:37 -0000

This is a multi-part message in MIME format.
--------------020306070909090806050604
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

applied small correction to sections 4.4.1.2 and 4.4.1.6

-------- Original-Nachricht --------
Betreff: 	New Version Notification for draft-lodderstedt-oauth-security-01
Datum: 	Mon, 14 Mar 2011 03:34:57 -0700 (PDT)
Von: 	IETF I-D Submission Tool <idsubmission@ietf.org>
An: 	torsten@lodderstedt.net
CC: 	mark.mcgloin@ie.ibm.com,phil.hunt@yahoo.com



A new version of I-D, draft-lodderstedt-oauth-security-01.txt has been successfully submitted by Torsten Lodderstedt and posted to the IETF repository.

Filename:	 draft-lodderstedt-oauth-security
Revision:	 01
Title:		 OAuth 2.0 Threat Model and Security Considerations
Creation_date:	 2011-03-14
WG ID:		 Independent Submission
Number_of_pages: 51

Abstract:
This document gives security considerations based on a comprehensive
threat model for the OAuth 2.0 Protocol.



The IETF Secretariat.




--------------020306070909090806050604
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body bgcolor="#ffffff" text="#000000">
    applied small correction to sections 4.4.1.2 and 4.4.1.6<br>
    <br>
    -------- Original-Nachricht --------
    <table class="moz-email-headers-table" border="0" cellpadding="0"
      cellspacing="0">
      <tbody>
        <tr>
          <th align="RIGHT" valign="BASELINE" nowrap="nowrap">Betreff: </th>
          <td>New Version Notification for
            draft-lodderstedt-oauth-security-01</td>
        </tr>
        <tr>
          <th align="RIGHT" valign="BASELINE" nowrap="nowrap">Datum: </th>
          <td>Mon, 14 Mar 2011 03:34:57 -0700 (PDT)</td>
        </tr>
        <tr>
          <th align="RIGHT" valign="BASELINE" nowrap="nowrap">Von: </th>
          <td>IETF I-D Submission Tool <a class="moz-txt-link-rfc2396E" href="mailto:idsubmission@ietf.org">&lt;idsubmission@ietf.org&gt;</a></td>
        </tr>
        <tr>
          <th align="RIGHT" valign="BASELINE" nowrap="nowrap">An: </th>
          <td><a class="moz-txt-link-abbreviated" href="mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a></td>
        </tr>
        <tr>
          <th align="RIGHT" valign="BASELINE" nowrap="nowrap">CC: </th>
          <td><a class="moz-txt-link-abbreviated" href="mailto:mark.mcgloin@ie.ibm.com,phil.hunt@yahoo.com">mark.mcgloin@ie.ibm.com,phil.hunt@yahoo.com</a></td>
        </tr>
      </tbody>
    </table>
    <br>
    <br>
    <pre>A new version of I-D, draft-lodderstedt-oauth-security-01.txt has been successfully submitted by Torsten Lodderstedt and posted to the IETF repository.

Filename:	 draft-lodderstedt-oauth-security
Revision:	 01
Title:		 OAuth 2.0 Threat Model and Security Considerations
Creation_date:	 2011-03-14
WG ID:		 Independent Submission
Number_of_pages: 51

Abstract:
This document gives security considerations based on a comprehensive
threat model for the OAuth 2.0 Protocol.
                                                                                  


The IETF Secretariat.


</pre>
  </body>
</html>

--------------020306070909090806050604--

From torsten@lodderstedt.net  Mon Mar 14 04:14:25 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1B2A53A6B14 for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 04:14:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.248
X-Spam-Level: 
X-Spam-Status: No, score=-2.248 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zH7wVPEP2klu for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 04:14:21 -0700 (PDT)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.99]) by core3.amsl.com (Postfix) with ESMTP id 0F3983A6950 for <oauth@ietf.org>; Mon, 14 Mar 2011 04:14:20 -0700 (PDT)
Received: from [87.142.251.225] (helo=[192.168.71.49]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Pz5kU-0004zw-68 for oauth@ietf.org; Mon, 14 Mar 2011 12:15:42 +0100
Message-ID: <4D7DF8DC.9030102@lodderstedt.net>
Date: Mon, 14 Mar 2011 12:15:40 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="------------040200010506030204070805"
X-Df-Sender: torsten@lodderstedt-online.de
Subject: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-revocation-02
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 11:14:25 -0000

This is a multi-part message in MIME format.
--------------040200010506030204070805
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi all,

I just uploaded a new revision of the revocation I-D 
(http://tools.ietf.org/html/draft-lodderstedt-oauth-revocation-02).

Changes:
- dropped token_type parameter
- made client authentication optional (as on the token endpoint)
- changed success status code to 200

Thank's to all reviewers.

regards,
Torsten.

-------- Original-Nachricht --------
Betreff: 	New Version Notification for 
draft-lodderstedt-oauth-revocation-02
Datum: 	Mon, 14 Mar 2011 04:11:50 -0700 (PDT)
Von: 	IETF I-D Submission Tool <idsubmission@ietf.org>
An: 	torsten@lodderstedt.net
CC: 	sdronia@gmx.de



A new version of I-D, draft-lodderstedt-oauth-revocation-02.txt has been successfully submitted by Torsten Lodderstedt and posted to the IETF repository.

Filename:	 draft-lodderstedt-oauth-revocation
Revision:	 02
Title:		 Token Revocation
Creation_date:	 2011-03-14
WG ID:		 Independent Submission
Number_of_pages: 6

Abstract:
This draft proposes an additional endpoint for OAuth authorization
servers for revoking tokens.



The IETF Secretariat.




--------------040200010506030204070805
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body bgcolor="#ffffff" text="#000000">
    Hi all,<br>
    <br>
    I just uploaded a new revision of the revocation I-D
    (<a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-lodderstedt-oauth-revocation-02">http://tools.ietf.org/html/draft-lodderstedt-oauth-revocation-02</a>).
    <br>
    <br>
    Changes:<br>
    - dropped token_type parameter<br>
    - made client authentication optional (as on the token endpoint)<br>
    - changed success status code to 200<br>
    <br>
    Thank's to all reviewers.<br>
    <br>
    regards,<br>
    Torsten.<br>
    <br>
    -------- Original-Nachricht --------
    <table class="moz-email-headers-table" border="0" cellpadding="0"
      cellspacing="0">
      <tbody>
        <tr>
          <th align="RIGHT" valign="BASELINE" nowrap="nowrap">Betreff: </th>
          <td>New Version Notification for
            draft-lodderstedt-oauth-revocation-02</td>
        </tr>
        <tr>
          <th align="RIGHT" valign="BASELINE" nowrap="nowrap">Datum: </th>
          <td>Mon, 14 Mar 2011 04:11:50 -0700 (PDT)</td>
        </tr>
        <tr>
          <th align="RIGHT" valign="BASELINE" nowrap="nowrap">Von: </th>
          <td>IETF I-D Submission Tool <a class="moz-txt-link-rfc2396E" href="mailto:idsubmission@ietf.org">&lt;idsubmission@ietf.org&gt;</a></td>
        </tr>
        <tr>
          <th align="RIGHT" valign="BASELINE" nowrap="nowrap">An: </th>
          <td><a class="moz-txt-link-abbreviated" href="mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a></td>
        </tr>
        <tr>
          <th align="RIGHT" valign="BASELINE" nowrap="nowrap">CC: </th>
          <td><a class="moz-txt-link-abbreviated" href="mailto:sdronia@gmx.de">sdronia@gmx.de</a></td>
        </tr>
      </tbody>
    </table>
    <br>
    <br>
    <pre>A new version of I-D, draft-lodderstedt-oauth-revocation-02.txt has been successfully submitted by Torsten Lodderstedt and posted to the IETF repository.

Filename:	 draft-lodderstedt-oauth-revocation
Revision:	 02
Title:		 Token Revocation
Creation_date:	 2011-03-14
WG ID:		 Independent Submission
Number_of_pages: 6

Abstract:
This draft proposes an additional endpoint for OAuth authorization
servers for revoking tokens.
                                                                                  


The IETF Secretariat.


</pre>
  </body>
</html>

--------------040200010506030204070805--

From jricher@mitre.org  Mon Mar 14 05:43:49 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8523E3A6D0B for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 05:43:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.564
X-Spam-Level: 
X-Spam-Status: No, score=-2.564 tagged_above=-999 required=5 tests=[AWL=0.035,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8s2MlOKzysca for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 05:43:48 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 377C53A6C9A for <oauth@ietf.org>; Mon, 14 Mar 2011 05:43:47 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id E18D321B1858; Mon, 14 Mar 2011 08:45:10 -0400 (EDT)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id D9FE821B1850; Mon, 14 Mar 2011 08:45:10 -0400 (EDT)
Received: from IMCMBX3.MITRE.ORG ([129.83.29.206]) by imchub1.MITRE.ORG ([129.83.29.73]) with mapi; Mon, 14 Mar 2011 08:45:10 -0400
From: "Richer, Justin P." <jricher@mitre.org>
To: Mike Jones <Michael.Jones@microsoft.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Mon, 14 Mar 2011 08:44:27 -0400
Thread-Topic: Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AcvgQJ6IA17FgLiXShex/HElNNZqMgCBO+JU
Message-ID: <D24C564ACEAD16459EF2526E1D7D605D0FFC3C71C8@IMCMBX3.MITRE.ORG>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 12:43:49 -0000

A -- but potentially do a short-form registry with a full-url nonregistered=
 means of extending error codes, like with grant types.

 -- justin
________________________________________
From: oauth-bounces@ietf.org [oauth-bounces@ietf.org] On Behalf Of Mike Jon=
es [Michael.Jones@microsoft.com]
Sent: Friday, March 11, 2011 6:04 PM
To: oauth@ietf.org
Subject: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Frid=
ay,  March 18

As you know, the OAuth 2.0 Bearer Token draft -03 established the OAuth Err=
ors Registry<http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.htm=
l#errors-registry> to increase interoperability among implementations using=
 the related OAuth specifications.  As you also know, there has been some d=
iscussion about whether:

A)  The OAuth Errors Registry belongs in in the Framework specification rat=
her than the bearer token specification,
B)  The OAuth Errors Registry should continue to be defined in the Bearer T=
oken specification and apply to all OAuth specifications,
C)  The OAuth Errors Registry should reside in the Bearer Token specificati=
on but be scoped back to only apply to that specification, or
D)  The OAuth Errors Registry should be deleted because the set of errors s=
hould not be extensible.

Please vote for A, B, C, or D by Friday, March 18th.

I personally believe that A makes the most sense, but given that other poin=
ts of view have also been voiced, this consensus call is needed to resolve =
the issue.

                                                                Cheers,
                                                                -- Mike


From tonynad@microsoft.com  Mon Mar 14 08:45:58 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 59E9E3A6D1C for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 08:45:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.207
X-Spam-Level: 
X-Spam-Status: No, score=-7.207 tagged_above=-999 required=5 tests=[AWL=0.259,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8kDJInXB5NrM for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 08:45:57 -0700 (PDT)
Received: from smtp.microsoft.com (mail2.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id B9B463A6971 for <oauth@ietf.org>; Mon, 14 Mar 2011 08:45:53 -0700 (PDT)
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (157.54.80.48) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Mon, 14 Mar 2011 08:47:17 -0700
Received: from TX2EHSOBE003.bigfish.com (157.54.51.114) by mail.microsoft.com (157.54.80.48) with Microsoft SMTP Server (TLS) id 14.1.270.2; Mon, 14 Mar 2011 08:47:17 -0700
Received: from mail196-tx2-R.bigfish.com (10.9.14.250) by TX2EHSOBE003.bigfish.com (10.9.40.23) with Microsoft SMTP Server id 14.1.225.8; Mon, 14 Mar 2011 15:47:16 +0000
Received: from mail196-tx2 (localhost.localdomain [127.0.0.1])	by mail196-tx2-R.bigfish.com (Postfix) with ESMTP id 4DD68A2831C	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Mon, 14 Mar 2011 15:47:16 +0000 (UTC)
X-SpamScore: -29
X-BigFish: PS-29(zz9371PzzdafM1202h1082kzz8275eh8275bh8275dh1033ILa1495iz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT002.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail196-tx2 (localhost.localdomain [127.0.0.1]) by mail196-tx2 (MessageSwitch) id 1300117635984974_694; Mon, 14 Mar 2011 15:47:15 +0000 (UTC)
Received: from TX2EHSMHS032.bigfish.com (unknown [10.9.14.242])	by mail196-tx2.bigfish.com (Postfix) with ESMTP id D1B4612F8052	for <oauth@ietf.org>; Mon, 14 Mar 2011 15:47:15 +0000 (UTC)
Received: from SN1PRD0302HT002.namprd03.prod.outlook.com (65.55.94.9) by TX2EHSMHS032.bigfish.com (10.9.99.132) with Microsoft SMTP Server (TLS) id 14.1.225.8; Mon, 14 Mar 2011 15:47:15 +0000
Received: from SN1PRD0302MB097.namprd03.prod.outlook.com ([169.254.8.16]) by SN1PRD0302HT002.namprd03.prod.outlook.com ([10.14.149.46]) with mapi id 14.01.0225.027; Mon, 14 Mar 2011 15:47:14 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AcvgQJ6IA17FgLiXShex/HElNNZqMgCHmbeA
Date: Mon, 14 Mar 2011 15:47:13 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E707FB87D3@SN1PRD0302MB097.namprd03.prod.outlook.com>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [131.107.0.107]
Content-Type: multipart/alternative; boundary="_000_B26C1EF377CB694EAB6BDDC8E624B6E707FB87D3SN1PRD0302MB097_"
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT002.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14HUBC105.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC105.redmond.corp.microsoft.com
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 15:45:58 -0000

--_000_B26C1EF377CB694EAB6BDDC8E624B6E707FB87D3SN1PRD0302MB097_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

My preference would be option A

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of M=
ike Jones
Sent: Friday, March 11, 2011 3:04 PM
To: oauth@ietf.org
Subject: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Frida=
y, March 18

As you know, the OAuth 2.0 Bearer Token draft -03 established the OAuth Err=
ors Registry<http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.htm=
l#errors-registry> to increase interoperability among implementations using=
 the related OAuth specifications.  As you also know, there has been some d=
iscussion about whether:

A)  The OAuth Errors Registry belongs in in the Framework specification rat=
her than the bearer token specification,
B)  The OAuth Errors Registry should continue to be defined in the Bearer T=
oken specification and apply to all OAuth specifications,
C)  The OAuth Errors Registry should reside in the Bearer Token specificati=
on but be scoped back to only apply to that specification, or
D)  The OAuth Errors Registry should be deleted because the set of errors s=
hould not be extensible.

Please vote for A, B, C, or D by Friday, March 18th.

I personally believe that A makes the most sense, but given that other poin=
ts of view have also been voiced, this consensus call is needed to resolve =
the issue.

                                                                Cheers,
                                                                -- Mike


--_000_B26C1EF377CB694EAB6BDDC8E624B6E707FB87D3SN1PRD0302MB097_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">My preference would be=
 option A<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Mike Jones<br>
<b>Sent:</b> Friday, March 11, 2011 3:04 PM<br>
<b>To:</b> oauth@ietf.org<br>
<b>Subject:</b> [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadlin=
e Friday, March 18<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">As you know, the OAuth 2.0 Bearer Token draft -03 es=
tablished the
<a href=3D"http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03.html#=
errors-registry">
OAuth Errors Registry</a> to increase interoperability among implementation=
s using the related OAuth specifications.&nbsp; As you also know, there has=
 been some discussion about whether:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">A)&nbsp; The OAuth Errors Registry belongs in in the=
 Framework specification rather than the bearer token specification,<o:p></=
o:p></p>
<p class=3D"MsoNormal">B)&nbsp; The OAuth Errors Registry should continue t=
o be defined in the Bearer Token specification and apply to all OAuth speci=
fications,<o:p></o:p></p>
<p class=3D"MsoNormal">C)&nbsp; The OAuth Errors Registry should reside in =
the Bearer Token specification but be scoped back to only apply to that spe=
cification, or<o:p></o:p></p>
<p class=3D"MsoNormal">D)&nbsp; The OAuth Errors Registry should be deleted=
 because the set of errors should not be extensible.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Please vote for A, B, C, or D by Friday, March 18<su=
p>th</sup>.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I personally believe that A makes the most sense, bu=
t given that other points of view have also been voiced, this consensus cal=
l is needed to resolve the issue.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; Cheers,<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_B26C1EF377CB694EAB6BDDC8E624B6E707FB87D3SN1PRD0302MB097_--

From mscurtescu@google.com  Mon Mar 14 12:34:53 2011
Return-Path: <mscurtescu@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D2BED3A6B4C for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 12:34:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level: 
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fPGieKZtuEbA for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 12:34:53 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.44.51]) by core3.amsl.com (Postfix) with ESMTP id F25223A6B57 for <oauth@ietf.org>; Mon, 14 Mar 2011 12:34:52 -0700 (PDT)
Received: from kpbe19.cbf.corp.google.com (kpbe19.cbf.corp.google.com [172.25.105.83]) by smtp-out.google.com with ESMTP id p2EJaGp9004611 for <oauth@ietf.org>; Mon, 14 Mar 2011 12:36:16 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1300131376; bh=NGOsYy+kjFD9gljjcJmVlFragZI=; h=MIME-Version:From:Date:Message-ID:Subject:To:Content-Type; b=QIwwhhFS6MzusORyTk7m0g4FAs5y3jbuDR3ggwa8bnXx8Q0KuYECT3UIofYA3m9AY 4aHUzRfW4nHG4ZpFAmWyA==
Received: from gxk10 (gxk10.prod.google.com [10.202.11.10]) by kpbe19.cbf.corp.google.com with ESMTP id p2EJZxre013186 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Mon, 14 Mar 2011 12:36:15 -0700
Received: by gxk10 with SMTP id 10so1339637gxk.39 for <oauth@ietf.org>; Mon, 14 Mar 2011 12:36:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:from:date:message-id:subject:to :content-type; bh=JTFNMux38D+8JjVcGNGDDJjMJqekMdeujpUPuPyUYJA=; b=x4/ibJwQRtzpgOUpPwEzkArw1pgx9d5+fkN+br/VHyxbCJGQ0YxJDlb9gWqCqtSwFD IrkI4ussl+VMZDbmPp4Q==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:from:date:message-id:subject:to:content-type; b=w97vjpJzopZz7lXxLnW52McDZBpkSJpv/KIHrYXNTu7h9kiMzYagNwe4UWscjXySCN jzfe7VthS/ybxk5Mmmgw==
Received: by 10.101.204.13 with SMTP id g13mr3382202anq.104.1300131375233; Mon, 14 Mar 2011 12:36:15 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.100.34.4 with HTTP; Mon, 14 Mar 2011 12:35:55 -0700 (PDT)
From: Marius Scurtescu <mscurtescu@google.com>
Date: Mon, 14 Mar 2011 12:35:55 -0700
Message-ID: <AANLkTi=yvALug6xBkA4z=Rx1KEDsuVBAis5dbsaq-Xpx@mail.gmail.com>
To: OAuth WG <oauth@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1
X-System-Of-Record: true
Subject: [OAUTH-WG] Google launched OAuth 2 v10 support
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 19:34:53 -0000

The announcement:
http://googlecode.blogspot.com/2011/03/making-auth-easier-oauth-20-for-google.html

The documentation page:
http://code.google.com/apis/accounts/docs/OAuth2.html

Other than the core spec it implements:
- revocation endpoint
- native app support using oob and localhost (I still have to send a
formal extension for this)
- auto-approval, immediate mode and forced approval (these are experimental)

Registration is required, anonymous mode not supported anymore.

Feedback more than welcome.

Thanks,
Marius

From recordond@gmail.com  Mon Mar 14 16:14:06 2011
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0D0363A6BCB for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 16:14:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MO1lz7ekjX1c for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 16:14:05 -0700 (PDT)
Received: from mail-ww0-f44.google.com (mail-ww0-f44.google.com [74.125.82.44]) by core3.amsl.com (Postfix) with ESMTP id E43093A697A for <oauth@ietf.org>; Mon, 14 Mar 2011 16:14:04 -0700 (PDT)
Received: by wwa36 with SMTP id 36so25721wwa.13 for <oauth@ietf.org>; Mon, 14 Mar 2011 16:15:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=VUerGmUC68de+IJ+NCIZLATMQk28WTvsaxHW/M2Eo3E=; b=FnSmve3eTlkz+iHOFFMODe0dLSAY8/kinGcjtiIPP8MWnIcAOmDs5pouk4mZoVx2n+ yl7zT3LF8NpIuxGCx6bcMe+KpD1dtQ8mgGO2HasjBbxfmFEqvGON09xd3x1H6Hztq+dL uan8PW8qYqKBMqUuHlWn05l/btcK0+xU0Wde4=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=blxg0anldgurpyuGKPgRQQspDd8aJdPTpSRRFD/e65XbumQLxD0hCMKoH9aj2eXHIE L9E4FLgsYw3ZeE8JsuzVsymRFEvODc/J1QCuDIco0jJhJEafjXYBRd1L4zbwK4TXkVhD WSqG3Kmw/p+h4LSGGuS1K96/4MOimP02mmCDM=
MIME-Version: 1.0
Received: by 10.216.121.130 with SMTP id r2mr11004796weh.96.1300144528608; Mon, 14 Mar 2011 16:15:28 -0700 (PDT)
Received: by 10.216.239.67 with HTTP; Mon, 14 Mar 2011 16:15:28 -0700 (PDT)
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <AcvgQJ6IA17FgLiXShex/HElNNZqMg==> <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
Date: Mon, 14 Mar 2011 23:15:28 +0000
Message-ID: <AANLkTikfr31SsQ=PsZ1Oc2eqDJhTb2NZoVz9Q5OP-t7p@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 23:14:06 -0000

I still haven't seen an explanation of what this registry accomplishes
or why it's become needed in the past few weeks.

--David


On Fri, Mar 11, 2011 at 11:04 PM, Mike Jones
<Michael.Jones@microsoft.com> wrote:
> As you know, the OAuth 2.0 Bearer Token draft -03 established the OAuth
> Errors Registry to increase interoperability among implementations using =
the
> related OAuth specifications.=A0 As you also know, there has been some
> discussion about whether:
>
>
>
> A)=A0 The OAuth Errors Registry belongs in in the Framework specification
> rather than the bearer token specification,
>
> B)=A0 The OAuth Errors Registry should continue to be defined in the Bear=
er
> Token specification and apply to all OAuth specifications,
>
> C)=A0 The OAuth Errors Registry should reside in the Bearer Token
> specification but be scoped back to only apply to that specification, or
>
> D)=A0 The OAuth Errors Registry should be deleted because the set of erro=
rs
> should not be extensible.
>
>
>
> Please vote for A, B, C, or D by Friday, March 18th.
>
>
>
> I personally believe that A makes the most sense, but given that other
> points of view have also been voiced, this consensus call is needed to
> resolve the issue.
>
>
>
> =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Cheers,
>
> =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 -- Mike
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

From recordond@gmail.com  Mon Mar 14 16:15:16 2011
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C471F3A7073 for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 16:15:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mm2tdSIWABls for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 16:15:16 -0700 (PDT)
Received: from mail-wy0-f172.google.com (mail-wy0-f172.google.com [74.125.82.172]) by core3.amsl.com (Postfix) with ESMTP id A6A043A705F for <oauth@ietf.org>; Mon, 14 Mar 2011 16:15:14 -0700 (PDT)
Received: by wyb42 with SMTP id 42so30330wyb.31 for <oauth@ietf.org>; Mon, 14 Mar 2011 16:16:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=Bk7e89nbIaSz5uyXLKkjnQsOUbmpqgF+Rl+OB5zbqVM=; b=NdJ//OtGFz354XaOS82jyac1FvnVzZuFey2gQHfux3o8yo3gOa1ZTIXKXIq311rQTU 0TX5vzSn9T9Vs3ETbWM5FRmC5+qLVjmV5pmB/v0zlFC8JG+0p1Q8ERhji/90Agx6lPk1 QLejvOG9Q2pbuXI49KXFygZMztC7rhs4KiZcg=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=wUQe0jOBUvR83PwNq7eRsv94S0Goi8IDtYAuYiwI3+rMWBf3sUkffOgzK+WBmP214b R57Y6Ra42y9MJIpOnFwJpSAnPlaDOc2VkdCj04bnTdphOWp9O1A5JdpN3hsisLZeWtqg VRT/GOxAGIOC0ATlvd//9YOCHoDv8GzovyxfI=
MIME-Version: 1.0
Received: by 10.216.134.230 with SMTP id s80mr11207457wei.74.1300144598341; Mon, 14 Mar 2011 16:16:38 -0700 (PDT)
Received: by 10.216.239.67 with HTTP; Mon, 14 Mar 2011 16:16:38 -0700 (PDT)
In-Reply-To: <AANLkTi=yvALug6xBkA4z=Rx1KEDsuVBAis5dbsaq-Xpx@mail.gmail.com>
References: <AANLkTi=yvALug6xBkA4z=Rx1KEDsuVBAis5dbsaq-Xpx@mail.gmail.com>
Date: Mon, 14 Mar 2011 23:16:38 +0000
Message-ID: <AANLkTik1vnNRMuES5ekbny=P8LCBs2jCHj1i0D=aNJyC@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Marius Scurtescu <mscurtescu@google.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Google launched OAuth 2 v10 support
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 23:15:16 -0000

Cool!

On Mon, Mar 14, 2011 at 7:35 PM, Marius Scurtescu <mscurtescu@google.com> wrote:
> The announcement:
> http://googlecode.blogspot.com/2011/03/making-auth-easier-oauth-20-for-google.html
>
> The documentation page:
> http://code.google.com/apis/accounts/docs/OAuth2.html
>
> Other than the core spec it implements:
> - revocation endpoint
> - native app support using oob and localhost (I still have to send a
> formal extension for this)
> - auto-approval, immediate mode and forced approval (these are experimental)
>
> Registration is required, anonymous mode not supported anymore.
>
> Feedback more than welcome.
>
> Thanks,
> Marius
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

From Michael.Jones@microsoft.com  Mon Mar 14 16:27:09 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 657623A6B8B for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 16:27:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level: 
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n0v69IO6Gun0 for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 16:27:08 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id CAA813A6B5F for <oauth@ietf.org>; Mon, 14 Mar 2011 16:27:07 -0700 (PDT)
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (157.54.79.174) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Mon, 14 Mar 2011 16:28:31 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.01.0270.002; Mon, 14 Mar 2011 16:28:31 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: David Recordon <recordond@gmail.com>
Thread-Topic: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AQHL4p25BoQvJnGGFEy781EVhANmb5QteMaQ
Date: Mon, 14 Mar 2011 23:28:31 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394325293E36@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <AcvgQJ6IA17FgLiXShex/HElNNZqMg==> <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTikfr31SsQ=PsZ1Oc2eqDJhTb2NZoVz9Q5OP-t7p@mail.gmail.com>
In-Reply-To: <AANLkTikfr31SsQ=PsZ1Oc2eqDJhTb2NZoVz9Q5OP-t7p@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.71]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2011 23:27:09 -0000

This is not new.  This is meeting the need expressed in draft 10, Section 3=
.2.1 and draft 11, Section 4.3.1 as "[[ Add mechanism for extending error c=
odes ]]".

It's there to provide a coordination mechanism among OAuth-related specific=
ations so that different specs use the same errors for the same thing.

				-- Mike

-----Original Message-----
From: David Recordon [mailto:recordond@gmail.com]=20
Sent: Monday, March 14, 2011 4:15 PM
To: Mike Jones
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline F=
riday, March 18

I still haven't seen an explanation of what this registry accomplishes or w=
hy it's become needed in the past few weeks.

--David


On Fri, Mar 11, 2011 at 11:04 PM, Mike Jones <Michael.Jones@microsoft.com> =
wrote:
> As you know, the OAuth 2.0 Bearer Token draft -03 established the=20
> OAuth Errors Registry to increase interoperability among=20
> implementations using the related OAuth specifications.=A0 As you also=20
> know, there has been some discussion about whether:
>
>
>
> A)=A0 The OAuth Errors Registry belongs in in the Framework=20
> specification rather than the bearer token specification,
>
> B)=A0 The OAuth Errors Registry should continue to be defined in the=20
> Bearer Token specification and apply to all OAuth specifications,
>
> C)=A0 The OAuth Errors Registry should reside in the Bearer Token=20
> specification but be scoped back to only apply to that specification,=20
> or
>
> D)=A0 The OAuth Errors Registry should be deleted because the set of=20
> errors should not be extensible.
>
>
>
> Please vote for A, B, C, or D by Friday, March 18th.
>
>
>
> I personally believe that A makes the most sense, but given that other=20
> points of view have also been voiced, this consensus call is needed to=20
> resolve the issue.
>
>
>
> =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=20
> Cheers,
>
> =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 --=20
> Mike
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


From recordond@gmail.com  Mon Mar 14 18:02:15 2011
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E8CCA3A696C for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 18:02:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rbj6kN7CF34B for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 18:02:15 -0700 (PDT)
Received: from mail-wy0-f172.google.com (mail-wy0-f172.google.com [74.125.82.172]) by core3.amsl.com (Postfix) with ESMTP id 06E863A6B9F for <oauth@ietf.org>; Mon, 14 Mar 2011 18:02:13 -0700 (PDT)
Received: by wyb42 with SMTP id 42so95739wyb.31 for <oauth@ietf.org>; Mon, 14 Mar 2011 18:03:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=1oBvn8q5G6OScK/iP+czdHUDveHE1m6acXW7lUotRbo=; b=Yxr8C+IfbDM53wl3T9gmcUt08qvE2jE1IKyr+qdQYFGT1cuV8aore03KcEMZXBvicT Vn7UPCcjKb/Y5CpHsY07dQu12nOsaQIFj2AjfwmclGNKa5f8kZAg+TqrhypOYJ2ZoCGo g6hk5GAJZpCbzFb1ah2TVrnX5TUX6aJvdhXew=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=vzP77mkN4ghlT0I9bpxzPU0rbkr86cYhSA41WqVfmOw+NTsao2cceoUYDxiLXVBUhW kJ7BX6fFrJ+HXVBi3cXvEczIEfWf9T71bNiQGKB2Sm3XsdIj78ce/p1/HX/lX7tvdBMP yEl7dNkVEbqhloJivqdkXu49a5EWjSm9AB3RA=
MIME-Version: 1.0
Received: by 10.216.143.17 with SMTP id k17mr2895170wej.74.1300151017562; Mon, 14 Mar 2011 18:03:37 -0700 (PDT)
Received: by 10.216.239.67 with HTTP; Mon, 14 Mar 2011 18:03:37 -0700 (PDT)
In-Reply-To: <4E1F6AAD24975D4BA5B168042967394325293E36@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTikfr31SsQ=PsZ1Oc2eqDJhTb2NZoVz9Q5OP-t7p@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394325293E36@TK5EX14MBXC207.redmond.corp.microsoft.com>
Date: Tue, 15 Mar 2011 01:03:37 +0000
Message-ID: <AANLkTiksipC4mSJO0yuDJQXpUx+v2FmbQ-zy+egoMnSb@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 01:02:16 -0000

Has anyone extended error codes? Is there a list of error codes
currently being used in the wild that need standardizing?

--David


On Mon, Mar 14, 2011 at 11:28 PM, Mike Jones
<Michael.Jones@microsoft.com> wrote:
> This is not new. =A0This is meeting the need expressed in draft 10, Secti=
on 3.2.1 and draft 11, Section 4.3.1 as "[[ Add mechanism for extending err=
or codes ]]".
>
> It's there to provide a coordination mechanism among OAuth-related specif=
ications so that different specs use the same errors for the same thing.
>
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0-- Mike
>
> -----Original Message-----
> From: David Recordon [mailto:recordond@gmail.com]
> Sent: Monday, March 14, 2011 4:15 PM
> To: Mike Jones
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline=
 Friday, March 18
>
> I still haven't seen an explanation of what this registry accomplishes or=
 why it's become needed in the past few weeks.
>
> --David
>
>
> On Fri, Mar 11, 2011 at 11:04 PM, Mike Jones <Michael.Jones@microsoft.com=
> wrote:
>> As you know, the OAuth 2.0 Bearer Token draft -03 established the
>> OAuth Errors Registry to increase interoperability among
>> implementations using the related OAuth specifications.=A0 As you also
>> know, there has been some discussion about whether:
>>
>>
>>
>> A)=A0 The OAuth Errors Registry belongs in in the Framework
>> specification rather than the bearer token specification,
>>
>> B)=A0 The OAuth Errors Registry should continue to be defined in the
>> Bearer Token specification and apply to all OAuth specifications,
>>
>> C)=A0 The OAuth Errors Registry should reside in the Bearer Token
>> specification but be scoped back to only apply to that specification,
>> or
>>
>> D)=A0 The OAuth Errors Registry should be deleted because the set of
>> errors should not be extensible.
>>
>>
>>
>> Please vote for A, B, C, or D by Friday, March 18th.
>>
>>
>>
>> I personally believe that A makes the most sense, but given that other
>> points of view have also been voiced, this consensus call is needed to
>> resolve the issue.
>>
>>
>>
>>
>> Cheers,
>>
>> =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 --
>> Mike
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
>

From cmortimore@salesforce.com  Mon Mar 14 18:08:58 2011
Return-Path: <cmortimore@salesforce.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A94F83A6D6D for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 18:08:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qlW-KjWgiqim for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 18:08:54 -0700 (PDT)
Received: from exprod8og106.obsmtp.com (exprod8og106.obsmtp.com [64.18.3.92]) by core3.amsl.com (Postfix) with SMTP id 1C6F13A696C for <oauth@ietf.org>; Mon, 14 Mar 2011 18:08:54 -0700 (PDT)
Received: from source ([204.14.239.238]) by exprod8ob106.postini.com ([64.18.7.12]) with SMTP ID DSNKTX68ejfVHB1m+GWE/W0DrTevkuTOzwFg@postini.com; Mon, 14 Mar 2011 18:10:18 PDT
Received: from EXSFM-MB01.internal.salesforce.com ([10.1.127.46]) by exsfm-hub3.internal.salesforce.com ([10.1.127.7]) with mapi; Mon, 14 Mar 2011 18:10:18 -0700
From: Chuck Mortimore <cmortimore@salesforce.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, OAuth WG <oauth@ietf.org>
Date: Mon, 14 Mar 2011 18:10:17 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvYq/YbFPHT3ougQOe8/lz6rJ3BkgKAceXC
Message-ID: <C9A40A87.1603D%cmortimore@salesforce.com>
In-Reply-To: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C9A40A871603Dcmortimoresalesforcecom_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 01:08:58 -0000

--_000_C9A40A871603Dcmortimoresalesforcecom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Draft looks good - readability is up considerably from previous drafts.    =
Getting pretty close IMO

Comments:

1) I'd vote for dropping the following from 1.4.2.   In turn I'd discuss so=
me of the security considerations, such as difficulty of protecting a clien=
t_secret in almost all use-cases of this profile.

    "Implicit grants improve the responsiveness and efficiency of some
   clients (such as a client implemented as an in-browser application)
   since it reduces the number of round trips required to obtain an
   access token."

2) Section 2.1, we should MUST TLS even for Authorization Code.

3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED since in 4.=
1.1 it's "REQUIRED unless"

4) Section 4.2.2 - when did we drop refresh_token?     I assume this goes b=
ack to disagreement on how best to handle native clients. I'd prefer it to =
simply reference 5.1 and leave what is issued up to the security profile of=
 the particular deployment as to what is issued.

...and of course section 9.

-cmort





On 3/1/11 11:32 PM, "Hannes Tschofenig" <hannes.tschofenig@gmx.net> wrote:

This is a Last Call for comments on

http://www.ietf.org/id/draft-ietf-oauth-v2-13.txt

Please have your comments in no later than March 16.

Do remember to send a note in if you have read the document and have no
other comments other than "its ready to go" - we need those as much as we n=
eed "I found a problem".

Thanks!
Hannes & Blaine

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


--_000_C9A40A871603Dcmortimoresalesforcecom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt</TITLE>
</HEAD>
<BODY>
<FONT FACE=3D"Lucida Grande"><SPAN STYLE=3D'font-size:11pt'>Draft looks goo=
d &#8211; readability is up considerably from previous drafts. &nbsp;&nbsp;=
&nbsp;Getting pretty close IMO<BR>
<BR>
Comments:<BR>
<BR>
1) I&#8217;d vote for dropping the following from 1.4.2. &nbsp;&nbsp;In tur=
n I&#8217;d discuss some of the security considerations, such as difficulty=
 of protecting a client_secret in almost all use-cases of this profile. &nb=
sp;&nbsp;<BR>
<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&#8220;</SPAN></FONT><FONT FACE=3D"Times, Times New=
 Roman"><SPAN STYLE=3D'font-size:12pt'>Implicit grants improve the responsi=
veness and efficiency of some<BR>
&nbsp;&nbsp;&nbsp;clients (such as a client implemented as an in-browser ap=
plication)<BR>
&nbsp;&nbsp;&nbsp;since it reduces the number of round trips required to ob=
tain an<BR>
&nbsp;&nbsp;&nbsp;access token.&#8221;<BR>
</SPAN></FONT><FONT FACE=3D"Lucida Grande"><SPAN STYLE=3D'font-size:11pt'><=
BR>
2) Section 2.1, we should MUST TLS even for Authorization Code. &nbsp;&nbsp=
;<BR>
<BR>
3) Section 4.1.3 &#8211; not clear to me why redirect_uri is REQUIRED since=
 in 4.1.1 it&#8217;s &#8220;REQUIRED unless&#8221;<BR>
<BR>
4) Section 4.2.2 &#8211; when did we drop refresh_token? &nbsp;&nbsp;&nbsp;=
&nbsp;I assume this goes back to disagreement on how best to handle native =
clients. I&#8217;d prefer it to simply reference 5.1 and leave what is issu=
ed up to the security profile of the particular deployment as to what is is=
sued.<BR>
<BR>
...and of course section 9.<BR>
<BR>
-cmort &nbsp;<BR>
<BR>
&nbsp;&nbsp;<BR>
<BR>
<BR>
<BR>
On 3/1/11 11:32 PM, &quot;Hannes Tschofenig&quot; &lt;<a href=3D"hannes.tsc=
hofenig@gmx.net">hannes.tschofenig@gmx.net</a>&gt; wrote:<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Lucida Grande"><SPAN STYLE=3D'font-=
size:11pt'>This is a Last Call for comments on<BR>
<BR>
<a href=3D"http://www.ietf.org/id/draft-ietf-oauth-v2-13.txt">http://www.ie=
tf.org/id/draft-ietf-oauth-v2-13.txt</a><BR>
<BR>
Please have your comments in no later than March 16.<BR>
<BR>
Do remember to send a note in if you have read the document and have no<BR>
other comments other than &quot;its ready to go&quot; - we need those as mu=
ch as we need &quot;I found a problem&quot;.<BR>
<BR>
Thanks!<BR>
Hannes &amp; Blaine<BR>
<BR>
_______________________________________________<BR>
OAuth mailing list<BR>
<a href=3D"OAuth@ietf.org">OAuth@ietf.org</a><BR>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.or=
g/mailman/listinfo/oauth</a><BR>
<BR>
</SPAN></FONT></BLOCKQUOTE>
</BODY>
</HTML>


--_000_C9A40A871603Dcmortimoresalesforcecom_--

From eran@hueniverse.com  Mon Mar 14 18:28:39 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 238AB3A6BCA for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 18:28:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.56
X-Spam-Level: 
X-Spam-Status: No, score=-2.56 tagged_above=-999 required=5 tests=[AWL=0.039,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Eja1GoNjoAUW for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 18:28:37 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 765013A6BB2 for <oauth@ietf.org>; Mon, 14 Mar 2011 18:28:36 -0700 (PDT)
Received: (qmail 13604 invoked from network); 15 Mar 2011 01:30:00 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 15 Mar 2011 01:30:00 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Mon, 14 Mar 2011 18:30:00 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: David Recordon <recordond@gmail.com>
Date: Mon, 14 Mar 2011 18:29:53 -0700
Thread-Topic: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AcvirNUTXwUySjgURoWKC0VaSK06MgAAZuqg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F3379F5@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTikfr31SsQ=PsZ1Oc2eqDJhTb2NZoVz9Q5OP-t7p@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394325293E36@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTiksipC4mSJO0yuDJQXpUx+v2FmbQ-zy+egoMnSb@mail.gmail.com>
In-Reply-To: <AANLkTiksipC4mSJO0yuDJQXpUx+v2FmbQ-zy+egoMnSb@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 01:28:39 -0000

It's a clear example of defining facilities without *ANY* use cases or requ=
irements.

We have clear use cases and actual registration requests for the current re=
gistries defined in v2.

What's most annoying about this entire push for an error registry is that t=
he author and supporters have all failed to show a single example of an act=
ual value to be registered. I don't think I'm asking for much.

Registries must be held to the same level of adoption as any other part of =
the protocol. If a feature is not being use by the time the document is fin=
alized, it MUST NOT be included and left out. Otherwise, this is pure astro=
naut architecture and design by committee.

As for the reference to the editorial comment in draft 11 - there were othe=
r such notes in part drafts which were simply removed without addressing th=
roughout the process. This registry is new, and is baseless. An important p=
art of our process is weeding out what is not necessary, and an error regis=
try clearly fails to meet this standard.

This entire thread should be stopped until someone can offer clear use case=
s and requirements. Otherwise, this is a joke.

EHL



> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of David Recordon
> Sent: Monday, March 14, 2011 6:04 PM
> To: Mike Jones
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline
> Friday, March 18
>=20
> Has anyone extended error codes? Is there a list of error codes currently
> being used in the wild that need standardizing?
>=20
> --David
>=20
>=20
> On Mon, Mar 14, 2011 at 11:28 PM, Mike Jones
> <Michael.Jones@microsoft.com> wrote:
> > This is not new. =A0This is meeting the need expressed in draft 10, Sec=
tion
> 3.2.1 and draft 11, Section 4.3.1 as "[[ Add mechanism for extending erro=
r
> codes ]]".
> >
> > It's there to provide a coordination mechanism among OAuth-related
> specifications so that different specs use the same errors for the same t=
hing.
> >
> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0-- Mike
> >
> > -----Original Message-----
> > From: David Recordon [mailto:recordond@gmail.com]
> > Sent: Monday, March 14, 2011 4:15 PM
> > To: Mike Jones
> > Cc: oauth@ietf.org
> > Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry,
> > deadline Friday, March 18
> >
> > I still haven't seen an explanation of what this registry accomplishes =
or why
> it's become needed in the past few weeks.
> >
> > --David
> >
> >
> > On Fri, Mar 11, 2011 at 11:04 PM, Mike Jones
> <Michael.Jones@microsoft.com> wrote:
> >> As you know, the OAuth 2.0 Bearer Token draft -03 established the
> >> OAuth Errors Registry to increase interoperability among
> >> implementations using the related OAuth specifications.=A0 As you also
> >> know, there has been some discussion about whether:
> >>
> >>
> >>
> >> A)=A0 The OAuth Errors Registry belongs in in the Framework
> >> specification rather than the bearer token specification,
> >>
> >> B)=A0 The OAuth Errors Registry should continue to be defined in the
> >> Bearer Token specification and apply to all OAuth specifications,
> >>
> >> C)=A0 The OAuth Errors Registry should reside in the Bearer Token
> >> specification but be scoped back to only apply to that specification,
> >> or
> >>
> >> D)=A0 The OAuth Errors Registry should be deleted because the set of
> >> errors should not be extensible.
> >>
> >>
> >>
> >> Please vote for A, B, C, or D by Friday, March 18th.
> >>
> >>
> >>
> >> I personally believe that A makes the most sense, but given that
> >> other points of view have also been voiced, this consensus call is
> >> needed to resolve the issue.
> >>
> >>
> >>
> >>
> >> Cheers,
> >>
> >> =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 --
> >> Mike
> >>
> >>
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >>
> >>
> >
> >
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From wmills@yahoo-inc.com  Mon Mar 14 18:49:51 2011
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A87083A6BD5 for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 18:49:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id APlT9s2VWFcG for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 18:49:50 -0700 (PDT)
Received: from web32309.mail.mud.yahoo.com (web32309.mail.mud.yahoo.com [68.142.207.157]) by core3.amsl.com (Postfix) with SMTP id 3842E3A6E0E for <oauth@ietf.org>; Mon, 14 Mar 2011 18:49:50 -0700 (PDT)
Received: (qmail 23733 invoked by uid 60001); 15 Mar 2011 01:51:09 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1300153869; bh=f5zRkei0zLMnQfMZnq2PMnDT5OUqsZTuut79b3QipNc=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=jh3EwRy5TK2OvwI7teUHNCRTqltEFW9HkGFTwujaywTdK8sEbW+sp1Pc/O+uR+RkbcJDEJ9T1tMJUUZWH/UNJElHueFF6QZI6MscK5dRup6uVIdM6DNi3JoDybV8Qq8N1N9qiIBorqFtJ5QleAAXwg+L5tEft6lSfmKBcCCPuwo=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=ZCmlIjh/zDxdf6WfJQK5WsHnlzPv4cl0xrAeeny956qWyqi9H1zf09YgmuO/npvrKXqG7ikIuCgomar3B3x69nr8Kr9X8MKbw8ROT7/5/sSNfJOW3QTWbwSl/ToYZsUyIN2behE9QwSjSKZeBBO2QNNycW2MVPezPgRB+D14j4E=;
Message-ID: <302498.23684.qm@web32309.mail.mud.yahoo.com>
X-YMail-OSG: nVennPcVM1l3434PNSVpJlwNUlha.5Wm6rn3o5_GrYC.odR wDs9z9oVR8Fln6XEvBTTvVYNjQq_XXD1tJmr3SurTSTCitJydX8XsBS0Wjc6 _gzlBdqL.cPyv4oOpeJxw5OEGmniU6T87rDcYfbo60NsWrUQvLTUoJMYG2es UBDmy33T9Rqdoiqy5hTwdP_eDxPhDI2W_a8RJW.4ONCip15CQEzm3G.KNuUH 4RTh_qWD8K4DLvPkelq9aUereRkzH5mQOvTxeCWZBrjhmNWIHauV9Kiep2Sj ZSQA7FCKpWSqy1CvfobfHpSfE2qvU56WJHNNvzIs2.fWG7XexFu6ZtN0bRVH TMpUF8jTr7GQCj1Wc.tmEWrwmDaGIJNrYC2QxZxDr
Received: from [209.131.62.115] by web32309.mail.mud.yahoo.com via HTTP; Mon, 14 Mar 2011 18:51:08 PDT
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.109.292656
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
Date: Mon, 14 Mar 2011 18:51:08 -0700 (PDT)
From: "William J. Mills" <wmills@yahoo-inc.com>
To: Mike Jones <Michael.Jones@microsoft.com>, "oauth@ietf.org" <oauth@ietf.org>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-532061361-1300153868=:23684"
Subject: Re: [OAUTH-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 01:49:51 -0000

--0-532061361-1300153868=:23684
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

My vote is D, or C -- if you really have a use case for extensible errors i=
n Bearer.=0A=0AAs for consistency, the WG should attempt to keep error code=
s sensible and consistently applied.=0A=0A=0A=0A___________________________=
_____=0AFrom: Mike Jones <Michael.Jones@microsoft.com>=0ATo: "oauth@ietf.or=
g" <oauth@ietf.org>=0ASent: Friday, March 11, 2011 3:04 PM=0ASubject: [OAUT=
H-WG] Vote:  Location of OAuth Errors Registry, deadline Friday, March 18=
=0A=0A =0AAs you know, the OAuth 2.0 Bearer Token draft -03 established the=
 OAuth Errors Registry to increase interoperability among implementations u=
sing the related OAuth specifications.=A0 As you also know, there has been =
some discussion about whether:=0A=A0=0AA)=A0 The OAuth Errors Registry belo=
ngs in in the Framework specification rather than the bearer token specific=
ation,=0AB)=A0 The OAuth Errors Registry should continue to be defined in t=
he Bearer Token specification and apply to all OAuth specifications,=0AC)=
=A0 The OAuth Errors Registry should reside in the Bearer Token specificati=
on but be scoped back to only apply to that specification, or=0AD)=A0 The O=
Auth Errors Registry should be deleted because the set of errors should not=
 be extensible.=0A=A0=0APlease vote for A, B, C, or D by Friday, March 18th=
.=0A=A0=0AI personally believe that A makes the most sense, but given that =
other points of view have also been voiced, this consensus call is needed t=
o resolve the issue.=0A=A0=0A=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 Cheer=
s,=0A=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 -- Mike=0A=A0=0A_____________=
__________________________________=0AOAuth mailing list=0AOAuth@ietf.org=0A=
https://www.ietf.org/mailman/listinfo/oauth=0A=0A=0A      
--0-532061361-1300153868=:23684
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:ti=
mes new roman, new york, times, serif;font-size:12pt"><div><span>My vote is=
 D, or C -- if you really have a use case for extensible errors in Bearer.<=
/span></div><div><br><span></span></div><div><span>As for consistency, the =
WG should attempt to keep error codes sensible and consistently applied.<br=
></span></div><div><br></div><div style=3D"font-family: times new roman,new=
 york,times,serif; font-size: 12pt;"><div style=3D"font-family: times new r=
oman,new york,times,serif; font-size: 12pt;"><font size=3D"2" face=3D"Arial=
"><hr size=3D"1"><b><span style=3D"font-weight: bold;">From:</span></b> Mik=
e Jones &lt;Michael.Jones@microsoft.com&gt;<br><b><span style=3D"font-weigh=
t: bold;">To:</span></b> "oauth@ietf.org" &lt;oauth@ietf.org&gt;<br><b><spa=
n style=3D"font-weight: bold;">Sent:</span></b> Friday, March 11, 2011 3:04=
 PM<br><b><span style=3D"font-weight: bold;">Subject:</span></b> [OAUTH-WG]=
 Vote:=20
 Location of OAuth Errors Registry, deadline Friday,=0A=09March 18<br></fon=
t><br> =0A=0A=0A =0A =0A<style><!--=0A#yiv-1961922743  =0A _filtered #yiv-1=
961922743 {font-family:Calibri;panose-1:2 15 5 2 2 2 4 3 2 4;}=0A#yiv-19619=
22743  =0A#yiv-1961922743 p.yiv-1961922743MsoNormal, #yiv-1961922743 li.yiv=
-1961922743MsoNormal, #yiv-1961922743 div.yiv-1961922743MsoNormal=0A=09{mar=
gin:0in;margin-bottom:.0001pt;font-size:11.0pt;font-family:"sans-serif";}=
=0A#yiv-1961922743 a:link, #yiv-1961922743 span.yiv-1961922743MsoHyperlink=
=0A=09{color:blue;text-decoration:underline;}=0A#yiv-1961922743 a:visited, =
#yiv-1961922743 span.yiv-1961922743MsoHyperlinkFollowed=0A=09{color:purple;=
text-decoration:underline;}=0A#yiv-1961922743 span.yiv-1961922743EmailStyle=
17=0A=09{font-family:"sans-serif";color:windowtext;}=0A#yiv-1961922743 .yiv=
-1961922743MsoChpDefault=0A=09{font-family:"sans-serif";}=0A _filtered #yiv=
-1961922743 {margin:1.0in 1.0in 1.0in 1.0in;}=0A#yiv-1961922743 div.yiv-196=
1922743WordSection1=0A=09{}=0A--></style>=0A<div class=3D"yiv-1961922743Wor=
dSection1">=0A<div class=3D"yiv-1961922743MsoNormal">As you know, the OAuth=
 2.0 Bearer Token draft -03 established the=0A<a rel=3D"nofollow" target=3D=
"_blank" href=3D"http://self-issued.info/docs/draft-ietf-oauth-v2-bearer-03=
.html#errors-registry">=0AOAuth Errors Registry</a> to increase interoperab=
ility among implementations using the related OAuth specifications.&nbsp; A=
s you also know, there has been some discussion about whether:</div> =0A<di=
v class=3D"yiv-1961922743MsoNormal"> &nbsp;</div> =0A<div class=3D"yiv-1961=
922743MsoNormal">A)&nbsp; The OAuth Errors Registry belongs in in the Frame=
work specification rather than the bearer token specification,</div> =0A<di=
v class=3D"yiv-1961922743MsoNormal">B)&nbsp; The OAuth Errors Registry shou=
ld continue to be defined in the Bearer Token specification and apply to al=
l OAuth specifications,</div> =0A<div class=3D"yiv-1961922743MsoNormal">C)&=
nbsp; The OAuth Errors Registry should reside in the Bearer Token specifica=
tion but be scoped back to only apply to that specification, or</div> =0A<d=
iv class=3D"yiv-1961922743MsoNormal">D)&nbsp; The OAuth Errors Registry sho=
uld be deleted because the set of errors should not be extensible.</div> =
=0A<div class=3D"yiv-1961922743MsoNormal"> &nbsp;</div> =0A<div class=3D"yi=
v-1961922743MsoNormal">Please vote for A, B, C, or D by Friday, March 18<su=
p>th</sup>.</div> =0A<div class=3D"yiv-1961922743MsoNormal"> &nbsp;</div> =
=0A<div class=3D"yiv-1961922743MsoNormal">I personally believe that A makes=
 the most sense, but given that other points of view have also been voiced,=
 this consensus call is needed to resolve the issue.</div> =0A<div class=3D=
"yiv-1961922743MsoNormal"> &nbsp;</div> =0A<div class=3D"yiv-1961922743MsoN=
ormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; Cheers,</div> =0A<div class=3D"yiv-1961922743MsoNormal">&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- M=
ike</div> =0A<div class=3D"yiv-1961922743MsoNormal"> &nbsp;</div> =0A</div>=
=0A =0A<br>_______________________________________________<br>OAuth mailing=
 list<br><a ymailto=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org=
">OAuth@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oa=
uth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br><=
br><br></div></div></div><br>=0A=0A=0A=0A=0A=0A=0A=0A      </body></html>
--0-532061361-1300153868=:23684--

From cmortimore@salesforce.com  Mon Mar 14 20:48:17 2011
Return-Path: <cmortimore@salesforce.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5AFEA3A6C1F for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 20:48:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3lhoSmSAXTTz for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 20:48:12 -0700 (PDT)
Received: from exprod8og107.obsmtp.com (exprod8og107.obsmtp.com [64.18.3.94]) by core3.amsl.com (Postfix) with SMTP id 7D5CA3A6C1A for <oauth@ietf.org>; Mon, 14 Mar 2011 20:48:11 -0700 (PDT)
Received: from source ([204.14.239.238]) by exprod8ob107.postini.com ([64.18.7.12]) with SMTP ID DSNKTX7hz1GuxAj0JjTGzAYhFqtPMKr1QcLO@postini.com; Mon, 14 Mar 2011 20:49:37 PDT
Received: from EXSFM-MB01.internal.salesforce.com ([10.1.127.46]) by exsfm-hub3.internal.salesforce.com ([10.1.127.7]) with mapi; Mon, 14 Mar 2011 20:49:36 -0700
From: Chuck Mortimore <cmortimore@salesforce.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>, OAuth WG <oauth@ietf.org>
Date: Mon, 14 Mar 2011 20:49:35 -0700
Thread-Topic: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-revocation-02
Thread-Index: AcviOTQf+ATVQlOLRNOks3lhBw9qxAAisss/
Message-ID: <C9A42FDE.16065%cmortimore@salesforce.com>
In-Reply-To: <4D7DF8DC.9030102@lodderstedt.net>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C9A42FDE16065cmortimoresalesforcecom_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-revocation-02
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 03:48:17 -0000

--_000_C9A42FDE16065cmortimoresalesforcecom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hey Torsten - glad to see this spec out there, and we plan to implement in =
the future.   Only 1 quick comment:

"the authorization server is supposed to detect the token type automaticall=
y."    I think it would be better to have the client explicitly state the t=
oken type.   The client will know, so we might as well remove the burden fr=
om the server trying to do this heuristically.

-cmort




On 3/14/11 3:15 AM, "Torsten Lodderstedt" <torsten@lodderstedt.net> wrote:

  Hi all,

 I just uploaded a new revision of the revocation I-D (http://tools.ietf.or=
g/html/draft-lodderstedt-oauth-revocation-02).

 Changes:
 - dropped token_type parameter
 - made client authentication optional (as on the token endpoint)
 - changed success status code to 200

 Thank's to all reviewers.

 regards,
 Torsten.

 -------- Original-Nachricht --------
 Betreff:  New Version Notification for draft-lodderstedt-oauth-revocation-=
02
 Datum:  Mon, 14 Mar 2011 04:11:50 -0700 (PDT)
 Von:  IETF I-D Submission Tool <idsubmission@ietf.org> <mailto:idsubmissio=
n@ietf.org>
 An:  torsten@lodderstedt.net
 CC:  sdronia@gmx.de


A new version of I-D, draft-lodderstedt-oauth-revocation-02.txt has been su=
ccessfully submitted by Torsten Lodderstedt and posted to the IETF reposito=
ry.

Filename:  draft-lodderstedt-oauth-revocation
Revision:  02
Title:   Token Revocation
Creation_date:  2011-03-14
WG ID:   Independent Submission
Number_of_pages: 6

Abstract:
This draft proposes an additional endpoint for OAuth authorization
servers for revoking tokens.



The IETF Secretariat.




--_000_C9A42FDE16065cmortimoresalesforcecom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Re: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-o=
auth-revocation-02</TITLE>
</HEAD>
<BODY>
<FONT FACE=3D"Lucida Grande"><SPAN STYLE=3D'font-size:11pt'>Hey Torsten &#8=
211; glad to see this spec out there, and we plan to implement in the futur=
e. &nbsp;&nbsp;Only 1 quick comment:<BR>
<BR>
&quot;</SPAN></FONT><FONT FACE=3D"Times, Times New Roman"><SPAN STYLE=3D'fo=
nt-size:12pt'>the authorization server is supposed to detect the token type=
 automatically.</SPAN></FONT><FONT FACE=3D"Lucida Grande"><SPAN STYLE=3D'fo=
nt-size:11pt'>&#8221; &nbsp;&nbsp;&nbsp;I think it would be better to have =
the client explicitly state the token type. &nbsp;&nbsp;The client will kno=
w, so we might as well remove the burden from the server trying to do this =
heuristically.<BR>
<BR>
-cmort<BR>
<BR>
<BR>
<BR>
<BR>
On 3/14/11 3:15 AM, &quot;Torsten Lodderstedt&quot; &lt;<a href=3D"torsten@=
lodderstedt.net">torsten@lodderstedt.net</a>&gt; wrote:<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Lucida Grande"><SPAN STYLE=3D'font-=
size:11pt'> &nbsp;&nbsp;Hi all,<BR>
&nbsp;<BR>
&nbsp;I just uploaded a new revision of the revocation I-D (<a href=3D"http=
://tools.ietf.org/html/draft-lodderstedt-oauth-revocation-02">http://tools.=
ietf.org/html/draft-lodderstedt-oauth-revocation-02</a>). <BR>
&nbsp;<BR>
&nbsp;Changes:<BR>
&nbsp;- dropped token_type parameter<BR>
&nbsp;- made client authentication optional (as on the token endpoint)<BR>
&nbsp;- changed success status code to 200<BR>
&nbsp;<BR>
&nbsp;Thank's to all reviewers.<BR>
&nbsp;<BR>
&nbsp;regards,<BR>
&nbsp;Torsten.<BR>
&nbsp;<BR>
&nbsp;-------- Original-Nachricht -------- &nbsp;&nbsp;<BR>
&nbsp;Betreff: &nbsp;New Version Notification for draft-lodderstedt-oauth-r=
evocation-02 &nbsp;<BR>
&nbsp;Datum: &nbsp;Mon, 14 Mar 2011 04:11:50 -0700 (PDT) &nbsp;<BR>
&nbsp;Von: &nbsp;IETF I-D Submission Tool &lt;<a href=3D"idsubmission@ietf.=
org">idsubmission@ietf.org</a>&gt; &lt;<a href=3D"mailto:idsubmission@ietf.=
org">mailto:idsubmission@ietf.org</a>&gt; &nbsp;&nbsp;<BR>
&nbsp;An: &nbsp;<a href=3D"torsten@lodderstedt.net">torsten@lodderstedt.net=
</a> &nbsp;<BR>
&nbsp;CC: &nbsp;<a href=3D"sdronia@gmx.de">sdronia@gmx.de</a> &nbsp;&nbsp;&=
nbsp;<BR>
&nbsp;<BR>
&nbsp;<BR>
A new version of I-D, draft-lodderstedt-oauth-revocation-02.txt has been su=
ccessfully submitted by Torsten Lodderstedt and posted to the IETF reposito=
ry.<BR>
<BR>
Filename:&nbsp; draft-lodderstedt-oauth-revocation<BR>
Revision:&nbsp; 02<BR>
Title:&nbsp;&nbsp; Token Revocation<BR>
Creation_date:&nbsp; 2011-03-14<BR>
WG ID:&nbsp;&nbsp; Independent Submission<BR>
Number_of_pages: 6<BR>
<BR>
Abstract:<BR>
This draft proposes an additional endpoint for OAuth authorization<BR>
servers for revoking tokens.<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<BR>
<BR>
<BR>
The IETF Secretariat.<BR>
<BR>
<BR>
&nbsp;<BR>
</SPAN></FONT></BLOCKQUOTE>
</BODY>
</HTML>


--_000_C9A42FDE16065cmortimoresalesforcecom_--

From phil.hunt@oracle.com  Mon Mar 14 22:11:14 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 00FA43A69CA for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 22:11:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.883
X-Spam-Level: 
X-Spam-Status: No, score=-5.883 tagged_above=-999 required=5 tests=[AWL=-0.576, BAYES_00=-2.599, MISSING_HEADERS=1.292, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2vKztnJq1uye for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 22:11:09 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 2C36F3A6980 for <oauth@ietf.org>; Mon, 14 Mar 2011 22:11:09 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2F5CVVu003101 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <oauth@ietf.org>; Tue, 15 Mar 2011 05:12:33 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2F5CU3I012497 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <oauth@ietf.org>; Tue, 15 Mar 2011 05:12:31 GMT
Received: from abhmt003.oracle.com (abhmt003.oracle.com [141.146.116.12]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2F5CUft000883 for <oauth@ietf.org>; Tue, 15 Mar 2011 00:12:30 -0500
Received: from [192.168.1.8] (/24.87.204.3) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 14 Mar 2011 22:12:30 -0700
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Apple Message framework v1082)
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F3379F5@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Mon, 14 Mar 2011 22:12:29 -0700
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <DEFEDFF1-E816-4BA1-8719-8856AE798919@oracle.com>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTikfr31SsQ=PsZ1Oc2eqDJhTb2NZoVz9Q5OP-t7p@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394325293E36@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTiksipC4mSJO0yuDJQXpUx+v2FmbQ-zy+egoMnSb@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234464F3379F5@P3PW5EX1MB01.EX1.SECURESERVER.NET>
X-Mailer: Apple Mail (2.1082)
X-Source-IP: acsmt356.oracle.com [141.146.40.156]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090204.4D7EF53F.005B,ss=1,fgs=0
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 05:11:14 -0000

As I indicated earlier, I don't agree yet with the choices and would =
like more information on the registry and use cases.

Phil
phil.hunt@oracle.com




On 2011-03-14, at 6:29 PM, Eran Hammer-Lahav wrote:

> It's a clear example of defining facilities without *ANY* use cases or =
requirements.
>=20
> We have clear use cases and actual registration requests for the =
current registries defined in v2.
>=20
> What's most annoying about this entire push for an error registry is =
that the author and supporters have all failed to show a single example =
of an actual value to be registered. I don't think I'm asking for much.
>=20
> Registries must be held to the same level of adoption as any other =
part of the protocol. If a feature is not being use by the time the =
document is finalized, it MUST NOT be included and left out. Otherwise, =
this is pure astronaut architecture and design by committee.
>=20
> As for the reference to the editorial comment in draft 11 - there were =
other such notes in part drafts which were simply removed without =
addressing throughout the process. This registry is new, and is =
baseless. An important part of our process is weeding out what is not =
necessary, and an error registry clearly fails to meet this standard.
>=20
> This entire thread should be stopped until someone can offer clear use =
cases and requirements. Otherwise, this is a joke.
>=20
> EHL
>=20
>=20
>=20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf
>> Of David Recordon
>> Sent: Monday, March 14, 2011 6:04 PM
>> To: Mike Jones
>> Cc: oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, =
deadline
>> Friday, March 18
>>=20
>> Has anyone extended error codes? Is there a list of error codes =
currently
>> being used in the wild that need standardizing?
>>=20
>> --David
>>=20
>>=20
>> On Mon, Mar 14, 2011 at 11:28 PM, Mike Jones
>> <Michael.Jones@microsoft.com> wrote:
>>> This is not new.  This is meeting the need expressed in draft 10, =
Section
>> 3.2.1 and draft 11, Section 4.3.1 as "[[ Add mechanism for extending =
error
>> codes ]]".
>>>=20
>>> It's there to provide a coordination mechanism among OAuth-related
>> specifications so that different specs use the same errors for the =
same thing.
>>>=20
>>>                                -- Mike
>>>=20
>>> -----Original Message-----
>>> From: David Recordon [mailto:recordond@gmail.com]
>>> Sent: Monday, March 14, 2011 4:15 PM
>>> To: Mike Jones
>>> Cc: oauth@ietf.org
>>> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry,
>>> deadline Friday, March 18
>>>=20
>>> I still haven't seen an explanation of what this registry =
accomplishes or why
>> it's become needed in the past few weeks.
>>>=20
>>> --David
>>>=20
>>>=20
>>> On Fri, Mar 11, 2011 at 11:04 PM, Mike Jones
>> <Michael.Jones@microsoft.com> wrote:
>>>> As you know, the OAuth 2.0 Bearer Token draft -03 established the
>>>> OAuth Errors Registry to increase interoperability among
>>>> implementations using the related OAuth specifications.  As you =
also
>>>> know, there has been some discussion about whether:
>>>>=20
>>>>=20
>>>>=20
>>>> A)  The OAuth Errors Registry belongs in in the Framework
>>>> specification rather than the bearer token specification,
>>>>=20
>>>> B)  The OAuth Errors Registry should continue to be defined in the
>>>> Bearer Token specification and apply to all OAuth specifications,
>>>>=20
>>>> C)  The OAuth Errors Registry should reside in the Bearer Token
>>>> specification but be scoped back to only apply to that =
specification,
>>>> or
>>>>=20
>>>> D)  The OAuth Errors Registry should be deleted because the set of
>>>> errors should not be extensible.
>>>>=20
>>>>=20
>>>>=20
>>>> Please vote for A, B, C, or D by Friday, March 18th.
>>>>=20
>>>>=20
>>>>=20
>>>> I personally believe that A makes the most sense, but given that
>>>> other points of view have also been voiced, this consensus call is
>>>> needed to resolve the issue.
>>>>=20
>>>>=20
>>>>=20
>>>>=20
>>>> Cheers,
>>>>=20
>>>>                                                                 --
>>>> Mike
>>>>=20
>>>>=20
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>>=20
>>>=20
>>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From eran@hueniverse.com  Mon Mar 14 22:14:08 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5B0EF3A69CA for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 22:14:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.561
X-Spam-Level: 
X-Spam-Status: No, score=-2.561 tagged_above=-999 required=5 tests=[AWL=0.038,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1yeoLMQp6AbK for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 22:14:07 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 3B7993A6980 for <oauth@ietf.org>; Mon, 14 Mar 2011 22:14:07 -0700 (PDT)
Received: (qmail 31845 invoked from network); 15 Mar 2011 05:15:31 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 15 Mar 2011 05:15:31 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Mon, 14 Mar 2011 22:15:31 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phil Hunt <phil.hunt@oracle.com>
Date: Mon, 14 Mar 2011 22:15:27 -0700
Thread-Topic: [OAUTH-WG] Vote: Location of OAuth Errors Registry,	deadline Friday, March 18
Thread-Index: Acviz6ER2yDGTbS1T3e9QAUp95ldpwAAFlzw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F337A16@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTikfr31SsQ=PsZ1Oc2eqDJhTb2NZoVz9Q5OP-t7p@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394325293E36@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTiksipC4mSJO0yuDJQXpUx+v2FmbQ-zy+egoMnSb@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234464F3379F5@P3PW5EX1MB01.EX1.SECURESERVER.NET> <DEFEDFF1-E816-4BA1-8719-8856AE798919@oracle.com>
In-Reply-To: <DEFEDFF1-E816-4BA1-8719-8856AE798919@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 05:14:08 -0000

Me too! :-)

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Phil Hunt
> Sent: Monday, March 14, 2011 10:12 PM
> Cc: oauth@ietf.org WG
> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline
> Friday, March 18
>=20
> As I indicated earlier, I don't agree yet with the choices and would like=
 more
> information on the registry and use cases.
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> On 2011-03-14, at 6:29 PM, Eran Hammer-Lahav wrote:
>=20
> > It's a clear example of defining facilities without *ANY* use cases or
> requirements.
> >
> > We have clear use cases and actual registration requests for the curren=
t
> registries defined in v2.
> >
> > What's most annoying about this entire push for an error registry is th=
at the
> author and supporters have all failed to show a single example of an actu=
al
> value to be registered. I don't think I'm asking for much.
> >
> > Registries must be held to the same level of adoption as any other part=
 of
> the protocol. If a feature is not being use by the time the document is
> finalized, it MUST NOT be included and left out. Otherwise, this is pure
> astronaut architecture and design by committee.
> >
> > As for the reference to the editorial comment in draft 11 - there were
> other such notes in part drafts which were simply removed without
> addressing throughout the process. This registry is new, and is baseless.=
 An
> important part of our process is weeding out what is not necessary, and a=
n
> error registry clearly fails to meet this standard.
> >
> > This entire thread should be stopped until someone can offer clear use
> cases and requirements. Otherwise, this is a joke.
> >
> > EHL
> >
> >
> >
> >> -----Original Message-----
> >> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
> >> Behalf Of David Recordon
> >> Sent: Monday, March 14, 2011 6:04 PM
> >> To: Mike Jones
> >> Cc: oauth@ietf.org
> >> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry,
> >> deadline Friday, March 18
> >>
> >> Has anyone extended error codes? Is there a list of error codes
> >> currently being used in the wild that need standardizing?
> >>
> >> --David
> >>
> >>
> >> On Mon, Mar 14, 2011 at 11:28 PM, Mike Jones
> >> <Michael.Jones@microsoft.com> wrote:
> >>> This is not new.  This is meeting the need expressed in draft 10,
> >>> Section
> >> 3.2.1 and draft 11, Section 4.3.1 as "[[ Add mechanism for extending
> >> error codes ]]".
> >>>
> >>> It's there to provide a coordination mechanism among OAuth-related
> >> specifications so that different specs use the same errors for the sam=
e
> thing.
> >>>
> >>>                                -- Mike
> >>>
> >>> -----Original Message-----
> >>> From: David Recordon [mailto:recordond@gmail.com]
> >>> Sent: Monday, March 14, 2011 4:15 PM
> >>> To: Mike Jones
> >>> Cc: oauth@ietf.org
> >>> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry,
> >>> deadline Friday, March 18
> >>>
> >>> I still haven't seen an explanation of what this registry
> >>> accomplishes or why
> >> it's become needed in the past few weeks.
> >>>
> >>> --David
> >>>
> >>>
> >>> On Fri, Mar 11, 2011 at 11:04 PM, Mike Jones
> >> <Michael.Jones@microsoft.com> wrote:
> >>>> As you know, the OAuth 2.0 Bearer Token draft -03 established the
> >>>> OAuth Errors Registry to increase interoperability among
> >>>> implementations using the related OAuth specifications.  As you
> >>>> also know, there has been some discussion about whether:
> >>>>
> >>>>
> >>>>
> >>>> A)  The OAuth Errors Registry belongs in in the Framework
> >>>> specification rather than the bearer token specification,
> >>>>
> >>>> B)  The OAuth Errors Registry should continue to be defined in the
> >>>> Bearer Token specification and apply to all OAuth specifications,
> >>>>
> >>>> C)  The OAuth Errors Registry should reside in the Bearer Token
> >>>> specification but be scoped back to only apply to that
> >>>> specification, or
> >>>>
> >>>> D)  The OAuth Errors Registry should be deleted because the set of
> >>>> errors should not be extensible.
> >>>>
> >>>>
> >>>>
> >>>> Please vote for A, B, C, or D by Friday, March 18th.
> >>>>
> >>>>
> >>>>
> >>>> I personally believe that A makes the most sense, but given that
> >>>> other points of view have also been voiced, this consensus call is
> >>>> needed to resolve the issue.
> >>>>
> >>>>
> >>>>
> >>>>
> >>>> Cheers,
> >>>>
> >>>>                                                                 --
> >>>> Mike
> >>>>
> >>>>
> >>>>
> >>>> _______________________________________________
> >>>> OAuth mailing list
> >>>> OAuth@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>
> >>>>
> >>>
> >>>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From SRS0=DkKbRQ=WI=lodderstedt.net=torsten@srs.bis7.eu.blackberry.com  Mon Mar 14 23:52:08 2011
Return-Path: <SRS0=DkKbRQ=WI=lodderstedt.net=torsten@srs.bis7.eu.blackberry.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0051E3A6BFA for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 23:52:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.557
X-Spam-Level: 
X-Spam-Status: No, score=-4.557 tagged_above=-999 required=5 tests=[AWL=0.288,  BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_BASE64_TEXT=1.753, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D9-QvXg-HfiS for <oauth@core3.amsl.com>; Mon, 14 Mar 2011 23:52:01 -0700 (PDT)
Received: from smtp03.bis7.eu.blackberry.com (smtp03.bis7.eu.blackberry.com [178.239.85.8]) by core3.amsl.com (Postfix) with ESMTP id 6CBA23A6BEE for <oauth@ietf.org>; Mon, 14 Mar 2011 23:51:59 -0700 (PDT)
Received: from b1.c11.bise7.blackberry ([192.168.0.101]) by srs.bis7.eu.blackberry.com (8.13.7 TEAMON/8.13.7) with ESMTP id p2F6rMn5022634; Tue, 15 Mar 2011 06:53:22 GMT
Received: from ups31.c11.bise7.blackberry (cmp31.c11.bise7.blackberry [172.18.204.201]) by b1.c11.bise7.blackberry (8.13.7 TEAMON/8.13.7) with ESMTP id p2F6rLIi010229; Tue, 15 Mar 2011 06:53:21 GMT
X-rim-org-msg-ref-id: 151288460
Message-ID: <151288460-1300172001-cardhu_decombobulator_blackberry.rim.net-1903963869-@b1.c11.bise7.blackberry>
X-Priority: Normal
References: <4D7DF8DC.9030102@lodderstedt.net><C9A42FDE.16065%cmortimore@salesforce.com>
In-Reply-To: <C9A42FDE.16065%cmortimore@salesforce.com>
Sensitivity: Normal
Importance: Normal
To: "Chuck Mortimore" <cmortimore@salesforce.com>, "OAuth WG" <oauth@ietf.org>
From: torsten@lodderstedt.net
Date: Tue, 15 Mar 2011 06:53:27 +0000
Content-Type: multipart/alternative; boundary="part27603-boundary-1795435711-383541320"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Fwd: New Version Notification fordraft-lodderstedt-oauth-revocation-02
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: torsten@lodderstedt.net
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 07:12:01 -0000

--part27603-boundary-1795435711-383541320
Content-Transfer-Encoding: base64
Content-Type: text/plain; charset="Windows-1252"
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--part27603-boundary-1795435711-383541320
Content-Transfer-Encoding: base64
Content-Type: text/html; charset="Windows-1252"
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--part27603-boundary-1795435711-383541320--


From drobin1437@gmail.com  Tue Mar 15 06:33:03 2011
Return-Path: <drobin1437@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 046823A6D65 for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 06:33:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GlfR8TIy6Y+p for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 06:33:02 -0700 (PDT)
Received: from mail-gx0-f172.google.com (mail-gx0-f172.google.com [209.85.161.172]) by core3.amsl.com (Postfix) with ESMTP id B1A6C3A6D8E for <oauth@ietf.org>; Tue, 15 Mar 2011 06:33:01 -0700 (PDT)
Received: by gxk19 with SMTP id 19so284179gxk.31 for <oauth@ietf.org>; Tue, 15 Mar 2011 06:34:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:date:message-id:subject:from:to :content-type; bh=Qo0R212/IagVwhUpXy1GvWoKT2otVGR/iZ5ZZBdy/R8=; b=TzxsDFBQ/7tGFzBaB3WXs5gX6JonjKkr5HS3Rl1O69VW0pJOsDe4Xbnlabm9zz0a++ zqDXAYa4Hrrbp5Y2Llph2hPvqrgzLry0osBfa1VwXAUvcZ7sAZgnB+NhIVhch8dE9HZ2 x07YLhEi5VyXGDAcIwwDG67FffSb4k2sujagA=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=fnelWjku0+5y/gqIjnTDvKS3od+Bh26opOh1q+Bselq+4+3AMACRmmS8C7oODodlLa 5hUsYOtQSfrOBghPRn0vuDdUjTTzUuvflZ76F8SpYktR9B24KhxP74cj8e936o3RL1M6 ktDx6HQ+bYSQSGI33aAJnPJfKQAu8UMGw1ogA=
MIME-Version: 1.0
Received: by 10.146.228.36 with SMTP id a36mr19729655yah.32.1300196066290; Tue, 15 Mar 2011 06:34:26 -0700 (PDT)
Received: by 10.147.170.9 with HTTP; Tue, 15 Mar 2011 06:34:26 -0700 (PDT)
Date: Tue, 15 Mar 2011 09:34:26 -0400
Message-ID: <AANLkTim2xsMnu0waPMfu1nTtjQs8MRWXJX0-2=M2pFz7@mail.gmail.com>
From: David Robinson <drobin1437@gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary=000e0cd57042ab6b64049e857ca7
Subject: Re: [OAUTH-WG] draft-lodderstedt-oauth-revocation-02
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 13:33:03 -0000

--000e0cd57042ab6b64049e857ca7
Content-Type: text/plain; charset=ISO-8859-1

Page 4 of the specification says:
The client MUST NOT make any assumptions about the timing and MUST NOT use
the token again.

In the case of a self-care portal mentioned in -  1.0 Introduction -
clients may not be aware that
tokens have been revoked.  In that scenario is seems probable that clients
will try to use revoked tokens
at least once.

--000e0cd57042ab6b64049e857ca7
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Page 4 of the specification says:<br>The client MUST NOT make any assumptio=
ns about the timing and MUST NOT use the token again.<br><br>In the case of=
 a self-care portal mentioned in -=A0 1.0 Introduction -=A0 clients may not=
 be aware that<br>
tokens have been revoked.=A0 In that scenario is seems probable that client=
s will try to use revoked tokens<br>at least once.<br><br><br>

--000e0cd57042ab6b64049e857ca7--

From Michael.Jones@microsoft.com  Tue Mar 15 07:51:03 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B7CA33A6DFD for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 07:51:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b1-6USkTBcew for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 07:50:53 -0700 (PDT)
Received: from smtp.microsoft.com (mailc.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id ED3E43A6DEF for <oauth@ietf.org>; Tue, 15 Mar 2011 07:50:52 -0700 (PDT)
Received: from TK5EX14HUBC102.redmond.corp.microsoft.com (157.54.7.154) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Tue, 15 Mar 2011 07:52:17 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14HUBC102.redmond.corp.microsoft.com ([157.54.7.154]) with mapi id 14.01.0270.002; Tue, 15 Mar 2011 07:52:17 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: Feedback on draft-ietf-oauth-v2-13
Thread-Index: AcvjIIlY9nhc1m+fQaqTlLWHoqRYTw==
Date: Tue, 15 Mar 2011 14:52:17 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739432529379F@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739432529379FTK5EX14MBXC207r_"
MIME-Version: 1.0
Subject: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 14:51:03 -0000

--_000_4E1F6AAD24975D4BA5B16804296739432529379FTK5EX14MBXC207r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

My last call feedback on draft 13 follows.

NORMATIVE FEEDBACK

2.1.1:  "If no valid redirection URI is available, the authorization server=
 SHOULD" - I don't understand why this is a SHOULD and not a MUST

3:  Restore Client Assertion Credentials

Restore the Client Assertion Credentials feature that was present in draft =
11, section 3.2.

4.1.1:  Scope string matching rules are ambiguous

In the "scope" definition, add "The space-delimited strings are case insens=
itive."

4.1, 4.2, 4.3.2, 4.4.2, 5.1, 6:  "Scope" parameter should be paired with co=
mplimentary "resource" parameter

It is desirable to be able to have a single service protecting multiple res=
ources.  To achieve that, there needs to be a parameter specifying what the=
 desired resource being accessed is.  This is different than scope.  At lea=
st as we're using it, "scope" would be a space-separated list of kinds of a=
ccess requested.  For instance you might be requesting read access to someo=
ne's calendar free/busy times and the right to post new calendar requests. =
 Those would be scope statements and would use URIs specifying those rights=
.

Therefore, we request that an additional optional "resource" parameter be a=
dded to the specification in the same places that "scope" appears.  "Resour=
ce" would be the URI (probably a URL) of the resource being protected by th=
e service.

4.2.2:  Add optional "expires_at" parameter

SAML, WS-Trust, JWT, and several other specifications use absolute, rather =
than relative expiration times.  Please add an optional "expires_at" parame=
ter, enabling absolute times to be used.  The value should be an integer sp=
ecifying the number of seconds from 1970-01-01T0:0:0Z as measured in UTC un=
til the desired date/time. See RFC 3339 for details regarding date/times in=
 general and UTC in particular.

4.4.2 etc.:  The name "client_credentials" is confusing

The name client_credentials does not refer to the same concept as the uses =
of the term "Client Credentials" in 1.4.4 and other locations in the docume=
nt.  It would be far better to rename this parameter "none" or "implicit", =
to indicate that no explicit credentials are being passed in the protocol. =
 It might also clarify this concept if you added an example.

7:  Restore WWW-Authenticate Response Header Field

Restore the WWW-Authenticate Response Header Field that was present in draf=
t 11, section 6.2.

10:  Add OAuth Errors Registry

Add the OAuth Errors Registry from the bearer token specification, draft 03=
, section 4.3, to the IANA Considerations.

10.2:  Add parameter locations to OAuth Parameters Registry

Add the "resource request" and "resource response" parameter locations, as =
defined in the bearer token specification, draft 03, section 4.2, to the OA=
uth Parameters Registry.

EDITORIAL FEEDBACK

1.2 item (D) :  "and if valid issues a access token" -> "and if valid, issu=
es an access token and optional refresh token"
1.3:  "an access token is a string" -> "an access token is a string encoded=
"
1.4.5:  "OAuth and other trust frameworks" -> "OAuth" - The term "trust fra=
mework" seems to have taken on a different meaning than this one these days=
.
1.5:  "used to obtain a new access token when the current access token expi=
res" -> "used to obtain a new access token when the current access token is=
 no longer valid".  "expires" is just one case.
1.5 item (F) :  "access token is invalid (expired)" -> "access token is inv=
alid (e.g., expired)"
2.1.1:  "resource owner's user-agent" this may not be possible if the resou=
rce owner is a device or if the resource owner does not have a user agent
2.1.1:  "which MUST be retained" -> "which MUST be preserved"
2.2:  "The location of the token endpoint can be found in the service docum=
entation" - There is no service documentation; suggest that this just say "=
The location of the token endpoint discovery is out of scope of this docume=
nt"
3:  "keeping their secrets confidential" -> "keeping their credentials conf=
idential"
4:  "which the client uses to requesting the access" -> "which the client u=
ses to request the access"
4.1:  "with the resource owner's user-agent" this may not be possible if th=
e resource owner is a device or if the resource owner does not have a user =
agent
4.1.1:  "parameters are present and valid" - there are no processing requir=
ements section to determine what "valid" means; suggest that a processing s=
ection be added to understand what "valid" means otherwise remove the refer=
ences to "valid"
4.1.3:  Usage of "verify" and "validate", should consistent. "Validate the =
client credentials and ensure they match the authorization code" this is mi=
sleading and should read "Validate the client credentials and ensure that t=
he authorization code given is authorized"
4.1.4:  "the authorization server return" -> "the authorization server retu=
rns"
4.1.2.1, 4.2.2, 4.2.2.1:  List REQUIRED parameters before OPTIONAL paramete=
rs.
4.2:  It's unclear what the actual meaning of "user-agent's same-origin pol=
icy" really is as there are many and I don't think there is common agreemen=
t on this; I suggest that the actual policy that we want be spelled out her=
e in the document
4.2  option (A) under figure 4: "the client includes its client identifier,=
 requested scope" -> "the client includes its client identifier, optional r=
equested scope"
4.2.1:  "Due to lack of client authentication" - not sure what this is tryi=
ng to get at here as this is just a client id; nothing about its usage is c=
alled out, thus this should go in the Security Considerations section, not =
here in the main text
4.2.2:  "The clients SHOULD ignore unrecognized" -> "The clients SHOULD ign=
ore undocumented response"
4.5:  Remove "I-D.ietf-oauth-saml2-bearer" until this becomes a standard
5.1:  "The parameters are included in the entity body of the HTTP ...." - T=
his should be a new generic section on JSON encoded responses
6:  Item #7 "has not expired and that its scope covers the requested resour=
ce" -> "has not expired and that the scope expressed is within the required=
 scope of the requested resource"
11.2:  remove references to "I-D.hammer-oauth-v2-mac-token-02", "I-D.ietf-o=
auth-v2-bearer-02", "I-D.ietf-oauth-saml2-bearer-03" until these become sta=
ndards


--_000_4E1F6AAD24975D4BA5B16804296739432529379FTK5EX14MBXC207r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">My last call feedback on draft 13 follows.<o:p></o:p=
></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>NORMATIVE FEEDBACK<o:p></o:p></b></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>2.1.1: </b>&nbsp;&#8220;If no valid redirection U=
RI is available, the authorization server SHOULD&#8221; &#8211; I don&#8217=
;t understand why this is a SHOULD and not a MUST<o:p></o:p></p>
<p class=3D"MsoNormal"><b><o:p>&nbsp;</o:p></b></p>
<p class=3D"MsoNormal"><b>3:&nbsp; Restore Client Assertion Credentials<o:p=
></o:p></b></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Restore the Client Assertion Credentials feature tha=
t was present in draft 11, section 3.2.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>4.1.1:&nbsp; Scope string matching rules are ambi=
guous<o:p></o:p></b></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">In the &#8220;scope&#8221; definition, add &#8220;Th=
e space-delimited strings are case insensitive.&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><b><o:p>&nbsp;</o:p></b></p>
<p class=3D"MsoNormal"><b>4.1, 4.2, 4.3.2, 4.4.2, 5.1, 6: &nbsp;&#8220;Scop=
e&#8221; parameter should be paired with complimentary &#8220;resource&#822=
1; parameter<o:p></o:p></b></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">It is desirable to be able to have a single service =
protecting multiple resources.&nbsp; To achieve that, there needs to be a p=
arameter specifying what the desired resource being accessed is.&nbsp; This=
 is different than scope.&nbsp; At least as we&#8217;re
 using it, &#8220;scope&#8221; would be a space-separated list of kinds of =
access requested.&nbsp; For instance you might be requesting read access to=
 someone&#8217;s calendar free/busy times and the right to post new calenda=
r requests.&nbsp; Those would be scope statements and would
 use URIs specifying those rights.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Therefore, we request that an additional optional &#=
8220;resource&#8221; parameter be added to the specification in the same pl=
aces that &#8220;scope&#8221; appears.&nbsp; &#8220;Resource&#8221; would b=
e the URI (probably a URL) of the resource being protected by the service.<=
o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>4.2.2:&nbsp; Add optional &#8220;expires_at&#8221=
; parameter<o:p></o:p></b></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">SAML, WS-Trust, JWT, and several other specification=
s use absolute, rather than relative expiration times.&nbsp; Please add an =
optional &#8220;expires_at&#8221; parameter, enabling absolute times to be =
used.&nbsp; The value should be an integer specifying the
 number of seconds from 1970-01-01T0:0:0Z as measured in UTC until the desi=
red date/time. See RFC 3339 for details regarding date/times in general and=
 UTC in particular.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>4.4.2 etc.: &nbsp;The name &#8220;client_credenti=
als&#8221; is confusing<o:p></o:p></b></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The name client_credentials does not refer to the sa=
me concept as the uses of the term &#8220;Client Credentials&#8221; in 1.4.=
4 and other locations in the document.&nbsp; It would be far better to rena=
me this parameter &#8220;none&#8221; or &#8220;implicit&#8221;, to indicate
 that no explicit credentials are being passed in the protocol.&nbsp; It mi=
ght also clarify this concept if you added an example.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>7:&nbsp; Restore WWW-Authenticate Response Header=
 Field</b><o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Restore the WWW-Authenticate Response Header Field t=
hat was present in draft 11, section 6.2.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>10:&nbsp; Add OAuth Errors Registry<o:p></o:p></b=
></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Add the OAuth Errors Registry from the bearer token =
specification, draft 03, section 4.3, to the IANA Considerations.<o:p></o:p=
></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>10.2:&nbsp; Add parameter locations to OAuth Para=
meters Registry<o:p></o:p></b></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Add the &quot;resource request&quot; and &quot;resou=
rce response&quot; parameter locations, as defined in the bearer token spec=
ification, draft 03, section 4.2, to the OAuth Parameters Registry.<o:p></o=
:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>EDITORIAL FEEDBACK<o:p></o:p></b></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><b>1.2 item (D) : </b>&nbsp;&#8220;and if valid issu=
es a access token&#8221; -&gt; &#8220;and if valid, issues an access token =
and optional refresh token&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><b>1.3: </b>&nbsp;&#8220;an access token is a string=
&#8221; -&gt; &#8220;an access token is a string encoded&#8221;<o:p></o:p><=
/p>
<p class=3D"MsoNormal"><b>1.4.5:</b>&nbsp; &#8220;OAuth and other trust fra=
meworks&#8221; -&gt; &#8220;OAuth&#8221; &#8211; The term &#8220;trust fram=
ework&#8221; seems to have taken on a different meaning than this one these=
 days.<o:p></o:p></p>
<p class=3D"MsoNormal"><b>1.5:</b> &nbsp;&#8220;used to obtain a new access=
 token when the current access token expires&#8221; -&gt; &#8220;used to ob=
tain a new access token when the current access token is no longer valid&#8=
221;.&nbsp; &#8220;expires&#8221; is just one case.<o:p></o:p></p>
<p class=3D"MsoNormal"><b>1.5 item (F) : </b>&nbsp;&#8220;access token is i=
nvalid (expired)&#8221; -&gt; &#8220;access token is invalid (e.g., expired=
)&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><b>2.1.1: </b>&nbsp;&#8220;resource owner&#8217;s us=
er-agent&#8221; this may not be possible if the resource owner is a device =
or if the resource owner does not have a user agent<o:p></o:p></p>
<p class=3D"MsoNormal"><b>2.1.1:</b>&nbsp; &#8220;which MUST be retained&#8=
221; -&gt; &#8220;which MUST be preserved&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><b>2.2: </b>&nbsp;&#8220;The location of the token e=
ndpoint can be found in the service documentation&#8221; &#8211; There is n=
o service documentation; suggest that this just say &#8220;The location of =
the token endpoint discovery is out of scope of this document&#8221;<o:p></=
o:p></p>
<p class=3D"MsoNormal"><b>3:</b>&nbsp; &#8220;keeping their secrets confide=
ntial&#8221; -&gt; &#8220;keeping their credentials confidential&#8221;<o:p=
></o:p></p>
<p class=3D"MsoNormal"><b>4:</b>&nbsp; &#8220;which the client uses to requ=
esting the access&#8221; -&gt; &#8220;which the client uses to request the =
access&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><b>4.1:</b>&nbsp; &#8220;with the resource owner&#82=
17;s user-agent&#8221; this may not be possible if the resource owner is a =
device or if the resource owner does not have a user agent<o:p></o:p></p>
<p class=3D"MsoNormal"><b>4.1.1: </b>&nbsp;&#8220;parameters are present an=
d valid&#8221; &#8211; there are no processing requirements section to dete=
rmine what &#8220;valid&#8221; means; suggest that a processing section be =
added to understand what &#8220;valid&#8221; means otherwise remove the ref=
erences
 to &#8220;valid&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><b>4.1.3: </b>&nbsp;Usage of &#8220;verify&#8221; an=
d &#8220;validate&#8221;, should consistent. &#8220;Validate the client cre=
dentials and ensure they match the authorization code&#8221; this is mislea=
ding and should read &#8220;Validate the client credentials and ensure that=
 the authorization
 code given is authorized&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><b>4.1.4: </b>&nbsp;&#8220;the authorization server =
return&#8221; -&gt; &#8220;the authorization server returns&#8221;<o:p></o:=
p></p>
<p class=3D"MsoNormal"><b>4.1.2.1, 4.2.2, 4.2.2.1:</b>&nbsp; List REQUIRED =
parameters before OPTIONAL parameters.<o:p></o:p></p>
<p class=3D"MsoNormal"><b>4.2:</b>&nbsp; It&#8217;s unclear what the actual=
 meaning of &#8220;user-agent&#8217;s same-origin policy&#8221; really is a=
s there are many and I don&#8217;t think there is common agreement on this;=
 I suggest that the actual policy that we want be spelled out here in
 the document<o:p></o:p></p>
<p class=3D"MsoNormal"><b>4.2&nbsp; option (A) under figure 4:</b> &#8220;t=
he client includes its client identifier, requested scope&#8221; -&gt; &#82=
20;the client includes its client identifier, optional requested scope&#822=
1;<o:p></o:p></p>
<p class=3D"MsoNormal"><b>4.2.1:</b>&nbsp; &#8220;Due to lack of client aut=
hentication&#8221; &#8211; not sure what this is trying to get at here as t=
his is just a client id; nothing about its usage is called out, thus this s=
hould go in the Security Considerations section, not here
 in the main text<o:p></o:p></p>
<p class=3D"MsoNormal"><b>4.2.2:</b>&nbsp; &#8220;The clients SHOULD ignore=
 unrecognized&#8221; -&gt; &#8220;The clients SHOULD ignore undocumented re=
sponse&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><b>4.5:</b>&nbsp; Remove &#8220;I-D.ietf-oauth-saml2=
-bearer&#8221; until this becomes a standard<o:p></o:p></p>
<p class=3D"MsoNormal"><b>5.1:</b>&nbsp; &#8220;The parameters are included=
 in the entity body of the HTTP &#8230;.&#8221; &#8211; This should be a ne=
w generic section on JSON encoded responses<o:p></o:p></p>
<p class=3D"MsoNormal"><b>6: </b>&nbsp;Item #7 &#8220;has not expired and t=
hat its scope covers the requested resource&#8221; -&gt;&nbsp;&#8220;has no=
t expired and that the scope expressed is within the required scope of the =
requested resource&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><b>11.2: </b>&nbsp;remove references to &#8220;I-D.h=
ammer-oauth-v2-mac-token-02&#8221;, &#8220;I-D.ietf-oauth-v2-bearer-02&#822=
1;, &#8220;I-D.ietf-oauth-saml2-bearer-03&#8221; until these become standar=
ds<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739432529379FTK5EX14MBXC207r_--

From Michael.Jones@microsoft.com  Tue Mar 15 07:52:32 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0E9FA3A6D9F for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 07:52:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level: 
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MkBz3NPKDgPP for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 07:52:30 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 0AA023A6D91 for <oauth@ietf.org>; Tue, 15 Mar 2011 07:52:28 -0700 (PDT)
Received: from TK5EX14HUBC106.redmond.corp.microsoft.com (157.54.80.61) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Tue, 15 Mar 2011 07:53:53 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14HUBC106.redmond.corp.microsoft.com ([157.54.80.61]) with mapi id 14.01.0270.002; Tue, 15 Mar 2011 07:53:53 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, OAuth WG <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
Thread-Index: AQHL2LRDx1NZtUoMi0K94kqaj5UetJQukBmg
Date: Tue, 15 Mar 2011 14:53:53 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394325295552@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net>
In-Reply-To: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 14:52:32 -0000

This specification is ready to publish.

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of H=
annes Tschofenig
Sent: Wednesday, March 02, 2011 12:32 AM
To: OAuth WG
Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt

This is a Last Call for comments on=20

http://www.ietf.org/id/draft-ietf-oauth-v2-bearer-03.txt

Please have your comments in no later than March 25 (extended deadline beca=
use of the ongoing OAuth base specification WGLC).

Do remember to send a note in if you have read the document and have no oth=
er comments other than "its ready to go" - we need those as much as we need=
 "I found a problem".

Thanks!
Hannes & Blaine
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


From torsten@lodderstedt.net  Tue Mar 15 11:44:47 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DE8BE3A6B10; Tue, 15 Mar 2011 11:44:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.216
X-Spam-Level: 
X-Spam-Status: No, score=-2.216 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vq2GYxN42J+i; Tue, 15 Mar 2011 11:44:47 -0700 (PDT)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.94]) by core3.amsl.com (Postfix) with ESMTP id B87373A6E2C; Tue, 15 Mar 2011 11:44:46 -0700 (PDT)
Received: from [79.253.57.157] (helo=[192.168.71.49]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1PzZFx-0002rb-Ad; Tue, 15 Mar 2011 19:46:09 +0100
Message-ID: <4D7FB3F0.2000406@lodderstedt.net>
Date: Tue, 15 Mar 2011 19:46:08 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: stpeter@stpeter.im, Mark Mcgloin <mark.mcgloin@ie.ibm.com>
References: <20110311101506.74534cfncraei3gg@webmail.df.eu>	<B26C1EF377CB694EAB6BDDC8E624B6E707FB7CE7@SN1PRD0302MB097.namprd03.prod.outlook.com>	<4D7A4B3B.7090600@stpeter.im>	<4D7A6D8D.20408@alcatel-lucent.com>	<4D7A73BE.1000209@stpeter.im>	<4D7A8048.3060505@stpeter.im> <4D7AA098.5070207@alcatel-lucent.com> <OFFA5F931D.DEF51391-ON80257853.00322DFF-80257853.0032723D@ie.ibm.com>
In-Reply-To: <OFFA5F931D.DEF51391-ON80257853.00322DFF-80257853.0032723D@ie.ibm.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 18:44:48 -0000

Hi Peter,

Thursday is fine with me.

I'm also open to start the dicussion around the topic earlier in one of 
the beer halls Igor mentioned :-)

regards,
Torsten.

Am 14.03.2011 10:10, schrieb Mark Mcgloin:
> Can we rule out Friday afternoon as people will be getting return flights.
>
> I am trying to get approval at the moment but will definitely not be able
> to attend all week. If we are discussing security considerations, can we
> make Thursday the focus day - this does not mean it can't be discussed
> before that too
>
> thanks
> Mark McGloin
>
>
> oauth-bounces@ietf.org wrote on 11/03/2011 22:22:16:
>
>> Igor Faynberg<igor.faynberg@alcatel-lucent.com>
>> Sent by: oauth-bounces@ietf.org
>>
>> 11/03/2011 22:22
>>
>> Please respond to
>> igor.faynberg@alcatel-lucent.com
>>
>> To
>>
>> Peter Saint-Andre<stpeter@stpeter.im>
>>
>> cc
>>
>> OAuth WG<oauth@ietf.org>
>>
>> Subject
>>
>> Re: [OAUTH-WG] IETF-80
>>
>> Peter,
>>
>> First, thank you very much for being so responsive!
>>
>> My hope was that we could start much earlier than on Thursday, and I've
>> been trying to coax Torsten to arrive no later than Monday. He should
>> lead the security discussion, and the earlier that starts -- the
>> better...  (And there are many interesting and important things related
>> to IdM in both Applications and Security Area meetings.)
>>
>> In case there is any problem with the room, Just a thought. Prague has
>> been known for  basement beer halls divided into small walled
>> partitions--just perfect to fit the OAuth security interest group. In
>> the past 120 years or so those have been used for plotting major
>> revolutions, discussing and creating art, and--most recently--writing
>> Internet Drafts (i.e., the three major activities within the OAuth
> charter).
>> I think we would have no problem finding a partition to ourselves in
>> between or after the meetings. (We did  that a few years ago when the
>> IETF met in Prague.)
>>
>> Just a thought...
>>
>> Igor
>>
>>
>>
>> Peter Saint-Andre wrote:
>>> On 3/11/11 12:10 PM, Peter Saint-Andre wrote:
>>>
>>>> On 3/11/11 11:44 AM, Igor Faynberg wrote:
>>>>
>>>>> Peter,
>>>>>
>>>>> Could you please advertise the room when it is reserved?
>>>>>
>>>> Certainly.
>>>>
>>>> I'd appreciate it if those who want to join this working session could
>>>> speak up on the list so that I can assign a "point person" and so that
>>>> we can figure out how big a room we need (and when).
>>>>
>>> Based on discussion so far, probably it would be good to find a room
> for
>>> 5-10 people on Thursday afternoon or Friday afternoon. Torsten, when
>>> will you arrive?
>>>
>>> Peter
>>>
>>>
>>>
> ------------------------------------------------------------------------
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From torsten@lodderstedt.net  Tue Mar 15 12:42:37 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C73093A6B30 for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 12:42:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.217
X-Spam-Level: 
X-Spam-Status: No, score=-2.217 tagged_above=-999 required=5 tests=[AWL=0.032,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EwCxgTWWxBhB for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 12:42:37 -0700 (PDT)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.18.15]) by core3.amsl.com (Postfix) with ESMTP id 837EC3A6979 for <oauth@ietf.org>; Tue, 15 Mar 2011 12:42:36 -0700 (PDT)
Received: from [79.253.18.230] (helo=[192.168.71.26]) by smtprelay03.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Pza9w-0000nh-6S; Tue, 15 Mar 2011 20:44:00 +0100
Message-ID: <4D7FC17F.1050301@lodderstedt.net>
Date: Tue, 15 Mar 2011 20:43:59 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Marius Scurtescu <mscurtescu@google.com>
References: <AANLkTi=yvALug6xBkA4z=Rx1KEDsuVBAis5dbsaq-Xpx@mail.gmail.com>
In-Reply-To: <AANLkTi=yvALug6xBkA4z=Rx1KEDsuVBAis5dbsaq-Xpx@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Google launched OAuth 2 v10 support
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 19:42:37 -0000

Congratulation!

I've got some questions:
- do you support the token_type parameter for the revocation endpoint?
- where can one find a documentation of the native app support?
- what is your approach to native apps and client secrects?

regards,
Torsten.

Am 14.03.2011 20:35, schrieb Marius Scurtescu:
> The announcement:
> http://googlecode.blogspot.com/2011/03/making-auth-easier-oauth-20-for-google.html
>
> The documentation page:
> http://code.google.com/apis/accounts/docs/OAuth2.html
>
> Other than the core spec it implements:
> - revocation endpoint
> - native app support using oob and localhost (I still have to send a
> formal extension for this)
> - auto-approval, immediate mode and forced approval (these are experimental)
>
> Registration is required, anonymous mode not supported anymore.
>
> Feedback more than welcome.
>
> Thanks,
> Marius
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From hannes.tschofenig@gmx.net  Tue Mar 15 12:47:37 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2E28D3A6B30 for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 12:47:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zNy3lqmELLi0 for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 12:47:36 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.23]) by core3.amsl.com (Postfix) with SMTP id EEE793A6A8B for <oauth@ietf.org>; Tue, 15 Mar 2011 12:47:34 -0700 (PDT)
Received: (qmail invoked by alias); 15 Mar 2011 19:48:55 -0000
Received: from a88-115-222-204.elisa-laajakaista.fi (EHLO [192.168.1.3]) [88.115.222.204] by mail.gmx.net (mp015) with SMTP; 15 Mar 2011 20:48:55 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/WJOAN8mvW0NqZPcCa+aAyYW6Ocrhp/HTXMLUaS0 HoMLyNoymoFsb7
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <20110311101506.74534cfncraei3gg@webmail.df.eu>
Date: Tue, 15 Mar 2011 21:48:52 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <E58A7D48-4E17-44F4-901E-6DF928C5ED5A@gmx.net>
References: <20110311101506.74534cfncraei3gg@webmail.df.eu>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: Apple Mail (2.1082)
X-Y-GMX-Trusted: 0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 19:47:37 -0000

Hi Torsten,=20

I was wondering whether you care about the JSON security discussion that =
is also going to happen during the week. I think it is relevant for =
OAuth!
That session is on Monday.=20

Throughout the week there are plenty of security related activities.=20

Scheduling some time for OAuth security discussions (outside the working =
group session) is a good idea.=20
Depending on the number of people and your exact goals you can either go =
to a pub or I could serve the IAB room for you.=20

Ciao
Hannes

On Mar 11, 2011, at 11:15 AM, Torsten Lodderstedt wrote:

>=20
> Hi all,
>=20
> who of the WG will attend IETF-80 and during which days?
>=20
> I'm uncertain yet whether it makes sense to arrive before Friday as =
there is only a single OAuth session on this day. If others will be =
available earlier we could probably setup some discussion of topics of =
common interest, e.g. native apps.
>=20
> regards,
> Torsten.
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From torsten@lodderstedt.net  Tue Mar 15 12:49:23 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CB31A3A6E96 for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 12:49:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.218
X-Spam-Level: 
X-Spam-Status: No, score=-2.218 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jAuEtWYPRd0k for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 12:49:23 -0700 (PDT)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.98]) by core3.amsl.com (Postfix) with ESMTP id EE1FE3A6E95 for <oauth@ietf.org>; Tue, 15 Mar 2011 12:49:21 -0700 (PDT)
Received: from [79.253.18.230] (helo=[192.168.71.26]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1PzaGT-0005DF-J0; Tue, 15 Mar 2011 20:50:45 +0100
Message-ID: <4D7FC314.80905@lodderstedt.net>
Date: Tue, 15 Mar 2011 20:50:44 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: David Robinson <drobin1437@gmail.com>
References: <AANLkTim2xsMnu0waPMfu1nTtjQs8MRWXJX0-2=M2pFz7@mail.gmail.com>
In-Reply-To: <AANLkTim2xsMnu0waPMfu1nTtjQs8MRWXJX0-2=M2pFz7@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------090507030607060303010603"
X-Df-Sender: torsten@lodderstedt-online.de
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] draft-lodderstedt-oauth-revocation-02
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 19:49:23 -0000

This is a multi-part message in MIME format.
--------------090507030607060303010603
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Am 15.03.2011 14:34, schrieb David Robinson:
> Page 4 of the specification says:
> The client MUST NOT make any assumptions about the timing and MUST NOT 
> use the token again.
>
> In the case of a self-care portal mentioned in -  1.0 Introduction -  
> clients may not be aware that
> tokens have been revoked.  In that scenario is seems probable that 
> clients will try to use revoked tokens
> at least once.

that's correct. What would be your conclusion/proposal?

regards,
Torsten.

>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--------------090507030607060303010603
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#ffffff" text="#000000">
    Am 15.03.2011 14:34, schrieb David Robinson:
    <blockquote
      cite="mid:AANLkTim2xsMnu0waPMfu1nTtjQs8MRWXJX0-2=M2pFz7@mail.gmail.com"
      type="cite">Page 4 of the specification says:<br>
      The client MUST NOT make any assumptions about the timing and MUST
      NOT use the token again.<br>
      <br>
      In the case of a self-care portal mentioned in -&nbsp; 1.0 Introduction
      -&nbsp; clients may not be aware that<br>
      tokens have been revoked.&nbsp; In that scenario is seems probable that
      clients will try to use revoked tokens<br>
      at least once.<br>
    </blockquote>
    <br>
    that's correct. What would be your conclusion/proposal?<br>
    <br>
    regards,<br>
    Torsten.<br>
    <br>
    <blockquote
      cite="mid:AANLkTim2xsMnu0waPMfu1nTtjQs8MRWXJX0-2=M2pFz7@mail.gmail.com"
      type="cite"><br>
      <br>
      <pre wrap="">
<fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
  </body>
</html>

--------------090507030607060303010603--

From hannes.tschofenig@gmx.net  Tue Mar 15 12:51:29 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EA5D63A6EA8 for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 12:51:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g4ARQyIxcMts for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 12:51:27 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.22]) by core3.amsl.com (Postfix) with SMTP id 223A23A6E9D for <oauth@ietf.org>; Tue, 15 Mar 2011 12:51:26 -0700 (PDT)
Received: (qmail invoked by alias); 15 Mar 2011 19:52:51 -0000
Received: from a88-115-222-204.elisa-laajakaista.fi (EHLO [192.168.1.3]) [88.115.222.204] by mail.gmx.net (mp066) with SMTP; 15 Mar 2011 20:52:51 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/AvPc6zmLARBXKutvHA85nag+QwmSATLRLHeCZ2v JsObZTcz3S3pSR
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <E56AB32F-240F-49DB-B545-A0E574004AD9@gmx.net>
Date: Tue, 15 Mar 2011 21:52:45 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <C1699604-3FB3-40E1-B4D6-4885D3CD69C5@gmx.net>
References: <E56AB32F-240F-49DB-B545-A0E574004AD9@gmx.net>
To: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
X-Mailer: Apple Mail (2.1082)
X-Y-GMX-Trusted: 0
Cc: OAuth WG <oauth@ietf.org>
Subject: [OAUTH-WG] Reminder: Prague IETF Meeting: Soliciting OAuth WG Presentations
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 19:51:29 -0000

A reminder to send me your presentation request.=20

On Mar 14, 2011, at 9:13 AM, Hannes Tschofenig wrote:

> Hi all,=20
>=20
> the IETF meeting in Prague is just around the corner and we need to =
put the agenda for the face-to-face meeting together.=20
> If you plan to give a presentation please drop us a mail ASAP.
>=20
> Ciao
> Hannes & Blaine
>=20


From Michael.Jones@microsoft.com  Tue Mar 15 13:15:35 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AB89E3A6B82 for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 13:15:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level: 
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1ZM-TSEduhhX for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 13:15:34 -0700 (PDT)
Received: from smtp.microsoft.com (mailb.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id ED1643A6EA1 for <oauth@ietf.org>; Tue, 15 Mar 2011 13:15:33 -0700 (PDT)
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (157.54.79.174) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Tue, 15 Mar 2011 13:16:58 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.01.0270.002; Tue, 15 Mar 2011 13:16:58 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AQHL4p25BoQvJnGGFEy781EVhANmb5QteMaQgACQ+ICAAAdWgIAAxFqg
Date: Tue, 15 Mar 2011 20:16:57 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739432529634C@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTikfr31SsQ=PsZ1Oc2eqDJhTb2NZoVz9Q5OP-t7p@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394325293E36@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTiksipC4mSJO0yuDJQXpUx+v2FmbQ-zy+egoMnSb@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234464F3379F5@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F3379F5@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.79]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 20:15:35 -0000

Per the previous discussions, the use case is enabling OAuth specifications=
 to be able to extend the set of interoperable error codes.  Use of an IANA=
 registry for this purpose is standard IETF practice.  (To see *lots* of ot=
her examples of this in practice, go to http://www.iana.org/protocols/ and =
search for "error".)

One non-hypothetical motivating example is extending the set of errors in 4=
.2.2.1 to add an "insufficient_scope" error to indicate that the request is=
 valid but requires higher privileges than currently held by the caller.  T=
his is different than "invalid_scope".

Another possible error code that is meaningful and actionable in some conte=
xts is "please_retry", indicating that this same request may succeed later =
if retried.  Services may return this when out of resources or during initi=
alization.

Given that we all intend OAuth to be a building block for a family of relat=
ed protocols and for new services, it would be presumptive of us to assert =
that we've identified of all the actionable error conditions up front.  Thi=
s is exactly parallel to the argument for the OAuth Parameters registry, wh=
ich does exist.

The IETF has a straightforward mechanism and for extending parameter spaces=
 in an orderly way.   I believe that we'll best serve those building new pr=
otocols and services on top of OAuth by using it!

				Cheers,
				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of E=
ran Hammer-Lahav
Sent: Monday, March 14, 2011 6:30 PM
To: David Recordon
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline F=
riday, March 18

It's a clear example of defining facilities without *ANY* use cases or requ=
irements.

We have clear use cases and actual registration requests for the current re=
gistries defined in v2.

What's most annoying about this entire push for an error registry is that t=
he author and supporters have all failed to show a single example of an act=
ual value to be registered. I don't think I'm asking for much.

Registries must be held to the same level of adoption as any other part of =
the protocol. If a feature is not being use by the time the document is fin=
alized, it MUST NOT be included and left out. Otherwise, this is pure astro=
naut architecture and design by committee.

As for the reference to the editorial comment in draft 11 - there were othe=
r such notes in part drafts which were simply removed without addressing th=
roughout the process. This registry is new, and is baseless. An important p=
art of our process is weeding out what is not necessary, and an error regis=
try clearly fails to meet this standard.

This entire thread should be stopped until someone can offer clear use case=
s and requirements. Otherwise, this is a joke.

EHL



> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf=20
> Of David Recordon
> Sent: Monday, March 14, 2011 6:04 PM
> To: Mike Jones
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry,=20
> deadline Friday, March 18
>=20
> Has anyone extended error codes? Is there a list of error codes=20
> currently being used in the wild that need standardizing?
>=20
> --David
>=20
>=20
> On Mon, Mar 14, 2011 at 11:28 PM, Mike Jones=20
> <Michael.Jones@microsoft.com> wrote:
> > This is not new. =A0This is meeting the need expressed in draft 10,=20
> > Section
> 3.2.1 and draft 11, Section 4.3.1 as "[[ Add mechanism for extending=20
> error codes ]]".
> >
> > It's there to provide a coordination mechanism among OAuth-related
> specifications so that different specs use the same errors for the same t=
hing.
> >
> > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0-- Mike
> >
> > -----Original Message-----
> > From: David Recordon [mailto:recordond@gmail.com]
> > Sent: Monday, March 14, 2011 4:15 PM
> > To: Mike Jones
> > Cc: oauth@ietf.org
> > Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry,=20
> > deadline Friday, March 18
> >
> > I still haven't seen an explanation of what this registry=20
> > accomplishes or why
> it's become needed in the past few weeks.
> >
> > --David
> >
> >
> > On Fri, Mar 11, 2011 at 11:04 PM, Mike Jones
> <Michael.Jones@microsoft.com> wrote:
> >> As you know, the OAuth 2.0 Bearer Token draft -03 established the=20
> >> OAuth Errors Registry to increase interoperability among=20
> >> implementations using the related OAuth specifications.=A0 As you=20
> >> also know, there has been some discussion about whether:
> >>
> >>
> >>
> >> A)=A0 The OAuth Errors Registry belongs in in the Framework=20
> >> specification rather than the bearer token specification,
> >>
> >> B)=A0 The OAuth Errors Registry should continue to be defined in the=20
> >> Bearer Token specification and apply to all OAuth specifications,
> >>
> >> C)=A0 The OAuth Errors Registry should reside in the Bearer Token=20
> >> specification but be scoped back to only apply to that=20
> >> specification, or
> >>
> >> D)=A0 The OAuth Errors Registry should be deleted because the set of=20
> >> errors should not be extensible.
> >>
> >>
> >>
> >> Please vote for A, B, C, or D by Friday, March 18th.
> >>
> >>
> >>
> >> I personally believe that A makes the most sense, but given that=20
> >> other points of view have also been voiced, this consensus call is=20
> >> needed to resolve the issue.
> >>
> >>
> >>
> >>
> >> Cheers,
> >>
> >> =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 --=20
> >> Mike
> >>
> >>
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >>
> >>
> >
> >
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


From igor.faynberg@alcatel-lucent.com  Tue Mar 15 13:27:32 2011
Return-Path: <igor.faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8E5C63A6E44 for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 13:27:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fXau-tBD6cNk for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 13:27:31 -0700 (PDT)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by core3.amsl.com (Postfix) with ESMTP id 65D453A6E7B for <oauth@ietf.org>; Tue, 15 Mar 2011 13:27:31 -0700 (PDT)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id p2FKSraa028596 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 15 Mar 2011 15:28:53 -0500 (CDT)
Received: from [135.244.8.99] (faynberg.lra.lucent.com [135.244.8.99] (may be forged)) by umail.lucent.com (8.13.8/TPES) with ESMTP id p2FKSqcX026578; Tue, 15 Mar 2011 15:28:52 -0500 (CDT)
Message-ID: <4D7FCC04.8010405@alcatel-lucent.com>
Date: Tue, 15 Mar 2011 16:28:52 -0400
From: Igor Faynberg <igor.faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <20110311101506.74534cfncraei3gg@webmail.df.eu> <E58A7D48-4E17-44F4-901E-6DF928C5ED5A@gmx.net>
In-Reply-To: <E58A7D48-4E17-44F4-901E-6DF928C5ED5A@gmx.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] IETF-80
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: igor.faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 20:27:32 -0000

This made me recall  a formula from a middle-school textbook on physics 
or something:

(IAB/I)*P = PAB.

Hint: I think in that Hilton they deliver beer to any room.

Igor



Hannes Tschofenig wrote:
> ...
> Depending on the number of people and your exact goals you can either go to a pub or I could serve the IAB room for you. 
>
>   
>

From eran@hueniverse.com  Tue Mar 15 14:13:56 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E25B03A6B83 for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 14:13:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.561
X-Spam-Level: 
X-Spam-Status: No, score=-2.561 tagged_above=-999 required=5 tests=[AWL=0.038,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xtPOr1oJT49n for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 14:13:55 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 56D553A6B70 for <oauth@ietf.org>; Tue, 15 Mar 2011 14:13:55 -0700 (PDT)
Received: (qmail 5881 invoked from network); 15 Mar 2011 21:14:09 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 15 Mar 2011 21:14:08 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Tue, 15 Mar 2011 14:13:57 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Mike Jones <Michael.Jones@microsoft.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Tue, 15 Mar 2011 14:13:52 -0700
Thread-Topic: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AQHL4p25BoQvJnGGFEy781EVhANmb5QteMaQgACQ+ICAAAdWgIAAxFqggAAH+oA=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F432442@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTikfr31SsQ=PsZ1Oc2eqDJhTb2NZoVz9Q5OP-t7p@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394325293E36@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTiksipC4mSJO0yuDJQXpUx+v2FmbQ-zy+egoMnSb@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234464F3379F5@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4E1F6AAD24975D4BA5B16804296739432529634C@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432529634C@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 21:13:57 -0000

Thank you.

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Mike Jones
> Sent: Tuesday, March 15, 2011 1:17 PM

> Per the previous discussions, the use case is enabling OAuth specificatio=
ns to
> be able to extend the set of interoperable error codes.  Use of an IANA
> registry for this purpose is standard IETF practice.  (To see *lots* of o=
ther
> examples of this in practice, go to http://www.iana.org/protocols/ and
> search for "error".)

A registry is *one* possible solution for extensibility. Once the requireme=
nts are established we can pick the most appropriate solution.
=20
> One non-hypothetical motivating example is extending the set of errors in
> 4.2.2.1 to add an "insufficient_scope" error to indicate that the request=
 is
> valid but requires higher privileges than currently held by the caller.  =
This is
> different than "invalid_scope".

Insufficient scope is only applicable when making protected resource reques=
ts. Since v2 doesn't address how to make authenticated requests and does no=
t define error codes for that case, such an error code is irrelevant. The M=
AC scheme does not use error codes at all as existing HTTP status codes ful=
ly cover every error case. I would be surprised if the bearer token scheme =
cannot do the same.

> Another possible error code that is meaningful and actionable in some
> contexts is "please_retry", indicating that this same request may succeed
> later if retried.  Services may return this when out of resources or duri=
ng
> initialization.

HTTP 503 Service Unavailable covers this and is the appropriate method to r=
eturn such information.

> Given that we all intend OAuth to be a building block for a family of rel=
ated
> protocols and for new services, it would be presumptive of us to assert t=
hat
> we've identified of all the actionable error conditions up front.  This i=
s exactly
> parallel to the argument for the OAuth Parameters registry, which does ex=
ist.

We have reviewed the document for over a year and came up with a comprehens=
ive error response list for the endpoint defined within the specification.

However, here is an example use case...

Other specifications extending v2 can define additional error codes if nece=
ssary. For example, the UX extension adds a 'display' parameter to the auth=
orization endpoint which can result in an 'unknown_display' error. However,=
 such an error is only valuable if the client has a way to correct the requ=
est and try again, which is something the UX extension will need to address=
 if defining such an error code. It would be helpful to hear from the UX au=
thors how to intend to address errors related to their new parameters.

> The IETF has a straightforward mechanism and for extending parameter
> spaces in an orderly way.   I believe that we'll best serve those buildin=
g new
> protocols and services on top of OAuth by using it!

As for the registry solution, a registry is not the only route for addressi=
ng such a case. Extensions can use error URIs (which is something *we* have=
 opted to do for extension grant types, instead of using a registry). Addit=
ionally, such extensions can simply 'update the v2 RFC' to include an addit=
ional error code.

A registry does not help or improve interoperability if the client is not a=
ware of the extension and is constantly updated with new registry values (o=
r whatever the extension policy requires). Using error URI codes is much si=
mpler, consistent with the specification, and something I would be supporti=
ve of adding via a simple sentence to -13 saying that additional error code=
s may be defined and must be absolute URIs.

I am still not convinced we need to address error code extensibility, but g=
iven my use case example above, I would be open for allowing URI error code=
s. Any reason why using URI as error code isn't sufficient (please present =
new use cases for such requirements)?

EHL
=20

>=20
> 				Cheers,
> 				-- Mike
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Eran Hammer-Lahav
> Sent: Monday, March 14, 2011 6:30 PM
> To: David Recordon
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline
> Friday, March 18
>=20
> It's a clear example of defining facilities without *ANY* use cases or
> requirements.
>=20
> We have clear use cases and actual registration requests for the current
> registries defined in v2.
>=20
> What's most annoying about this entire push for an error registry is that=
 the
> author and supporters have all failed to show a single example of an actu=
al
> value to be registered. I don't think I'm asking for much.
>=20
> Registries must be held to the same level of adoption as any other part o=
f the
> protocol. If a feature is not being use by the time the document is final=
ized, it
> MUST NOT be included and left out. Otherwise, this is pure astronaut
> architecture and design by committee.
>=20
> As for the reference to the editorial comment in draft 11 - there were ot=
her
> such notes in part drafts which were simply removed without addressing
> throughout the process. This registry is new, and is baseless. An importa=
nt
> part of our process is weeding out what is not necessary, and an error
> registry clearly fails to meet this standard.
>=20
> This entire thread should be stopped until someone can offer clear use ca=
ses
> and requirements. Otherwise, this is a joke.
>=20
> EHL
>=20
>=20
>=20
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > Of David Recordon
> > Sent: Monday, March 14, 2011 6:04 PM
> > To: Mike Jones
> > Cc: oauth@ietf.org
> > Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry,
> > deadline Friday, March 18
> >
> > Has anyone extended error codes? Is there a list of error codes
> > currently being used in the wild that need standardizing?
> >
> > --David
> >
> >
> > On Mon, Mar 14, 2011 at 11:28 PM, Mike Jones
> > <Michael.Jones@microsoft.com> wrote:
> > > This is not new. =A0This is meeting the need expressed in draft 10,
> > > Section
> > 3.2.1 and draft 11, Section 4.3.1 as "[[ Add mechanism for extending
> > error codes ]]".
> > >
> > > It's there to provide a coordination mechanism among OAuth-related
> > specifications so that different specs use the same errors for the same
> thing.
> > >
> > > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0-- Mik=
e
> > >
> > > -----Original Message-----
> > > From: David Recordon [mailto:recordond@gmail.com]
> > > Sent: Monday, March 14, 2011 4:15 PM
> > > To: Mike Jones
> > > Cc: oauth@ietf.org
> > > Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry,
> > > deadline Friday, March 18
> > >
> > > I still haven't seen an explanation of what this registry
> > > accomplishes or why
> > it's become needed in the past few weeks.
> > >
> > > --David
> > >
> > >
> > > On Fri, Mar 11, 2011 at 11:04 PM, Mike Jones
> > <Michael.Jones@microsoft.com> wrote:
> > >> As you know, the OAuth 2.0 Bearer Token draft -03 established the
> > >> OAuth Errors Registry to increase interoperability among
> > >> implementations using the related OAuth specifications.=A0 As you
> > >> also know, there has been some discussion about whether:
> > >>
> > >>
> > >>
> > >> A)=A0 The OAuth Errors Registry belongs in in the Framework
> > >> specification rather than the bearer token specification,
> > >>
> > >> B)=A0 The OAuth Errors Registry should continue to be defined in the
> > >> Bearer Token specification and apply to all OAuth specifications,
> > >>
> > >> C)=A0 The OAuth Errors Registry should reside in the Bearer Token
> > >> specification but be scoped back to only apply to that
> > >> specification, or
> > >>
> > >> D)=A0 The OAuth Errors Registry should be deleted because the set of
> > >> errors should not be extensible.
> > >>
> > >>
> > >>
> > >> Please vote for A, B, C, or D by Friday, March 18th.
> > >>
> > >>
> > >>
> > >> I personally believe that A makes the most sense, but given that
> > >> other points of view have also been voiced, this consensus call is
> > >> needed to resolve the issue.
> > >>
> > >>
> > >>
> > >>
> > >> Cheers,
> > >>
> > >> =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 --
> > >> Mike
> > >>
> > >>
> > >>
> > >> _______________________________________________
> > >> OAuth mailing list
> > >> OAuth@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/oauth
> > >>
> > >>
> > >
> > >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From jricher@mitre.org  Tue Mar 15 14:36:51 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DBBDE3A6EAC for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 14:36:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.566
X-Spam-Level: 
X-Spam-Status: No, score=-2.566 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n6yNDaieAvUD for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 14:36:49 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 6C6773A6E9D for <oauth@ietf.org>; Tue, 15 Mar 2011 14:36:49 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 951C021B0D9A; Tue, 15 Mar 2011 17:38:09 -0400 (EDT)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 8E3A521B0C74; Tue, 15 Mar 2011 17:38:09 -0400 (EDT)
Received: from [129.83.50.23] (129.83.50.23) by imchub2.MITRE.ORG (129.83.29.74) with Microsoft SMTP Server id 8.2.254.0; Tue, 15 Mar 2011 17:38:09 -0400
From: Justin Richer <jricher@mitre.org>
To: Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F432442@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTikfr31SsQ=PsZ1Oc2eqDJhTb2NZoVz9Q5OP-t7p@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394325293E36@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTiksipC4mSJO0yuDJQXpUx+v2FmbQ-zy+egoMnSb@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234464F3379F5@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4E1F6AAD24975D4BA5B16804296739432529634C@TK5EX14MBXC207.redmond.corp.microsoft.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432442@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset="UTF-8"
Date: Tue, 15 Mar 2011 17:37:44 -0400
Message-ID: <1300225064.1937.9.camel@ground>
MIME-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 7bit
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 21:36:51 -0000

Other use cases include the encoding extensions (such as the XML one,
and if anyone gets around to it, the form-encoded one) and a "format not
supported" error. Having a standard set of oauth errors on the protected
resource is a good idea. That said:

> I am still not convinced we need to address error code extensibility, but given my use case example above, I would be open for allowing URI error codes. Any reason why using URI as error code isn't sufficient (please present new use cases for such requirements)?

Like I said in a previous email, I'm happy with it being a uri-based
extension, like grant_type. I still think there's value in structuring
what the short codes are, and I think we need *some* kind of
extensibility and a way to make sure that errors don't come from
different spaces with the same code and mean different things. I don't
particularly care what the exact extension mechanism for this is so long
as there's an accepted way to get new stuff in there without stomping on
other things.

I disagree that the errors are all about the client being able to
automatically do something about them -- they're just as useful to push
up the stack to developers. Regardless, if it's an accepted practice
that other RFCs can simply "update the Oauth2 RFC" document without the
use of a registry, and that we can permit some kind of namespacing for
non-registered names (ie, use URIs), then we're probably covering our
bases.

 -- Justin

> EHL
> 
> 
> >
> >                               Cheers,
> >                               -- Mike
> >
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > Of Eran Hammer-Lahav
> > Sent: Monday, March 14, 2011 6:30 PM
> > To: David Recordon
> > Cc: oauth@ietf.org
> > Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline
> > Friday, March 18
> >
> > It's a clear example of defining facilities without *ANY* use cases or
> > requirements.
> >
> > We have clear use cases and actual registration requests for the current
> > registries defined in v2.
> >
> > What's most annoying about this entire push for an error registry is that the
> > author and supporters have all failed to show a single example of an actual
> > value to be registered. I don't think I'm asking for much.
> >
> > Registries must be held to the same level of adoption as any other part of the
> > protocol. If a feature is not being use by the time the document is finalized, it
> > MUST NOT be included and left out. Otherwise, this is pure astronaut
> > architecture and design by committee.
> >
> > As for the reference to the editorial comment in draft 11 - there were other
> > such notes in part drafts which were simply removed without addressing
> > throughout the process. This registry is new, and is baseless. An important
> > part of our process is weeding out what is not necessary, and an error
> > registry clearly fails to meet this standard.
> >
> > This entire thread should be stopped until someone can offer clear use cases
> > and requirements. Otherwise, this is a joke.
> >
> > EHL
> >
> >
> >
> > > -----Original Message-----
> > > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > > Of David Recordon
> > > Sent: Monday, March 14, 2011 6:04 PM
> > > To: Mike Jones
> > > Cc: oauth@ietf.org
> > > Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry,
> > > deadline Friday, March 18
> > >
> > > Has anyone extended error codes? Is there a list of error codes
> > > currently being used in the wild that need standardizing?
> > >
> > > --David
> > >
> > >
> > > On Mon, Mar 14, 2011 at 11:28 PM, Mike Jones
> > > <Michael.Jones@microsoft.com> wrote:
> > > > This is not new.  This is meeting the need expressed in draft 10,
> > > > Section
> > > 3.2.1 and draft 11, Section 4.3.1 as "[[ Add mechanism for extending
> > > error codes ]]".
> > > >
> > > > It's there to provide a coordination mechanism among OAuth-related
> > > specifications so that different specs use the same errors for the same
> > thing.
> > > >
> > > >                                -- Mike
> > > >
> > > > -----Original Message-----
> > > > From: David Recordon [mailto:recordond@gmail.com]
> > > > Sent: Monday, March 14, 2011 4:15 PM
> > > > To: Mike Jones
> > > > Cc: oauth@ietf.org
> > > > Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry,
> > > > deadline Friday, March 18
> > > >
> > > > I still haven't seen an explanation of what this registry
> > > > accomplishes or why
> > > it's become needed in the past few weeks.
> > > >
> > > > --David
> > > >
> > > >
> > > > On Fri, Mar 11, 2011 at 11:04 PM, Mike Jones
> > > <Michael.Jones@microsoft.com> wrote:
> > > >> As you know, the OAuth 2.0 Bearer Token draft -03 established the
> > > >> OAuth Errors Registry to increase interoperability among
> > > >> implementations using the related OAuth specifications.  As you
> > > >> also know, there has been some discussion about whether:
> > > >>
> > > >>
> > > >>
> > > >> A)  The OAuth Errors Registry belongs in in the Framework
> > > >> specification rather than the bearer token specification,
> > > >>
> > > >> B)  The OAuth Errors Registry should continue to be defined in the
> > > >> Bearer Token specification and apply to all OAuth specifications,
> > > >>
> > > >> C)  The OAuth Errors Registry should reside in the Bearer Token
> > > >> specification but be scoped back to only apply to that
> > > >> specification, or
> > > >>
> > > >> D)  The OAuth Errors Registry should be deleted because the set of
> > > >> errors should not be extensible.
> > > >>
> > > >>
> > > >>
> > > >> Please vote for A, B, C, or D by Friday, March 18th.
> > > >>
> > > >>
> > > >>
> > > >> I personally believe that A makes the most sense, but given that
> > > >> other points of view have also been voiced, this consensus call is
> > > >> needed to resolve the issue.
> > > >>
> > > >>
> > > >>
> > > >>
> > > >> Cheers,
> > > >>
> > > >>                                                                 --
> > > >> Mike
> > > >>
> > > >>
> > > >>
> > > >> _______________________________________________
> > > >> OAuth mailing list
> > > >> OAuth@ietf.org
> > > >> https://www.ietf.org/mailman/listinfo/oauth
> > > >>
> > > >>
> > > >
> > > >
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From eran@hueniverse.com  Tue Mar 15 14:46:49 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 288A73A6EEA for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 14:46:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.562
X-Spam-Level: 
X-Spam-Status: No, score=-2.562 tagged_above=-999 required=5 tests=[AWL=0.037,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q77WF5A5Ihls for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 14:46:48 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 59CDD3A6E9D for <oauth@ietf.org>; Tue, 15 Mar 2011 14:46:48 -0700 (PDT)
Received: (qmail 11102 invoked from network); 15 Mar 2011 21:48:12 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 15 Mar 2011 21:48:12 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Tue, 15 Mar 2011 14:48:06 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Justin Richer <jricher@mitre.org>
Date: Tue, 15 Mar 2011 14:47:48 -0700
Thread-Topic: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
Thread-Index: AcvjWUhNWhg8lc6USFGx1VYkZmsSeAAAMrgA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F432451@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432528F007@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTikfr31SsQ=PsZ1Oc2eqDJhTb2NZoVz9Q5OP-t7p@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394325293E36@TK5EX14MBXC207.redmond.corp.microsoft.com> <AANLkTiksipC4mSJO0yuDJQXpUx+v2FmbQ-zy+egoMnSb@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234464F3379F5@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4E1F6AAD24975D4BA5B16804296739432529634C@TK5EX14MBXC207.redmond.corp.microsoft.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432442@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1300225064.1937.9.camel@ground>
In-Reply-To: <1300225064.1937.9.camel@ground>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Vote: Location of OAuth Errors Registry, deadline Friday, March 18
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 21:46:49 -0000
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From tim.freeman@hp.com  Tue Mar 15 14:55:25 2011
Return-Path: <tim.freeman@hp.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9944A3A6E9A for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 14:55:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -109.959
X-Spam-Level: 
X-Spam-Status: No, score=-109.959 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, SARE_OBFU_PART_ICR=0.64, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3J40jPHEaool for <oauth@core3.amsl.com>; Tue, 15 Mar 2011 14:55:24 -0700 (PDT)
Received: from g4t0016.houston.hp.com (g4t0016.houston.hp.com [15.201.24.19]) by core3.amsl.com (Postfix) with ESMTP id 351AF3A6BAC for <oauth@ietf.org>; Tue, 15 Mar 2011 14:55:24 -0700 (PDT)
Received: from G6W0641.americas.hpqcorp.net (g6w0641.atlanta.hp.com [16.230.34.77]) (using TLSv1 with cipher RC4-MD5 (128/128 bits)) (No client certificate requested) by g4t0016.houston.hp.com (Postfix) with ESMTPS id 8C62E1465E for <oauth@ietf.org>; Tue, 15 Mar 2011 21:56:49 +0000 (UTC)
Received: from G4W0659.americas.hpqcorp.net (16.234.40.187) by G6W0641.americas.hpqcorp.net (16.230.34.77) with Microsoft SMTP Server (TLS) id 8.2.176.0; Tue, 15 Mar 2011 21:56:26 +0000
Received: from GVW0432EXB.americas.hpqcorp.net ([16.234.32.145]) by G4W0659.americas.hpqcorp.net ([16.234.40.187]) with mapi; Tue, 15 Mar 2011 21:56:26 +0000
From: "Freeman, Tim" <tim.freeman@hp.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Tue, 15 Mar 2011 21:56:23 +0000
Thread-Topic: Feedback on draft-ieft-oauth-v2-13.txt
Thread-Index: AcvjW9M3Qju0javhRxG3cWlQdEgu4A==
Message-ID: <59DD1BA8FD3C0F4C90771C18F2B5B53A6542CFF4BF@GVW0432EXB.americas.hpqcorp.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [OAUTH-WG] Feedback on draft-ieft-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2011 21:55:25 -0000

Hi, I've been out of this for a while working on something else.  To get ba=
ck
in, I read through the latest draft and have some feedback.  The fact that =
I've
been paying attention to other things for a while means my feedback has a
different slant from that of people who have been engaged.  On the one hand=
,
I'm can more easily see terms that are not defined before they are used, si=
nce
I don't remember what they mean.  On the other hand, my feedback might be w=
rong
in ways that have been talked to death in the 719 recent emails to the oaut=
h
mailing list that I haven't yet read.  Thus, be sure not to spend much effo=
rt
skipping over redundant junk.  For what it's worth, here are my notes.

Tim Freeman
Email: tim.freeman@hp.com
Desk in Palo Alto: (650) 857-2581
Home: (408) 774-1298
Cell: (408) 348-7536

Section 1.4, Authorization Grant: They're intermediate credentials represen=
ting
the resource owner authorization.  What's a resource owner authorization?
If it's the resource owner's authorization to do something, it might be goo=
d to
say what the something is.

I had to read ahead a bit to figure out that authorization codes are
authorization grants.  Section 1.4 before the beginning of section 1.4.1 sh=
ould
say that the subsequent subsections describe a variety of types of
authorization grants.

Section 1.4.2. "user-agent" is used without first being defined.  I suppose
that in practice it means "browser", but you didn't use the word "browser" =
so I
suppose you had some other possible user agents in mind.  Examples would be
helpful.

Section 2, "Protocol endpoints".  The word "endpoint" is used without first
being defined.  Using it in the section title is fine, but the reader has t=
o
start guessing a meaning at "The authorization process utilizes two
endpoints:".  In section 2.1 you assume that endpoints have URI's; since
"endpoint" is undefined, it's unclear whether that assumption is warranted.

Section 2.1.1, "Redirection URI".  "If a redirection URI was registered, th=
e
authorization server MUST compare any redirection URI received at the
authorization endpoint with the registered URI."  Section 2.1 says the
authorization endpoint is where the user (presumably also the resource owne=
r,
using the user-agent) interacts with the authorization server.  Therefore, =
I
conclude that the communication path between the client and the authorizati=
on
server in figure 3 does not happen by the authorization endpoint, since the
client is not the user.  I suspect it's the token endpoint, since there's a
token in Figure 3 step E.  (If that's wrong, section 2.1 needs to be change=
d to
say that the client uses the authorization endpoint too.)  Section 2.1.1 sa=
ys
"If a redirection URI was registered, the authorization server MUST compare=
 any
redirection URI received at the authorization endpoint with the registered
URI."  Thus I conclude that that phrase requires the authorization server t=
o
check the redirection URI at step A of figure 3, but not step D, since that
communication comes from the client instead of the user and therefore is no=
t
going to the authorization endpoint.  If there is no requirement to check t=
he
redirection URI in step D, it's unclear why it's there.

Section 3 "Client Authentication".  I think the intent is that client
identifiers are public, since they are disclosed to the user-agent in secti=
on
4.1, "Authorization Code".  You might want to say so, otherwise one might
reason that clients are required to publish their client identifiers (in
section 4.1), and client identifiers are part of the client credentials
(section 3), no clients can keep their credentials confidential, so no
authorization servers should issue client credentials to any clients. =20
Perhaps client identifiers are not part of the client credentials?

Section 4, "Obtaining Authorization".  Change "requesting" to "request" in =
"The
authorization is expressed in the form of an authorization grant which the
client uses to requesting the access token."

Figure 3 in section 4.1.  "User authenticates" is a two-way communication
because the authorization server will typically prompt the user to authenti=
cate,
but the arrow only points from user-agent to authorization server, so there=
 is
no opportunity to prompt.  I think you want arrows pointing in both directi=
ons
on the "User authenticates" path.

Figure 3 says that communication D from the client to authorization server
includes the redirect URI, but the text for communication D does not say th=
at.
We should get clear on whether the redirect URI is public or not.  If it's
public, and the client, all possible entities wishing to impersonate the
client, and the authorization server all know it, then there's no value in
communicating it from the client to the authorization server.  If it's priv=
ate,
that should be specified when the redirection URI is introduced at step A, =
and
the alternative of omitting it because it's common knowledge to the client =
and
the authentication server (in section 2.1.1, first paragraph) goes away sin=
ce
it's disclosed to (possibly adversarial) user agents in Figure 3, step A.

Figure 3 step B: You'll need to make clear that if the resource owner is a
human, there will be a need to uniquely identify the client and the request=
ed
resource in a human-readable way.  For example, if the actual client is
"Microsoft, Inc.", and I am able to register a client "M1crosoft, Inc.", an=
d
humans in practice cannot distinguish "Microsoft" from "M1crosoft", people
might give my client authorizations that they intended to give to Microsoft=
. =20

I can imagine using social engineering to leave the user in the middle of o=
ne
OAuth exchange while they start another in another window, and if popup win=
dows
are used for interacting with the user while authenticating, they might
authenticate the wrong client.  In other words, the rhythm of the interacti=
on
is not a reliable cue to tell a human which client he's authenticating to, =
so
the human-readable name of the client must be unambiguously stated on the
screen when the user is accepting or denying the authorization.

The human-readable name corresponding to a client id has to come from a
database on the authorization server, since the client cannot be trusted to
provide it.

A similar scenario can be created where imperfect human reading comprehensi=
on
can cause authentication to the wrong resource, if the operators of the
authorization server allow arbitrary names for resources.

Figure 3 step C: The redirection URI also has to include the client's state=
, if
the client specified state in step A, right?  Otherwise the client doesn't =
get
the state and the state cannot fulfill its function of disambiguating
concurrent requests.

Figure 3 step E: The description does not mention that the redirect URI is =
part
of the information being validated, but it is offered as input to the proce=
ss
in step D.  You should say in the description of E what that input is used =
for.

Section 4.1.3: At the end of this section, you say the authorization server
much check that the redirection URI matches the redirection URI used by the
authorization server to deliver the authorization code.  This should be
mentioned at step D of figure 3.  The scenario where you lose if check is n=
ot
done should be stated, since it's not obvious.

I skipped sections 4.2, 4.3, and 4.4, since that's not the kind of
authorization I need to do.

Section 9: "Security Considerations" are TBD?  Okay, on reviewing the
announcement, this version wasn't meant to be a final draft.  No problem.
Maybe my suggestion above about human-readable names for clients and resour=
ces
will give rise to some text here.

Section 10.2.2: It says the "state" parameter can be present in the
authorization request and authorization response.  I suppose the authorizat=
ion
response is the response to the authorization request, but in the figures u=
p to
this point the phrases "authorization grant" (Figure 1) or "authorization c=
ode"
(Figure 3) are used, not authorization response.  I see that there is a sec=
tion
4.1.2 "Authorization Response".  It would be good to identify which arrows =
in
Figures 1 and 3 are Authorization Responses (I suspect B and C, respectivel=
y).
It looks like that text would not fit into the space available in the figur=
e,
but it would fit well in the steps listed below each of the figures.

From Michael.Jones@microsoft.com  Wed Mar 16 10:55:58 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A89B93A69F9 for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 10:55:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qIEl-e4DiXKJ for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 10:55:54 -0700 (PDT)
Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id 8122B3A69EF for <oauth@ietf.org>; Wed, 16 Mar 2011 10:55:54 -0700 (PDT)
Received: from TK5EX14HUBC102.redmond.corp.microsoft.com (157.54.7.154) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Wed, 16 Mar 2011 10:57:21 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14HUBC102.redmond.corp.microsoft.com ([157.54.7.154]) with mapi id 14.01.0270.002; Wed, 16 Mar 2011 10:57:20 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: OAuth JWT Bearer Token Profile
Thread-Index: AcvkA5gsAXiuOwryT8mBtO7U6YTn3g==
Date: Wed, 16 Mar 2011 17:57:20 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739432529871C@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.71]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B16804296739432529871CTK5EX14MBXC207r_"
MIME-Version: 1.0
Subject: [OAUTH-WG] OAuth JWT Bearer Token Profile
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Mar 2011 17:55:58 -0000

--_000_4E1F6AAD24975D4BA5B16804296739432529871CTK5EX14MBXC207r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I've just published an OAuth JWT Bearer Token Profile<http://self-issued.in=
fo/docs/draft-jones-oauth-jwt-bearer.html>.  It defines a means of using a =
JSON Web Token (JWT) bearer token to request an OAuth 2.0 access token.  Th=
is profile is intentionally strongly based upon the SAML 2.0 Bearer Asserti=
on Grant Type Profile for OAuth 2.0<http://www.ietf.org/id/draft-ietf-oauth=
-saml2-bearer-03.txt> by Brian Campbell and Chuck Mortimore; it borrows som=
e text from the SAML profile with their permission.  Thanks Brian and Chuck=
, for supporting the writing of this profile and for your reviews of prelim=
inary drafts.

The profile draft is available at these locations:

http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.html
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.txt
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.xml
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.html (will point =
to new versions as they are posted)
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.txt (will point t=
o new versions as they are posted)
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.xml (will point t=
o new versions as they are posted)
http://svn.openid.net/repos/specifications/oauth/2.0/ (Subversion repositor=
y, with html, txt, and html versions available)

I will also submit this as a formal Internet draft after the IETF tool re-o=
pens for submissions (on March 28th).

                                                                -- Mike


--_000_4E1F6AAD24975D4BA5B16804296739432529871CTK5EX14MBXC207r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">I&#8217;ve just published an <a href=3D"http://self-=
issued.info/docs/draft-jones-oauth-jwt-bearer.html">
OAuth JWT Bearer Token Profile</a>.&nbsp; It defines a means of using a JSO=
N Web Token (JWT) bearer token to request an OAuth 2.0 access token.&nbsp; =
This profile is intentionally strongly based upon the
<a href=3D"http://www.ietf.org/id/draft-ietf-oauth-saml2-bearer-03.txt">SAM=
L 2.0 Bearer Assertion Grant Type Profile for OAuth 2.0</a> by Brian Campbe=
ll and Chuck Mortimore; it borrows some text from the SAML profile with the=
ir permission.&nbsp; Thanks Brian and Chuck,
 for supporting the writing of this profile and for your reviews of prelimi=
nary drafts.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The profile draft is available at these locations:<o=
:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer-00.html">http://self-issued.info/docs/draft-jones-oauth-jw=
t-bearer-00.html</a><o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer-00.txt">http://self-issued.info/docs/draft-jones-oauth-jwt=
-bearer-00.txt</a><o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer-00.xml">http://self-issued.info/docs/draft-jones-oauth-jwt=
-bearer-00.xml</a><o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer.html">http://self-issued.info/docs/draft-jones-oauth-jwt-b=
earer.html</a> (will point to new versions as they are posted)<o:p></o:p></=
p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer.txt">http://self-issued.info/docs/draft-jones-oauth-jwt-be=
arer.txt</a> (will point to new versions as they are posted)<o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer.xml">http://self-issued.info/docs/draft-jones-oauth-jwt-be=
arer.xml</a> (will point to new versions as they are posted)<o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://svn.openid.net/repos/specification=
s/oauth/2.0/">http://svn.openid.net/repos/specifications/oauth/2.0/</a> (Su=
bversion repository, with html, txt, and html versions available)<o:p></o:p=
></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I will also submit this as a formal Internet draft a=
fter the IETF tool re-opens for submissions (on March 28<sup>th</sup>).<o:p=
></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B16804296739432529871CTK5EX14MBXC207r_--

From jricher@mitre.org  Wed Mar 16 14:18:18 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 17E193A6A24 for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 14:18:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.567
X-Spam-Level: 
X-Spam-Status: No, score=-2.567 tagged_above=-999 required=5 tests=[AWL=0.032,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xo2kjNT8a8bS for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 14:18:17 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 5F1083A694C for <oauth@ietf.org>; Wed, 16 Mar 2011 14:18:17 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id E39B321B111C for <oauth@ietf.org>; Wed, 16 Mar 2011 17:19:43 -0400 (EDT)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id DED8321B1119 for <oauth@ietf.org>; Wed, 16 Mar 2011 17:19:43 -0400 (EDT)
Received: from [172.31.36.107] (172.31.36.107) by imchub1.MITRE.ORG (129.83.29.73) with Microsoft SMTP Server (TLS) id 8.2.254.0; Wed, 16 Mar 2011 17:19:43 -0400
Message-ID: <4D81296E.4040301@mitre.org>
Date: Wed, 16 Mar 2011 17:19:42 -0400
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: <oauth@ietf.org>
References: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net>
In-Reply-To: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Mar 2011 21:18:18 -0000

Overall this is in good shape. Some points:

Mutual cross-reference between the MAC and Bearer specs might help 
people trying to decide what kind of OAuth token to use.

2.3
The parameter name "oauth_token" is already taken by OAuth 1.0 and 
should NOT be re-used here. Suggest changing it to "oauth2_token". An 
alternative is to go back to the original non-namespaced "access_token", 
which I don't recommend.

4.2
The protected resource parameter registry doesn't make much sense as 
specified, and seems to imply that all non-oauth PR parmeters would also 
need to be registered here. Suggest removal of this.

4.3
The error registry needs to be removed from this draft and either placed 
into the core spec or another extension capability should be defined. 
Either way, this spec isn't the place for it.

  -- Justin

From torsten@lodderstedt.net  Wed Mar 16 15:14:58 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 36E493A6A48 for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 15:14:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.22
X-Spam-Level: 
X-Spam-Status: No, score=-2.22 tagged_above=-999 required=5 tests=[AWL=0.029,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5dRj1yKSgCpG for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 15:14:57 -0700 (PDT)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.93]) by core3.amsl.com (Postfix) with ESMTP id AC2623A6A37 for <oauth@ietf.org>; Wed, 16 Mar 2011 15:14:56 -0700 (PDT)
Received: from [79.253.26.48] (helo=[192.168.71.49]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Pzz0v-0004xn-RB; Wed, 16 Mar 2011 23:16:21 +0100
Message-ID: <4D8136B5.6030004@lodderstedt.net>
Date: Wed, 16 Mar 2011 23:16:21 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <E56AB32F-240F-49DB-B545-A0E574004AD9@gmx.net> <C1699604-3FB3-40E1-B4D6-4885D3CD69C5@gmx.net>
In-Reply-To: <C1699604-3FB3-40E1-B4D6-4885D3CD69C5@gmx.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Reminder: Prague IETF Meeting: Soliciting OAuth WG Presentations
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Mar 2011 22:14:58 -0000

pls. add a presentation about the security document/considerations to 
the agenda

Am 15.03.2011 20:52, schrieb Hannes Tschofenig:
> A reminder to send me your presentation request.
>
> On Mar 14, 2011, at 9:13 AM, Hannes Tschofenig wrote:
>
>> Hi all,
>>
>> the IETF meeting in Prague is just around the corner and we need to put the agenda for the face-to-face meeting together.
>> If you plan to give a presentation please drop us a mail ASAP.
>>
>> Ciao
>> Hannes&  Blaine
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From eran@hueniverse.com  Wed Mar 16 15:19:11 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E0D753A6A82 for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 15:19:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.562
X-Spam-Level: 
X-Spam-Status: No, score=-2.562 tagged_above=-999 required=5 tests=[AWL=0.037,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9Kix1ZcTh9ZL for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 15:19:11 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 15EB43A6A43 for <oauth@ietf.org>; Wed, 16 Mar 2011 15:19:10 -0700 (PDT)
Received: (qmail 18080 invoked from network); 16 Mar 2011 22:20:36 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 16 Mar 2011 22:20:36 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Wed, 16 Mar 2011 15:20:28 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Date: Wed, 16 Mar 2011 15:20:20 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
Thread-Index: AcvkH+XWS6AqZG8ZTp2tS27AQIuSrgACFy+w
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F4326D5@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net> <4D81296E.4040301@mitre.org>
In-Reply-To: <4D81296E.4040301@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Mar 2011 22:19:12 -0000

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Justin Richer

> Mutual cross-reference between the MAC and Bearer specs might help
> people trying to decide what kind of OAuth token to use.

Speaking for MAC - over my dead body :-)

EHL

From jricher@mitre.org  Wed Mar 16 15:40:35 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 42D513A6A91 for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 15:40:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.569
X-Spam-Level: 
X-Spam-Status: No, score=-2.569 tagged_above=-999 required=5 tests=[AWL=0.030,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5RY3MQlZSscg for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 15:40:34 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 79B223A6A8A for <oauth@ietf.org>; Wed, 16 Mar 2011 15:40:34 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 4417421B0A65; Wed, 16 Mar 2011 18:41:59 -0400 (EDT)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 3EA1721B031D; Wed, 16 Mar 2011 18:41:59 -0400 (EDT)
Received: from [172.31.36.107] (172.31.36.107) by imchub1.MITRE.ORG (129.83.29.73) with Microsoft SMTP Server (TLS) id 8.2.254.0; Wed, 16 Mar 2011 18:41:58 -0400
Message-ID: <4D813CB6.4070808@mitre.org>
Date: Wed, 16 Mar 2011 18:41:58 -0400
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net> <4D81296E.4040301@mitre.org> <90C41DD21FB7C64BB94121FBBC2E7234464F4326D5@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F4326D5@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Mar 2011 22:40:35 -0000

>> Mutual cross-reference between the MAC and Bearer specs might help
>> people trying to decide what kind of OAuth token to use.
> Speaking for MAC - over my dead body :-)
>

Now now, that's just not nice. :)

From jricher@mitre.org  Wed Mar 16 16:03:45 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 25CF53A69F6 for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 16:03:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.57
X-Spam-Level: 
X-Spam-Status: No, score=-2.57 tagged_above=-999 required=5 tests=[AWL=0.029,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZSctJjPVH5Yq for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 16:03:44 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id E30713A69DC for <oauth@ietf.org>; Wed, 16 Mar 2011 16:03:43 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id CD61A21B0A15 for <oauth@ietf.org>; Wed, 16 Mar 2011 19:05:10 -0400 (EDT)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id C8A4D21B01F6 for <oauth@ietf.org>; Wed, 16 Mar 2011 19:05:10 -0400 (EDT)
Received: from [172.31.36.107] (172.31.36.107) by imchub1.MITRE.ORG (129.83.29.73) with Microsoft SMTP Server (TLS) id 8.2.254.0; Wed, 16 Mar 2011 19:05:10 -0400
Message-ID: <4D814226.9090101@mitre.org>
Date: Wed, 16 Mar 2011 19:05:10 -0400
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: <oauth@ietf.org>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
In-Reply-To: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
Content-Type: text/plain; charset="ISO-8859-1"; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Mar 2011 23:03:45 -0000

Many of my comments have probably been covered by other folks on the 
list, but I'm going to repeat things along here anyway:

Preamble:

Does this document actually obsolete 5849? Since OAuth2 is explicitly 
not backwards compatible, is this WG really making the claim that we're 
updating OAuth, or rather defining a newer (and better) way of doing it?

1.4.2 (et al)

I still don't like the word "implicit" being used here, since there's 
really nothing implicit about it. The grant being made is explicit as 
far as the end user is concerned, and could even have an intermediary 
"do you authorize this?" screen in the middle. I'm still failing to come 
up with a better term than the original "user-agent" wording. What we're 
really talking about here is a way for an end user to directly authorize 
a client as opposed to doing a traditional double-redirect. So it's 
direct like client-credentials and username-and-password, but it's on 
behalf of a user and the client still never sees the user's credentials 
to the AS. We need, and have needed for some time, a better way to say this.

2.0

The phrase "extension grant types MAY define" should probably be the 
more encompasing "extensions MAY define".

2.1

The wording on implicit and explicit makes even less sense here, since 
if the client is getting back a token directly then the grant is even 
more explicit than if the client has to trade the code for something. 
Think about it this way: if the AS is giving you a code, it's implied 
that that code is good for you to get a token that you can actually do 
something with. The AS hasn't actually granted the client access to the 
PR yet, though, just provided a means for doing so. On the other hand, 
the client that gets a token directly is being granted explicit access 
to the PR directly. The server's not implying anything here, it's saying 
"hey, go get stuff with this token".

3.

With 'client_id' required on most steps, the phrase that the AS should 
not issue credentials to untrustworthy clients is incongruous. Perhaps 
better would be to say that the AS shouldn't trust the credentials 
issued to clients without the ability to keep secrets. Basically, we 
need a way of saying that the client identifier is necessary but the 
assumption of it being kept a secret can only go so far. I'm sure the 
security considerations will cover this more deeply, but this is 
something that should be clarified up front here, especially because 
this section is referenced throughout the document.

4.1.2 (and other flows)

Rephrase: "The clients should avoid making assumptions about code value 
sizes. The authorization server should document the size of any value it 
issues." as "Clients should avoid making assumptions about code value 
sizes, and the authorization server should document the size of any 
value it issues."

4.1.3

"Validate the client credentials and ensure they match the authorization 
code." makes it sound like the client credentials and the authorization 
code are the same, or derived from each other. Suggest: "Validate the 
client credentials  and ensure that the client presenting the code is 
the same one the code was originally issued to." This phrasing also 
implies an architecture decision: access codes need to be bound to 
client id's.

4.1.4 (and other flows)

What's with the "example_parameter" bit in all the examples? I think we 
only need this in 5.1's example. It's confusing when peppered throughout 
the spec without context.

4.2

Remove "or native applications", add language about the saved 
round-trip, which is the real reason for this flow, not security 
concerns over saved secrets. Javascript clients could easily use the 
auth code flow with their security profile (and an untrusted client 
password, which is allowed).

5

This section should probably point out that the poorly-named implicit 
flow doesn't use the format in here, and that the reader should go check 
out section 4.2 instead.

5.2

Provide a mechanism for extensions to put different error codes onto the 
wire, either through a registry, URIs, or language saying how to update 
this RFC.

6

Do we need to say that downscoping an access token doesn't change the 
issued scope for the refresh token? It seems obvious to me, but I'm 
wondering if we want to head off questions about this behavior. In 
general, I'd still like to see an explicit section about this behavior 
apart from the (well-written) paragraph about the scope parameter. 
Particularly since we've had someone propose a rescoping proposal 
already (but I can't seem to find this in my email archives now.) I can 
propose text if the WG agrees this is of use; otherwise it probably 
belongs in developer guides.




Overall, -13 is in decent shape, and modulo a little polishing as 
enumerated here it's basically ready, in my opinion.

  -- Justin



From James.H.Manger@team.telstra.com  Wed Mar 16 19:39:08 2011
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C87EC3A6A14 for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 19:39:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.539
X-Spam-Level: 
X-Spam-Status: No, score=-0.539 tagged_above=-999 required=5 tests=[AWL=0.361,  BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, HTML_MESSAGE=0.001, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 29vtjzTPCW2b for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 19:39:05 -0700 (PDT)
Received: from ipxano.tcif.telstra.com.au (ipxano.tcif.telstra.com.au [203.35.82.200]) by core3.amsl.com (Postfix) with ESMTP id 89E453A691F for <oauth@ietf.org>; Wed, 16 Mar 2011 19:39:04 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.63,197,1299416400"; d="scan'208,217";a="31501219"
Received: from unknown (HELO ipccni.tcif.telstra.com.au) ([10.97.216.208]) by ipoani.tcif.telstra.com.au with ESMTP; 17 Mar 2011 13:40:29 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6287"; a="21686304"
Received: from wsmsg3757.srv.dir.telstra.com ([172.49.40.85]) by ipccni.tcif.telstra.com.au with ESMTP; 17 Mar 2011 13:40:29 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by wsmsg3757.srv.dir.telstra.com ([172.49.40.85]) with mapi; Thu, 17 Mar 2011 13:40:28 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: OAuth WG <oauth@ietf.org>
Date: Thu, 17 Mar 2011 13:40:26 +1100
Thread-Topic: OAuth2 abstract
Thread-Index: AcvkTKvuSZ2d8pW/RJaZcWcOl5CEaw==
Message-ID: <255B9BB34FB7D647A506DC292726F6E1127FBD267F@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: multipart/alternative; boundary="_000_255B9BB34FB7D647A506DC292726F6E1127FBD267FWSMSG3153Vsrv_"
MIME-Version: 1.0
Subject: [OAUTH-WG] OAuth2 abstract
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 02:39:08 -0000

--_000_255B9BB34FB7D647A506DC292726F6E1127FBD267FWSMSG3153Vsrv_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Comments on draft-ietf-oauth-v2-13:



1. Abstract

The 1-line abstract is not helpful - it merely repeats the title. The abstr=
act is important as it is the text most widely seem around the rest of the =
IETF community (eg in announcements of drafts and RFCs) and beyond. It need=
s to mention: users delegating access to applications; applications orchest=
rating that delegation; swapping permanent credentials for short-lived acce=
ss tokens; and that it uses HTTP. Here is my suggestion:



  "The OAuth 2.0 authorization protocol allows an application to gain
  limited permission to access an HTTP service on behalf of a user by
  orchestrating an approval interaction between the user and the service.
  OAuth 2.0 uses temporary credentials, issued by an HTTP service either
  directly to an application or to represent user-delegated permissions.
  A collection of HTTP services can accept temporary credentials without
  needing to handle long-term user or application credentials, which
  can be restricted to a secure service that issues the temporary
  credentials."



I think this text can be understood without knowing any of the specialised =
terms introduced later in the specification.





--

James Manger




--_000_255B9BB34FB7D647A506DC292726F6E1127FBD267FWSMSG3153Vsrv_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
-->
</style><!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-AU" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Comments on draft-ietf-oauth-v2-13:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">1. <b>Abstract</b><o:p></o:p></p>
<p class=3D"MsoNormal">The 1-line abstract is not helpful &#8211; it merely=
 repeats the title. The abstract is important as it is the text most widely=
 seem around the rest of the IETF community (eg in announcements of drafts =
and RFCs) and beyond. It needs to mention:
 users delegating access to applications; applications orchestrating that d=
elegation; swapping permanent credentials for short-lived access tokens; an=
d that it uses HTTP. Here is my suggestion:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp; &#8220;The OAuth 2.0 authorization protocol a=
llows an application to gain<br>
&nbsp;&nbsp;limited permission to access an HTTP service on behalf of a use=
r by<br>
&nbsp;&nbsp;orchestrating an approval interaction between the user and the =
service.<br>
&nbsp;&nbsp;OAuth 2.0 uses temporary credentials, issued by an HTTP service=
 either<br>
&nbsp;&nbsp;directly to an application or to represent user-delegated permi=
ssions.<br>
&nbsp;&nbsp;A collection of HTTP services can accept temporary credentials =
without<br>
&nbsp;&nbsp;needing to handle long-term user or application credentials, wh=
ich<br>
&nbsp;&nbsp;can be restricted to a secure service that issues the temporary=
<br>
&nbsp;&nbsp;credentials.&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I think this text can be understood without knowing =
any of the specialised terms introduced later in the specification.<o:p></o=
:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">--<o:p></o:p></p>
<p class=3D"MsoNormal">James Manger<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_255B9BB34FB7D647A506DC292726F6E1127FBD267FWSMSG3153Vsrv_--

From steve@seven.net.nz  Wed Mar 16 21:19:52 2011
Return-Path: <steve@seven.net.nz>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 79E823A6A42 for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 21:19:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RR+Ip+RrSUto for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 21:19:51 -0700 (PDT)
Received: from mail-ww0-f44.google.com (mail-ww0-f44.google.com [74.125.82.44]) by core3.amsl.com (Postfix) with ESMTP id 11CE33A6A15 for <oauth@ietf.org>; Wed, 16 Mar 2011 21:19:50 -0700 (PDT)
Received: by wwa36 with SMTP id 36so2024613wwa.13 for <oauth@ietf.org>; Wed, 16 Mar 2011 21:21:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seven.net.nz; s=google; h=domainkey-signature:from:content-type:content-transfer-encoding :subject:date:message-id:to:mime-version:x-mailer; bh=Us8UneQmj4sco35NCkdNWPCfAsryYpvBbv6gaKPETCg=; b=LeKCJXOULPnR7vxv50oapqrk4MOms8GrxfAkyf1ujbXYsZ4EJFnnKKTIo88nqeaBmS Wj/GOOjTWCUDfjqolF35ZhUgJgkjHl/RSvAEmkpsOfbx/i9c+2bW4C0Ji9CfPWQnnIAq fL4DzEQIKJNpnuDlQ+QkerMT2AUU8oIQNTkaU=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=seven.net.nz; s=google; h=from:content-type:content-transfer-encoding:subject:date:message-id :to:mime-version:x-mailer; b=hj3Xj94u437MUHBGJxdLgGQGFycOY5x9ajRdDSBhmeRjv7HQ1BoC0BsRq+S/0PgSdB 1GNev3J53zp/51IBSvCxXxlneEgctVuj9dCG2jr/rjr3lPdFHW/msN3u0GLl3BCp4BaD 6B2XVoreT7F8/Ys9to6Syo2Ifo6xTdgG2R8fI=
Received: by 10.227.7.18 with SMTP id b18mr846004wbb.103.1300335677556; Wed, 16 Mar 2011 21:21:17 -0700 (PDT)
Received: from [192.168.20.87] ([122.56.32.246]) by mx.google.com with ESMTPS id y29sm387706wbd.21.2011.03.16.21.21.15 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 16 Mar 2011 21:21:16 -0700 (PDT)
From: Steve Hoeksema <steve@seven.net.nz>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Thu, 17 Mar 2011 17:21:11 +1300
Message-Id: <CD79AD87-1D8E-4FC6-9ADE-46A197EDFF6B@seven.net.nz>
To: oauth@ietf.org
Mime-Version: 1.0 (Apple Message framework v1082)
X-Mailer: Apple Mail (2.1082)
Subject: [OAUTH-WG] Method of validating client id & client secret for authenticated requests?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 04:20:25 -0000

Hi all,

I'm evaluating whether OAuth 2 draft 13 w/ MAC authentication will be =
suitable for my situation.

We have an API which will be consumed by approved native apps on mobile =
devices. For business reasons I want to ensure that a user cannot use =
their own valid access token to make API calls from non-approved =
clients.

Perhaps this is not what OAuth is designed to protect against, but I'd =
like to use a standardized authentication method if at all possible.

I understand the process of granting an access token to clients =
validated by client_id and client_secret, but I want to do the same for =
all authenticated requests.
As far as I can tell, an an authenticated request is signed by an access =
token and token secret, but not client id and client secret.

I'm aware that determined users could extract the client ID and client =
secret from mobile app binaries, but this should stop casual users.

I've found a couple of discussions related to this problem, but I'm not =
sure if they're what I'm after -

[1] http://www.ietf.org/mail-archive/web/oauth/current/msg03836.html
[2] http://www.ietf.org/mail-archive/web/oauth/current/msg04872.html

It might be possible to include the client ID and client secret as query =
parameters in the message to sign (but exclude the client secret in the =
actual request URL of course), or put the client ID in the Authorization =
header.

If anyone has a better way to do this, especially in a way that would =
still make it a valid OAuth 2 request, I'm all ears.


Regards
Steve=

From James.H.Manger@team.telstra.com  Wed Mar 16 22:02:35 2011
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B5D763A6A24 for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 22:02:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.559
X-Spam-Level: 
X-Spam-Status: No, score=-0.559 tagged_above=-999 required=5 tests=[AWL=0.342,  BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l048Zxl1Z19x for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 22:02:34 -0700 (PDT)
Received: from ipxano.tcif.telstra.com.au (ipxano.tcif.telstra.com.au [203.35.82.200]) by core3.amsl.com (Postfix) with ESMTP id 28BF23A6919 for <oauth@ietf.org>; Wed, 16 Mar 2011 22:02:26 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.63,197,1299416400"; d="scan'208";a="31523027"
Received: from unknown (HELO ipcani.tcif.telstra.com.au) ([10.97.216.200]) by ipoani.tcif.telstra.com.au with ESMTP; 17 Mar 2011 16:03:52 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6287"; a="21973643"
Received: from wsmsg3756.srv.dir.telstra.com ([172.49.40.84]) by ipcani.tcif.telstra.com.au with ESMTP; 17 Mar 2011 16:03:51 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by wsmsg3756.srv.dir.telstra.com ([172.49.40.84]) with mapi; Thu, 17 Mar 2011 16:03:40 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: Steve Hoeksema <steve@seven.net.nz>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 17 Mar 2011 16:03:38 +1100
Thread-Topic: [OAUTH-WG] Method of validating client id & client secret for authenticated requests?
Thread-Index: AcvkWt4HE7hXfDuPQwyQQgClvP6L7gAAilSA
Message-ID: <255B9BB34FB7D647A506DC292726F6E1127FC44D6D@WSMSG3153V.srv.dir.telstra.com>
References: <CD79AD87-1D8E-4FC6-9ADE-46A197EDFF6B@seven.net.nz>
In-Reply-To: <CD79AD87-1D8E-4FC6-9ADE-46A197EDFF6B@seven.net.nz>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Method of validating client id & client secret for	authenticated requests?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 05:02:35 -0000

Steve,

> I'm evaluating whether OAuth 2 draft 13 w/ MAC authentication will be sui=
table for my situation.
> ...
> I want to ensure that a user cannot use their own valid access token to m=
ake API calls from non-approved clients.
> ...
> I'm aware that determined users could extract the client ID and client se=
cret from mobile app binaries, but this should stop casual users.


An app should be able to protect a MAC token secret almost as well as a cli=
ent secret (perhaps even better as it isn't in the static code) -- as long =
as you are using HTTPS to issue it. A MAC token secret is not exposed to a =
casual user. Even a bearer token is not exposed to a casual user as long as=
 you use HTTPS everywhere.


--
James Manger

From eran@hueniverse.com  Wed Mar 16 22:24:37 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 490553A6784 for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 22:24:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.563
X-Spam-Level: 
X-Spam-Status: No, score=-2.563 tagged_above=-999 required=5 tests=[AWL=0.036,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0f4JP0APwkat for <oauth@core3.amsl.com>; Wed, 16 Mar 2011 22:24:34 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id A6D003A659C for <oauth@ietf.org>; Wed, 16 Mar 2011 22:24:34 -0700 (PDT)
Received: (qmail 21809 invoked from network); 17 Mar 2011 05:26:01 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 17 Mar 2011 05:26:01 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Wed, 16 Mar 2011 22:26:01 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Steve Hoeksema <steve@seven.net.nz>, "oauth@ietf.org" <oauth@ietf.org>
Date: Wed, 16 Mar 2011 22:25:52 -0700
Thread-Topic: [OAUTH-WG] Method of validating client id & client secret for authenticated requests?
Thread-Index: AcvkWtvyKsyt8j4RTsyWg+7VDvETdQACEpYg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F432749@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD79AD87-1D8E-4FC6-9ADE-46A197EDFF6B@seven.net.nz>
In-Reply-To: <CD79AD87-1D8E-4FC6-9ADE-46A197EDFF6B@seven.net.nz>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Method of validating client id & client secret for	authenticated requests?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 05:24:37 -0000

OAuth 2 intentionally dropped the use of client credentials when making pro=
tected resource requests. This seems to be your main issue.

If you are going to use MAC tokens, one easy solution is to tell your devel=
opers to simply concatenate the client secret with the token secret when si=
gning the request. This is assuming the server has a way of mapping the tok=
en with the client on the backend. Basically, when you issue an access toke=
n, you only provide half the secret to the client. The other half is a prea=
rranged value that is issued to the client OOB.

However, I am not sure how casual users are going to extract the access tok=
en issued to an application running on their mobile device (especially if y=
ou use MAC and obey they SSL requirement for getting the token). If anythin=
g, it should be easier to extract the client credentials from the code whic=
h is static.

EHL


> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Steve Hoeksema
> Sent: Wednesday, March 16, 2011 9:21 PM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Method of validating client id & client secret for
> authenticated requests?
>=20
> Hi all,
>=20
> I'm evaluating whether OAuth 2 draft 13 w/ MAC authentication will be
> suitable for my situation.
>=20
> We have an API which will be consumed by approved native apps on mobile
> devices. For business reasons I want to ensure that a user cannot use the=
ir
> own valid access token to make API calls from non-approved clients.
>=20
> Perhaps this is not what OAuth is designed to protect against, but I'd li=
ke to
> use a standardized authentication method if at all possible.
>=20
> I understand the process of granting an access token to clients validated=
 by
> client_id and client_secret, but I want to do the same for all authentica=
ted
> requests.
> As far as I can tell, an an authenticated request is signed by an access =
token
> and token secret, but not client id and client secret.
>=20
> I'm aware that determined users could extract the client ID and client se=
cret
> from mobile app binaries, but this should stop casual users.
>=20
> I've found a couple of discussions related to this problem, but I'm not s=
ure if
> they're what I'm after -
>=20
> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg03836.html
> [2] http://www.ietf.org/mail-archive/web/oauth/current/msg04872.html
>=20
> It might be possible to include the client ID and client secret as query
> parameters in the message to sign (but exclude the client secret in the a=
ctual
> request URL of course), or put the client ID in the Authorization header.
>=20
> If anyone has a better way to do this, especially in a way that would sti=
ll make
> it a valid OAuth 2 request, I'm all ears.
>=20
>=20
> Regards
> Steve
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From cmortimore@salesforce.com  Thu Mar 17 11:01:51 2011
Return-Path: <cmortimore@salesforce.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A3DC93A6A1C for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 11:01:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W66FkMgGRGbm for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 11:01:47 -0700 (PDT)
Received: from exprod8og113.obsmtp.com (exprod8og113.obsmtp.com [64.18.3.26]) by core3.amsl.com (Postfix) with SMTP id 81C313A6A04 for <oauth@ietf.org>; Thu, 17 Mar 2011 11:01:43 -0700 (PDT)
Received: from source ([204.14.239.238]) by exprod8ob113.postini.com ([64.18.7.12]) with SMTP ID DSNKTYJM35/WPFl2VUnGgd0r0Vf0N5rfRp4Q@postini.com; Thu, 17 Mar 2011 11:03:13 PDT
Received: from EXSFM-MB01.internal.salesforce.com ([10.1.127.46]) by exsfm-hub3.internal.salesforce.com ([10.1.127.7]) with mapi; Thu, 17 Mar 2011 11:03:11 -0700
From: Chuck Mortimore <cmortimore@salesforce.com>
To: Mike Jones <Michael.Jones@microsoft.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 17 Mar 2011 11:03:10 -0700
Thread-Topic: [OAUTH-WG] OAuth JWT Bearer Token Profile
Thread-Index: AcvkA5gsAXiuOwryT8mBtO7U6YTn3gAyfp5a
Message-ID: <C9A79AED.1640F%cmortimore@salesforce.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432529871C@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C9A79AED1640Fcmortimoresalesforcecom_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] OAuth JWT Bearer Token Profile
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 18:01:51 -0000

--_000_C9A79AED1640Fcmortimoresalesforcecom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Good stuff Mike

Having an explicit error message for "unsupported_alg" might be useful for =
this spec.  I doubt all implementations will implement all the algs in the =
JWT spec.

-cmort


On 3/16/11 9:57 AM, "Mike Jones" <Michael.Jones@microsoft.com> wrote:

I've just published an OAuth JWT Bearer Token Profile <http://self-issued.i=
nfo/docs/draft-jones-oauth-jwt-bearer.html> .  It defines a means of using =
a JSON Web Token (JWT) bearer token to request an OAuth 2.0 access token.  =
This profile is intentionally strongly based upon the SAML 2.0 Bearer Asser=
tion Grant Type Profile for OAuth 2.0 <http://www.ietf.org/id/draft-ietf-oa=
uth-saml2-bearer-03.txt>  by Brian Campbell and Chuck Mortimore; it borrows=
 some text from the SAML profile with their permission.  Thanks Brian and C=
huck, for supporting the writing of this profile and for your reviews of pr=
eliminary drafts.

The profile draft is available at these locations:

http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.html
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.txt
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.xml
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.html (will point =
to new versions as they are posted)
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.txt (will point t=
o new versions as they are posted)
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.xml (will point t=
o new versions as they are posted)
http://svn.openid.net/repos/specifications/oauth/2.0/ (Subversion repositor=
y, with html, txt, and html versions available)

I will also submit this as a formal Internet draft after the IETF tool re-o=
pens for submissions (on March 28th).

                                                                -- Mike



--_000_C9A79AED1640Fcmortimoresalesforcecom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Re: [OAUTH-WG] OAuth JWT Bearer Token Profile</TITLE>
</HEAD>
<BODY>
<FONT FACE=3D"Lucida Grande"><SPAN STYLE=3D'font-size:11pt'>Good stuff Mike=
<BR>
<BR>
Having an explicit error message for &#8220;unsupported_alg&#8221; might be=
 useful for this spec. &nbsp;I doubt all implementations will implement all=
 the algs in the JWT spec.<BR>
<BR>
-cmort<BR>
<BR>
<BR>
On 3/16/11 9:57 AM, &quot;Mike Jones&quot; &lt;<a href=3D"Michael.Jones@mic=
rosoft.com">Michael.Jones@microsoft.com</a>&gt; wrote:<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Lucida Grande"><SPAN STYLE=3D'font-=
size:11pt'>I&#8217;ve just published an OAuth JWT Bearer Token Profile &lt;=
<a href=3D"http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.html">=
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.html</a>&gt; . &n=
bsp;It defines a means of using a JSON Web Token (JWT) bearer token to requ=
est an OAuth 2.0 access token. &nbsp;This profile is intentionally strongly=
 based upon the SAML 2.0 Bearer Assertion Grant Type Profile for OAuth 2.0 =
&lt;<a href=3D"http://www.ietf.org/id/draft-ietf-oauth-saml2-bearer-03.txt"=
>http://www.ietf.org/id/draft-ietf-oauth-saml2-bearer-03.txt</a>&gt; &nbsp;=
by Brian Campbell and Chuck Mortimore; it borrows some text from the SAML p=
rofile with their permission. &nbsp;Thanks Brian and Chuck, for supporting =
the writing of this profile and for your reviews of preliminary drafts.<BR>
&nbsp;<BR>
The profile draft is available at these locations:<BR>
&nbsp;<BR>
<a href=3D"http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.htm=
l">http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.html</a><BR=
>
<a href=3D"http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.txt=
">http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.txt</a><BR>
<a href=3D"http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.xml=
">http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.xml</a><BR>
<a href=3D"http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.html">=
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.html</a> (will po=
int to new versions as they are posted)<BR>
<a href=3D"http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.txt">h=
ttp://self-issued.info/docs/draft-jones-oauth-jwt-bearer.txt</a> (will poin=
t to new versions as they are posted)<BR>
<a href=3D"http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.xml">h=
ttp://self-issued.info/docs/draft-jones-oauth-jwt-bearer.xml</a> (will poin=
t to new versions as they are posted)<BR>
<a href=3D"http://svn.openid.net/repos/specifications/oauth/2.0/">http://sv=
n.openid.net/repos/specifications/oauth/2.0/</a> (Subversion repository, wi=
th html, txt, and html versions available)<BR>
&nbsp;<BR>
I will also submit this as a formal Internet draft after the IETF tool re-o=
pens for submissions (on March 28th).<BR>
&nbsp;<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;-- Mike<BR>
&nbsp;<BR>
<BR>
</SPAN></FONT></BLOCKQUOTE>
</BODY>
</HTML>


--_000_C9A79AED1640Fcmortimoresalesforcecom_--

From hannes.tschofenig@gmx.net  Thu Mar 17 11:27:37 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BF2193A6A22 for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 11:27:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hcD0E8IosOiN for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 11:27:37 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.22]) by core3.amsl.com (Postfix) with SMTP id 75ADD3A6A10 for <oauth@ietf.org>; Thu, 17 Mar 2011 11:27:36 -0700 (PDT)
Received: (qmail invoked by alias); 17 Mar 2011 18:29:02 -0000
Received: from a88-115-222-204.elisa-laajakaista.fi (EHLO [192.168.1.8]) [88.115.222.204] by mail.gmx.net (mp048) with SMTP; 17 Mar 2011 19:29:02 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX19FP2t9JZJFp3ZXqOwj+fL6hGAkVJOUcV3lXVzOcj Cco30u29oLlAyo
Message-ID: <4D825300.3060005@gmx.net>
Date: Thu, 17 Mar 2011 20:29:20 +0200
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] Agenda Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 18:27:37 -0000

Open Authentication Protocol WG
==============================-

FRIDAY, April 1, 2011
Vienna/Madrid Room

Chairs: Hannes Tschofenig/Blaine Cook

Agenda
------

1) Agenda Bashing (Chairs)

2) Discussion of Working Group Last Call Comments (Chairs/Mike Jones)
http://datatracker.ietf.org/doc/draft-ietf-oauth-v2/
http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/
http://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/

3) OAuth Security (Thorsten)
http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/

4) OAuth JSON Encoding (Mike Jones)
http://tools.ietf.org/html/draft-jones-json-web-token-01

5) OAuth Use Cases (Zachary Zeltsan)
https://datatracker.ietf.org/doc/draft-zeltsan-oauth-use-cases/

6) Re-Chartering Discussion (Chairs)


From tonynad@microsoft.com  Thu Mar 17 11:52:14 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D0D213A6ADD for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 11:52:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.259
X-Spam-Level: 
X-Spam-Status: No, score=-7.259 tagged_above=-999 required=5 tests=[AWL=0.208,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j1RQZulDPrtA for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 11:52:13 -0700 (PDT)
Received: from smtp.microsoft.com (mailb.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 4F9373A693F for <oauth@ietf.org>; Thu, 17 Mar 2011 11:52:12 -0700 (PDT)
Received: from TK5EX14HUBC102.redmond.corp.microsoft.com (157.54.7.154) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 17 Mar 2011 11:53:40 -0700
Received: from TX2EHSOBE003.bigfish.com (157.54.51.80) by mail.microsoft.com (157.54.7.154) with Microsoft SMTP Server (TLS) id 14.1.270.2; Thu, 17 Mar 2011 11:53:40 -0700
Received: from mail105-tx2-R.bigfish.com (10.9.14.247) by TX2EHSOBE003.bigfish.com (10.9.40.23) with Microsoft SMTP Server id 14.1.225.8; Thu, 17 Mar 2011 18:53:39 +0000
Received: from mail105-tx2 (localhost.localdomain [127.0.0.1])	by mail105-tx2-R.bigfish.com (Postfix) with ESMTP id 3D72250469	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Thu, 17 Mar 2011 18:53:39 +0000 (UTC)
X-SpamScore: -35
X-BigFish: PS-35(zz542N9371PzzdafM1202h1082kzz8275eh8275dh1033ILa1495iz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT003.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail105-tx2 (localhost.localdomain [127.0.0.1]) by mail105-tx2 (MessageSwitch) id 130038801981659_851; Thu, 17 Mar 2011 18:53:39 +0000 (UTC)
Received: from TX2EHSMHS046.bigfish.com (unknown [10.9.14.242])	by mail105-tx2.bigfish.com (Postfix) with ESMTP id 11423FD8052; Thu, 17 Mar 2011 18:53:39 +0000 (UTC)
Received: from SN1PRD0302HT003.namprd03.prod.outlook.com (65.55.94.9) by TX2EHSMHS046.bigfish.com (10.9.99.146) with Microsoft SMTP Server (TLS) id 14.1.225.8; Thu, 17 Mar 2011 18:53:34 +0000
Received: from SN1PRD0302MB100.namprd03.prod.outlook.com ([169.254.10.59]) by SN1PRD0302HT003.namprd03.prod.outlook.com ([10.14.148.113]) with mapi id 14.01.0225.027; Thu, 17 Mar 2011 18:53:34 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Agenda Proposal
Thread-Index: AQHL5NFBdQUZ9sYZYkucSI2AqplAT5Qx3X2g
Date: Thu, 17 Mar 2011 18:53:33 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E70B6B2520@SN1PRD0302MB100.namprd03.prod.outlook.com>
References: <4D825300.3060005@gmx.net>
In-Reply-To: <4D825300.3060005@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [131.107.0.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT003.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%GMX.NET$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14HUBC102.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC102.redmond.corp.microsoft.com
Subject: Re: [OAUTH-WG] Agenda Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 18:52:14 -0000

Is it possible to add these to the mix?

http://www.ietf.org/id/draft-jones-simple-web-discovery-00.txt

and also the  http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.=
txt=20

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of H=
annes Tschofenig
Sent: Thursday, March 17, 2011 11:29 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] Agenda Proposal

Open Authentication Protocol WG
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D-

FRIDAY, April 1, 2011
Vienna/Madrid Room

Chairs: Hannes Tschofenig/Blaine Cook

Agenda
------

1) Agenda Bashing (Chairs)

2) Discussion of Working Group Last Call Comments (Chairs/Mike Jones) http:=
//datatracker.ietf.org/doc/draft-ietf-oauth-v2/
http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/
http://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/

3) OAuth Security (Thorsten)
http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/

4) OAuth JSON Encoding (Mike Jones)
http://tools.ietf.org/html/draft-jones-json-web-token-01

5) OAuth Use Cases (Zachary Zeltsan)
https://datatracker.ietf.org/doc/draft-zeltsan-oauth-use-cases/

6) Re-Chartering Discussion (Chairs)

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth





From eran@hueniverse.com  Thu Mar 17 11:55:15 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F15553A693F for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 11:55:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.563
X-Spam-Level: 
X-Spam-Status: No, score=-2.563 tagged_above=-999 required=5 tests=[AWL=0.036,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QiK7tJGParix for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 11:55:15 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id DE0123A694D for <oauth@ietf.org>; Thu, 17 Mar 2011 11:55:14 -0700 (PDT)
Received: (qmail 3639 invoked from network); 17 Mar 2011 18:56:41 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 17 Mar 2011 18:56:39 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 17 Mar 2011 11:56:30 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Anthony Nadalin <tonynad@microsoft.com>, Hannes Tschofenig <hannes.tschofenig@gmx.net>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 17 Mar 2011 11:56:20 -0700
Thread-Topic: [OAUTH-WG] Agenda Proposal
Thread-Index: AQHL5NFBdQUZ9sYZYkucSI2AqplAT5Qx3X2ggAACdYA=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F4328A9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4D825300.3060005@gmx.net> <B26C1EF377CB694EAB6BDDC8E624B6E70B6B2520@SN1PRD0302MB100.namprd03.prod.outlook.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E70B6B2520@SN1PRD0302MB100.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Agenda Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 18:55:16 -0000

Re: draft-jones-simple-web-discovery

While I don't have an objections to this document being presented and discu=
ssed at the meeting, I want to point that this has absolutely nothing to do=
 with this working group and if the IETF community has an interest in pursu=
ing it, it does not belong in this working group.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Anthony Nadalin
> Sent: Thursday, March 17, 2011 11:54 AM
> To: Hannes Tschofenig; oauth@ietf.org
> Subject: Re: [OAUTH-WG] Agenda Proposal
>=20
> Is it possible to add these to the mix?
>=20
> http://www.ietf.org/id/draft-jones-simple-web-discovery-00.txt
>=20
> and also the  http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-
> 00.txt
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Hannes Tschofenig
> Sent: Thursday, March 17, 2011 11:29 AM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Agenda Proposal
>=20
> Open Authentication Protocol WG
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D-
>=20
> FRIDAY, April 1, 2011
> Vienna/Madrid Room
>=20
> Chairs: Hannes Tschofenig/Blaine Cook
>=20
> Agenda
> ------
>=20
> 1) Agenda Bashing (Chairs)
>=20
> 2) Discussion of Working Group Last Call Comments (Chairs/Mike Jones)
> http://datatracker.ietf.org/doc/draft-ietf-oauth-v2/
> http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/
> http://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/
>=20
> 3) OAuth Security (Thorsten)
> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/
>=20
> 4) OAuth JSON Encoding (Mike Jones)
> http://tools.ietf.org/html/draft-jones-json-web-token-01
>=20
> 5) OAuth Use Cases (Zachary Zeltsan)
> https://datatracker.ietf.org/doc/draft-zeltsan-oauth-use-cases/
>=20
> 6) Re-Chartering Discussion (Chairs)
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From gdb@mit.edu  Thu Mar 17 12:18:57 2011
Return-Path: <gdb@mit.edu>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 174713A69A7 for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 12:18:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level: 
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ERIunH+GRFnv for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 12:18:56 -0700 (PDT)
Received: from dmz-mailsec-scanner-7.mit.edu (DMZ-MAILSEC-SCANNER-7.MIT.EDU [18.7.68.36]) by core3.amsl.com (Postfix) with ESMTP id 34D523A694D for <oauth@ietf.org>; Thu, 17 Mar 2011 12:18:56 -0700 (PDT)
X-AuditID: 12074424-b7b0bae000000a05-ce-4d825ef7d3ac
Received: from mailhub-auth-4.mit.edu ( [18.7.62.39]) by dmz-mailsec-scanner-7.mit.edu (Symantec Brightmail Gateway) with SMTP id 4C.68.02565.8FE528D4; Thu, 17 Mar 2011 15:20:24 -0400 (EDT)
Received: from outgoing.mit.edu (OUTGOING-AUTH.MIT.EDU [18.7.22.103]) by mailhub-auth-4.mit.edu (8.13.8/8.9.2) with ESMTP id p2HJKNbG018281 for <oauth@ietf.org>; Thu, 17 Mar 2011 15:20:23 -0400
Received: from mail-vx0-f172.google.com (mail-vx0-f172.google.com [209.85.220.172]) (authenticated bits=0) (User authenticated as gdb@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.6/8.12.4) with ESMTP id p2HJKMgU024529 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Thu, 17 Mar 2011 15:20:23 -0400 (EDT)
Received: by vxg33 with SMTP id 33so3436224vxg.31 for <oauth@ietf.org>; Thu, 17 Mar 2011 12:20:22 -0700 (PDT)
Received: by 10.52.68.137 with SMTP id w9mr179828vdt.84.1300389622163; Thu, 17 Mar 2011 12:20:22 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.52.163.97 with HTTP; Thu, 17 Mar 2011 12:20:02 -0700 (PDT)
From: Greg Brockman <gdb@MIT.EDU>
Date: Thu, 17 Mar 2011 12:20:02 -0700
Message-ID: <AANLkTikNk-aYy-tFua09yBCexiwUtNDBtt+ESzxitV7C@mail.gmail.com>
To: oauth@ietf.org
Content-Type: text/plain; charset=UTF-8
X-Brightmail-Tracker: AAAAAxesv8MXrMB7F61bSQ==
X-Mailman-Approved-At: Thu, 17 Mar 2011 12:32:38 -0700
Subject: [OAUTH-WG] OAuth without HTTP redirects
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 19:30:00 -0000

Hi,

I notice that the current OAuth2 draft seems to have browser redirects
baked in rather deeply.  Are there any plans to add support for flows
that don't involve HTTP redirects?  For example, it seems at the
moment that pure JavaScript applications aren't well-supported, as the
resource owner must be redirected to the authorization endpoint, thus
leaving the JS app.  Now of course trying to do the OAuth flow from
within the JS app (say by displaying the authorization endpoint within
an iframe) might expose phishing attacks, but one could imagine e.g. a
plugin that integrates with the browser in order to provide a
relatively unforgeable OAuth authorization endpoint.

More generally, does this sound like a use-case that OAuth would be
interested in supporting?

Thanks,

- gdb

(Reposting from oauth@googlegroups.com as this seems a more appropriate forum.)

From SRS0=9JaSRA=WK=lodderstedt.net=torsten@srs.bis7.eu.blackberry.com  Thu Mar 17 13:37:31 2011
Return-Path: <SRS0=9JaSRA=WK=lodderstedt.net=torsten@srs.bis7.eu.blackberry.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 788B83A6AF0; Thu, 17 Mar 2011 13:37:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.62
X-Spam-Level: 
X-Spam-Status: No, score=-4.62 tagged_above=-999 required=5 tests=[AWL=0.226,  BAYES_00=-2.599, MIME_BASE64_TEXT=1.753, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KJypPlLpwE3J; Thu, 17 Mar 2011 13:37:30 -0700 (PDT)
Received: from smtp07.bis7.eu.blackberry.com (smtp07.bis7.eu.blackberry.com [178.239.85.12]) by core3.amsl.com (Postfix) with ESMTP id 25A603A6A5F; Thu, 17 Mar 2011 13:37:29 -0700 (PDT)
Received: from b1.c11.bise7.blackberry ([192.168.0.101]) by srs.bis7.eu.blackberry.com (8.13.7 TEAMON/8.13.7) with ESMTP id p2HKctqk003723; Thu, 17 Mar 2011 20:38:55 GMT
Received: from ups31.c11.bise7.blackberry (cmp31.c11.bise7.blackberry [172.18.204.201]) by b1.c11.bise7.blackberry (8.13.7 TEAMON/8.13.7) with ESMTP id p2HKcteZ005273; Thu, 17 Mar 2011 20:38:55 GMT
X-rim-org-msg-ref-id: 679216289
Message-ID: <679216289-1300394335-cardhu_decombobulator_blackberry.rim.net-1731987242-@b1.c11.bise7.blackberry>
Content-Transfer-Encoding: base64
X-Priority: Normal
References: <4D825300.3060005@gmx.net>
In-Reply-To: <4D825300.3060005@gmx.net>
Sensitivity: Normal
Importance: Normal
To: "Tschofenig, Hannes" <Hannes.Tschofenig@gmx.net>, oauth-bounces@ietf.org,  "oauth@ietf.org" <oauth@ietf.org>
From: torsten@lodderstedt.net
Date: Thu, 17 Mar 2011 20:38:56 +0000
Content-Type: text/plain; charset="Windows-1252"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Agenda Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: torsten@lodderstedt.net
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 20:42:09 -0000
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From huilan.lu@alcatel-lucent.com  Thu Mar 17 14:29:48 2011
Return-Path: <huilan.lu@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C13583A6B26 for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 14:29:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.271
X-Spam-Level: 
X-Spam-Status: No, score=-6.271 tagged_above=-999 required=5 tests=[AWL=0.328,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XmTsnD1Gc6Gp for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 14:29:42 -0700 (PDT)
Received: from ihemail4.lucent.com (ihemail4.lucent.com [135.245.0.39]) by core3.amsl.com (Postfix) with ESMTP id BE59F3A6B23 for <oauth@ietf.org>; Thu, 17 Mar 2011 14:29:41 -0700 (PDT)
Received: from usnavsmail4.ndc.alcatel-lucent.com (usnavsmail4.ndc.alcatel-lucent.com [135.3.39.12]) by ihemail4.lucent.com (8.13.8/IER-o) with ESMTP id p2HLV7gn014098 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <oauth@ietf.org>; Thu, 17 Mar 2011 16:31:07 -0500 (CDT)
Received: from USNAVSXCHHUB02.ndc.alcatel-lucent.com (usnavsxchhub02.ndc.alcatel-lucent.com [135.3.39.111]) by usnavsmail4.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p2HLV1lW022598 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT) for <oauth@ietf.org>; Thu, 17 Mar 2011 16:31:07 -0500
Received: from USNAVSXCHMBSB3.ndc.alcatel-lucent.com ([135.3.39.135]) by USNAVSXCHHUB02.ndc.alcatel-lucent.com ([135.3.39.111]) with mapi; Thu, 17 Mar 2011 16:31:07 -0500
From: "Lu, Hui-Lan (Huilan)" <huilan.lu@alcatel-lucent.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 17 Mar 2011 16:31:06 -0500
Thread-Topic: One more comment on draft-ietf-oauth-v2-13
Thread-Index: Acvk2kseVH/L3D9RQXG2oC3qUM7r0wAC+IFQ
Message-ID: <0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DE5@USNAVSXCHMBSB3.ndc.alcatel-lucent.com>
References: <AANLkTikNk-aYy-tFua09yBCexiwUtNDBtt+ESzxitV7C@mail.gmail.com>
In-Reply-To: <AANLkTikNk-aYy-tFua09yBCexiwUtNDBtt+ESzxitV7C@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.39
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.12
Subject: [OAUTH-WG] One more comment on draft-ietf-oauth-v2-13
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 21:29:48 -0000

The required binding of the client and refresh token is implied. For clarit=
y, I would suggest to make it explcit with the following edits:=20

+ In section 1.5, after the first sentence, add "Unlike the access token, t=
he refresh token is bound to the client and is consumed only by the authori=
zation server."

+ On p. 33, the sentence "The client includes its authentication credential=
s as described in Section 3" is descriptive. Make it prescriptive to read "=
The client MUST include its authentication credentials as described in Sect=
ion 3."

Regards,
Huilan LU


=20

From tonynad@microsoft.com  Thu Mar 17 15:40:04 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3E7C03A6B1C for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 15:40:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.294
X-Spam-Level: 
X-Spam-Status: No, score=-7.294 tagged_above=-999 required=5 tests=[AWL=0.173,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QpRZiZmDJ96z for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 15:40:03 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 029BC3A69B3 for <oauth@ietf.org>; Thu, 17 Mar 2011 15:40:02 -0700 (PDT)
Received: from TK5EX14HUBC106.redmond.corp.microsoft.com (157.54.80.61) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 17 Mar 2011 15:41:31 -0700
Received: from ch1outboundpool.messaging.microsoft.com (157.54.51.81) by mail.microsoft.com (157.54.80.61) with Microsoft SMTP Server (TLS) id 14.1.270.2; Thu, 17 Mar 2011 15:41:30 -0700
Received: from mail31-ch1-R.bigfish.com (216.32.181.168) by CH1EHSOBE003.bigfish.com (10.43.70.53) with Microsoft SMTP Server id 14.1.225.8; Thu, 17 Mar 2011 22:41:29 +0000
Received: from mail31-ch1 (localhost.localdomain [127.0.0.1])	by mail31-ch1-R.bigfish.com (Postfix) with ESMTP id E8582D4013C	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Thu, 17 Mar 2011 22:41:29 +0000 (UTC)
X-SpamScore: -41
X-BigFish: PS-41(zz542N1432N9371PzzdafM1202h1082kzz8275eh8275dh1033ILa1495iz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT001.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail31-ch1 (localhost.localdomain [127.0.0.1]) by mail31-ch1 (MessageSwitch) id 1300401689700272_11375; Thu, 17 Mar 2011 22:41:29 +0000 (UTC)
Received: from CH1EHSMHS007.bigfish.com (snatpool1.int.messaging.microsoft.com [10.43.68.254])	by mail31-ch1.bigfish.com (Postfix) with ESMTP id A5AF81A5804D;	Thu, 17 Mar 2011 22:41:29 +0000 (UTC)
Received: from SN1PRD0302HT001.namprd03.prod.outlook.com (65.55.94.9) by CH1EHSMHS007.bigfish.com (10.43.70.7) with Microsoft SMTP Server (TLS) id 14.1.225.8; Thu, 17 Mar 2011 22:41:29 +0000
Received: from SN1PRD0302MB097.namprd03.prod.outlook.com ([169.254.8.208]) by SN1PRD0302HT001.namprd03.prod.outlook.com ([10.14.149.47]) with mapi id 14.01.0225.027; Thu, 17 Mar 2011 22:41:28 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, Hannes Tschofenig <hannes.tschofenig@gmx.net>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Agenda Proposal
Thread-Index: AQHL5NFBdQUZ9sYZYkucSI2AqplAT5Qx3X2ggAACdYCAAAGZwA==
Date: Thu, 17 Mar 2011 22:41:27 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E70B6B99FF@SN1PRD0302MB097.namprd03.prod.outlook.com>
References: <4D825300.3060005@gmx.net> <B26C1EF377CB694EAB6BDDC8E624B6E70B6B2520@SN1PRD0302MB100.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234464F4328A9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F4328A9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [131.107.0.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT001.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%HUENIVERSE.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%GMX.NET$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14HUBC106.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC106.redmond.corp.microsoft.com
Subject: Re: [OAUTH-WG] Agenda Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 22:40:04 -0000

I think it does for example how one might discover the authorization servic=
e and this would be a forum to see if others also do or not.

-----Original Message-----
From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]=20
Sent: Thursday, March 17, 2011 11:56 AM
To: Anthony Nadalin; Hannes Tschofenig; oauth@ietf.org
Subject: RE: [OAUTH-WG] Agenda Proposal

Re: draft-jones-simple-web-discovery

While I don't have an objections to this document being presented and discu=
ssed at the meeting, I want to point that this has absolutely nothing to do=
 with this working group and if the IETF community has an interest in pursu=
ing it, it does not belong in this working group.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf=20
> Of Anthony Nadalin
> Sent: Thursday, March 17, 2011 11:54 AM
> To: Hannes Tschofenig; oauth@ietf.org
> Subject: Re: [OAUTH-WG] Agenda Proposal
>=20
> Is it possible to add these to the mix?
>=20
> http://www.ietf.org/id/draft-jones-simple-web-discovery-00.txt
>=20
> and also the =20
> http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-
> 00.txt
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf=20
> Of Hannes Tschofenig
> Sent: Thursday, March 17, 2011 11:29 AM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Agenda Proposal
>=20
> Open Authentication Protocol WG
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D-
>=20
> FRIDAY, April 1, 2011
> Vienna/Madrid Room
>=20
> Chairs: Hannes Tschofenig/Blaine Cook
>=20
> Agenda
> ------
>=20
> 1) Agenda Bashing (Chairs)
>=20
> 2) Discussion of Working Group Last Call Comments (Chairs/Mike Jones)=20
> http://datatracker.ietf.org/doc/draft-ietf-oauth-v2/
> http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/
> http://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/
>=20
> 3) OAuth Security (Thorsten)
> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/
>=20
> 4) OAuth JSON Encoding (Mike Jones)
> http://tools.ietf.org/html/draft-jones-json-web-token-01
>=20
> 5) OAuth Use Cases (Zachary Zeltsan)
> https://datatracker.ietf.org/doc/draft-zeltsan-oauth-use-cases/
>=20
> 6) Re-Chartering Discussion (Chairs)
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth





From eran@hueniverse.com  Thu Mar 17 15:58:17 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 004D43A6A84 for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 15:58:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.564
X-Spam-Level: 
X-Spam-Status: No, score=-2.564 tagged_above=-999 required=5 tests=[AWL=0.035,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uQtE5naVaV2O for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 15:58:15 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id B09383A69B3 for <oauth@ietf.org>; Thu, 17 Mar 2011 15:58:15 -0700 (PDT)
Received: (qmail 8879 invoked from network); 17 Mar 2011 22:59:42 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 17 Mar 2011 22:59:41 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 17 Mar 2011 15:59:30 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Anthony Nadalin <tonynad@microsoft.com>, Hannes Tschofenig <hannes.tschofenig@gmx.net>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 17 Mar 2011 15:57:48 -0700
Thread-Topic: [OAUTH-WG] Agenda Proposal
Thread-Index: AQHL5NFBdQUZ9sYZYkucSI2AqplAT5Qx3X2ggAACdYCAAAGZwIAAQLQQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F432958@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4D825300.3060005@gmx.net> <B26C1EF377CB694EAB6BDDC8E624B6E70B6B2520@SN1PRD0302MB100.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234464F4328A9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E70B6B99FF@SN1PRD0302MB097.namprd03.prod.outlook.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E70B6B99FF@SN1PRD0302MB097.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Agenda Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 22:58:17 -0000

This proposal goes far beyond just solving any discovery needs for OAuth. I=
t also directly competes with existing (deployed) proposals. This group is =
not the right forum to discuss and design a generally applicable discovery =
solution for the web. Once discovery is added to our charter (any discovery=
 is currently out of scope), we can figure out if there are existing soluti=
ons to utilize, if we want to create a specialized solution for OAuth, or i=
f a general purpose solution is needed (and does not already exist in a pub=
lished standard).

If a general purpose solution is the direction to go, this is not the venue=
 to develop it.

So again, presenting this at the meeting is fine, but beyond that, this wor=
king group is not chartered nor equipped to develop this technology for gen=
eral purpose. In addition, the right way to present SWD to this WG is via a=
n example of how OAuth might be using it, and not any direct discussion of =
the merits of the actual proposal - that belongs on the Apps-discuss list u=
ntil another forum is identified or created.

EHL

> -----Original Message-----
> From: Anthony Nadalin [mailto:tonynad@microsoft.com]
> Sent: Thursday, March 17, 2011 3:41 PM
> To: Eran Hammer-Lahav; Hannes Tschofenig; oauth@ietf.org
> Subject: RE: [OAUTH-WG] Agenda Proposal
>=20
> I think it does for example how one might discover the authorization serv=
ice
> and this would be a forum to see if others also do or not.
>=20
> -----Original Message-----
> From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]
> Sent: Thursday, March 17, 2011 11:56 AM
> To: Anthony Nadalin; Hannes Tschofenig; oauth@ietf.org
> Subject: RE: [OAUTH-WG] Agenda Proposal
>=20
> Re: draft-jones-simple-web-discovery
>=20
> While I don't have an objections to this document being presented and
> discussed at the meeting, I want to point that this has absolutely nothin=
g to
> do with this working group and if the IETF community has an interest in
> pursuing it, it does not belong in this working group.
>=20
> EHL
>=20
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > Of Anthony Nadalin
> > Sent: Thursday, March 17, 2011 11:54 AM
> > To: Hannes Tschofenig; oauth@ietf.org
> > Subject: Re: [OAUTH-WG] Agenda Proposal
> >
> > Is it possible to add these to the mix?
> >
> > http://www.ietf.org/id/draft-jones-simple-web-discovery-00.txt
> >
> > and also the
> > http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-
> > 00.txt
> >
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > Of Hannes Tschofenig
> > Sent: Thursday, March 17, 2011 11:29 AM
> > To: oauth@ietf.org
> > Subject: [OAUTH-WG] Agenda Proposal
> >
> > Open Authentication Protocol WG
> > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D-
> >
> > FRIDAY, April 1, 2011
> > Vienna/Madrid Room
> >
> > Chairs: Hannes Tschofenig/Blaine Cook
> >
> > Agenda
> > ------
> >
> > 1) Agenda Bashing (Chairs)
> >
> > 2) Discussion of Working Group Last Call Comments (Chairs/Mike Jones)
> > http://datatracker.ietf.org/doc/draft-ietf-oauth-v2/
> > http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/
> > http://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/
> >
> > 3) OAuth Security (Thorsten)
> > http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/
> >
> > 4) OAuth JSON Encoding (Mike Jones)
> > http://tools.ietf.org/html/draft-jones-json-web-token-01
> >
> > 5) OAuth Use Cases (Zachary Zeltsan)
> > https://datatracker.ietf.org/doc/draft-zeltsan-oauth-use-cases/
> >
> > 6) Re-Chartering Discussion (Chairs)
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> >
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20


From stpeter@stpeter.im  Thu Mar 17 16:33:55 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DC86B3A6B3D for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 16:33:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.604
X-Spam-Level: 
X-Spam-Status: No, score=-102.604 tagged_above=-999 required=5 tests=[AWL=-0.005, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0qnL4FqdviC0 for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 16:33:53 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id EE53B3A6A77 for <oauth@ietf.org>; Thu, 17 Mar 2011 16:33:52 -0700 (PDT)
Received: from squire.local (dsl-251-69.dynamic-dsl.frii.net [216.17.251.69]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 61B294006D; Thu, 17 Mar 2011 17:35:59 -0600 (MDT)
Message-ID: <4D829AB7.7060502@stpeter.im>
Date: Thu, 17 Mar 2011 17:35:19 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <4D825300.3060005@gmx.net>	<B26C1EF377CB694EAB6BDDC8E624B6E70B6B2520@SN1PRD0302MB100.namprd03.prod.outlook.com>	<90C41DD21FB7C64BB94121FBBC2E7234464F4328A9@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<B26C1EF377CB694EAB6BDDC8E624B6E70B6B99FF@SN1PRD0302MB097.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432958@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F432958@P3PW5EX1MB01.EX1.SECURESERVER.NET>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms050806030100010001010307"
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Agenda Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Mar 2011 23:33:56 -0000

This is a cryptographically signed message in MIME format.

--------------ms050806030100010001010307
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

+1.

Discussion on the apps-discuss list would be welcome:

https://www.ietf.org/mailman/listinfo/apps-discuss

On 3/17/11 4:57 PM, Eran Hammer-Lahav wrote:
> This proposal goes far beyond just solving any discovery needs for
> OAuth. It also directly competes with existing (deployed) proposals.
> This group is not the right forum to discuss and design a generally
> applicable discovery solution for the web. Once discovery is added to
> our charter (any discovery is currently out of scope), we can figure
> out if there are existing solutions to utilize, if we want to create
> a specialized solution for OAuth, or if a general purpose solution is
> needed (and does not already exist in a published standard).
>=20
> If a general purpose solution is the direction to go, this is not the
> venue to develop it.
>=20
> So again, presenting this at the meeting is fine, but beyond that,
> this working group is not chartered nor equipped to develop this
> technology for general purpose. In addition, the right way to present
> SWD to this WG is via an example of how OAuth might be using it, and
> not any direct discussion of the merits of the actual proposal - that
> belongs on the Apps-discuss list until another forum is identified or
> created.
>=20
> EHL
>=20
>> -----Original Message----- From: Anthony Nadalin
>> [mailto:tonynad@microsoft.com] Sent: Thursday, March 17, 2011 3:41
>> PM To: Eran Hammer-Lahav; Hannes Tschofenig; oauth@ietf.org=20
>> Subject: RE: [OAUTH-WG] Agenda Proposal
>>=20
>> I think it does for example how one might discover the
>> authorization service and this would be a forum to see if others
>> also do or not.
>>=20
>> -----Original Message----- From: Eran Hammer-Lahav
>> [mailto:eran@hueniverse.com] Sent: Thursday, March 17, 2011 11:56
>> AM To: Anthony Nadalin; Hannes Tschofenig; oauth@ietf.org Subject:
>> RE: [OAUTH-WG] Agenda Proposal
>>=20
>> Re: draft-jones-simple-web-discovery
>>=20
>> While I don't have an objections to this document being presented
>> and discussed at the meeting, I want to point that this has
>> absolutely nothing to do with this working group and if the IETF
>> community has an interest in pursuing it, it does not belong in
>> this working group.
>>=20
>> EHL
>>=20
>>> -----Original Message----- From: oauth-bounces@ietf.org
>>> [mailto:oauth-bounces@ietf.org] On Behalf Of Anthony Nadalin=20
>>> Sent: Thursday, March 17, 2011 11:54 AM To: Hannes Tschofenig;
>>> oauth@ietf.org Subject: Re: [OAUTH-WG] Agenda Proposal
>>>=20
>>> Is it possible to add these to the mix?
>>>=20
>>> http://www.ietf.org/id/draft-jones-simple-web-discovery-00.txt
>>>=20
>>> and also the=20
>>> http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-=20
>>> 00.txt
>>>=20
>>> -----Original Message----- From: oauth-bounces@ietf.org
>>> [mailto:oauth-bounces@ietf.org] On Behalf Of Hannes Tschofenig=20
>>> Sent: Thursday, March 17, 2011 11:29 AM To: oauth@ietf.org=20
>>> Subject: [OAUTH-WG] Agenda Proposal
>>>=20
>>> Open Authentication Protocol WG =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D-
>>>=20
>>> FRIDAY, April 1, 2011 Vienna/Madrid Room
>>>=20
>>> Chairs: Hannes Tschofenig/Blaine Cook
>>>=20
>>> Agenda ------
>>>=20
>>> 1) Agenda Bashing (Chairs)
>>>=20
>>> 2) Discussion of Working Group Last Call Comments (Chairs/Mike
>>> Jones) http://datatracker.ietf.org/doc/draft-ietf-oauth-v2/=20
>>> http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/=20
>>> http://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/
>>>=20
>>> 3) OAuth Security (Thorsten)=20
>>> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/
>>>
>>>
>>>=20
4) OAuth JSON Encoding (Mike Jones)
>>> http://tools.ietf.org/html/draft-jones-json-web-token-01
>>>=20
>>> 5) OAuth Use Cases (Zachary Zeltsan)=20
>>> https://datatracker.ietf.org/doc/draft-zeltsan-oauth-use-cases/
>>>=20
>>> 6) Re-Chartering Discussion (Chairs)
>>>=20
>>> _______________________________________________ OAuth mailing
>>> list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>>=20
>>>=20


--------------ms050806030100010001010307
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms050806030100010001010307--

From tonynad@microsoft.com  Thu Mar 17 19:33:56 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 84D343A696C for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 19:33:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.319
X-Spam-Level: 
X-Spam-Status: No, score=-7.319 tagged_above=-999 required=5 tests=[AWL=0.148,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KI+9VUPYdX7e for <oauth@core3.amsl.com>; Thu, 17 Mar 2011 19:33:55 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 04A823A67EE for <oauth@ietf.org>; Thu, 17 Mar 2011 19:33:54 -0700 (PDT)
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (157.54.80.48) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 17 Mar 2011 19:35:23 -0700
Received: from ch1outboundpool.messaging.microsoft.com (157.54.51.114) by mail.microsoft.com (157.54.80.48) with Microsoft SMTP Server (TLS) id 14.1.270.2; Thu, 17 Mar 2011 19:35:23 -0700
Received: from mail24-ch1-R.bigfish.com (216.32.181.168) by CH1EHSOBE003.bigfish.com (10.43.70.53) with Microsoft SMTP Server id 14.1.225.8; Fri, 18 Mar 2011 02:35:22 +0000
Received: from mail24-ch1 (localhost.localdomain [127.0.0.1])	by mail24-ch1-R.bigfish.com (Postfix) with ESMTP id 1DEC7C802F9	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Fri, 18 Mar 2011 02:35:22 +0000 (UTC)
X-SpamScore: -41
X-BigFish: PS-41(zz542N1432N9371PzzdafM1202h1082kzz1033IL8275eh8275dha1495iz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT002.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail24-ch1 (localhost.localdomain [127.0.0.1]) by mail24-ch1 (MessageSwitch) id 1300415721810393_3911; Fri, 18 Mar 2011 02:35:21 +0000 (UTC)
Received: from CH1EHSMHS003.bigfish.com (snatpool1.int.messaging.microsoft.com [10.43.68.245])	by mail24-ch1.bigfish.com (Postfix) with ESMTP id B3B6210B004E;	Fri, 18 Mar 2011 02:35:21 +0000 (UTC)
Received: from SN1PRD0302HT002.namprd03.prod.outlook.com (65.55.94.9) by CH1EHSMHS003.bigfish.com (10.43.70.3) with Microsoft SMTP Server (TLS) id 14.1.225.22; Fri, 18 Mar 2011 02:35:21 +0000
Received: from SN1PRD0302MB097.namprd03.prod.outlook.com ([169.254.8.208]) by SN1PRD0302HT002.namprd03.prod.outlook.com ([10.14.149.46]) with mapi id 14.01.0225.027; Fri, 18 Mar 2011 02:35:20 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, Hannes Tschofenig <hannes.tschofenig@gmx.net>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Agenda Proposal
Thread-Index: AQHL5NFBdQUZ9sYZYkucSI2AqplAT5Qx3X2ggAACdYCAAAGZwIAAQLQQgAA9TJA=
Date: Fri, 18 Mar 2011 02:35:19 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E70B6BBB01@SN1PRD0302MB097.namprd03.prod.outlook.com>
References: <4D825300.3060005@gmx.net> <B26C1EF377CB694EAB6BDDC8E624B6E70B6B2520@SN1PRD0302MB100.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234464F4328A9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E70B6B99FF@SN1PRD0302MB097.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432958@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F432958@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [50.46.124.183]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT002.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%HUENIVERSE.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%GMX.NET$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14HUBC105.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC105.redmond.corp.microsoft.com
Subject: Re: [OAUTH-WG] Agenda Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2011 02:33:56 -0000

You need to chill a little instead of just jumping on people w/o understand=
ing. First I did not say that I wanted to discuss a general discovery mecha=
nism, as my example was limited to OAuth usage not the generic case.

-----Original Message-----
From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]=20
Sent: Thursday, March 17, 2011 3:58 PM
To: Anthony Nadalin; Hannes Tschofenig; oauth@ietf.org
Subject: RE: [OAUTH-WG] Agenda Proposal

This proposal goes far beyond just solving any discovery needs for OAuth. I=
t also directly competes with existing (deployed) proposals. This group is =
not the right forum to discuss and design a generally applicable discovery =
solution for the web. Once discovery is added to our charter (any discovery=
 is currently out of scope), we can figure out if there are existing soluti=
ons to utilize, if we want to create a specialized solution for OAuth, or i=
f a general purpose solution is needed (and does not already exist in a pub=
lished standard).

If a general purpose solution is the direction to go, this is not the venue=
 to develop it.

So again, presenting this at the meeting is fine, but beyond that, this wor=
king group is not chartered nor equipped to develop this technology for gen=
eral purpose. In addition, the right way to present SWD to this WG is via a=
n example of how OAuth might be using it, and not any direct discussion of =
the merits of the actual proposal - that belongs on the Apps-discuss list u=
ntil another forum is identified or created.

EHL

> -----Original Message-----
> From: Anthony Nadalin [mailto:tonynad@microsoft.com]
> Sent: Thursday, March 17, 2011 3:41 PM
> To: Eran Hammer-Lahav; Hannes Tschofenig; oauth@ietf.org
> Subject: RE: [OAUTH-WG] Agenda Proposal
>=20
> I think it does for example how one might discover the authorization=20
> service and this would be a forum to see if others also do or not.
>=20
> -----Original Message-----
> From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]
> Sent: Thursday, March 17, 2011 11:56 AM
> To: Anthony Nadalin; Hannes Tschofenig; oauth@ietf.org
> Subject: RE: [OAUTH-WG] Agenda Proposal
>=20
> Re: draft-jones-simple-web-discovery
>=20
> While I don't have an objections to this document being presented and=20
> discussed at the meeting, I want to point that this has absolutely=20
> nothing to do with this working group and if the IETF community has an=20
> interest in pursuing it, it does not belong in this working group.
>=20
> EHL
>=20
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On=20
> > Behalf Of Anthony Nadalin
> > Sent: Thursday, March 17, 2011 11:54 AM
> > To: Hannes Tschofenig; oauth@ietf.org
> > Subject: Re: [OAUTH-WG] Agenda Proposal
> >
> > Is it possible to add these to the mix?
> >
> > http://www.ietf.org/id/draft-jones-simple-web-discovery-00.txt
> >
> > and also the
> > http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-
> > 00.txt
> >
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On=20
> > Behalf Of Hannes Tschofenig
> > Sent: Thursday, March 17, 2011 11:29 AM
> > To: oauth@ietf.org
> > Subject: [OAUTH-WG] Agenda Proposal
> >
> > Open Authentication Protocol WG
> > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D-
> >
> > FRIDAY, April 1, 2011
> > Vienna/Madrid Room
> >
> > Chairs: Hannes Tschofenig/Blaine Cook
> >
> > Agenda
> > ------
> >
> > 1) Agenda Bashing (Chairs)
> >
> > 2) Discussion of Working Group Last Call Comments (Chairs/Mike=20
> > Jones) http://datatracker.ietf.org/doc/draft-ietf-oauth-v2/
> > http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/
> > http://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/
> >
> > 3) OAuth Security (Thorsten)
> > http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/
> >
> > 4) OAuth JSON Encoding (Mike Jones)
> > http://tools.ietf.org/html/draft-jones-json-web-token-01
> >
> > 5) OAuth Use Cases (Zachary Zeltsan)=20
> > https://datatracker.ietf.org/doc/draft-zeltsan-oauth-use-cases/
> >
> > 6) Re-Chartering Discussion (Chairs)
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> >
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20






From hannes.tschofenig@gmx.net  Fri Mar 18 11:06:24 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 12BEF3A69E1 for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 11:06:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h0M1hOH3-G-g for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 11:06:23 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.22]) by core3.amsl.com (Postfix) with SMTP id B1F1C3A69D6 for <oauth@ietf.org>; Fri, 18 Mar 2011 11:06:22 -0700 (PDT)
Received: (qmail invoked by alias); 18 Mar 2011 18:07:50 -0000
Received: from a88-115-222-204.elisa-laajakaista.fi (EHLO [192.168.1.3]) [88.115.222.204] by mail.gmx.net (mp062) with SMTP; 18 Mar 2011 19:07:50 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/MxlVuTY7M+ibxi9ImwvsITUqztgKIQATVAFlVKC QHmkB9Gx91ZxAa
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Date: Fri, 18 Mar 2011 20:07:49 +0200
Message-Id: <465AA23C-41EF-452B-A36C-7C53B27A8787@gmx.net>
To: OAuth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1082)
X-Mailer: Apple Mail (2.1082)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] WOES (Web Object Encryption and Signing) BarBOF
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2011 18:06:24 -0000

Hi all,

I just want to point you to the WOES BarBOF:

* Room: Karlin I
* Date: 20:00 on Monday, 28th March 2011
* Relevant documents: 
   - http://www.ietf.org/id/draft-rescorla-jsms-00.txt
   - http://tools.ietf.org/html/draft-jones-json-web-token-01

Ciao
Hannes

From hannes.tschofenig@gmx.net  Fri Mar 18 11:07:17 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1AEF23A69E1 for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 11:07:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DbaYz1Kw4SR9 for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 11:07:15 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.22]) by core3.amsl.com (Postfix) with SMTP id 4E7A83A69DF for <oauth@ietf.org>; Fri, 18 Mar 2011 11:07:15 -0700 (PDT)
Received: (qmail invoked by alias); 18 Mar 2011 18:08:43 -0000
Received: from a88-115-222-204.elisa-laajakaista.fi (EHLO [192.168.1.3]) [88.115.222.204] by mail.gmx.net (mp062) with SMTP; 18 Mar 2011 19:08:43 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/UbDRPxp/UlOAYpWHwjMPWlVd9dqzhGqgjdlaQw3 4OtKUdmkgEeSZD
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Fri, 18 Mar 2011 20:08:43 +0200
Message-Id: <B818AD06-097D-4162-9586-ACC60673B0A1@gmx.net>
To: OAuth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1082)
X-Mailer: Apple Mail (2.1082)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] Updated Agenda
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2011 18:07:17 -0000

Here is the updated agenda.=20

Ciao
Hannes

PS: I don't see a problem with Mike presenting his discovery draft =
(draft-jones-simple-web-discovery-00.txt).=20

-----

Open Authentication Protocol WG
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D-

FRIDAY, April 1, 2011
Vienna/Madrid Room

Chairs: Hannes Tschofenig/Blaine Cook

Agenda
------

1) Agenda Bashing (Chairs)

2) Discussion of Working Group Last Call Comments (Chairs/Mike Jones)
http://datatracker.ietf.org/doc/draft-ietf-oauth-v2/
http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/  =20
http://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/

Discussion goal: We will have a look at the status of the last call
(in case there is need for comments).=20

3) OAuth Security (Thorsten Lodderstedt)
http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/

Discussion goal: This is a newet document and Thorsten will=20
give us an overview of his proposal to capture the OAuth security
aspects.=20

4) OAuth JSON Encoding (Mike Jones)
http://tools.ietf.org/html/draft-jones-json-web-token-01
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.txt

Discussion goal: These are also new documents and Mike=20
will explain their purpose. There is also the WOES barBOF
discussion relevant to this topic (on Monday evening).

5) OAuth Use Cases (Zachary Zeltsan)
https://datatracker.ietf.org/doc/draft-zeltsan-oauth-use-cases/=20

Discussion goal: This document was presented a few times already.
We need to check whether there is interest in continuing this=20
effort.=20

6) Simple Web Discovery (Mike Jones)=20
http://www.ietf.org/id/draft-jones-simple-web-discovery-00.txt

Discussion goal: This is a new document to address discovery
for OAuth. Mike will explain the idea to the group and will=20
point other related work. We need to decide whether this=20
document should be considered for the WG rechartering=20
activity.

6) Re-Chartering Discussion (Chairs)

Discussion goal: The chairs will present the updated charter=20
text and we will determine necessary changes.
=20=

From hannes.tschofenig@gmx.net  Fri Mar 18 11:20:13 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0C7AD3A6A2D for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 11:20:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sqB1cuNbYfz0 for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 11:20:11 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.23]) by core3.amsl.com (Postfix) with SMTP id 3C92E3A69B7 for <oauth@ietf.org>; Fri, 18 Mar 2011 11:20:10 -0700 (PDT)
Received: (qmail invoked by alias); 18 Mar 2011 18:21:39 -0000
Received: from a88-115-222-204.elisa-laajakaista.fi (EHLO [192.168.1.3]) [88.115.222.204] by mail.gmx.net (mp017) with SMTP; 18 Mar 2011 19:21:39 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/4/RdhbqT4EZDvGNHSpXFH2OGsHdXZ9PQcs7s+8q wj/s9RmMJIDM/I
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E70B6B2520@SN1PRD0302MB100.namprd03.prod.outlook.com>
Date: Fri, 18 Mar 2011 20:21:38 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <640955D5-A0C3-4EBF-B31A-5FC04D2E3761@gmx.net>
References: <4D825300.3060005@gmx.net> <B26C1EF377CB694EAB6BDDC8E624B6E70B6B2520@SN1PRD0302MB100.namprd03.prod.outlook.com>
To: Anthony Nadalin <tonynad@microsoft.com>
X-Mailer: Apple Mail (2.1082)
X-Y-GMX-Trusted: 0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Agenda Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2011 18:20:13 -0000

Hi Tony,=20

please make sure that draft-jones-oauth-jwt-bearer-00.txt  is submitted =
before the working group session starts.=20

Ciao
Hannes

On Mar 17, 2011, at 8:53 PM, Anthony Nadalin wrote:

> Is it possible to add these to the mix?
>=20
> http://www.ietf.org/id/draft-jones-simple-web-discovery-00.txt
>=20
> and also the  =
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.txt=20
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Hannes Tschofenig
> Sent: Thursday, March 17, 2011 11:29 AM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Agenda Proposal
>=20
> Open Authentication Protocol WG
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D-
>=20
> FRIDAY, April 1, 2011
> Vienna/Madrid Room
>=20
> Chairs: Hannes Tschofenig/Blaine Cook
>=20
> Agenda
> ------
>=20
> 1) Agenda Bashing (Chairs)
>=20
> 2) Discussion of Working Group Last Call Comments (Chairs/Mike Jones) =
http://datatracker.ietf.org/doc/draft-ietf-oauth-v2/
> http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/
> http://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/
>=20
> 3) OAuth Security (Thorsten)
> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/
>=20
> 4) OAuth JSON Encoding (Mike Jones)
> http://tools.ietf.org/html/draft-jones-json-web-token-01
>=20
> 5) OAuth Use Cases (Zachary Zeltsan)
> https://datatracker.ietf.org/doc/draft-zeltsan-oauth-use-cases/
>=20
> 6) Re-Chartering Discussion (Chairs)
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20
>=20


From tonynad@microsoft.com  Fri Mar 18 11:31:28 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4EE8B3A69D0 for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 11:31:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.337
X-Spam-Level: 
X-Spam-Status: No, score=-7.337 tagged_above=-999 required=5 tests=[AWL=0.130,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WVxK2xhjLEbF for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 11:31:26 -0700 (PDT)
Received: from smtp.microsoft.com (mail2.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 3D3F33A69B7 for <oauth@ietf.org>; Fri, 18 Mar 2011 11:31:26 -0700 (PDT)
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (157.54.80.48) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 18 Mar 2011 11:32:55 -0700
Received: from DB3EHSOBE003.bigfish.com (157.54.51.112) by mail.microsoft.com (157.54.80.48) with Microsoft SMTP Server (TLS) id 14.1.270.2; Fri, 18 Mar 2011 11:32:55 -0700
Received: from mail38-db3-R.bigfish.com (10.3.81.244) by DB3EHSOBE003.bigfish.com (10.3.84.23) with Microsoft SMTP Server id 14.1.225.8; Fri, 18 Mar 2011 18:32:35 +0000
Received: from mail38-db3 (localhost.localdomain [127.0.0.1])	by mail38-db3-R.bigfish.com (Postfix) with ESMTP id 020D46705DC	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Fri, 18 Mar 2011 18:32:35 +0000 (UTC)
X-SpamScore: -47
X-BigFish: PS-47(zz542N1432N98dN9371PzzdafM1202h1082kzz1033IL8275eh8275dha1495iz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT001.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail38-db3 (localhost.localdomain [127.0.0.1]) by mail38-db3 (MessageSwitch) id 1300473138732247_1317; Fri, 18 Mar 2011 18:32:18 +0000 (UTC)
Received: from DB3EHSMHS005.bigfish.com (unknown [10.3.81.252])	by mail38-db3.bigfish.com (Postfix) with ESMTP id 7043F1B30052; Fri, 18 Mar 2011 18:32:18 +0000 (UTC)
Received: from SN1PRD0302HT001.namprd03.prod.outlook.com (65.55.94.9) by DB3EHSMHS005.bigfish.com (10.3.87.105) with Microsoft SMTP Server (TLS) id 14.1.225.22; Fri, 18 Mar 2011 18:31:30 +0000
Received: from SN1PRD0302MB097.namprd03.prod.outlook.com ([169.254.8.208]) by SN1PRD0302HT001.namprd03.prod.outlook.com ([10.14.149.47]) with mapi id 14.01.0225.027; Fri, 18 Mar 2011 18:31:27 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Thread-Topic: [OAUTH-WG] Agenda Proposal
Thread-Index: AQHL5NFBdQUZ9sYZYkucSI2AqplAT5Qx3X2ggAGLhACAAAKnUA==
Date: Fri, 18 Mar 2011 18:31:26 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E70B6BDEBA@SN1PRD0302MB097.namprd03.prod.outlook.com>
References: <4D825300.3060005@gmx.net> <B26C1EF377CB694EAB6BDDC8E624B6E70B6B2520@SN1PRD0302MB100.namprd03.prod.outlook.com> <640955D5-A0C3-4EBF-B31A-5FC04D2E3761@gmx.net>
In-Reply-To: <640955D5-A0C3-4EBF-B31A-5FC04D2E3761@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [131.107.0.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT001.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%GMX.NET$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14HUBC105.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC105.redmond.corp.microsoft.com
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Agenda Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2011 18:31:28 -0000

Will do as I think the system opens back up on the 28th

-----Original Message-----
From: Hannes Tschofenig [mailto:hannes.tschofenig@gmx.net]=20
Sent: Friday, March 18, 2011 11:22 AM
To: Anthony Nadalin
Cc: Hannes Tschofenig; oauth@ietf.org
Subject: Re: [OAUTH-WG] Agenda Proposal

Hi Tony,=20

please make sure that draft-jones-oauth-jwt-bearer-00.txt  is submitted bef=
ore the working group session starts.=20

Ciao
Hannes

On Mar 17, 2011, at 8:53 PM, Anthony Nadalin wrote:

> Is it possible to add these to the mix?
>=20
> http://www.ietf.org/id/draft-jones-simple-web-discovery-00.txt
>=20
> and also the  http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-0=
0.txt=20
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of=
 Hannes Tschofenig
> Sent: Thursday, March 17, 2011 11:29 AM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Agenda Proposal
>=20
> Open Authentication Protocol WG
> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D-
>=20
> FRIDAY, April 1, 2011
> Vienna/Madrid Room
>=20
> Chairs: Hannes Tschofenig/Blaine Cook
>=20
> Agenda
> ------
>=20
> 1) Agenda Bashing (Chairs)
>=20
> 2) Discussion of Working Group Last Call Comments (Chairs/Mike Jones) htt=
p://datatracker.ietf.org/doc/draft-ietf-oauth-v2/
> http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/
> http://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/
>=20
> 3) OAuth Security (Thorsten)
> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/
>=20
> 4) OAuth JSON Encoding (Mike Jones)
> http://tools.ietf.org/html/draft-jones-json-web-token-01
>=20
> 5) OAuth Use Cases (Zachary Zeltsan)
> https://datatracker.ietf.org/doc/draft-zeltsan-oauth-use-cases/
>=20
> 6) Re-Chartering Discussion (Chairs)
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20
>=20






From primmer@google.com  Fri Mar 18 15:54:43 2011
Return-Path: <primmer@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2B7673A6A85 for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 15:54:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level: 
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n7AHus6P421n for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 15:54:42 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.44.51]) by core3.amsl.com (Postfix) with ESMTP id 078743A6A62 for <oauth@ietf.org>; Fri, 18 Mar 2011 15:54:41 -0700 (PDT)
Received: from kpbe15.cbf.corp.google.com (kpbe15.cbf.corp.google.com [172.25.105.79]) by smtp-out.google.com with ESMTP id p2IMuBIM011065 for <oauth@ietf.org>; Fri, 18 Mar 2011 15:56:11 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1300488971; bh=HzKx39yi5/4XvpJwbylvtSfE3Xw=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=QljEA8vnD7szyXpAD7SSKi6Nv2ZFmIN9IsKNlzBuhbEP4UhaHAq1Z5uJHxTNE60Mp DfrSTVfXTPj+OnL/4Tk4g==
Received: from iyf13 (iyf13.prod.google.com [10.241.50.77]) by kpbe15.cbf.corp.google.com with ESMTP id p2IMuA2m026887 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Fri, 18 Mar 2011 15:56:10 -0700
Received: by iyf13 with SMTP id 13so4925532iyf.28 for <oauth@ietf.org>; Fri, 18 Mar 2011 15:56:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=nuIC6pqehwWUD7VpWRalfj6SYlSd4n3U9QsG763AWUE=; b=wzzU/timpaWJLYAqWhAzV2+lJSkIaF+A8jSH0+onz/DcRK7DnmOPOPtY6ynFrVbsK3 2LkpBK7HdIEYdUHMTrTg==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; b=OI9mAvgASeXxeVl+o3sV8nb936Qw4M3ecU5oPBP7OPmurPj/DzlATU7U7T4Z+p4WI8 dkqU2u9/Uduxv7CgAM0A==
Received: by 10.231.115.146 with SMTP id i18mr1500740ibq.79.1300488970136; Fri, 18 Mar 2011 15:56:10 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.231.26.157 with HTTP; Fri, 18 Mar 2011 15:55:49 -0700 (PDT)
In-Reply-To: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com>
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com>
From: David Primmer <primmer@google.com>
Date: Fri, 18 Mar 2011 15:55:49 -0700
Message-ID: <AANLkTimGjiCGk5dpA=YVzq5vDkLR2+caSz=pZ5WiZO9H@mail.gmail.com>
To: Phil Hunt <phil.hunt@oracle.com>
Content-Type: text/plain; charset=ISO-8859-1
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2011 22:54:43 -0000

Hi Phil,

I actually think this rephrasing of the rule of thumb is not really
helpful based on how the word "legs" has been used in my experience of
discussing and teaching OAuth. I actually tried to be pretty explicit
about this topic in a talk I did at Google I/O last year because we
have lots of questions about 2 versus 3 legged OAuth since the launch
of the Google Apps Marketplace.
http://www.youtube.com/watch?v=0L_dEOjhADQ. I speak about 17mins in.

We have traditionally used the terms two legged OAuth and three legged
OAuth to describe the trust relationships involved in the grant. I
think your interpretation is very different and not a common way to
use the terms 'legs' in relation to OAuth and will simply confuse
people. 2LO involves a client authenticating itself to a server. 3LO
involves those two previous actors, plus a user/resource owner who
delegates permissions to the client. In everyday use, 2LO is 'server
to server' auth with out of band permissions and user identity and 3LO
involves an individual grant where the user's grant is identified by a
token given to the client and passed to the server on access. Another
way to look at it is 2LO is just HTTP request signing.

davep

On Mon, Feb 21, 2011 at 4:45 PM, Phil Hunt <phil.hunt@oracle.com> wrote:
> FYI. I published a blog post with a flow-chart explaining the legs of OAuth.
> http://independentidentity.blogspot.com/2011/02/does-oauth-have-legs.html
>
> Please let me know if any corrections should be made, or for that matter, any improvements!
>
> Phil
> phil.hunt@oracle.com
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

From phil.hunt@oracle.com  Fri Mar 18 17:05:39 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5BB513A6A83 for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 17:05:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.203
X-Spam-Level: 
X-Spam-Status: No, score=-5.203 tagged_above=-999 required=5 tests=[AWL=0.001,  BAYES_00=-2.599, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3+SA5KkZqpca for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 17:05:38 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 4294C3A69E5 for <oauth@ietf.org>; Fri, 18 Mar 2011 17:05:38 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2J074Ou029136 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Sat, 19 Mar 2011 00:07:05 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2J073Lx029558 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 19 Mar 2011 00:07:03 GMT
Received: from abhmt016.oracle.com (abhmt016.oracle.com [141.146.116.25]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2J073m7004918; Fri, 18 Mar 2011 19:07:03 -0500
Received: from [25.67.126.57] (/74.198.150.185) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 18 Mar 2011 17:07:03 -0700
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com> <AANLkTimGjiCGk5dpA=YVzq5vDkLR2+caSz=pZ5WiZO9H@mail.gmail.com>
In-Reply-To: <AANLkTimGjiCGk5dpA=YVzq5vDkLR2+caSz=pZ5WiZO9H@mail.gmail.com>
Mime-Version: 1.0 (iPhone Mail 8F190)
Content-Type: text/plain; charset=us-ascii
Message-Id: <3C84AD7A-F00F-43EC-AAD3-AD2DCFB46B0E@oracle.com>
Content-Transfer-Encoding: quoted-printable
X-Mailer: iPhone Mail (8F190)
From: Phillip Hunt <phil.hunt@oracle.com>
Date: Fri, 18 Mar 2011 17:06:57 -0700
To: David Primmer <primmer@google.com>
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090204.4D83F3A8.0031,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Mar 2011 00:05:39 -0000

I agree with what you are saying. We were having trouble understanding legs t=
oo, so I came up with the diagram. The diagram does show the parties aspect.=
 But I remain uncomfortable about the terminology.=20

Phil

Sent from my phone.=20

On 2011-03-18, at 15:55, David Primmer <primmer@google.com> wrote:

> Hi Phil,
>=20
> I actually think this rephrasing of the rule of thumb is not really
> helpful based on how the word "legs" has been used in my experience of
> discussing and teaching OAuth. I actually tried to be pretty explicit
> about this topic in a talk I did at Google I/O last year because we
> have lots of questions about 2 versus 3 legged OAuth since the launch
> of the Google Apps Marketplace.
> http://www.youtube.com/watch?v=3D0L_dEOjhADQ. I speak about 17mins in.
>=20
> We have traditionally used the terms two legged OAuth and three legged
> OAuth to describe the trust relationships involved in the grant. I
> think your interpretation is very different and not a common way to
> use the terms 'legs' in relation to OAuth and will simply confuse
> people. 2LO involves a client authenticating itself to a server. 3LO
> involves those two previous actors, plus a user/resource owner who
> delegates permissions to the client. In everyday use, 2LO is 'server
> to server' auth with out of band permissions and user identity and 3LO
> involves an individual grant where the user's grant is identified by a
> token given to the client and passed to the server on access. Another
> way to look at it is 2LO is just HTTP request signing.
>=20
> davep
>=20
> On Mon, Feb 21, 2011 at 4:45 PM, Phil Hunt <phil.hunt@oracle.com> wrote:
>> FYI. I published a blog post with a flow-chart explaining the legs of OAu=
th.
>> http://independentidentity.blogspot.com/2011/02/does-oauth-have-legs.html=

>>=20
>> Please let me know if any corrections should be made, or for that matter,=
 any improvements!
>>=20
>> Phil
>> phil.hunt@oracle.com
>>=20
>>=20
>>=20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20

From eran@hueniverse.com  Fri Mar 18 17:19:11 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 215883A6A8C for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 17:19:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.564
X-Spam-Level: 
X-Spam-Status: No, score=-2.564 tagged_above=-999 required=5 tests=[AWL=0.035,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w+ck6fp3qJyZ for <oauth@core3.amsl.com>; Fri, 18 Mar 2011 17:19:10 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id E711A3A6A84 for <oauth@ietf.org>; Fri, 18 Mar 2011 17:19:09 -0700 (PDT)
Received: (qmail 31817 invoked from network); 19 Mar 2011 00:20:39 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 19 Mar 2011 00:20:39 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Fri, 18 Mar 2011 17:20:39 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phillip Hunt <phil.hunt@oracle.com>, David Primmer <primmer@google.com>
Date: Fri, 18 Mar 2011 17:20:27 -0700
Thread-Topic: [OAUTH-WG] Flowchart for legs of OAuth
Thread-Index: AcvlyZnScTrlrtP/QaWBeF3mvw72wgAAcP4w
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F432BB0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com> <AANLkTimGjiCGk5dpA=YVzq5vDkLR2+caSz=pZ5WiZO9H@mail.gmail.com> <3C84AD7A-F00F-43EC-AAD3-AD2DCFB46B0E@oracle.com>
In-Reply-To: <3C84AD7A-F00F-43EC-AAD3-AD2DCFB46B0E@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Mar 2011 00:19:11 -0000

The legs terminology is just plain awful. I prefer parties, roles, anything=
 else.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Phillip Hunt
> Sent: Friday, March 18, 2011 5:07 PM
> To: David Primmer
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
>=20
> I agree with what you are saying. We were having trouble understanding le=
gs
> too, so I came up with the diagram. The diagram does show the parties
> aspect. But I remain uncomfortable about the terminology.
>=20
> Phil
>=20
> Sent from my phone.
>=20
> On 2011-03-18, at 15:55, David Primmer <primmer@google.com> wrote:
>=20
> > Hi Phil,
> >
> > I actually think this rephrasing of the rule of thumb is not really
> > helpful based on how the word "legs" has been used in my experience of
> > discussing and teaching OAuth. I actually tried to be pretty explicit
> > about this topic in a talk I did at Google I/O last year because we
> > have lots of questions about 2 versus 3 legged OAuth since the launch
> > of the Google Apps Marketplace.
> > http://www.youtube.com/watch?v=3D0L_dEOjhADQ. I speak about 17mins
> in.
> >
> > We have traditionally used the terms two legged OAuth and three legged
> > OAuth to describe the trust relationships involved in the grant. I
> > think your interpretation is very different and not a common way to
> > use the terms 'legs' in relation to OAuth and will simply confuse
> > people. 2LO involves a client authenticating itself to a server. 3LO
> > involves those two previous actors, plus a user/resource owner who
> > delegates permissions to the client. In everyday use, 2LO is 'server
> > to server' auth with out of band permissions and user identity and 3LO
> > involves an individual grant where the user's grant is identified by a
> > token given to the client and passed to the server on access. Another
> > way to look at it is 2LO is just HTTP request signing.
> >
> > davep
> >
> > On Mon, Feb 21, 2011 at 4:45 PM, Phil Hunt <phil.hunt@oracle.com> wrote=
:
> >> FYI. I published a blog post with a flow-chart explaining the legs of =
OAuth.
> >> http://independentidentity.blogspot.com/2011/02/does-oauth-have-
> legs.
> >> html
> >>
> >> Please let me know if any corrections should be made, or for that matt=
er,
> any improvements!
> >>
> >> Phil
> >> phil.hunt@oracle.com
> >>
> >>
> >>
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From hannes.tschofenig@gmx.net  Sat Mar 19 10:56:46 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C84423A6ABD for <oauth@core3.amsl.com>; Sat, 19 Mar 2011 10:56:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z13elVgyi6E4 for <oauth@core3.amsl.com>; Sat, 19 Mar 2011 10:56:46 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.23]) by core3.amsl.com (Postfix) with SMTP id A9E633A6AB7 for <oauth@ietf.org>; Sat, 19 Mar 2011 10:56:44 -0700 (PDT)
Received: (qmail invoked by alias); 19 Mar 2011 17:58:14 -0000
Received: from a88-115-222-204.elisa-laajakaista.fi (EHLO [192.168.1.3]) [88.115.222.204] by mail.gmx.net (mp053) with SMTP; 19 Mar 2011 18:58:14 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX18snJgRjZYspFCyNGzvaJCQIAg/pv8IvTDhvX5dnY QWjvo0njFP5l0R
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Sat, 19 Mar 2011 19:58:13 +0200
Message-Id: <389C0727-A69C-4C4B-BB60-53E1172A88AE@gmx.net>
To: "oauth@ietf.org WG" <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1082)
X-Mailer: Apple Mail (2.1082)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Mar 2011 17:56:46 -0000

Hi all,=20

the WGLC for the OAuth base specification has been completed and the =
authors think that this document is ready for a WGLC as well.=20

Hence, let us start the last call for comments on =
http://www.ietf.org/id/draft-ietf-oauth-saml2-bearer-03.txt

Please have your comments in no later than April 2nd.

Do remember to send a note in if you have read the document and have no =
other comments other than "its ready to go".=20

Thanks!
Hannes & Blaine=

From Michael.Jones@microsoft.com  Sat Mar 19 11:02:16 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AFB743A6ACB for <oauth@core3.amsl.com>; Sat, 19 Mar 2011 11:02:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level: 
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BUlGQzvHajBl for <oauth@core3.amsl.com>; Sat, 19 Mar 2011 11:02:16 -0700 (PDT)
Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id EC8083A6AC9 for <oauth@ietf.org>; Sat, 19 Mar 2011 11:02:15 -0700 (PDT)
Received: from TK5EX14HUBC104.redmond.corp.microsoft.com (157.54.80.25) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Sat, 19 Mar 2011 11:03:47 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14HUBC104.redmond.corp.microsoft.com ([157.54.80.25]) with mapi id 14.01.0270.002; Sat, 19 Mar 2011 11:03:47 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, "oauth@ietf.org WG" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
Thread-Index: AQHL5l94juBUBuHKq0GMCPmVQswN4ZQ08tSw
Date: Sat, 19 Mar 2011 18:03:46 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739432529E25E@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <389C0727-A69C-4C4B-BB60-53E1172A88AE@gmx.net>
In-Reply-To: <389C0727-A69C-4C4B-BB60-53E1172A88AE@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/mixed; boundary="_002_4E1F6AAD24975D4BA5B16804296739432529E25ETK5EX14MBXC207r_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Mar 2011 18:02:16 -0000

--_002_4E1F6AAD24975D4BA5B16804296739432529E25ETK5EX14MBXC207r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I'm confused.  Per the attached message that you sent on March 1st, the las=
t call period started then and ended on March 16th.  How is this second las=
t call different?

				Thanks,
				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of H=
annes Tschofenig
Sent: Saturday, March 19, 2011 10:58 AM
To: oauth@ietf.org WG
Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt

Hi all,=20

the WGLC for the OAuth base specification has been completed and the author=
s think that this document is ready for a WGLC as well.=20

Hence, let us start the last call for comments on http://www.ietf.org/id/dr=
aft-ietf-oauth-saml2-bearer-03.txt

Please have your comments in no later than April 2nd.

Do remember to send a note in if you have read the document and have no oth=
er comments other than "its ready to go".=20

Thanks!
Hannes & Blaine
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


--_002_4E1F6AAD24975D4BA5B16804296739432529E25ETK5EX14MBXC207r_
Content-Type: message/rfc822
Content-Disposition: attachment;
	creation-date="Sat, 19 Mar 2011 18:03:44 GMT";
	modification-date="Sat, 19 Mar 2011 18:03:44 GMT"

Received: from mail27-ch1-R.bigfish.com (157.54.51.81) by mail.microsoft.com
 (157.54.80.25) with Microsoft SMTP Server (TLS) id 14.1.270.2; Tue, 1 Mar
 2011 23:32:58 -0800
Received: from mail27-ch1 (localhost.localdomain [127.0.0.1])	by
 mail27-ch1-R.bigfish.com (Postfix) with ESMTP id C31477C0265;	Wed,  2 Mar
 2011 07:32:57 +0000 (UTC)
Received: from mail27-ch1 (localhost.localdomain [127.0.0.1]) by mail27-ch1
 (MessageSwitch) id 1299051169261205_924; Wed,  2 Mar 2011 07:32:49 +0000
 (UTC)
Received: from CH1EHSMHS003.bigfish.com (snatpool1.int.messaging.microsoft.com
 [10.43.68.250])	by mail27-ch1.bigfish.com (Postfix) with ESMTP id
 0579B338097;	Wed,  2 Mar 2011 07:32:18 +0000 (UTC)
Received: from mail.ietf.org (64.170.98.32) by CH1EHSMHS003.bigfish.com
 (10.43.70.3) with Microsoft SMTP Server id 14.1.225.8; Wed, 2 Mar 2011
 07:32:16 +0000
Received: from [127.0.0.1] (localhost [127.0.0.1])	by core3.amsl.com (Postfix)
 with ESMTP id 43B543A6A9A;	Tue,  1 Mar 2011 23:31:10 -0800 (PST)
Received: from localhost (localhost [127.0.0.1])	by core3.amsl.com (Postfix)
 with ESMTP id BCF3A3A6A49	for <oauth@core3.amsl.com>; Tue,  1 Mar 2011
 23:31:08 -0800 (PST)
Received: from mail.ietf.org ([64.170.98.32])	by localhost (core3.amsl.com
 [127.0.0.1]) (amavisd-new, port 10024)	with ESMTP id 3UmZu+1yPOZG for
 <oauth@core3.amsl.com>;	Tue,  1 Mar 2011 23:31:07 -0800 (PST)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.23])	by
 core3.amsl.com (Postfix) with SMTP id C9F443A6934	for <oauth@ietf.org>; Tue,
  1 Mar 2011 23:31:06 -0800 (PST)
Received: (qmail invoked by alias); 02 Mar 2011 07:32:10 -0000
Received: from unknown (EHLO [10.255.138.199]) [192.100.123.77]	by
 mail.gmx.net (mp049) with SMTP; 02 Mar 2011 08:32:10 +0100
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
To: OAuth WG <oauth@ietf.org>
Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AQHL2KwNtNCYQQdTT0GgApQhUIlMWg==
Sender: "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>
Date: Wed, 2 Mar 2011 07:32:05 +0000
Message-ID: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>,
	<mailto:oauth-request@ietf.org?subject=subscribe>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>,
	<mailto:oauth-request@ietf.org?subject=unsubscribe>
Content-Language: en-US
X-MS-Exchange-Organization-AuthSource: TK5EX14HUBC104.redmond.corp.microsoft.com
X-MS-Has-Attach: 
X-Auto-Response-Suppress: All
X-MS-TNEF-Correlator: 
list-archive: <http://www.ietf.org/mail-archive/web/oauth>
x-bigfish: vp
x-sender-lookup: Y
x-spamscore: 0
x-spam-status: No, score=-102.599 tagged_above=-999 required=5
	tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
x-spam-level: 
x-virus-scanned: amavisd-new at amsl.com
x-beenthere: oauth@ietf.org
x-mailman-version: 2.1.9
errors-to: oauth-bounces@ietf.org
list-id: OAUTH WG <oauth.ietf.org>
list-post: <mailto:oauth@ietf.org>
delivered-to: oauth@core3.amsl.com
x-original-to: oauth@core3.amsl.com
x-spam-score: -102.599
x-spam-flag: NO
x-provags-id: V01U2FsdGVkX19kFdxAITBkiTZZmUvshcIG3YcHU0DAA7gbng9yb3
	BOcO5SzSWqLw6I
x-y-gmx-trusted: 0
x-authenticated: #29516787
Content-Type: text/plain; charset="us-ascii"
Content-ID: <21924CA9AF59A4498F2A08C245DE8DD3@microsoft.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0

This is a Last Call for comments on

http://www.ietf.org/id/draft-ietf-oauth-v2-13.txt

Please have your comments in no later than March 16.

Do remember to send a note in if you have read the document and have no
other comments other than "its ready to go" - we need those as much as we n=
eed "I found a problem".

Thanks!
Hannes & Blaine

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


--_002_4E1F6AAD24975D4BA5B16804296739432529E25ETK5EX14MBXC207r_--

From Anil.Saldhana@redhat.com  Sat Mar 19 11:35:53 2011
Return-Path: <Anil.Saldhana@redhat.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8B7D83A694E for <oauth@core3.amsl.com>; Sat, 19 Mar 2011 11:35:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Level: 
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wXU8ZQnEvh5r for <oauth@core3.amsl.com>; Sat, 19 Mar 2011 11:35:52 -0700 (PDT)
Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by core3.amsl.com (Postfix) with ESMTP id 662FD3A6920 for <oauth@ietf.org>; Sat, 19 Mar 2011 11:35:52 -0700 (PDT)
Received: from int-mx12.intmail.prod.int.phx2.redhat.com (int-mx12.intmail.prod.int.phx2.redhat.com [10.5.11.25]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id p2JIbNcs008533 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <oauth@ietf.org>; Sat, 19 Mar 2011 14:37:23 -0400
Received: from localhost.sadbhav (vpn-229-47.phx2.redhat.com [10.3.229.47]) by int-mx12.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id p2JIbM3a002417 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for <oauth@ietf.org>; Sat, 19 Mar 2011 14:37:23 -0400
Message-ID: <4D84F7E2.6090305@redhat.com>
Date: Sat, 19 Mar 2011 13:37:22 -0500
From: Anil Saldhana <Anil.Saldhana@redhat.com>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.15) Gecko/20110307 Fedora/3.1.9-0.39.b3pre.fc14 Thunderbird/3.1.9
MIME-Version: 1.0
To: oauth@ietf.org
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com>	<AANLkTimGjiCGk5dpA=YVzq5vDkLR2+caSz=pZ5WiZO9H@mail.gmail.com>	<3C84AD7A-F00F-43EC-AAD3-AD2DCFB46B0E@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432BB0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F432BB0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.68 on 10.5.11.25
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Mar 2011 18:35:53 -0000

I agree.  "2 party oauth", "3 party oauth"  tells  what it is, rather than
"3 legged oauth".

On 03/18/2011 07:20 PM, Eran Hammer-Lahav wrote:
> The legs terminology is just plain awful. I prefer parties, roles, anything else.
>
> EHL
>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>> Of Phillip Hunt
>> Sent: Friday, March 18, 2011 5:07 PM
>> To: David Primmer
>> Cc: OAuth WG
>> Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
>>
>> I agree with what you are saying. We were having trouble understanding legs
>> too, so I came up with the diagram. The diagram does show the parties
>> aspect. But I remain uncomfortable about the terminology.
>>
>> Phil
>>
>> Sent from my phone.
>>
>> On 2011-03-18, at 15:55, David Primmer<primmer@google.com>  wrote:
>>
>>> Hi Phil,
>>>
>>> I actually think this rephrasing of the rule of thumb is not really
>>> helpful based on how the word "legs" has been used in my experience of
>>> discussing and teaching OAuth. I actually tried to be pretty explicit
>>> about this topic in a talk I did at Google I/O last year because we
>>> have lots of questions about 2 versus 3 legged OAuth since the launch
>>> of the Google Apps Marketplace.
>>> http://www.youtube.com/watch?v=0L_dEOjhADQ. I speak about 17mins
>> in.
>>> We have traditionally used the terms two legged OAuth and three legged
>>> OAuth to describe the trust relationships involved in the grant. I
>>> think your interpretation is very different and not a common way to
>>> use the terms 'legs' in relation to OAuth and will simply confuse
>>> people. 2LO involves a client authenticating itself to a server. 3LO
>>> involves those two previous actors, plus a user/resource owner who
>>> delegates permissions to the client. In everyday use, 2LO is 'server
>>> to server' auth with out of band permissions and user identity and 3LO
>>> involves an individual grant where the user's grant is identified by a
>>> token given to the client and passed to the server on access. Another
>>> way to look at it is 2LO is just HTTP request signing.
>>>
>>> davep
>>>
>>> On Mon, Feb 21, 2011 at 4:45 PM, Phil Hunt<phil.hunt@oracle.com>  wrote:
>>>> FYI. I published a blog post with a flow-chart explaining the legs of OAuth.
>>>> http://independentidentity.blogspot.com/2011/02/does-oauth-have-
>> legs.
>>>> html
>>>>
>>>> Please let me know if any corrections should be made, or for that matter,
>> any improvements!
>>>> Phil
>>>> phil.hunt@oracle.com
>>>>

From eran@hueniverse.com  Sat Mar 19 11:36:37 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0CFBD3A694E for <oauth@core3.amsl.com>; Sat, 19 Mar 2011 11:36:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.565
X-Spam-Level: 
X-Spam-Status: No, score=-2.565 tagged_above=-999 required=5 tests=[AWL=0.034,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RYStPYjwdhcc for <oauth@core3.amsl.com>; Sat, 19 Mar 2011 11:36:36 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 24F3A3A6920 for <oauth@ietf.org>; Sat, 19 Mar 2011 11:36:36 -0700 (PDT)
Received: (qmail 4714 invoked from network); 19 Mar 2011 18:38:07 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 19 Mar 2011 18:38:07 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Sat, 19 Mar 2011 11:38:06 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Mike Jones <Michael.Jones@microsoft.com>, Hannes Tschofenig <hannes.tschofenig@gmx.net>, "oauth@ietf.org WG" <oauth@ietf.org>
Date: Sat, 19 Mar 2011 11:37:53 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
Thread-Index: AQHL5l94juBUBuHKq0GMCPmVQswN4ZQ08tSwgAAJ20A=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F432C09@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <389C0727-A69C-4C4B-BB60-53E1172A88AE@gmx.net> <4E1F6AAD24975D4BA5B16804296739432529E25E@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432529E25E@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Mar 2011 18:36:37 -0000

We had last calls for v2 and bearer. This is for the SAML profile.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Mike Jones
> Sent: Saturday, March 19, 2011 11:04 AM
> To: Hannes Tschofenig; oauth@ietf.org WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
>=20
> I'm confused.  Per the attached message that you sent on March 1st, the l=
ast
> call period started then and ended on March 16th.  How is this second las=
t call
> different?
>=20
> 				Thanks,
> 				-- Mike
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Hannes Tschofenig
> Sent: Saturday, March 19, 2011 10:58 AM
> To: oauth@ietf.org WG
> Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
>=20
> Hi all,
>=20
> the WGLC for the OAuth base specification has been completed and the
> authors think that this document is ready for a WGLC as well.
>=20
> Hence, let us start the last call for comments on
> http://www.ietf.org/id/draft-ietf-oauth-saml2-bearer-03.txt
>=20
> Please have your comments in no later than April 2nd.
>=20
> Do remember to send a note in if you have read the document and have no
> other comments other than "its ready to go".
>=20
> Thanks!
> Hannes & Blaine
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From hannes.tschofenig@gmx.net  Sat Mar 19 12:49:02 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9FEF83A69D0 for <oauth@core3.amsl.com>; Sat, 19 Mar 2011 12:49:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hGy6CAesvz8e for <oauth@core3.amsl.com>; Sat, 19 Mar 2011 12:49:01 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.23]) by core3.amsl.com (Postfix) with SMTP id 604343A69BB for <oauth@ietf.org>; Sat, 19 Mar 2011 12:49:00 -0700 (PDT)
Received: (qmail invoked by alias); 19 Mar 2011 19:50:31 -0000
Received: from a88-115-222-204.elisa-laajakaista.fi (EHLO [192.168.1.3]) [88.115.222.204] by mail.gmx.net (mp049) with SMTP; 19 Mar 2011 20:50:31 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX18fJf1M0q0fEZDnwPRuYs7pGzhZD0GWjEHuR1A/tF fh4zs5a+xuVtnq
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F432C09@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Sat, 19 Mar 2011 21:50:29 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <E28B197A-180F-45A0-9F40-58B1C7E821F4@gmx.net>
References: <389C0727-A69C-4C4B-BB60-53E1172A88AE@gmx.net> <4E1F6AAD24975D4BA5B16804296739432529E25E@TK5EX14MBXC207.redmond.corp.microsoft.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432C09@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1082)
X-Y-GMX-Trusted: 0
Cc: "oauth@ietf.org WG" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Mar 2011 19:49:02 -0000

Correct.=20

WGLC on draft-ietf-oauth-v2-13.txt is finished.=20
WGLC on draft-ietf-oauth-v2-bearer-03.txt is still ongoing till March =
25.
WGLC on draft-ietf-oauth-saml2-bearer-03.txt got just started.


On Mar 19, 2011, at 8:37 PM, Eran Hammer-Lahav wrote:

> We had last calls for v2 and bearer. This is for the SAML profile.
>=20
> EHL
>=20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf
>> Of Mike Jones
>> Sent: Saturday, March 19, 2011 11:04 AM
>> To: Hannes Tschofenig; oauth@ietf.org WG
>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
>>=20
>> I'm confused.  Per the attached message that you sent on March 1st, =
the last
>> call period started then and ended on March 16th.  How is this second =
last call
>> different?
>>=20
>> 				Thanks,
>> 				-- Mike
>>=20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf
>> Of Hannes Tschofenig
>> Sent: Saturday, March 19, 2011 10:58 AM
>> To: oauth@ietf.org WG
>> Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
>>=20
>> Hi all,
>>=20
>> the WGLC for the OAuth base specification has been completed and the
>> authors think that this document is ready for a WGLC as well.
>>=20
>> Hence, let us start the last call for comments on
>> http://www.ietf.org/id/draft-ietf-oauth-saml2-bearer-03.txt
>>=20
>> Please have your comments in no later than April 2nd.
>>=20
>> Do remember to send a note in if you have read the document and have =
no
>> other comments other than "its ready to go".
>>=20
>> Thanks!
>> Hannes & Blaine
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20


From gffletch@aol.com  Mon Mar 21 08:49:22 2011
Return-Path: <gffletch@aol.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6A70528C0F5; Mon, 21 Mar 2011 08:49:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.391
X-Spam-Level: 
X-Spam-Status: No, score=-1.391 tagged_above=-999 required=5 tests=[AWL=-1.207, BAYES_40=-0.185, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z5mnXsxCrPB2; Mon, 21 Mar 2011 08:49:20 -0700 (PDT)
Received: from imr-mb01.mx.aol.com (imr-mb01.mx.aol.com [64.12.207.164]) by core3.amsl.com (Postfix) with ESMTP id B47F828C0F2; Mon, 21 Mar 2011 08:49:20 -0700 (PDT)
Received: from mtaout-ma04.r1000.mx.aol.com (mtaout-ma04.r1000.mx.aol.com [172.29.41.4]) by imr-mb01.mx.aol.com (8.14.1/8.14.1) with ESMTP id p2LFobBf024034; Mon, 21 Mar 2011 11:50:37 -0400
Received: from palantir.local (unknown [10.181.183.94]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mtaout-ma04.r1000.mx.aol.com (MUA/Third Party Client Interface) with ESMTPSA id 277FFE000223; Mon, 21 Mar 2011 11:50:37 -0400 (EDT)
Message-ID: <4D8773CC.4010003@aol.com>
Date: Mon, 21 Mar 2011 11:50:36 -0400
From: George Fletcher <gffletch@aol.com>
Organization: AOL LLC
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Mike Jones <Michael.Jones@microsoft.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG><B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>, <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B1@IMCMBX3.MITRE.ORG><0BB28BF7-0331-4C6E-ABE3-A18FB0FB71D3@oracle.com><4D79461C.1020200@lodderstedt.net><5A61CBCB-F644-4B43-937C-1BE59AC9B013@oracle.com><4D796C9E.1070507@aol.com><4E1F6AAD24975D4BA5B16804296739432528C8AB@TK5EX14MBXC207.redmond.corp.microsoft.com> <1986667044-1299830172-cardhu_decombobulator_blackberry.rim.net-393558361-@b1.c11.bise7.blackberry>
In-Reply-To: <1986667044-1299830172-cardhu_decombobulator_blackberry.rim.net-393558361-@b1.c11.bise7.blackberry>
Content-Type: multipart/alternative; boundary="------------020001070004080303000400"
x-aol-global-disposition: G
X-AOL-SCOLL-SCORE: 0:2:458014592:93952408  
X-AOL-SCOLL-URL_COUNT: 0  
x-aol-sid: 3039ac1d29044d8773cd3a28
X-AOL-IP: 10.181.183.94
Cc: oauth-bounces@ietf.org, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2011 15:49:22 -0000

This is a multi-part message in MIME format.
--------------020001070004080303000400
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit

+1

On 3/11/11 2:56 AM, torsten@lodderstedt.net wrote:
> Why not "bearer_token"? This would be in line with the Authorization scheme name.
>
> regards,
> Torsten.
> Gesendet mit BlackBerry® Webmail von Telekom Deutschland
>
> -----Original Message-----
> From: Mike Jones<Michael.Jones@microsoft.com>
> Sender: oauth-bounces@ietf.org
> Date: Fri, 11 Mar 2011 01:54:00
> To: OAuth WG<oauth@ietf.org>
> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

-- 
Chief Architect                   AIM:  gffletch
Identity Services Engineering     Work: george.fletcher@teamaol.com
AOL Inc.                          Home: gffletch@aol.com
Mobile: +1-703-462-3494           Blog: http://practicalid.blogspot.com
Office: +1-703-265-2544           Twitter: http://twitter.com/gffletch


--------------020001070004080303000400
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#ffffff">
    <font face="Helvetica, Arial, sans-serif">+1<br>
      <br>
    </font>On 3/11/11 2:56 AM, <a class="moz-txt-link-abbreviated" href="mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a> wrote:
    <blockquote
cite="mid:1986667044-1299830172-cardhu_decombobulator_blackberry.rim.net-393558361-@b1.c11.bise7.blackberry"
      type="cite">
      <pre wrap="">Why not "bearer_token"? This would be in line with the Authorization scheme name.

regards,
Torsten.
Gesendet mit BlackBerry&reg; Webmail von Telekom Deutschland  

-----Original Message-----
From: Mike Jones <a class="moz-txt-link-rfc2396E" href="mailto:Michael.Jones@microsoft.com">&lt;Michael.Jones@microsoft.com&gt;</a>
Sender: <a class="moz-txt-link-abbreviated" href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a>
Date: Fri, 11 Mar 2011 01:54:00 
To: OAuth WG<a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>

_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>

</pre>
    </blockquote>
    <br>
    <pre class="moz-signature" cols="72">-- 
Chief Architect                   AIM:  gffletch
Identity Services Engineering     Work: <a class="moz-txt-link-abbreviated" href="mailto:george.fletcher@teamaol.com">george.fletcher@teamaol.com</a>
AOL Inc.                          Home: <a class="moz-txt-link-abbreviated" href="mailto:gffletch@aol.com">gffletch@aol.com</a>
Mobile: +1-703-462-3494           Blog: <a class="moz-txt-link-freetext" href="http://practicalid.blogspot.com">http://practicalid.blogspot.com</a>
Office: +1-703-265-2544           Twitter: <a class="moz-txt-link-freetext" href="http://twitter.com/gffletch">http://twitter.com/gffletch</a>
</pre>
  </body>
</html>

--------------020001070004080303000400--

From Michael.Jones@microsoft.com  Mon Mar 21 09:46:36 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6710A28C175 for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 09:46:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WwMPclO3hy4Z for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 09:46:35 -0700 (PDT)
Received: from smtp.microsoft.com (mail2.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 771B828C0EB for <oauth@ietf.org>; Mon, 21 Mar 2011 09:46:35 -0700 (PDT)
Received: from TK5EX14HUBC101.redmond.corp.microsoft.com (157.54.7.153) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Mon, 21 Mar 2011 09:48:07 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14HUBC101.redmond.corp.microsoft.com ([157.54.7.153]) with mapi id 14.01.0270.002; Mon, 21 Mar 2011 09:48:07 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: Apparent consensus on OAuth Errors Registry
Thread-Index: Acvn58EM+JExiW6yQkawESD8X4iCRg==
Date: Mon, 21 Mar 2011 16:48:07 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.51.73]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943252A0A60TK5EX14MBXC207r_"
MIME-Version: 1.0
Subject: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2011 16:46:36 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943252A0A60TK5EX14MBXC207r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

People voted as follows in the poll I conducted on the OAuth Errors Registr=
y:

For A:
                Mike Jones
                Igor Faynberg
                Justin Richter
                Anthony Nadalin

For D or C:
                Eran Hammer-Lahav
                William Mills

Given that twice as many people indicated a preference for A as for any oth=
er option, that seems to indicate a consensus for A.  Therefore Eran, when =
you update your draft, can you please proceed on that basis?

                                                                Thanks,
                                                                -- Mike


--_000_4E1F6AAD24975D4BA5B1680429673943252A0A60TK5EX14MBXC207r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">People voted as follows in the poll I conducted on t=
he OAuth Errors Registry:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">For A:<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mike Jones<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Igor Faynberg<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Justin Richter<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Anthony Nadalin<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <o:p></o:p></p>
<p class=3D"MsoNormal">For D or C:<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Eran Hammer-Lahav<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; William Mills<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Given that twice as many people indicated a preferen=
ce for A as for any other option, that seems to indicate a consensus for A.=
&nbsp; Therefore Eran, when you update your draft, can you please proceed o=
n that basis?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; Thanks,<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943252A0A60TK5EX14MBXC207r_--

From eran@hueniverse.com  Mon Mar 21 10:20:05 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E092028C0EC for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 10:20:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.565
X-Spam-Level: 
X-Spam-Status: No, score=-2.565 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FV0YB0-M4JEi for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 10:20:04 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id B92C83A68BD for <oauth@ietf.org>; Mon, 21 Mar 2011 10:20:04 -0700 (PDT)
Received: (qmail 23471 invoked from network); 21 Mar 2011 17:21:36 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 21 Mar 2011 17:21:36 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Mon, 21 Mar 2011 10:21:29 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Mike Jones <Michael.Jones@microsoft.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Mon, 21 Mar 2011 10:21:29 -0700
Thread-Topic: Apparent consensus on OAuth Errors Registry
Thread-Index: Acvn58EM+JExiW6yQkawESD8X4iCRgAAFzKQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F432D81@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234464F432D81P3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2011 17:20:06 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F432D81P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

You call this consensus? David Recordon was raising concerns about the prop=
osal and Justin Richter agreed to registry alternatives. So no, this is not=
 sufficient to make changes yet.

I do see a need to extend the error code set in case of extensions which mo=
dify the behavior of the authorization and token endpoints. Such additional=
 error codes are completely dependent on the definition of additional param=
eters which we do register. I have received some negative feedback about us=
ing URIs for extension error codes (due to their inconsistency with the exi=
sting codes).

I will post a modified proposal for error extensibility based on the requir=
ement I presented earlier (as I have not seen any other valid requirements =
or use cases) before the next draft for discussion.

EHL


From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of M=
ike Jones
Sent: Monday, March 21, 2011 9:48 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

People voted as follows in the poll I conducted on the OAuth Errors Registr=
y:

For A:
                Mike Jones
                Igor Faynberg
                Justin Richter
                Anthony Nadalin

For D or C:
                Eran Hammer-Lahav
                William Mills

Given that twice as many people indicated a preference for A as for any oth=
er option, that seems to indicate a consensus for A.  Therefore Eran, when =
you update your draft, can you please proceed on that basis?

                                                                Thanks,
                                                                -- Mike


--_000_90C41DD21FB7C64BB94121FBBC2E7234464F432D81P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'c=
olor:#1F497D'>You call this consensus? David Recordon was raising concerns =
about the proposal and Justin Richter agreed to registry alternatives. So n=
o, this is not sufficient to make changes yet.<o:p></o:p></span></p><p clas=
s=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'color:#1F497D'>I do see a need to extend t=
he error code set in case of extensions which modify the behavior of the au=
thorization and token endpoints. Such additional error codes are completely=
 dependent on the definition of additional parameters which we do register.=
 I have received some negative feedback about using URIs for extension erro=
r codes (due to their inconsistency with the existing codes).<o:p></o:p></s=
pan></p><p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'>I will post =
a modified proposal for error extensibility based on the requirement I pres=
ented earlier (as I have not seen any other valid requirements or use cases=
) before the next draft for discussion.<o:p></o:p></span></p><p class=3DMso=
Normal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=
=3DMsoNormal><span style=3D'color:#1F497D'>EHL<o:p></o:p></span></p><p clas=
s=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p=
><div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in=
 4.0pt'><div><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;paddi=
ng:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span style=3D'font-size:10.0=
pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span style=3D'font-s=
ize:10.0pt;font-family:"Tahoma","sans-serif"'> oauth-bounces@ietf.org [mail=
to:oauth-bounces@ietf.org] <b>On Behalf Of </b>Mike Jones<br><b>Sent:</b> M=
onday, March 21, 2011 9:48 AM<br><b>To:</b> oauth@ietf.org<br><b>Subject:</=
b> [OAUTH-WG] Apparent consensus on OAuth Errors Registry<o:p></o:p></span>=
</p></div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNor=
mal>People voted as follows in the poll I conducted on the OAuth Errors Reg=
istry:<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DM=
soNormal>For A:<o:p></o:p></p><p class=3DMsoNormal>&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mike Jon=
es<o:p></o:p></p><p class=3DMsoNormal>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Igor Faynberg<o:p></o=
:p></p><p class=3DMsoNormal>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Justin Richter<o:p></o:p></p><p=
 class=3DMsoNormal>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Anthony Nadalin<o:p></o:p></p><p class=
=3DMsoNormal>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp; <o:p></o:p></p><p class=3DMsoNormal>For D or C=
:<o:p></o:p></p><p class=3DMsoNormal>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Eran Hammer-Lahav<o:p>=
</o:p></p><p class=3DMsoNormal>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; William Mills<o:p></o:p></p>=
<p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Given that t=
wice as many people indicated a preference for A as for any other option, t=
hat seems to indicate a consensus for A.&nbsp; Therefore Eran, when you upd=
ate your draft, can you please proceed on that basis?<o:p></o:p></p><p clas=
s=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Thanks,<o:p></o=
:p></p><p class=3DMsoNormal>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></p><p class=3DMsoNormal>=
<o:p>&nbsp;</o:p></p></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F432D81P3PW5EX1MB01E_--

From phil.hunt@oracle.com  Mon Mar 21 11:42:38 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DD5923A67D9; Mon, 21 Mar 2011 11:42:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.558
X-Spam-Level: 
X-Spam-Status: No, score=-6.558 tagged_above=-999 required=5 tests=[AWL=0.040,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WMccIBxaH4bo; Mon, 21 Mar 2011 11:42:37 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id A2CEB3A67AA; Mon, 21 Mar 2011 11:42:37 -0700 (PDT)
Received: from rcsinet13.oracle.com (rcsinet13.oracle.com [148.87.113.125]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2LIi7OV008975 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 21 Mar 2011 18:44:08 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by rcsinet13.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2LIi6Gw023536 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 21 Mar 2011 18:44:06 GMT
Received: from abhmt016.oracle.com (abhmt016.oracle.com [141.146.116.25]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2LIi6Z1010944; Mon, 21 Mar 2011 13:44:06 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 21 Mar 2011 11:44:06 -0700
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: multipart/alternative; boundary=Apple-Mail-2-303296992
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <4D8773CC.4010003@aol.com>
Date: Mon, 21 Mar 2011 11:44:04 -0700
Message-Id: <88DBF649-171E-4E40-BE66-D5520C0CA84E@oracle.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG><B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>, <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B1@IMCMBX3.MITRE.ORG><0BB28BF7-0331-4C6E-ABE3-A18FB0FB71D3@oracle.com><4D79461C.1020200@lodderstedt.net><5A61CBCB-F644-4B43-937C-1BE59AC9B013@oracle.com><4D796C9E.1070507@aol.com><4E1F6AAD24975D4BA5B16804296739432528C8AB@TK5EX14MBXC207.redmond.corp.microsoft.com> <1986667044-1299830172-cardhu_decombobulator_blackberry.rim.net-393558361-@b1.c11.bise7.blackberry> <4D8773CC.4010003@aol.com>
To: George Fletcher <gffletch@aol.com>
X-Mailer: Apple Mail (2.1082)
X-Source-IP: acsmt356.oracle.com [141.146.40.156]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090208.4D879C77.00A3,ss=1,fgs=0
Cc: oauth-bounces@ietf.org, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2011 18:42:39 -0000

--Apple-Mail-2-303296992
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

+1

Phil
phil.hunt@oracle.com




On 2011-03-21, at 8:50 AM, George Fletcher wrote:

> +1
>=20
> On 3/11/11 2:56 AM, torsten@lodderstedt.net wrote:
>>=20
>> Why not "bearer_token"? This would be in line with the Authorization =
scheme name.
>>=20
>> regards,
>> Torsten.
>> Gesendet mit BlackBerry=AE Webmail von Telekom Deutschland =20
>>=20
>> -----Original Message-----
>> From: Mike Jones <Michael.Jones@microsoft.com>
>> Sender: oauth-bounces@ietf.org
>> Date: Fri, 11 Mar 2011 01:54:00=20
>> To: OAuth WG<oauth@ietf.org>
>> Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20
> --=20
> Chief Architect                   AIM:  gffletch
> Identity Services Engineering     Work: george.fletcher@teamaol.com
> AOL Inc.                          Home: gffletch@aol.com
> Mobile: +1-703-462-3494           Blog: =
http://practicalid.blogspot.com
> Office: +1-703-265-2544           Twitter: http://twitter.com/gffletch
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail-2-303296992
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
">+1<div><br><div>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-21, at 8:50 AM, George Fletcher wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite">
<div text=3D"#000000" bgcolor=3D"#ffffff">
    <font face=3D"Helvetica, Arial, sans-serif">+1<br>
      <br>
    </font>On 3/11/11 2:56 AM, <a class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:torsten@lodderstedt.net">torsten@lodderstedt.net</a> =
wrote:
    <blockquote =
cite=3D"mid:1986667044-1299830172-cardhu_decombobulator_blackberry.rim.net=
-393558361-@b1.c11.bise7.blackberry" type=3D"cite">
      <pre wrap=3D"">Why not "bearer_token"? This would be in line with =
the Authorization scheme name.

regards,
Torsten.
Gesendet mit BlackBerry=AE Webmail von Telekom Deutschland =20

-----Original Message-----
From: Mike Jones <a class=3D"moz-txt-link-rfc2396E" =
href=3D"mailto:Michael.Jones@microsoft.com">&lt;Michael.Jones@microsoft.co=
m&gt;</a>
Sender: <a class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a>
Date: Fri, 11 Mar 2011 01:54:00=20
To: OAuth WG<a class=3D"moz-txt-link-rfc2396E" =
href=3D"mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

_______________________________________________
OAuth mailing list
<a class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class=3D"moz-txt-link-freetext" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a>

_______________________________________________
OAuth mailing list
<a class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class=3D"moz-txt-link-freetext" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a>

</pre>
    </blockquote>
    <br>
    <pre class=3D"moz-signature" cols=3D"72">--=20
Chief Architect                   AIM:  gffletch
Identity Services Engineering     Work: <a =
class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:george.fletcher@teamaol.com">george.fletcher@teamaol.com</a=
>
AOL Inc.                          Home: <a =
class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:gffletch@aol.com">gffletch@aol.com</a>
Mobile: +1-703-462-3494           Blog: <a class=3D"moz-txt-link-freetext"=
 =
href=3D"http://practicalid.blogspot.com/">http://practicalid.blogspot.com<=
/a>
Office: +1-703-265-2544           Twitter: <a =
class=3D"moz-txt-link-freetext" =
href=3D"http://twitter.com/gffletch">http://twitter.com/gffletch</a>
</pre>
  </div>

_______________________________________________<br>OAuth mailing =
list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></body></html>=

--Apple-Mail-2-303296992--

From phil.hunt@oracle.com  Mon Mar 21 11:43:52 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7CB4D3A6767 for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 11:43:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.559
X-Spam-Level: 
X-Spam-Status: No, score=-6.559 tagged_above=-999 required=5 tests=[AWL=0.039,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j7s-hfQGYSuz for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 11:43:51 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 7C8CF3A66B4 for <oauth@ietf.org>; Mon, 21 Mar 2011 11:43:51 -0700 (PDT)
Received: from rcsinet13.oracle.com (rcsinet13.oracle.com [148.87.113.125]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2LIjMwG013039 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 21 Mar 2011 18:45:24 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by rcsinet13.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2LIjMFN027000 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 21 Mar 2011 18:45:22 GMT
Received: from abhmt003.oracle.com (abhmt003.oracle.com [141.146.116.12]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2LIjLe9028786; Mon, 21 Mar 2011 13:45:21 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 21 Mar 2011 11:45:21 -0700
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: multipart/alternative; boundary=Apple-Mail-3-303372932
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com>
Date: Mon, 21 Mar 2011 11:45:19 -0700
Message-Id: <BBF14087-532E-428F-819E-323C113872AF@oracle.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.1082)
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090201.4D879CC2.014B,ss=1,fgs=0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2011 18:43:52 -0000

--Apple-Mail-3-303372932
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

I don't believe there is consensus yet. Many of us have not voted and/or =
don't agree with the options presented.

Phil
phil.hunt@oracle.com




On 2011-03-21, at 9:48 AM, Mike Jones wrote:

> People voted as follows in the poll I conducted on the OAuth Errors =
Registry:
> =20
> For A:
>                 Mike Jones
>                 Igor Faynberg
>                 Justin Richter
>                 Anthony Nadalin
>               =20
> For D or C:
>                 Eran Hammer-Lahav
>                 William Mills
> =20
> Given that twice as many people indicated a preference for A as for =
any other option, that seems to indicate a consensus for A.  Therefore =
Eran, when you update your draft, can you please proceed on that basis?
> =20
>                                                                 =
Thanks,
>                                                                 -- =
Mike
> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail-3-303372932
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">I =
don't believe there is consensus yet. Many of us have not voted and/or =
don't agree with the options presented.<div><br><div>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-21, at 9:48 AM, Mike Jones wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; ">People voted as follows in the =
poll I conducted on the OAuth Errors Registry:<o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
"><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; =
font-family: Calibri, sans-serif; ">For A:<o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Mike Jones<o:p></o:p></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Igor Faynberg<o:p></o:p></div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Justin Richter<o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Anthony Nadalin<o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; ">For D or =
C:<o:p></o:p></div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: =
Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Eran Hammer-Lahav<o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; William Mills<o:p></o:p></div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 11pt; font-family: Calibri, sans-serif; =
"><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; =
font-family: Calibri, sans-serif; ">Given that twice as many people =
indicated a preference for A as for any other option, that seems to =
indicate a consensus for A.&nbsp; Therefore Eran, when you update your =
draft, can you please proceed on that basis?<o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
"><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; =
font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; Thanks,<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; -- Mike<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; =
"><o:p>&nbsp;</o:p></div></div>___________________________________________=
____<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" =
style=3D"color: blue; text-decoration: underline; =
">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: =
blue; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><br></div></span></blockq=
uote></div><br></div></body></html>=

--Apple-Mail-3-303372932--

From James.H.Manger@team.telstra.com  Mon Mar 21 16:36:58 2011
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AC6793A6912 for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 16:36:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.575
X-Spam-Level: 
X-Spam-Status: No, score=-0.575 tagged_above=-999 required=5 tests=[AWL=0.325,  BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, HTML_MESSAGE=0.001, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aY3DztCCoeDt for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 16:36:54 -0700 (PDT)
Received: from ipxbno.tcif.telstra.com.au (ipxbno.tcif.telstra.com.au [203.35.82.204]) by core3.amsl.com (Postfix) with ESMTP id B79A828C1AF for <oauth@ietf.org>; Mon, 21 Mar 2011 16:36:44 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.63,222,1299416400"; d="scan'208,217";a="28184779"
Received: from unknown (HELO ipccni.tcif.telstra.com.au) ([10.97.216.208]) by ipobni.tcif.telstra.com.au with ESMTP; 22 Mar 2011 10:38:16 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6292"; a="21999949"
Received: from wsmsg3755.srv.dir.telstra.com ([172.49.40.196]) by ipccni.tcif.telstra.com.au with ESMTP; 22 Mar 2011 10:38:17 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by WSMSG3755.srv.dir.telstra.com ([172.49.40.196]) with mapi; Tue, 22 Mar 2011 10:38:16 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Tue, 22 Mar 2011 10:38:15 +1100
Thread-Topic: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
Thread-Index: Acvn+CdoWK6TWWcuS8Gp2mpp/TgZ+AAIMJJQ
Message-ID: <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com>
In-Reply-To: <BBF14087-532E-428F-819E-323C113872AF@oracle.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: multipart/alternative; boundary="_000_255B9BB34FB7D647A506DC292726F6E1127FD7E69BWSMSG3153Vsrv_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2011 23:36:58 -0000

--_000_255B9BB34FB7D647A506DC292726F6E1127FD7E69BWSMSG3153Vsrv_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

The bearer spec defines 3 errors (invalid_request, invalid_token, insuffici=
ent_scope), which accompany 3 different status codes (400 Bad request, 401 =
Unauthorized, 403 Forbidden respectively).

Client apps are probably better off switching behaviour based on the HTTP s=
tatus code, and ignoring the error string (perhaps put it in a log, or on a=
 debug console so a developer can see it).



It seems like overkill to have:

*         An HTTP status code (eg 401)

*         An HTTP status message (eg Unauthorized)

*         An error string (eg invalid_token)

*         An error_description (eg token is formatted incorrectly)

*         An error_uri (eg http://api.example.com/error/45)

*         The body of the HTTP response (eg an HTML page with extensive det=
ails about the error and links to the API documentation)



6 sources of error information -- and all for a bearer token that is usuall=
y opaque to the client app!



Encouraging new error strings to be defined - by having a registry for them=
 - is not ideal. Client apps that don't recognize a value learn nothing. At=
 least with HTTP status codes a client app knows the class of error (eg 4xx=
 or 5xx) and can behave accordingly even if it doesn't recognize the specif=
ic value (eg 538).



I'd vote for F) ditch error string/description/uri for the BEARER HTTP auth=
entication scheme.



--

James Manger





On 2011-03-21, at 9:48 AM, Mike Jones wrote:





People voted as follows in the poll I conducted on the OAuth Errors Registr=
y:



For A:

                Mike Jones

                Igor Faynberg

                Justin Richter

                Anthony Nadalin



For D or C:

                Eran Hammer-Lahav

                William Mills



Given that twice as many people indicated a preference for A as for any oth=
er option, that seems to indicate a consensus for A.  Therefore Eran, when =
you update your draft, can you please proceed on that basis?



                                                                Thanks,

                                                                -- Mike






--_000_255B9BB34FB7D647A506DC292726F6E1127FD7E69BWSMSG3153Vsrv_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:p=3D"urn:schemas-m=
icrosoft-com:office:powerpoint" xmlns:a=3D"urn:schemas-microsoft-com:office=
:access" xmlns:dt=3D"uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s=3D"=
uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs=3D"urn:schemas-microsof=
t-com:rowset" xmlns:z=3D"#RowsetSchema" xmlns:b=3D"urn:schemas-microsoft-co=
m:office:publisher" xmlns:ss=3D"urn:schemas-microsoft-com:office:spreadshee=
t" xmlns:c=3D"urn:schemas-microsoft-com:office:component:spreadsheet" xmlns=
:odc=3D"urn:schemas-microsoft-com:office:odc" xmlns:oa=3D"urn:schemas-micro=
soft-com:office:activation" xmlns:html=3D"http://www.w3.org/TR/REC-html40" =
xmlns:q=3D"http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc=3D"http://m=
icrosoft.com/officenet/conferencing" xmlns:D=3D"DAV:" xmlns:Repl=3D"http://=
schemas.microsoft.com/repl/" xmlns:mt=3D"http://schemas.microsoft.com/share=
point/soap/meetings/" xmlns:x2=3D"http://schemas.microsoft.com/office/excel=
/2003/xml" xmlns:ppda=3D"http://www.passport.com/NameSpace.xsd" xmlns:ois=
=3D"http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir=3D"http://=
schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds=3D"http://www.w3=
.org/2000/09/xmldsig#" xmlns:dsp=3D"http://schemas.microsoft.com/sharepoint=
/dsp" xmlns:udc=3D"http://schemas.microsoft.com/data/udc" xmlns:xsd=3D"http=
://www.w3.org/2001/XMLSchema" xmlns:sub=3D"http://schemas.microsoft.com/sha=
repoint/soap/2002/1/alerts/" xmlns:ec=3D"http://www.w3.org/2001/04/xmlenc#"=
 xmlns:sp=3D"http://schemas.microsoft.com/sharepoint/" xmlns:sps=3D"http://=
schemas.microsoft.com/sharepoint/soap/" xmlns:xsi=3D"http://www.w3.org/2001=
/XMLSchema-instance" xmlns:udcs=3D"http://schemas.microsoft.com/data/udc/so=
ap" xmlns:udcxf=3D"http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udc=
p2p=3D"http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf=3D"http:/=
/schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss=3D"http://sche=
mas.microsoft.com/office/2006/digsig-setup" xmlns:dssi=3D"http://schemas.mi=
crosoft.com/office/2006/digsig" xmlns:mdssi=3D"http://schemas.openxmlformat=
s.org/package/2006/digital-signature" xmlns:mver=3D"http://schemas.openxmlf=
ormats.org/markup-compatibility/2006" xmlns:m=3D"http://schemas.microsoft.c=
om/office/2004/12/omml" xmlns:mrels=3D"http://schemas.openxmlformats.org/pa=
ckage/2006/relationships" xmlns:spwp=3D"http://microsoft.com/sharepoint/web=
partpages" xmlns:ex12t=3D"http://schemas.microsoft.com/exchange/services/20=
06/types" xmlns:ex12m=3D"http://schemas.microsoft.com/exchange/services/200=
6/messages" xmlns:pptsl=3D"http://schemas.microsoft.com/sharepoint/soap/Sli=
deLibrary/" xmlns:spsl=3D"http://microsoft.com/webservices/SharePointPortal=
Server/PublishedLinksService" xmlns:Z=3D"urn:schemas-microsoft-com:" xmlns:=
st=3D"&#1;" xmlns=3D"http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
 /* List Definitions */
 @list l0
	{mso-list-id:778527300;
	mso-list-type:hybrid;
	mso-list-template-ids:417468400 -1340685810 201916419 201916421 201916417 =
201916419 201916421 201916417 201916419 201916421;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
-->
</style><!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-AU" link=3D"blue" vlink=3D"purple" style=3D"word-wrap: bre=
ak-word;
-webkit-nbsp-mode: space;-webkit-line-break: after-white-space">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D">The bearer spec defines 3 errors (invalid_request, invalid_t=
oken, insufficient_scope), which accompany 3 different status codes (400 Ba=
d request, 401 Unauthorized,
 403 Forbidden respectively).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D">Client apps are probably better off switching behaviour base=
d on the HTTP status code, and ignoring the error string (perhaps put it in=
 a log, or on a debug
 console so a developer can see it).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D">It seems like overkill to have:<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:S=
ymbol;color:#1F497D"><span style=3D"mso-list:Ignore">&middot;<span style=3D=
"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;
color:#1F497D">An HTTP status code (eg 401)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:S=
ymbol;color:#1F497D"><span style=3D"mso-list:Ignore">&middot;<span style=3D=
"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;
color:#1F497D">An HTTP status message (eg Unauthorized)<o:p></o:p></span></=
p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:S=
ymbol;color:#1F497D"><span style=3D"mso-list:Ignore">&middot;<span style=3D=
"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;
color:#1F497D">An error string (eg invalid_token)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:S=
ymbol;color:#1F497D"><span style=3D"mso-list:Ignore">&middot;<span style=3D=
"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;
color:#1F497D">An error_description (eg token is formatted incorrectly)<o:p=
></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:S=
ymbol;color:#1F497D"><span style=3D"mso-list:Ignore">&middot;<span style=3D=
"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;
color:#1F497D">An error_uri (eg
<a href=3D"http://api.example.com/error/45">http://api.example.com/error/45=
</a>)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:S=
ymbol;color:#1F497D"><span style=3D"mso-list:Ignore">&middot;<span style=3D=
"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;
color:#1F497D">The body of the HTTP response (eg an HTML page with extensiv=
e details about the error and links to the API documentation)<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D">6 sources of error information -- and all for a bearer token=
 that is usually opaque to the client app!<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D">Encouraging new error strings to be defined &#8211; by havin=
g a registry for them &#8211; is not ideal. Client apps that don&#8217;t re=
cognize a value learn nothing. At least
 with HTTP status codes a client app knows the class of error (eg 4xx or 5x=
x) and can behave accordingly even if it doesn&#8217;t recognize the specif=
ic value (eg 538).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D">I&#8217;d vote for F) ditch error string/description/uri for=
 the BEARER HTTP authentication scheme.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D">--<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D">James Manger<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;
color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div>
<p class=3D"MsoNormal">On 2011-03-21, at 9:48 AM, Mike Jones wrote:<o:p></o=
:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">People voted as follows =
in the poll I conducted on the OAuth Errors Registry:<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">For A:<o:p></o:p></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mike Jon=
es<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Igor Fay=
nberg<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Justin R=
ichter<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Anthony =
Nadalin<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<o:p></o:=
p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">For D or C:<o:p></o:p></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Eran Ham=
mer-Lahav<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; William =
Mills<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">Given that twice as many=
 people indicated a preference for A as for any other option, that seems to=
 indicate a consensus for A.&nbsp; Therefore Eran, when you update
 your draft, can you please proceed on that basis?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Thanks,<o:p></o:p></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:13.5pt;font-=
family:&quot;Helvetica&quot;,&quot;sans-serif&quot;"><o:p>&nbsp;</o:p></spa=
n></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_255B9BB34FB7D647A506DC292726F6E1127FD7E69BWSMSG3153Vsrv_--

From eran@hueniverse.com  Mon Mar 21 17:52:58 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A3EB628C1C3 for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 17:52:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.565
X-Spam-Level: 
X-Spam-Status: No, score=-2.565 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QY2bTlzE8ic0 for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 17:52:55 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id F285C28C1BF for <oauth@ietf.org>; Mon, 21 Mar 2011 17:52:54 -0700 (PDT)
Received: (qmail 15648 invoked from network); 22 Mar 2011 00:54:27 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 22 Mar 2011 00:54:26 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Mon, 21 Mar 2011 17:54:10 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>
Date: Mon, 21 Mar 2011 17:54:06 -0700
Thread-Topic: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
Thread-Index: AcvoK6el0NDGqBmWSq6qSWNAAyZfgQ==
Message-ID: <3407E981-35CB-4ECE-91CB-5DFF3ABB6BA1@hueniverse.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com> <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_3407E98135CB4ECE91CB5DFF3ABB6BA1hueniversecom_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2011 00:52:58 -0000

--_000_3407E98135CB4ECE91CB5DFF3ABB6BA1hueniversecom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_3407E98135CB4ECE91CB5DFF3ABB6BA1hueniversecom_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_3407E98135CB4ECE91CB5DFF3ABB6BA1hueniversecom_--

From phil.hunt@oracle.com  Mon Mar 21 20:15:49 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A5BFE28C1D3 for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 20:15:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.56
X-Spam-Level: 
X-Spam-Status: No, score=-6.56 tagged_above=-999 required=5 tests=[AWL=0.038,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sPrVsGcGnAoy for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 20:15:48 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 276863A635F for <oauth@ietf.org>; Mon, 21 Mar 2011 20:15:48 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2M3HJ8l002505 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 22 Mar 2011 03:17:20 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2M3HIGV028994 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 22 Mar 2011 03:17:18 GMT
Received: from abhmt010.oracle.com (abhmt010.oracle.com [141.146.116.19]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2M3HIrp011801; Mon, 21 Mar 2011 22:17:18 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 21 Mar 2011 20:17:17 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-1-334088778
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com>
Date: Mon, 21 Mar 2011 20:17:15 -0700
Message-Id: <3DA41CB6-5E24-4D46-9703-C04FAF4D9571@oracle.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com> <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090209.4D8814BF.0033,ss=1,fgs=0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2011 03:15:49 -0000

--Apple-Mail-1-334088778
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

I'm still not understanding why each RFC (e.g. the bearer spec) can't =
define its own error codes. If you were to support the bearer token RFC, =
then you obviously understand the normative errors. I'm just not getting =
what the value of a central "OAuth" registry is. =20

An OAuth registry also unnecessarily limits possibility of re-use of =
token schemes in other frameworks outside of OAuth or conversely limits =
the ability to use tokens (such as kerberos) in an OAuth "framework".

So again, I ask what the benefit of a registry is achieved that could =
not be achieved within the token spec itself.

Phil
phil.hunt@oracle.com




On 2011-03-21, at 4:38 PM, Manger, James H wrote:

> The bearer spec defines 3 errors (invalid_request, invalid_token, =
insufficient_scope), which accompany 3 different status codes (400 Bad =
request, 401 Unauthorized, 403 Forbidden respectively).
> Client apps are probably better off switching behaviour based on the =
HTTP status code, and ignoring the error string (perhaps put it in a =
log, or on a debug console so a developer can see it).
> =20
> It seems like overkill to have:
> =B7         An HTTP status code (eg 401)
> =B7         An HTTP status message (eg Unauthorized)
> =B7         An error string (eg invalid_token)
> =B7         An error_description (eg token is formatted incorrectly)
> =B7         An error_uri (eg http://api.example.com/error/45)
> =B7         The body of the HTTP response (eg an HTML page with =
extensive details about the error and links to the API documentation)
> =20
> 6 sources of error information -- and all for a bearer token that is =
usually opaque to the client app!
> =20
> Encouraging new error strings to be defined =96 by having a registry =
for them =96 is not ideal. Client apps that don=92t recognize a value =
learn nothing. At least with HTTP status codes a client app knows the =
class of error (eg 4xx or 5xx) and can behave accordingly even if it =
doesn=92t recognize the specific value (eg 538).
> =20
> I=92d vote for F) ditch error string/description/uri for the BEARER =
HTTP authentication scheme.
> =20
> --
> James Manger
> =20
> =20
> On 2011-03-21, at 9:48 AM, Mike Jones wrote:
>=20
>=20
> People voted as follows in the poll I conducted on the OAuth Errors =
Registry:
> =20
> For A:
>                 Mike Jones
>                 Igor Faynberg
>                 Justin Richter
>                 Anthony Nadalin
>               =20
> For D or C:
>                 Eran Hammer-Lahav
>                 William Mills
> =20
> Given that twice as many people indicated a preference for A as for =
any other option, that seems to indicate a consensus for A.  Therefore =
Eran, when you update your draft, can you please proceed on that basis?
> =20
>                                                                 =
Thanks,
>                                                                 -- =
Mike
> =20
> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail-1-334088778
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">I'm =
still not understanding why each RFC (e.g. the bearer spec) can't define =
its own error codes. If you were to support the bearer token RFC, then =
you obviously understand the normative errors. I'm just not getting what =
the value of a central "OAuth" registry is. &nbsp;<div><br></div><div>An =
OAuth registry also unnecessarily limits possibility of re-use of token =
schemes in other frameworks outside of OAuth or conversely limits the =
ability to use tokens (such as kerberos) in an OAuth =
"framework".</div><div><br></div><div>So again, I ask what the benefit =
of a registry is achieved that could not be achieved within the token =
spec itself.<br><div><br></div><div><div>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-21, at 4:38 PM, Manger, James H wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-AU" link=3D"blue" vlink=3D"purple" style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div class=3D"WordSection1" style=3D"page: =
WordSection1; "><div style=3D"margin-top: 0cm; margin-right: 0cm; =
margin-bottom: 0.0001pt; margin-left: 0cm; font-size: 12pt; font-family: =
'Times New Roman', serif; "><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">The bearer spec defines =
3 errors (invalid_request, invalid_token, insufficient_scope), which =
accompany 3 different status codes (400 Bad request, 401 Unauthorized, =
403 Forbidden respectively).<o:p></o:p></span></div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">Client apps are probably better =
off switching behaviour based on the HTTP status code, and ignoring the =
error string (perhaps put it in a log, or on a debug console so a =
developer can see it).<o:p></o:p></span></div><div style=3D"margin-top: =
0cm; margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); "><o:p>&nbsp;</o:p></span></div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">It seems like overkill to =
have:<o:p></o:p></span></div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 36pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; text-indent: =
-18pt; "><span style=3D"font-size: 11pt; font-family: Symbol; color: =
rgb(31, 73, 125); "><span>=B7<span style=3D"font: normal normal normal =
7pt/normal 'Times New Roman'; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">An HTTP status code (eg =
401)<o:p></o:p></span></div><div style=3D"margin-top: 0cm; margin-right: =
0cm; margin-bottom: 0.0001pt; margin-left: 36pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-indent: -18pt; "><span =
style=3D"font-size: 11pt; font-family: Symbol; color: rgb(31, 73, 125); =
"><span>=B7<span style=3D"font: normal normal normal 7pt/normal 'Times =
New Roman'; ">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">An HTTP status message (eg =
Unauthorized)<o:p></o:p></span></div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 36pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; text-indent: =
-18pt; "><span style=3D"font-size: 11pt; font-family: Symbol; color: =
rgb(31, 73, 125); "><span>=B7<span style=3D"font: normal normal normal =
7pt/normal 'Times New Roman'; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">An error string (eg =
invalid_token)<o:p></o:p></span></div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 36pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; text-indent: =
-18pt; "><span style=3D"font-size: 11pt; font-family: Symbol; color: =
rgb(31, 73, 125); "><span>=B7<span style=3D"font: normal normal normal =
7pt/normal 'Times New Roman'; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">An error_description (eg token is formatted =
incorrectly)<o:p></o:p></span></div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 36pt; =
font-size: 12pt; font-family: 'Times New Roman', serif; text-indent: =
-18pt; "><span style=3D"font-size: 11pt; font-family: Symbol; color: =
rgb(31, 73, 125); "><span>=B7<span style=3D"font: normal normal normal =
7pt/normal 'Times New Roman'; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">An error_uri (eg<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://api.example.com/error/45" style=3D"color: blue; =
text-decoration: underline; =
">http://api.example.com/error/45</a>)<o:p></o:p></span></div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 36pt; font-size: 12pt; font-family: 'Times New Roman', =
serif; text-indent: -18pt; "><span style=3D"font-size: 11pt; =
font-family: Symbol; color: rgb(31, 73, 125); "><span>=B7<span =
style=3D"font: normal normal normal 7pt/normal 'Times New Roman'; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">The body of the HTTP response (eg an HTML page with =
extensive details about the error and links to the API =
documentation)<o:p></o:p></span></div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">6 =
sources of error information -- and all for a bearer token that is =
usually opaque to the client app!<o:p></o:p></span></div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">Encouraging new error strings to be defined =96 by having a registry =
for them =96 is not ideal. Client apps that don=92t recognize a value =
learn nothing. At least with HTTP status codes a client app knows the =
class of error (eg 4xx or 5xx) and can behave accordingly even if it =
doesn=92t recognize the specific value (eg =
538).<o:p></o:p></span></div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">I=92d =
vote for F) ditch error string/description/uri for the BEARER HTTP =
authentication scheme.<o:p></o:p></span></div><div style=3D"margin-top: =
0cm; margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); "><o:p>&nbsp;</o:p></span></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">--<o:p></o:p></span></div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">James =
Manger<o:p></o:p></span></div></div><div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"color: =
rgb(31, 73, 125); "><o:p>&nbsp;</o:p></span></div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div><div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; font-size: =
12pt; font-family: 'Times New Roman', serif; ">On 2011-03-21, at 9:48 =
AM, Mike Jones wrote:<o:p></o:p></div></div><div style=3D"margin-top: =
0cm; margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span lang=3D"EN-US" =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; ">People =
voted as follows in the poll I conducted on the OAuth Errors =
Registry:<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0cm; margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
lang=3D"EN-US" style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; ">&nbsp;<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; ">For A:<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Mike Jones<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Igor Faynberg<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Justin Richter<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Anthony =
Nadalin<o:p></o:p></span></div></div><div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span lang=3D"EN-US" =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; ">For D or =
C:<o:p></o:p></span></div></div><div><div style=3D"margin-top: 0cm; =
margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span lang=3D"EN-US" =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Eran =
Hammer-Lahav<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0cm; margin-right: 0cm; margin-bottom: 0.0001pt; margin-left: 0cm; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
lang=3D"EN-US" style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; William Mills<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; ">&nbsp;<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; ">Given that twice as many people indicated a =
preference for A as for any other option, that seems to indicate a =
consensus for A.&nbsp; Therefore Eran, when you update your draft, can =
you please proceed on that basis?<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; ">&nbsp;<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; Thanks,<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; -- Mike<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-US" style=3D"font-size: 13.5pt; font-family: =
Helvetica, sans-serif; =
"><o:p>&nbsp;</o:p></span></div></div></div></div><div =
style=3D"margin-top: 0cm; margin-right: 0cm; margin-bottom: 0.0001pt; =
margin-left: 0cm; font-size: 12pt; font-family: 'Times New Roman', =
serif; =
"><o:p>&nbsp;</o:p></div></div></div>_____________________________________=
__________<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" =
style=3D"color: blue; text-decoration: underline; =
">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: =
blue; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><br></div></span></blockq=
uote></div><br></div></div></body></html>=

--Apple-Mail-1-334088778--

From eran@hueniverse.com  Mon Mar 21 21:32:38 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 70D653A692D for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 21:32:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.565
X-Spam-Level: 
X-Spam-Status: No, score=-2.565 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SSLjD1oZ0ruE for <oauth@core3.amsl.com>; Mon, 21 Mar 2011 21:32:27 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 0EDD63A692F for <oauth@ietf.org>; Mon, 21 Mar 2011 21:32:26 -0700 (PDT)
Received: (qmail 23668 invoked from network); 22 Mar 2011 04:33:59 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 22 Mar 2011 04:33:59 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Mon, 21 Mar 2011 21:33:30 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phil Hunt <phil.hunt@oracle.com>, "Manger, James H" <James.H.Manger@team.telstra.com>
Date: Mon, 21 Mar 2011 21:32:58 -0700
Thread-Topic: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
Thread-Index: AcvoP6xo7jIh2S16Tz22F9h5qWH6SgACONDg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F432EF4@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com> <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com> <3DA41CB6-5E24-4D46-9703-C04FAF4D9571@oracle.com>
In-Reply-To: <3DA41CB6-5E24-4D46-9703-C04FAF4D9571@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234464F432EF4P3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2011 04:32:39 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F432EF4P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

There are two separate issues here which Mike's latest draft conflated into=
 one.

Issues 1:

The v2 specification currently does not allow for defining additional error=
 codes to the authorization and token endpoints. The only way to define add=
itional error codes is by updating the RFC (once published). Updating an RF=
C is an acceptable way of extending an existing specification, but only if =
it is done very infrequently. The other two options are to allow URI-format=
ted error code, or define a registry.

In any case, all three extensibility model have a single purpose - to reduc=
e the likelihood of an error code name collision. It does not improve inter=
operability unless clients actually implement the additional codes. The goa=
l of the v2 specification must be to cover all possible scenarios so that a=
 client implementing nothing but these codes will be able to handle error c=
ases related to this specification.

After a long discussion, the only valid use case to arise is the one in whi=
ch an extension such as the UX specification (providing a way for the clien=
t to specify the display size of the authorization web page for various dev=
ices) needs additional codes. For example, the UX specification defines the=
 'display' authorization request parameter. If the client provides bad valu=
e, the server may want to return an error specific to this situation.

The open issue is how to address this use case. Since such additional error=
 codes are always a result of an additional request parameter, I am looking=
 for a way to allow parameter registration to specify such related error co=
des without defining yet another registry. This solution is specific to the=
 only use case we have. Defining an error registry is likely to do more har=
m than good, encouraging developers to define new generic error codes that =
are not extension-specific which will only reduce interoperability.

Issue 2:

The bearer token specification includes registration requirements for prote=
cted resource request parameters as well as potential error codes when a pr=
otected resource request fails. A few people have strongly objected to this=
 new proposal since the semantics of the protected resource request is by d=
efinition, outside the scope of any OAuth specification.

The only parameter allowed to infringe on the resource server namespace is =
the currently named 'oauth_token' parameter. There is an ongoing discussion=
 to renamed it to 'bearer_token'.

Hope this helps.

EHL


From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of P=
hil Hunt
Sent: Monday, March 21, 2011 8:17 PM
To: Manger, James H
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

I'm still not understanding why each RFC (e.g. the bearer spec) can't defin=
e its own error codes. If you were to support the bearer token RFC, then yo=
u obviously understand the normative errors. I'm just not getting what the =
value of a central "OAuth" registry is.

An OAuth registry also unnecessarily limits possibility of re-use of token =
schemes in other frameworks outside of OAuth or conversely limits the abili=
ty to use tokens (such as kerberos) in an OAuth "framework".

So again, I ask what the benefit of a registry is achieved that could not b=
e achieved within the token spec itself.

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>




On 2011-03-21, at 4:38 PM, Manger, James H wrote:


The bearer spec defines 3 errors (invalid_request, invalid_token, insuffici=
ent_scope), which accompany 3 different status codes (400 Bad request, 401 =
Unauthorized, 403 Forbidden respectively).
Client apps are probably better off switching behaviour based on the HTTP s=
tatus code, and ignoring the error string (perhaps put it in a log, or on a=
 debug console so a developer can see it).

It seems like overkill to have:
*         An HTTP status code (eg 401)
*         An HTTP status message (eg Unauthorized)
*         An error string (eg invalid_token)
*         An error_description (eg token is formatted incorrectly)
*         An error_uri (eg http://api.example.com/error/45)
*         The body of the HTTP response (eg an HTML page with extensive det=
ails about the error and links to the API documentation)

6 sources of error information -- and all for a bearer token that is usuall=
y opaque to the client app!

Encouraging new error strings to be defined - by having a registry for them=
 - is not ideal. Client apps that don't recognize a value learn nothing. At=
 least with HTTP status codes a client app knows the class of error (eg 4xx=
 or 5xx) and can behave accordingly even if it doesn't recognize the specif=
ic value (eg 538).

I'd vote for F) ditch error string/description/uri for the BEARER HTTP auth=
entication scheme.

--
James Manger


On 2011-03-21, at 9:48 AM, Mike Jones wrote:



People voted as follows in the poll I conducted on the OAuth Errors Registr=
y:

For A:
                Mike Jones
                Igor Faynberg
                Justin Richter
                Anthony Nadalin

For D or C:
                Eran Hammer-Lahav
                William Mills

Given that twice as many people indicated a preference for A as for any oth=
er option, that seems to indicate a consensus for A.  Therefore Eran, when =
you update your draft, can you please proceed on that basis?

                                                                Thanks,
                                                                -- Mike


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_90C41DD21FB7C64BB94121FBBC2E7234464F432EF4P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>There are=
 two separate issues here which Mike&#8217;s latest draft conflated into on=
e.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0p=
t;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span=
></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Cali=
bri","sans-serif";color:#1F497D'>Issues 1:<o:p></o:p></span></p><p class=3D=
MsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif=
";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span sty=
le=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Th=
e v2 specification currently does not allow for defining additional error c=
odes to the authorization and token endpoints. The only way to define addit=
ional error codes is by updating the RFC (once published). Updating an RFC =
is an acceptable way of extending an existing specification, but only if it=
 is done very infrequently. The other two options are to allow URI-formatte=
d error code, or define a registry.<o:p></o:p></span></p><p class=3DMsoNorm=
al><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color=
:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>In any ca=
se, all three extensibility model have a single purpose &#8211; to reduce t=
he likelihood of an error code name collision. It does not improve interope=
rability unless clients actually implement the additional codes. The goal o=
f the v2 specification must be to cover all possible scenarios so that a cl=
ient implementing nothing but these codes will be able to handle error case=
s related to this specification.<o:p></o:p></span></p><p class=3DMsoNormal>=
<span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1=
F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>After a long=
 discussion, the only valid use case to arise is the one in which an extens=
ion such as the UX specification (providing a way for the client to specify=
 the display size of the authorization web page for various devices) needs =
additional codes. For example, the UX specification defines the &#8216;disp=
lay&#8217; authorization request parameter. If the client provides bad valu=
e, the server may want to return an error specific to this situation.<o:p><=
/o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-f=
amily:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'>The open issue is how to address this use case. Si=
nce such additional error codes are always a result of an additional reques=
t parameter, I am looking for a way to allow parameter registration to spec=
ify such related error codes without defining yet another registry. This so=
lution is specific to the only use case we have. Defining an error registry=
 is likely to do more harm than good, encouraging developers to define new =
generic error codes that are not extension-specific which will only reduce =
interoperability.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'=
font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nb=
sp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;fo=
nt-family:"Calibri","sans-serif";color:#1F497D'>Issue 2:<o:p></o:p></span><=
/p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibr=
i","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNo=
rmal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";col=
or:#1F497D'>The bearer token specification includes registration requiremen=
ts for protected resource request parameters as well as potential error cod=
es when a protected resource request fails. A few people have strongly obje=
cted to this new proposal since the semantics of the protected resource req=
uest is by definition, outside the scope of any OAuth specification.<o:p></=
o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fa=
mily:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p c=
lass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","san=
s-serif";color:#1F497D'>The only parameter allowed to infringe on the resou=
rce server namespace is the currently named &#8216;oauth_token&#8217; param=
eter. There is an ongoing discussion to renamed it to &#8216;bearer_token&#=
8217;.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:1=
1.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></=
span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"=
Calibri","sans-serif";color:#1F497D'>Hope this helps.<o:p></o:p></span></p>=
<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNorma=
l><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:=
#1F497D'>EHL<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-=
size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fa=
mily:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><div=
 style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0p=
t'><div><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.=
0pt 0in 0in 0in'><p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;fo=
nt-family:"Tahoma","sans-serif"'>From:</span></b><span style=3D'font-size:1=
0.0pt;font-family:"Tahoma","sans-serif"'> oauth-bounces@ietf.org [mailto:oa=
uth-bounces@ietf.org] <b>On Behalf Of </b>Phil Hunt<br><b>Sent:</b> Monday,=
 March 21, 2011 8:17 PM<br><b>To:</b> Manger, James H<br><b>Cc:</b> oauth@i=
etf.org<br><b>Subject:</b> Re: [OAUTH-WG] Apparent consensus on OAuth Error=
s Registry<o:p></o:p></span></p></div></div><p class=3DMsoNormal><o:p>&nbsp=
;</o:p></p><p class=3DMsoNormal>I'm still not understanding why each RFC (e=
.g. the bearer spec) can't define its own error codes. If you were to suppo=
rt the bearer token RFC, then you obviously understand the normative errors=
. I'm just not getting what the value of a central &quot;OAuth&quot; regist=
ry is. &nbsp;<o:p></o:p></p><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p>=
</div><div><p class=3DMsoNormal>An OAuth registry also unnecessarily limits=
 possibility of re-use of token schemes in other frameworks outside of OAut=
h or conversely limits the ability to use tokens (such as kerberos) in an O=
Auth &quot;framework&quot;.<o:p></o:p></p></div><div><p class=3DMsoNormal><=
o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>So again, I ask what th=
e benefit of a registry is achieved that could not be achieved within the t=
oken spec itself.<o:p></o:p></p><div><p class=3DMsoNormal><o:p>&nbsp;</o:p>=
</p></div><div><div><div><div><div><div><div><p class=3DMsoNormal><span sty=
le=3D'font-size:9.0pt;font-family:"Helvetica","sans-serif";color:black'>Phi=
l<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span style=3D'font-=
size:9.0pt;font-family:"Helvetica","sans-serif";color:black'><a href=3D"mai=
lto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><o:p></o:p></span></p></d=
iv></div></div></div><p class=3DMsoNormal><span style=3D'font-size:13.5pt;f=
ont-family:"Helvetica","sans-serif";color:black'><o:p>&nbsp;</o:p></span></=
p></div><p class=3DMsoNormal><span style=3D'font-size:13.5pt;font-family:"H=
elvetica","sans-serif";color:black'><br><br></span><o:p></o:p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On 20=
11-03-21, at 4:38 PM, Manger, James H wrote:<o:p></o:p></p></div><p class=
=3DMsoNormal><br><br><o:p></o:p></p><div><div><p class=3DMsoNormal><span la=
ng=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";col=
or:#1F497D'>The bearer spec defines 3 errors (invalid_request, invalid_toke=
n, insufficient_scope), which accompany 3 different status codes (400 Bad r=
equest, 401 Unauthorized, 403 Forbidden respectively).</span><span lang=3DE=
N-AU><o:p></o:p></span></p></div><div><p class=3DMsoNormal><span lang=3DEN-=
AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F49=
7D'>Client apps are probably better off switching behaviour based on the HT=
TP status code, and ignoring the error string (perhaps put it in a log, or =
on a debug console so a developer can see it).</span><span lang=3DEN-AU><o:=
p></o:p></span></p></div><div><p class=3DMsoNormal><span lang=3DEN-AU style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbs=
p;</span><span lang=3DEN-AU><o:p></o:p></span></p></div><div><p class=3DMso=
Normal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","=
sans-serif";color:#1F497D'>It seems like overkill to have:</span><span lang=
=3DEN-AU><o:p></o:p></span></p></div><div style=3D'margin-left:.5in'><p cla=
ss=3DMsoNormal style=3D'text-indent:-.25in'><span lang=3DEN-AU style=3D'fon=
t-size:11.0pt;font-family:Symbol;color:#1F497D'>&middot;</span><span lang=
=3DEN-AU style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;<span class=3Dapple-converted-space>&nbsp;</span></sp=
an><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans=
-serif";color:#1F497D'>An HTTP status code (eg 401)</span><span lang=3DEN-A=
U><o:p></o:p></span></p></div><div style=3D'margin-left:.5in'><p class=3DMs=
oNormal style=3D'text-indent:-.25in'><span lang=3DEN-AU style=3D'font-size:=
11.0pt;font-family:Symbol;color:#1F497D'>&middot;</span><span lang=3DEN-AU =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;<span class=3Dapple-converted-space>&nbsp;</span></span><span =
lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";c=
olor:#1F497D'>An HTTP status message (eg Unauthorized)</span><span lang=3DE=
N-AU><o:p></o:p></span></p></div><div style=3D'margin-left:.5in'><p class=
=3DMsoNormal style=3D'text-indent:-.25in'><span lang=3DEN-AU style=3D'font-=
size:11.0pt;font-family:Symbol;color:#1F497D'>&middot;</span><span lang=3DE=
N-AU style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;<span class=3Dapple-converted-space>&nbsp;</span></span><=
span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-ser=
if";color:#1F497D'>An error string (eg invalid_token)</span><span lang=3DEN=
-AU><o:p></o:p></span></p></div><div style=3D'margin-left:.5in'><p class=3D=
MsoNormal style=3D'text-indent:-.25in'><span lang=3DEN-AU style=3D'font-siz=
e:11.0pt;font-family:Symbol;color:#1F497D'>&middot;</span><span lang=3DEN-A=
U style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;<span class=3Dapple-converted-space>&nbsp;</span></span><spa=
n lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"=
;color:#1F497D'>An error_description (eg token is formatted incorrectly)</s=
pan><span lang=3DEN-AU><o:p></o:p></span></p></div><div style=3D'margin-lef=
t:.5in'><p class=3DMsoNormal style=3D'text-indent:-.25in'><span lang=3DEN-A=
U style=3D'font-size:11.0pt;font-family:Symbol;color:#1F497D'>&middot;</spa=
n><span lang=3DEN-AU style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3Dapple-converted-space>&nbsp=
;</span></span><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Ca=
libri","sans-serif";color:#1F497D'>An error_uri (eg<span class=3Dapple-conv=
erted-space>&nbsp;</span><a href=3D"http://api.example.com/error/45">http:/=
/api.example.com/error/45</a>)</span><span lang=3DEN-AU><o:p></o:p></span><=
/p></div><div style=3D'margin-left:.5in'><p class=3DMsoNormal style=3D'text=
-indent:-.25in'><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:Sy=
mbol;color:#1F497D'>&middot;</span><span lang=3DEN-AU style=3D'font-size:7.=
0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span cl=
ass=3Dapple-converted-space>&nbsp;</span></span><span lang=3DEN-AU style=3D=
'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>The bod=
y of the HTTP response (eg an HTML page with extensive details about the er=
ror and links to the API documentation)</span><span lang=3DEN-AU><o:p></o:p=
></span></p></div><div><p class=3DMsoNormal><span lang=3DEN-AU style=3D'fon=
t-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</spa=
n><span lang=3DEN-AU><o:p></o:p></span></p></div><div><p class=3DMsoNormal>=
<span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>6 sources of error information -- and all for a bearer =
token that is usually opaque to the client app!</span><span lang=3DEN-AU><o=
:p></o:p></span></p></div><div><p class=3DMsoNormal><span lang=3DEN-AU styl=
e=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nb=
sp;</span><span lang=3DEN-AU><o:p></o:p></span></p></div><div><p class=3DMs=
oNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";color:#1F497D'>Encouraging new error strings to be defined &#8=
211; by having a registry for them &#8211; is not ideal. Client apps that d=
on&#8217;t recognize a value learn nothing. At least with HTTP status codes=
 a client app knows the class of error (eg 4xx or 5xx) and can behave accor=
dingly even if it doesn&#8217;t recognize the specific value (eg 538).</spa=
n><span lang=3DEN-AU><o:p></o:p></span></p></div><div><p class=3DMsoNormal>=
<span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>&nbsp;</span><span lang=3DEN-AU><o:p></o:p></span></p><=
/div><div><p class=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0pt=
;font-family:"Calibri","sans-serif";color:#1F497D'>I&#8217;d vote for F) di=
tch error string/description/uri for the BEARER HTTP authentication scheme.=
</span><span lang=3DEN-AU><o:p></o:p></span></p></div><div><p class=3DMsoNo=
rmal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'>&nbsp;</span><span lang=3DEN-AU><o:p></o:p></span>=
</p></div><div><div><p class=3DMsoNormal><span lang=3DEN-AU style=3D'font-s=
ize:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>--</span><span=
 lang=3DEN-AU><o:p></o:p></span></p></div><div><p class=3DMsoNormal><span l=
ang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";co=
lor:#1F497D'>James Manger</span><span lang=3DEN-AU><o:p></o:p></span></p></=
div></div><div><div><p class=3DMsoNormal><span lang=3DEN-AU style=3D'color:=
#1F497D'>&nbsp;</span><span lang=3DEN-AU><o:p></o:p></span></p></div><div><=
p class=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-famil=
y:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><span lang=3DEN-AU><o:=
p></o:p></span></p></div><div><div><div><p class=3DMsoNormal><span lang=3DE=
N-AU>On 2011-03-21, at 9:48 AM, Mike Jones wrote:<o:p></o:p></span></p></di=
v></div><div><p class=3DMsoNormal><span lang=3DEN-AU><br><br><br><o:p></o:p=
></span></p></div><div><div><div><p class=3DMsoNormal><span style=3D'font-s=
ize:11.0pt;font-family:"Calibri","sans-serif"'>People voted as follows in t=
he poll I conducted on the OAuth Errors Registry:</span><span lang=3DEN-AU>=
<o:p></o:p></span></p></div></div><div><div><p class=3DMsoNormal><span styl=
e=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</span><spa=
n lang=3DEN-AU><o:p></o:p></span></p></div></div><div><div><p class=3DMsoNo=
rmal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Fo=
r A:</span><span lang=3DEN-AU><o:p></o:p></span></p></div></div><div><div><=
p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","=
sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp; Mike Jones</span><span lang=3DEN-AU><o:p></o:p=
></span></p></div></div><div><div><p class=3DMsoNormal><span style=3D'font-=
size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Igor Faynbe=
rg</span><span lang=3DEN-AU><o:p></o:p></span></p></div></div><div><div><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; Justin Richter</span><span lang=3DEN-AU><o:p></o=
:p></span></p></div></div><div><div><p class=3DMsoNormal><span style=3D'fon=
t-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Anthony N=
adalin</span><span lang=3DEN-AU><o:p></o:p></span></p></div></div><div><div=
><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri"=
,"sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span lang=3DEN-AU><o:p></o:p></span><=
/p></div></div><div><div><p class=3DMsoNormal><span style=3D'font-size:11.0=
pt;font-family:"Calibri","sans-serif"'>For D or C:</span><span lang=3DEN-AU=
><o:p></o:p></span></p></div></div><div><div><p class=3DMsoNormal><span sty=
le=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Eran Hammer-Lahav</span><span lang=3DEN-AU><o:p></o:p></span></p></div></di=
v><div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-famil=
y:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; William Mills</span><span lang=3D=
EN-AU><o:p></o:p></span></p></div></div><div><div><p class=3DMsoNormal><spa=
n style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span lang=3DEN-AU><o:p></o:p></span></p></div></div><div><div><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif"'>Given that twice as many people indicated a preference for A as for a=
ny other option, that seems to indicate a consensus for A.&nbsp; Therefore =
Eran, when you update your draft, can you please proceed on that basis?</sp=
an><span lang=3DEN-AU><o:p></o:p></span></p></div></div><div><div><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif"'>&nbsp;</span><span lang=3DEN-AU><o:p></o:p></span></p></div></div><di=
v><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Ca=
libri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp; Thanks,</span><span lang=3DEN-AU><o:p></o:p></span=
></p></div></div><div><div><p class=3DMsoNormal><span style=3D'font-size:11=
.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike</span><span lang=3DEN-=
AU><o:p></o:p></span></p></div></div><div><div><p class=3DMsoNormal><span s=
tyle=3D'font-size:13.5pt;font-family:"Helvetica","sans-serif"'>&nbsp;</span=
><span lang=3DEN-AU><o:p></o:p></span></p></div></div></div></div><div><p c=
lass=3DMsoNormal><span lang=3DEN-AU>&nbsp;<o:p></o:p></span></p></div></div=
><p class=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:13.5pt;font-fam=
ily:"Helvetica","sans-serif"'>_____________________________________________=
__<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.or=
g</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://ww=
w.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></span></p></div></div><p c=
lass=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div></body></html=
>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F432EF4P3PW5EX1MB01E_--

From phil.hunt@oracle.com  Tue Mar 22 09:43:48 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 91EF828C0E5 for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 09:43:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.56
X-Spam-Level: 
X-Spam-Status: No, score=-6.56 tagged_above=-999 required=5 tests=[AWL=0.037,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TMgYwCcZtP-y for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 09:43:40 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 9D9F928C13F for <oauth@ietf.org>; Tue, 22 Mar 2011 09:43:40 -0700 (PDT)
Received: from rcsinet13.oracle.com (rcsinet13.oracle.com [148.87.113.125]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2MGjBoo022691 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 22 Mar 2011 16:45:12 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by rcsinet13.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2MGj9R4024161 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 22 Mar 2011 16:45:10 GMT
Received: from abhmt020.oracle.com (abhmt020.oracle.com [141.146.116.29]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2MGj9ho013640; Tue, 22 Mar 2011 11:45:09 -0500
Received: from dhcp-rmdc-twvpn-1-vpnpool-10-159-13-30.vpn.oracle.com (/10.159.13.30) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 22 Mar 2011 09:45:08 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-1-382561054
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F432EF4@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Tue, 22 Mar 2011 09:45:08 -0700
Message-Id: <F154CBFA-F7C7-4C80-B46A-CE54E0EAFB45@oracle.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com> <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com> <3DA41CB6-5E24-4D46-9703-C04FAF4D9571@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432EF4@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt356.oracle.com [141.146.40.156]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090207.4D88D217.0073,ss=1,fgs=0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2011 16:43:48 -0000

--Apple-Mail-1-382561054
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Eran,

Thanks. Thats the best summary of the problem and I think it will help =
move the discussion forward (finally).

Issue 1:

Since only one token format could be in play at any time, there doesn't =
seem to be a chance for conflict unless a bearer token collides with =
either OAuth or HTTP itself.

Let's say, worst case, two RFC's defined the same error code (lets say =
MAC and BEARER) with a different normative meaning. Would there really =
be a conflict? It doesn't seem so. The token type would dictate the RFC =
which would describe the definition in that case.

So the value of a registry strictly becomes a more documentary function =
- to ensure a nice neat namespace for status codes.  The downside? It =
ties token specs strictly to OAuth. This is the part I object to.

Issue 2:
I think if fully de-coupled, then the BEARER spec would be free to add =
whatever detail they like - as long as there is agreement within the =
BEARER spec community.

Finally, while I agree, detailed error messages helps in user interface =
design (and have been a big proponent in the past), it seems that in =
most "Internet" cases, services decline to give detailed errors (e.g. =
take OpenID or SAML as examples). They tend to just report generic =
errors. So is there much practical value here if nobody is likely to use =
them? =20

Phil
phil.hunt@oracle.com




On 2011-03-21, at 9:32 PM, Eran Hammer-Lahav wrote:

> There are two separate issues here which Mike=92s latest draft =
conflated into one.
> =20
> Issues 1:
> =20
> The v2 specification currently does not allow for defining additional =
error codes to the authorization and token endpoints. The only way to =
define additional error codes is by updating the RFC (once published). =
Updating an RFC is an acceptable way of extending an existing =
specification, but only if it is done very infrequently. The other two =
options are to allow URI-formatted error code, or define a registry.
> =20
> In any case, all three extensibility model have a single purpose =96 =
to reduce the likelihood of an error code name collision. It does not =
improve interoperability unless clients actually implement the =
additional codes. The goal of the v2 specification must be to cover all =
possible scenarios so that a client implementing nothing but these codes =
will be able to handle error cases related to this specification.
> =20
> After a long discussion, the only valid use case to arise is the one =
in which an extension such as the UX specification (providing a way for =
the client to specify the display size of the authorization web page for =
various devices) needs additional codes. For example, the UX =
specification defines the =91display=92 authorization request parameter. =
If the client provides bad value, the server may want to return an error =
specific to this situation.
> =20
> The open issue is how to address this use case. Since such additional =
error codes are always a result of an additional request parameter, I am =
looking for a way to allow parameter registration to specify such =
related error codes without defining yet another registry. This solution =
is specific to the only use case we have. Defining an error registry is =
likely to do more harm than good, encouraging developers to define new =
generic error codes that are not extension-specific which will only =
reduce interoperability.
> =20
> Issue 2:
> =20
> The bearer token specification includes registration requirements for =
protected resource request parameters as well as potential error codes =
when a protected resource request fails. A few people have strongly =
objected to this new proposal since the semantics of the protected =
resource request is by definition, outside the scope of any OAuth =
specification.
> =20
> The only parameter allowed to infringe on the resource server =
namespace is the currently named =91oauth_token=92 parameter. There is =
an ongoing discussion to renamed it to =91bearer_token=92.
> =20
> Hope this helps.
> =20
> EHL
> =20
> =20
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Phil Hunt
> Sent: Monday, March 21, 2011 8:17 PM
> To: Manger, James H
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
> =20
> I'm still not understanding why each RFC (e.g. the bearer spec) can't =
define its own error codes. If you were to support the bearer token RFC, =
then you obviously understand the normative errors. I'm just not getting =
what the value of a central "OAuth" registry is. =20
> =20
> An OAuth registry also unnecessarily limits possibility of re-use of =
token schemes in other frameworks outside of OAuth or conversely limits =
the ability to use tokens (such as kerberos) in an OAuth "framework".
> =20
> So again, I ask what the benefit of a registry is achieved that could =
not be achieved within the token spec itself.
> =20
> Phil
> phil.hunt@oracle.com
> =20
>=20
>=20
> =20
> On 2011-03-21, at 4:38 PM, Manger, James H wrote:
>=20
>=20
> The bearer spec defines 3 errors (invalid_request, invalid_token, =
insufficient_scope), which accompany 3 different status codes (400 Bad =
request, 401 Unauthorized, 403 Forbidden respectively).
> Client apps are probably better off switching behaviour based on the =
HTTP status code, and ignoring the error string (perhaps put it in a =
log, or on a debug console so a developer can see it).
> =20
> It seems like overkill to have:
> =B7         An HTTP status code (eg 401)
> =B7         An HTTP status message (eg Unauthorized)
> =B7         An error string (eg invalid_token)
> =B7         An error_description (eg token is formatted incorrectly)
> =B7         An error_uri (eg http://api.example.com/error/45)
> =B7         The body of the HTTP response (eg an HTML page with =
extensive details about the error and links to the API documentation)
> =20
> 6 sources of error information -- and all for a bearer token that is =
usually opaque to the client app!
> =20
> Encouraging new error strings to be defined =96 by having a registry =
for them =96 is not ideal. Client apps that don=92t recognize a value =
learn nothing. At least with HTTP status codes a client app knows the =
class of error (eg 4xx or 5xx) and can behave accordingly even if it =
doesn=92t recognize the specific value (eg 538).
> =20
> I=92d vote for F) ditch error string/description/uri for the BEARER =
HTTP authentication scheme.
> =20
> --
> James Manger
> =20
> =20
> On 2011-03-21, at 9:48 AM, Mike Jones wrote:
>=20
>=20
>=20
> People voted as follows in the poll I conducted on the OAuth Errors =
Registry:
> =20
> For A:
>                 Mike Jones
>                 Igor Faynberg
>                 Justin Richter
>                 Anthony Nadalin
>               =20
> For D or C:
>                 Eran Hammer-Lahav
>                 William Mills
> =20
> Given that twice as many people indicated a preference for A as for =
any other option, that seems to indicate a consensus for A.  Therefore =
Eran, when you update your draft, can you please proceed on that basis?
> =20
>                                                                 =
Thanks,
>                                                                 -- =
Mike
> =20
> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> =20


--Apple-Mail-1-382561054
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
">Eran,<div><br></div><div>Thanks. Thats the best summary of the problem =
and I think it will help move the discussion forward =
(finally).</div><div><br></div><div>Issue =
1:</div><div><br></div><div>Since only one token format could be in play =
at any time, there doesn't seem to be a chance for conflict unless a =
bearer token collides with either OAuth or HTTP =
itself.</div><div><br></div><div>Let's say, worst case, two RFC's =
defined the same error code (lets say MAC and BEARER) with a different =
normative meaning. Would there really be a conflict? It doesn't seem so. =
The token type would dictate the RFC which would describe the definition =
in that case.</div><div><br></div><div>So the value of a registry =
strictly becomes a more documentary function - to ensure a nice neat =
namespace for status codes. &nbsp;The downside? It ties token specs =
strictly to OAuth. This is the part I object =
to.</div><div><br></div><div>Issue 2:</div><div>I think if fully =
de-coupled, then the BEARER spec would be free to add whatever detail =
they like - as long as there is agreement within the BEARER spec =
community.</div><div><br></div><div>Finally, while I agree, detailed =
error messages helps in user interface design (and have been a big =
proponent in the past), it seems that in most "Internet" cases, services =
decline to give detailed errors (e.g. take OpenID or SAML as examples). =
They tend to just report generic errors. So is there much practical =
value here if nobody is likely to use them? =
&nbsp;</div><div><br></div><div><div>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-21, at 9:32 PM, Eran Hammer-Lahav =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; font-family: Helvetica; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: =
normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">There =
are two separate issues here which Mike=92s latest draft conflated into =
one.<o:p></o:p></span></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif; "><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">Issues 1:<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">The =
v2 specification currently does not allow for defining additional error =
codes to the authorization and token endpoints. The only way to define =
additional error codes is by updating the RFC (once published). Updating =
an RFC is an acceptable way of extending an existing specification, but =
only if it is done very infrequently. The other two options are to allow =
URI-formatted error code, or define a =
registry.<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">In =
any case, all three extensibility model have a single purpose =96 to =
reduce the likelihood of an error code name collision. It does not =
improve interoperability unless clients actually implement the =
additional codes. The goal of the v2 specification must be to cover all =
possible scenarios so that a client implementing nothing but these codes =
will be able to handle error cases related to this =
specification.<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">After =
a long discussion, the only valid use case to arise is the one in which =
an extension such as the UX specification (providing a way for the =
client to specify the display size of the authorization web page for =
various devices) needs additional codes. For example, the UX =
specification defines the =91display=92 authorization request parameter. =
If the client provides bad value, the server may want to return an error =
specific to this situation.<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">The =
open issue is how to address this use case. Since such additional error =
codes are always a result of an additional request parameter, I am =
looking for a way to allow parameter registration to specify such =
related error codes without defining yet another registry. This solution =
is specific to the only use case we have. Defining an error registry is =
likely to do more harm than good, encouraging developers to define new =
generic error codes that are not extension-specific which will only =
reduce interoperability.<o:p></o:p></span></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); "><o:p>&nbsp;</o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">Issue =
2:<o:p></o:p></span></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif; "><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">The =
bearer token specification includes registration requirements for =
protected resource request parameters as well as potential error codes =
when a protected resource request fails. A few people have strongly =
objected to this new proposal since the semantics of the protected =
resource request is by definition, outside the scope of any OAuth =
specification.<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">The =
only parameter allowed to infringe on the resource server namespace is =
the currently named =91oauth_token=92 parameter. There is an ongoing =
discussion to renamed it to =91bearer_token=92.<o:p></o:p></span></div><di=
v style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">Hope =
this helps.<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">EHL<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"border-top-style: none; =
border-right-style: none; border-bottom-style: none; border-width: =
initial; border-color: initial; border-left-style: solid; =
border-left-color: blue; border-left-width: 1.5pt; padding-top: 0in; =
padding-right: 0in; padding-bottom: 0in; padding-left: 4pt; "><div><div =
style=3D"border-right-style: none; border-bottom-style: none; =
border-left-style: none; border-width: initial; border-color: initial; =
border-top-style: solid; border-top-color: rgb(181, 196, 223); =
border-top-width: 1pt; padding-top: 3pt; padding-right: 0in; =
padding-bottom: 0in; padding-left: 0in; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; =
">From:</span></b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif; "><span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth-bounces@ietf.org" style=3D"color: blue; =
text-decoration: underline; ">oauth-bounces@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>[mailto:oauth-bounces@ietf.or=
g]<span class=3D"Apple-converted-space">&nbsp;</span><b>On Behalf =
Of<span class=3D"Apple-converted-space">&nbsp;</span></b>Phil =
Hunt<br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Monday, March 21, 2011 8:17 =
PM<br><b>To:</b><span class=3D"Apple-converted-space">&nbsp;</span>Manger,=
 James H<br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth@ietf.org" style=3D"color: blue; text-decoration: =
underline; ">oauth@ietf.org</a><br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] Apparent =
consensus on OAuth Errors =
Registry<o:p></o:p></span></div></div></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif; ">I'm still not understanding why =
each RFC (e.g. the bearer spec) can't define its own error codes. If you =
were to support the bearer token RFC, then you obviously understand the =
normative errors. I'm just not getting what the value of a central =
"OAuth" registry is. &nbsp;<o:p></o:p></div><div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">An OAuth registry also =
unnecessarily limits possibility of re-use of token schemes in other =
frameworks outside of OAuth or conversely limits the ability to use =
tokens (such as kerberos) in an OAuth =
"framework".<o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">So again, I ask what the =
benefit of a registry is achieved that could not be achieved within the =
token spec itself.<o:p></o:p></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div><div><div><div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 9pt; font-family: Helvetica, =
sans-serif; color: black; ">Phil<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 9pt; font-family: Helvetica, =
sans-serif; color: black; "><a href=3D"mailto:phil.hunt@oracle.com" =
style=3D"color: blue; text-decoration: underline; =
">phil.hunt@oracle.com</a><o:p></o:p></span></div></div></div></div></div>=
<div style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: =
0.0001pt; margin-left: 0in; font-size: 12pt; font-family: 'Times New =
Roman', serif; "><span style=3D"font-size: 13.5pt; font-family: =
Helvetica, sans-serif; color: black; =
"><o:p>&nbsp;</o:p></span></div></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
13.5pt; font-family: Helvetica, sans-serif; color: black; =
"><br><br></span><o:p></o:p></div></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">On 2011-03-21, at 4:38 =
PM, Manger, James H wrote:<o:p></o:p></div></div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span lang=3D"EN-AU" =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">The bearer spec defines 3 errors (invalid_request, =
invalid_token, insufficient_scope), which accompany 3 different status =
codes (400 Bad request, 401 Unauthorized, 403 Forbidden =
respectively).</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">Client apps are probably =
better off switching behaviour based on the HTTP status code, and =
ignoring the error string (perhaps put it in a log, or on a debug =
console so a developer can see it).</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">It seems like overkill =
to have:</span><span lang=3D"EN-AU"><o:p></o:p></span></div></div><div =
style=3D"margin-left: 0.5in; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; text-indent: -0.25in; =
"><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: Symbol; =
color: rgb(31, 73, 125); ">=B7</span><span lang=3D"EN-AU" =
style=3D"font-size: 7pt; color: rgb(31, 73, 125); =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span lang=3D"EN-AU" =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">An HTTP status code (eg 401)</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div style=3D"margin-left: =
0.5in; "><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; font-family: =
'Times New Roman', serif; text-indent: -0.25in; "><span lang=3D"EN-AU" =
style=3D"font-size: 11pt; font-family: Symbol; color: rgb(31, 73, 125); =
">=B7</span><span lang=3D"EN-AU" style=3D"font-size: 7pt; color: rgb(31, =
73, 125); ">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span lang=3D"EN-AU" =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">An HTTP status message (eg Unauthorized)</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div style=3D"margin-left: =
0.5in; "><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; font-family: =
'Times New Roman', serif; text-indent: -0.25in; "><span lang=3D"EN-AU" =
style=3D"font-size: 11pt; font-family: Symbol; color: rgb(31, 73, 125); =
">=B7</span><span lang=3D"EN-AU" style=3D"font-size: 7pt; color: rgb(31, =
73, 125); ">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span lang=3D"EN-AU" =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">An error string (eg invalid_token)</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div style=3D"margin-left: =
0.5in; "><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; font-family: =
'Times New Roman', serif; text-indent: -0.25in; "><span lang=3D"EN-AU" =
style=3D"font-size: 11pt; font-family: Symbol; color: rgb(31, 73, 125); =
">=B7</span><span lang=3D"EN-AU" style=3D"font-size: 7pt; color: rgb(31, =
73, 125); ">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span lang=3D"EN-AU" =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">An error_description (eg token is formatted =
incorrectly)</span><span lang=3D"EN-AU"><o:p></o:p></span></div></div><div=
 style=3D"margin-left: 0.5in; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; text-indent: -0.25in; =
"><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: Symbol; =
color: rgb(31, 73, 125); ">=B7</span><span lang=3D"EN-AU" =
style=3D"font-size: 7pt; color: rgb(31, 73, 125); =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span lang=3D"EN-AU" =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">An error_uri (eg<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://api.example.com/error/45" style=3D"color: blue; =
text-decoration: underline; =
">http://api.example.com/error/45</a>)</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div style=3D"margin-left: =
0.5in; "><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; font-family: =
'Times New Roman', serif; text-indent: -0.25in; "><span lang=3D"EN-AU" =
style=3D"font-size: 11pt; font-family: Symbol; color: rgb(31, 73, 125); =
">=B7</span><span lang=3D"EN-AU" style=3D"font-size: 7pt; color: rgb(31, =
73, 125); ">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span lang=3D"EN-AU" =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">The body of the HTTP response (eg an HTML page with =
extensive details about the error and links to the API =
documentation)</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">6 sources of error =
information -- and all for a bearer token that is usually opaque to the =
client app!</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">Encouraging new error =
strings to be defined =96 by having a registry for them =96 is not =
ideal. Client apps that don=92t recognize a value learn nothing. At =
least with HTTP status codes a client app knows the class of error (eg =
4xx or 5xx) and can behave accordingly even if it doesn=92t recognize =
the specific value (eg 538).</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">I=92d vote for F) ditch =
error string/description/uri for the BEARER HTTP authentication =
scheme.</span><span lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div=
 style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">--</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">James Manger</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"color: rgb(31, 73, 125); =
">&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125); ">&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div><div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU">On 2011-03-21, at 9:48 AM, Mike Jones =
wrote:<o:p></o:p></span></div></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
lang=3D"EN-AU"><br><br><br><o:p></o:p></span></div></div><div><div><div><d=
iv style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; ">People voted as follows in the poll I conducted on the =
OAuth Errors Registry:</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; ">&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; ">For A:</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Mike Jones</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Igor Faynberg</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Justin Richter</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Anthony Nadalin</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; ">For D or C:</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; Eran Hammer-Lahav</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp; William Mills</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; ">&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; ">Given that twice as many people indicated a preference for =
A as for any other option, that seems to indicate a consensus for =
A.&nbsp; Therefore Eran, when you update your draft, can you please =
proceed on that basis?</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; ">&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; Thanks,</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; -- Mike</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 13.5pt; font-family: Helvetica, =
sans-serif; ">&nbsp;</span><span =
lang=3D"EN-AU"><o:p></o:p></span></div></div></div></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span =
lang=3D"EN-AU">&nbsp;<o:p></o:p></span></div></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span lang=3D"EN-AU" style=3D"font-size: 13.5pt; font-family: =
Helvetica, sans-serif; =
">_______________________________________________<br>OAuth mailing =
list<br><a href=3D"mailto:OAuth@ietf.org" style=3D"color: blue; =
text-decoration: underline; ">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: =
blue; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></span></div><=
/div></div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; font-family: =
'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div></div></div></div></div></span></blockquote=
></div><br></div></body></html>=

--Apple-Mail-1-382561054--

From eran@hueniverse.com  Tue Mar 22 09:47:13 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5427628C13F for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 09:47:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.566
X-Spam-Level: 
X-Spam-Status: No, score=-2.566 tagged_above=-999 required=5 tests=[AWL=0.032,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id reURnKdFQPJH for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 09:46:56 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 0484528C142 for <oauth@ietf.org>; Tue, 22 Mar 2011 09:46:55 -0700 (PDT)
Received: (qmail 22560 invoked from network); 22 Mar 2011 16:48:28 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 22 Mar 2011 16:48:27 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Tue, 22 Mar 2011 09:48:17 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phil Hunt <phil.hunt@oracle.com>
Date: Tue, 22 Mar 2011 09:48:12 -0700
Thread-Topic: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
Thread-Index: AcvosIYK9IabYIR7STam4RifJyK3cQAAD9vg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F432FE9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com> <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com> <3DA41CB6-5E24-4D46-9703-C04FAF4D9571@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432EF4@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F154CBFA-F7C7-4C80-B46A-CE54E0EAFB45@oracle.com>
In-Reply-To: <F154CBFA-F7C7-4C80-B46A-CE54E0EAFB45@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234464F432FE9P3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2011 16:47:13 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F432FE9P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Issue 1 has nothing to do with bearer, MAC, or accessing a protected resour=
ce. It is strictly about the v2 authorization and token endpoints. Each of =
those has a closed set of error codes which is currently not officially ext=
ensible.

EHL

From: Phil Hunt [mailto:phil.hunt@oracle.com]
Sent: Tuesday, March 22, 2011 9:45 AM
To: Eran Hammer-Lahav
Cc: Manger, James H; oauth@ietf.org
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

Eran,

Thanks. Thats the best summary of the problem and I think it will help move=
 the discussion forward (finally).

Issue 1:

Since only one token format could be in play at any time, there doesn't see=
m to be a chance for conflict unless a bearer token collides with either OA=
uth or HTTP itself.

Let's say, worst case, two RFC's defined the same error code (lets say MAC =
and BEARER) with a different normative meaning. Would there really be a con=
flict? It doesn't seem so. The token type would dictate the RFC which would=
 describe the definition in that case.

So the value of a registry strictly becomes a more documentary function - t=
o ensure a nice neat namespace for status codes.  The downside? It ties tok=
en specs strictly to OAuth. This is the part I object to.

Issue 2:
I think if fully de-coupled, then the BEARER spec would be free to add what=
ever detail they like - as long as there is agreement within the BEARER spe=
c community.

Finally, while I agree, detailed error messages helps in user interface des=
ign (and have been a big proponent in the past), it seems that in most "Int=
ernet" cases, services decline to give detailed errors (e.g. take OpenID or=
 SAML as examples). They tend to just report generic errors. So is there mu=
ch practical value here if nobody is likely to use them?

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>




On 2011-03-21, at 9:32 PM, Eran Hammer-Lahav wrote:


There are two separate issues here which Mike's latest draft conflated into=
 one.

Issues 1:

The v2 specification currently does not allow for defining additional error=
 codes to the authorization and token endpoints. The only way to define add=
itional error codes is by updating the RFC (once published). Updating an RF=
C is an acceptable way of extending an existing specification, but only if =
it is done very infrequently. The other two options are to allow URI-format=
ted error code, or define a registry.

In any case, all three extensibility model have a single purpose - to reduc=
e the likelihood of an error code name collision. It does not improve inter=
operability unless clients actually implement the additional codes. The goa=
l of the v2 specification must be to cover all possible scenarios so that a=
 client implementing nothing but these codes will be able to handle error c=
ases related to this specification.

After a long discussion, the only valid use case to arise is the one in whi=
ch an extension such as the UX specification (providing a way for the clien=
t to specify the display size of the authorization web page for various dev=
ices) needs additional codes. For example, the UX specification defines the=
 'display' authorization request parameter. If the client provides bad valu=
e, the server may want to return an error specific to this situation.

The open issue is how to address this use case. Since such additional error=
 codes are always a result of an additional request parameter, I am looking=
 for a way to allow parameter registration to specify such related error co=
des without defining yet another registry. This solution is specific to the=
 only use case we have. Defining an error registry is likely to do more har=
m than good, encouraging developers to define new generic error codes that =
are not extension-specific which will only reduce interoperability.

Issue 2:

The bearer token specification includes registration requirements for prote=
cted resource request parameters as well as potential error codes when a pr=
otected resource request fails. A few people have strongly objected to this=
 new proposal since the semantics of the protected resource request is by d=
efinition, outside the scope of any OAuth specification.

The only parameter allowed to infringe on the resource server namespace is =
the currently named 'oauth_token' parameter. There is an ongoing discussion=
 to renamed it to 'bearer_token'.

Hope this helps.

EHL


From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org] On Behalf Of Phil Hunt
Sent: Monday, March 21, 2011 8:17 PM
To: Manger, James H
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

I'm still not understanding why each RFC (e.g. the bearer spec) can't defin=
e its own error codes. If you were to support the bearer token RFC, then yo=
u obviously understand the normative errors. I'm just not getting what the =
value of a central "OAuth" registry is.

An OAuth registry also unnecessarily limits possibility of re-use of token =
schemes in other frameworks outside of OAuth or conversely limits the abili=
ty to use tokens (such as kerberos) in an OAuth "framework".

So again, I ask what the benefit of a registry is achieved that could not b=
e achieved within the token spec itself.

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>





On 2011-03-21, at 4:38 PM, Manger, James H wrote:



The bearer spec defines 3 errors (invalid_request, invalid_token, insuffici=
ent_scope), which accompany 3 different status codes (400 Bad request, 401 =
Unauthorized, 403 Forbidden respectively).
Client apps are probably better off switching behaviour based on the HTTP s=
tatus code, and ignoring the error string (perhaps put it in a log, or on a=
 debug console so a developer can see it).

It seems like overkill to have:
*         An HTTP status code (eg 401)
*         An HTTP status message (eg Unauthorized)
*         An error string (eg invalid_token)
*         An error_description (eg token is formatted incorrectly)
*         An error_uri (eg http://api.example.com/error/45)
*         The body of the HTTP response (eg an HTML page with extensive det=
ails about the error and links to the API documentation)

6 sources of error information -- and all for a bearer token that is usuall=
y opaque to the client app!

Encouraging new error strings to be defined - by having a registry for them=
 - is not ideal. Client apps that don't recognize a value learn nothing. At=
 least with HTTP status codes a client app knows the class of error (eg 4xx=
 or 5xx) and can behave accordingly even if it doesn't recognize the specif=
ic value (eg 538).

I'd vote for F) ditch error string/description/uri for the BEARER HTTP auth=
entication scheme.

--
James Manger


On 2011-03-21, at 9:48 AM, Mike Jones wrote:




People voted as follows in the poll I conducted on the OAuth Errors Registr=
y:

For A:
                Mike Jones
                Igor Faynberg
                Justin Richter
                Anthony Nadalin

For D or C:
                Eran Hammer-Lahav
                William Mills

Given that twice as many people indicated a preference for A as for any oth=
er option, that seems to indicate a consensus for A.  Therefore Eran, when =
you update your draft, can you please proceed on that basis?

                                                                Thanks,
                                                                -- Mike


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--_000_90C41DD21FB7C64BB94121FBBC2E7234464F432FE9P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Issue 1 h=
as nothing to do with bearer, MAC, or accessing a protected resource. It is=
 strictly about the v2 authorization and token endpoints. Each of those has=
 a closed set of error codes which is currently not officially extensible.<=
o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;f=
ont-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></=
p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri=
","sans-serif";color:#1F497D'>EHL<o:p></o:p></span></p><p class=3DMsoNormal=
><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#=
1F497D'><o:p>&nbsp;</o:p></span></p><div style=3D'border:none;border-left:s=
olid blue 1.5pt;padding:0in 0in 0in 4.0pt'><div><div style=3D'border:none;b=
order-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNorm=
al><b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Fr=
om:</span></b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-se=
rif"'> Phil Hunt [mailto:phil.hunt@oracle.com] <br><b>Sent:</b> Tuesday, Ma=
rch 22, 2011 9:45 AM<br><b>To:</b> Eran Hammer-Lahav<br><b>Cc:</b> Manger, =
James H; oauth@ietf.org<br><b>Subject:</b> Re: [OAUTH-WG] Apparent consensu=
s on OAuth Errors Registry<o:p></o:p></span></p></div></div><p class=3DMsoN=
ormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Eran,<o:p></o:p></p><div><p=
 class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>Tha=
nks. Thats the best summary of the problem and I think it will help move th=
e discussion forward (finally).<o:p></o:p></p></div><div><p class=3DMsoNorm=
al><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>Issue 1:<o:p></o:p>=
</p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p clas=
s=3DMsoNormal>Since only one token format could be in play at any time, the=
re doesn't seem to be a chance for conflict unless a bearer token collides =
with either OAuth or HTTP itself.<o:p></o:p></p></div><div><p class=3DMsoNo=
rmal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>Let's say, worst =
case, two RFC's defined the same error code (lets say MAC and BEARER) with =
a different normative meaning. Would there really be a conflict? It doesn't=
 seem so. The token type would dictate the RFC which would describe the def=
inition in that case.<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&n=
bsp;</o:p></p></div><div><p class=3DMsoNormal>So the value of a registry st=
rictly becomes a more documentary function - to ensure a nice neat namespac=
e for status codes. &nbsp;The downside? It ties token specs strictly to OAu=
th. This is the part I object to.<o:p></o:p></p></div><div><p class=3DMsoNo=
rmal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>Issue 2:<o:p></o:=
p></p></div><div><p class=3DMsoNormal>I think if fully de-coupled, then the=
 BEARER spec would be free to add whatever detail they like - as long as th=
ere is agreement within the BEARER spec community.<o:p></o:p></p></div><div=
><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>=
Finally, while I agree, detailed error messages helps in user interface des=
ign (and have been a big proponent in the past), it seems that in most &quo=
t;Internet&quot; cases, services decline to give detailed errors (e.g. take=
 OpenID or SAML as examples). They tend to just report generic errors. So i=
s there much practical value here if nobody is likely to use them? &nbsp;<o=
:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><di=
v><div><div><div><div><div><div><p class=3DMsoNormal><span style=3D'font-si=
ze:9.0pt;font-family:"Helvetica","sans-serif";color:black'>Phil<o:p></o:p><=
/span></p></div><div><p class=3DMsoNormal><span style=3D'font-size:9.0pt;fo=
nt-family:"Helvetica","sans-serif";color:black'><a href=3D"mailto:phil.hunt=
@oracle.com">phil.hunt@oracle.com</a><o:p></o:p></span></p></div></div></di=
v></div><p class=3DMsoNormal><span style=3D'font-size:13.5pt;font-family:"H=
elvetica","sans-serif";color:black'><o:p>&nbsp;</o:p></span></p></div><p cl=
ass=3DMsoNormal><span style=3D'font-size:13.5pt;font-family:"Helvetica","sa=
ns-serif";color:black'><br><br></span><o:p></o:p></p></div><p class=3DMsoNo=
rmal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On 2011-03-21, at =
9:32 PM, Eran Hammer-Lahav wrote:<o:p></o:p></p></div><p class=3DMsoNormal>=
<br><br><o:p></o:p></p><div><div><p class=3DMsoNormal><span style=3D'font-s=
ize:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>There are two =
separate issues here which Mike&#8217;s latest draft conflated into one.</s=
pan><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size=
:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p=
></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;=
font-family:"Calibri","sans-serif";color:#1F497D'>Issues 1:</span><o:p></o:=
p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-=
family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></=
div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"=
Calibri","sans-serif";color:#1F497D'>The v2 specification currently does no=
t allow for defining additional error codes to the authorization and token =
endpoints. The only way to define additional error codes is by updating the=
 RFC (once published). Updating an RFC is an acceptable way of extending an=
 existing specification, but only if it is done very infrequently. The othe=
r two options are to allow URI-formatted error code, or define a registry.<=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-si=
ze:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o=
:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0p=
t;font-family:"Calibri","sans-serif";color:#1F497D'>In any case, all three =
extensibility model have a single purpose &#8211; to reduce the likelihood =
of an error code name collision. It does not improve interoperability unles=
s clients actually implement the additional codes. The goal of the v2 speci=
fication must be to cover all possible scenarios so that a client implement=
ing nothing but these codes will be able to handle error cases related to t=
his specification.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><sp=
an style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F49=
7D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Afte=
r a long discussion, the only valid use case to arise is the one in which a=
n extension such as the UX specification (providing a way for the client to=
 specify the display size of the authorization web page for various devices=
) needs additional codes. For example, the UX specification defines the &#8=
216;display&#8217; authorization request parameter. If the client provides =
bad value, the server may want to return an error specific to this situatio=
n.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span=
><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11=
.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>The open issue is ho=
w to address this use case. Since such additional error codes are always a =
result of an additional request parameter, I am looking for a way to allow =
parameter registration to specify such related error codes without defining=
 yet another registry. This solution is specific to the only use case we ha=
ve. Defining an error registry is likely to do more harm than good, encoura=
ging developers to define new generic error codes that are not extension-sp=
ecific which will only reduce interoperability.</span><o:p></o:p></p></div>=
<div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Cali=
bri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'>Issue 2:</span><o:p></o:p></p></div><div><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNo=
rmal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";col=
or:#1F497D'>The bearer token specification includes registration requiremen=
ts for protected resource request parameters as well as potential error cod=
es when a protected resource request fails. A few people have strongly obje=
cted to this new proposal since the semantics of the protected resource req=
uest is by definition, outside the scope of any OAuth specification.</span>=
<o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.=
0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o=
:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font=
-family:"Calibri","sans-serif";color:#1F497D'>The only parameter allowed to=
 infringe on the resource server namespace is the currently named &#8216;oa=
uth_token&#8217; parameter. There is an ongoing discussion to renamed it to=
 &#8216;bearer_token&#8217;.</span><o:p></o:p></p></div><div><p class=3DMso=
Normal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";c=
olor:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><=
span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F=
497D'>Hope this helps.</span><o:p></o:p></p></div><div><p class=3DMsoNormal=
><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#=
1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span s=
tyle=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>=
EHL</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'fon=
t-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:1=
1.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p><=
/o:p></p></div><div style=3D'border:none;border-left:solid blue 1.5pt;paddi=
ng:0in 0in 0in 4.0pt;border-width:initial;border-color:initial'><div><div s=
tyle=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0i=
n;border-width:initial;border-color:initial'><div><p class=3DMsoNormal><b><=
span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</sp=
an></b><span class=3Dapple-converted-space><span style=3D'font-size:10.0pt;=
font-family:"Tahoma","sans-serif"'>&nbsp;</span></span><span style=3D'font-=
size:10.0pt;font-family:"Tahoma","sans-serif"'><a href=3D"mailto:oauth-boun=
ces@ietf.org">oauth-bounces@ietf.org</a><span class=3Dapple-converted-space=
>&nbsp;</span>[mailto:oauth-bounces@ietf.org]<span class=3Dapple-converted-=
space>&nbsp;</span><b>On Behalf Of<span class=3Dapple-converted-space>&nbsp=
;</span></b>Phil Hunt<br><b>Sent:</b><span class=3Dapple-converted-space>&n=
bsp;</span>Monday, March 21, 2011 8:17 PM<br><b>To:</b><span class=3Dapple-=
converted-space>&nbsp;</span>Manger, James H<br><b>Cc:</b><span class=3Dapp=
le-converted-space>&nbsp;</span><a href=3D"mailto:oauth@ietf.org">oauth@iet=
f.org</a><br><b>Subject:</b><span class=3Dapple-converted-space>&nbsp;</spa=
n>Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry</span><o:p></o=
:p></p></div></div></div><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></d=
iv><div><p class=3DMsoNormal>I'm still not understanding why each RFC (e.g.=
 the bearer spec) can't define its own error codes. If you were to support =
the bearer token RFC, then you obviously understand the normative errors. I=
'm just not getting what the value of a central &quot;OAuth&quot; registry =
is. &nbsp;<o:p></o:p></p></div><div><div><p class=3DMsoNormal>&nbsp;<o:p></=
o:p></p></div></div><div><div><p class=3DMsoNormal>An OAuth registry also u=
nnecessarily limits possibility of re-use of token schemes in other framewo=
rks outside of OAuth or conversely limits the ability to use tokens (such a=
s kerberos) in an OAuth &quot;framework&quot;.<o:p></o:p></p></div></div><d=
iv><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>So again, I ask what the benefit of a registry is achieve=
d that could not be achieved within the token spec itself.<o:p></o:p></p></=
div><div><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><d=
iv><div><div><div><div><div><div><p class=3DMsoNormal><span style=3D'font-s=
ize:9.0pt;font-family:"Helvetica","sans-serif";color:black'>Phil</span><o:p=
></o:p></p></div></div><div><div><p class=3DMsoNormal><span style=3D'font-s=
ize:9.0pt;font-family:"Helvetica","sans-serif";color:black'><a href=3D"mail=
to:phil.hunt@oracle.com">phil.hunt@oracle.com</a></span><o:p></o:p></p></di=
v></div></div></div></div><div><p class=3DMsoNormal><span style=3D'font-siz=
e:13.5pt;font-family:"Helvetica","sans-serif";color:black'>&nbsp;</span><o:=
p></o:p></p></div></div><div><p class=3DMsoNormal><span style=3D'font-size:=
13.5pt;font-family:"Helvetica","sans-serif";color:black'><br><br><br></span=
><o:p></o:p></p></div></div><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p>=
</div><div><div><div><p class=3DMsoNormal>On 2011-03-21, at 4:38 PM, Manger=
, James H wrote:<o:p></o:p></p></div></div><div><p class=3DMsoNormal><br><b=
r><br><o:p></o:p></p></div><div><div><div><p class=3DMsoNormal><span lang=
=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color=
:#1F497D'>The bearer spec defines 3 errors (invalid_request, invalid_token,=
 insufficient_scope), which accompany 3 different status codes (400 Bad req=
uest, 401 Unauthorized, 403 Forbidden respectively).</span><o:p></o:p></p><=
/div></div><div><div><p class=3DMsoNormal><span lang=3DEN-AU style=3D'font-=
size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Client apps a=
re probably better off switching behaviour based on the HTTP status code, a=
nd ignoring the error string (perhaps put it in a log, or on a debug consol=
e so a developer can see it).</span><o:p></o:p></p></div></div><div><div><p=
 class=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family=
:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div></=
div><div><div><p class=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11=
.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>It seems like overki=
ll to have:</span><o:p></o:p></p></div></div><div style=3D'margin-left:.5in=
'><div><p class=3DMsoNormal style=3D'text-indent:-.25in'><span lang=3DEN-AU=
 style=3D'font-size:11.0pt;font-family:Symbol;color:#1F497D'>&middot;</span=
><span lang=3DEN-AU style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3Dapple-converted-space>&nbsp;=
</span></span><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Cal=
ibri","sans-serif";color:#1F497D'>An HTTP status code (eg 401)</span><o:p><=
/o:p></p></div></div><div style=3D'margin-left:.5in'><div><p class=3DMsoNor=
mal style=3D'text-indent:-.25in'><span lang=3DEN-AU style=3D'font-size:11.0=
pt;font-family:Symbol;color:#1F497D'>&middot;</span><span lang=3DEN-AU styl=
e=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;<span class=3Dapple-converted-space>&nbsp;</span></span><span lang=
=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color=
:#1F497D'>An HTTP status message (eg Unauthorized)</span><o:p></o:p></p></d=
iv></div><div style=3D'margin-left:.5in'><div><p class=3DMsoNormal style=3D=
'text-indent:-.25in'><span lang=3DEN-AU style=3D'font-size:11.0pt;font-fami=
ly:Symbol;color:#1F497D'>&middot;</span><span lang=3DEN-AU style=3D'font-si=
ze:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<sp=
an class=3Dapple-converted-space>&nbsp;</span></span><span lang=3DEN-AU sty=
le=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>An=
 error string (eg invalid_token)</span><o:p></o:p></p></div></div><div styl=
e=3D'margin-left:.5in'><div><p class=3DMsoNormal style=3D'text-indent:-.25i=
n'><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:Symbol;color:#1=
F497D'>&middot;</span><span lang=3DEN-AU style=3D'font-size:7.0pt;color:#1F=
497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3Dapple-c=
onverted-space>&nbsp;</span></span><span lang=3DEN-AU style=3D'font-size:11=
.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>An error_description=
 (eg token is formatted incorrectly)</span><o:p></o:p></p></div></div><div =
style=3D'margin-left:.5in'><div><p class=3DMsoNormal style=3D'text-indent:-=
.25in'><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:Symbol;colo=
r:#1F497D'>&middot;</span><span lang=3DEN-AU style=3D'font-size:7.0pt;color=
:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3Dapp=
le-converted-space>&nbsp;</span></span><span lang=3DEN-AU style=3D'font-siz=
e:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>An error_uri (eg=
<span class=3Dapple-converted-space>&nbsp;</span><a href=3D"http://api.exam=
ple.com/error/45">http://api.example.com/error/45</a>)</span><o:p></o:p></p=
></div></div><div style=3D'margin-left:.5in'><div><p class=3DMsoNormal styl=
e=3D'text-indent:-.25in'><span lang=3DEN-AU style=3D'font-size:11.0pt;font-=
family:Symbol;color:#1F497D'>&middot;</span><span lang=3DEN-AU style=3D'fon=
t-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;<span class=3Dapple-converted-space>&nbsp;</span></span><span lang=3DEN-AU=
 style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D=
'>The body of the HTTP response (eg an HTML page with extensive details abo=
ut the error and links to the API documentation)</span><o:p></o:p></p></div=
></div><div><div><p class=3DMsoNormal><span lang=3DEN-AU style=3D'font-size=
:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p=
></o:p></p></div></div><div><div><p class=3DMsoNormal><span lang=3DEN-AU st=
yle=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>6=
 sources of error information -- and all for a bearer token that is usually=
 opaque to the client app!</span><o:p></o:p></p></div></div><div><div><p cl=
ass=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"C=
alibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div></div=
><div><div><p class=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0p=
t;font-family:"Calibri","sans-serif";color:#1F497D'>Encouraging new error s=
trings to be defined &#8211; by having a registry for them &#8211; is not i=
deal. Client apps that don&#8217;t recognize a value learn nothing. At leas=
t with HTTP status codes a client app knows the class of error (eg 4xx or 5=
xx) and can behave accordingly even if it doesn&#8217;t recognize the speci=
fic value (eg 538).</span><o:p></o:p></p></div></div><div><div><p class=3DM=
soNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri"=
,"sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div></div><div><=
div><p class=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-=
family:"Calibri","sans-serif";color:#1F497D'>I&#8217;d vote for F) ditch er=
ror string/description/uri for the BEARER HTTP authentication scheme.</span=
><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span lang=3DEN-=
AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F49=
7D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><div><p class=3DMsoNo=
rmal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'>--</span><o:p></o:p></p></div></div><div><div><p c=
lass=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"=
Calibri","sans-serif";color:#1F497D'>James Manger</span><o:p></o:p></p></di=
v></div></div><div><div><div><p class=3DMsoNormal><span lang=3DEN-AU style=
=3D'color:#1F497D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p cla=
ss=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Ca=
libri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div></div>=
<div><div><div><div><p class=3DMsoNormal><span lang=3DEN-AU>On 2011-03-21, =
at 9:48 AM, Mike Jones wrote:</span><o:p></o:p></p></div></div></div><div><=
div><p class=3DMsoNormal><span lang=3DEN-AU><br><br><br><br></span><o:p></o=
:p></p></div></div><div><div><div><div><p class=3DMsoNormal><span style=3D'=
font-size:11.0pt;font-family:"Calibri","sans-serif"'>People voted as follow=
s in the poll I conducted on the OAuth Errors Registry:</span><o:p></o:p></=
p></div></div></div><div><div><div><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</span><o:p></o:p></=
p></div></div></div><div><div><div><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif"'>For A:</span><o:p></o:p></=
p></div></div></div><div><div><div><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mike Jones=
</span><o:p></o:p></p></div></div></div><div><div><div><p class=3DMsoNormal=
><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp; Igor Faynberg</span><o:p></o:p></p></div></div></div><div><div><d=
iv><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibr=
i","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Justin Richter</span><o:p></o:p></p></div>=
</div></div><div><div><div><p class=3DMsoNormal><span style=3D'font-size:11=
.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Anthony Nadalin</s=
pan><o:p></o:p></p></div></div></div><div><div><div><p class=3DMsoNormal><s=
pan style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;</span><o:p></o:p></p></div></div></div><div><div><div><p class=3DMso=
Normal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>=
For D or C:</span><o:p></o:p></p></div></div></div><div><div><div><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp; Eran Hammer-Lahav</span><o:p></o:p></p></div></div></=
div><div><div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;fon=
t-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; William Mills</span><o:p><=
/o:p></p></div></div></div><div><div><div><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</span><o:p>=
</o:p></p></div></div></div><div><div><div><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Given that twice a=
s many people indicated a preference for A as for any other option, that se=
ems to indicate a consensus for A.&nbsp; Therefore Eran, when you update yo=
ur draft, can you please proceed on that basis?</span><o:p></o:p></p></div>=
</div></div><div><div><div><p class=3DMsoNormal><span style=3D'font-size:11=
.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</span><o:p></o:p></p></div>=
</div></div><div><div><div><p class=3DMsoNormal><span style=3D'font-size:11=
.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Thanks,</span><o:p></o:p></p><=
/div></div></div><div><div><div><p class=3DMsoNormal><span style=3D'font-si=
ze:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike</span><o:p></o:p>=
</p></div></div></div><div><div><div><p class=3DMsoNormal><span style=3D'fo=
nt-size:13.5pt;font-family:"Helvetica","sans-serif"'>&nbsp;</span><o:p></o:=
p></p></div></div></div></div></div><div><div><p class=3DMsoNormal><span la=
ng=3DEN-AU>&nbsp;</span><o:p></o:p></p></div></div></div><div><p class=3DMs=
oNormal><span lang=3DEN-AU style=3D'font-size:13.5pt;font-family:"Helvetica=
","sans-serif"'>_______________________________________________<br>OAuth ma=
iling list<br><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a hr=
ef=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mai=
lman/listinfo/oauth</a></span><o:p></o:p></p></div></div></div><div><p clas=
s=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div></div></div></div></div><p c=
lass=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F432FE9P3PW5EX1MB01E_--

From paul.madsen@gmail.com  Tue Mar 22 12:15:11 2011
Return-Path: <paul.madsen@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C4D3F3A67EF for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 12:15:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.299
X-Spam-Level: 
X-Spam-Status: No, score=-3.299 tagged_above=-999 required=5 tests=[AWL=0.300,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I2wHX7tJCHoh for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 12:15:11 -0700 (PDT)
Received: from mail-gw0-f44.google.com (mail-gw0-f44.google.com [74.125.83.44]) by core3.amsl.com (Postfix) with ESMTP id F25E73A67B1 for <oauth@ietf.org>; Tue, 22 Mar 2011 12:15:10 -0700 (PDT)
Received: by gwb20 with SMTP id 20so3573061gwb.31 for <oauth@ietf.org>; Tue, 22 Mar 2011 12:16:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:message-id:date:from:user-agent:mime-version:to :subject:content-type:content-transfer-encoding; bh=KBmkB5a95BvX39Qiiz2iYGiJHegGdo1UvW869osyf8k=; b=flNzzBFX4RALw0phXxRsF3d9GvT8acCyDdUaQn//7PDLuhdlgq2ADeWMtw9IkEzKY0 y32r/BSPGOT3ogwOB+SKxVaio58Lf6h636Kp4un7S+QICH9+eK0/I69O+OuXivKLI2vV 44mfRZ80CXlZdcrJyqJgFCnKUMI2EK32bFXCE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject :content-type:content-transfer-encoding; b=gyimA6FQms1IwtXNiYxBDo4L7WkNKrR2+5qBKaAGekbf+pVZhRNEkTIT5Z6MFHcA7+ EVsDYj4khHQDJgdrmUKQAxQIVhfsV32T/iXesH60S/ItsTbwXHs637QDiH1hxtlaiKur xOUhFk7QKOz63+tHnJaogunopohMYtunT7P2k=
Received: by 10.91.198.17 with SMTP id a17mr5472276agq.44.1300821403832; Tue, 22 Mar 2011 12:16:43 -0700 (PDT)
Received: from pmadsen-mbp.local (CPE0022b0cb82b4-CM0012256eb4b4.cpe.net.cable.rogers.com [99.224.152.177]) by mx.google.com with ESMTPS id w39sm4834977ana.39.2011.03.22.12.16.42 (version=SSLv3 cipher=OTHER); Tue, 22 Mar 2011 12:16:42 -0700 (PDT)
Message-ID: <4D88F598.8010205@gmail.com>
Date: Tue, 22 Mar 2011 15:16:40 -0400
From: Paul Madsen <paul.madsen@gmail.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: "oauth@ietf.org" <oauth@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: [OAUTH-WG] (late) feedback on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2011 19:15:11 -0000

In Section 6. Refreshing an Access Token 
(http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-6) the text

refresh_token
          REQUIRED.  The refresh token issued along the access token being refreshed.


seems both somewhat contorted and somewhat misleading

Suggest  'along' --> 'along with' or 'along side'

Even with the above change, the access token being refreshed may well 
not be the same as that originally issued with the refresh token (ie the 
first in the chain of access tokens issued 'off' the refresh token)

Suggest   'The refresh token associated with the access token being 
refreshed'

paul

From tonynad@microsoft.com  Tue Mar 22 14:30:25 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6244228C120 for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 14:30:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.363
X-Spam-Level: 
X-Spam-Status: No, score=-7.363 tagged_above=-999 required=5 tests=[AWL=0.103,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f5BaGBD5vBqd for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 14:30:10 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 463FB28C0D9 for <oauth@ietf.org>; Tue, 22 Mar 2011 14:30:09 -0700 (PDT)
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (157.54.80.67) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Tue, 22 Mar 2011 14:31:42 -0700
Received: from VA3EHSOBE002.bigfish.com (157.54.51.114) by mail.microsoft.com (157.54.80.67) with Microsoft SMTP Server (TLS) id 14.1.270.2; Tue, 22 Mar 2011 14:31:41 -0700
Received: from mail62-va3-R.bigfish.com (10.7.14.251) by VA3EHSOBE002.bigfish.com (10.7.40.22) with Microsoft SMTP Server id 14.1.225.8; Tue, 22 Mar 2011 21:31:41 +0000
Received: from mail62-va3 (localhost.localdomain [127.0.0.1])	by mail62-va3-R.bigfish.com (Postfix) with ESMTP id D3E298B0081	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Tue, 22 Mar 2011 21:31:40 +0000 (UTC)
X-SpamScore: -47
X-BigFish: PS-47(zz936eK98dN4015L328cM9371PzzdafM1202h1082kzz1033IL8275bh8275dhd311fiz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT002.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail62-va3 (localhost.localdomain [127.0.0.1]) by mail62-va3 (MessageSwitch) id 1300829499779907_18948; Tue, 22 Mar 2011 21:31:39 +0000 (UTC)
Received: from VA3EHSMHS025.bigfish.com (unknown [10.7.14.235])	by mail62-va3.bigfish.com (Postfix) with ESMTP id AFF511A5004C; Tue, 22 Mar 2011 21:31:39 +0000 (UTC)
Received: from SN1PRD0302HT002.namprd03.prod.outlook.com (65.55.94.9) by VA3EHSMHS025.bigfish.com (10.7.99.35) with Microsoft SMTP Server (TLS) id 14.1.225.8; Tue, 22 Mar 2011 21:31:36 +0000
Received: from SN1PRD0302MB097.namprd03.prod.outlook.com ([169.254.8.208]) by SN1PRD0302HT002.namprd03.prod.outlook.com ([10.14.149.46]) with mapi id 14.01.0225.027; Tue, 22 Mar 2011 21:31:34 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, Phil Hunt <phil.hunt@oracle.com>,  "Manger, James H" <James.H.Manger@team.telstra.com>
Thread-Topic: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
Thread-Index: Acvn58EM+JExiW6yQkawESD8X4iCRgAEF9CAAAo7B4AAB6YDgAACpPYAACHqsyA=
Date: Tue, 22 Mar 2011 21:31:34 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E70B6C2893@SN1PRD0302MB097.namprd03.prod.outlook.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com> <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com> <3DA41CB6-5E24-4D46-9703-C04FAF4D9571@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432EF4@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F432EF4@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [131.107.0.107]
Content-Type: multipart/alternative; boundary="_000_B26C1EF377CB694EAB6BDDC8E624B6E70B6C2893SN1PRD0302MB097_"
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT002.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%HUENIVERSE.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%ORACLE.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%TEAM.TELSTRA.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14HUBC107.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC107.redmond.corp.microsoft.com
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2011 21:30:25 -0000

--_000_B26C1EF377CB694EAB6BDDC8E624B6E70B6C2893SN1PRD0302MB097_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

There seems to be some basic disagreements;


(1)    The various token specifications standalone (e.g. draft-ietf-oauth-v=
2-bearer-03, etc.) and are not extensions to draft-ietf-oauth-v2-xx and hav=
e no need to have common error messages/codes

(2)    Errors in draft-ietf-oauth-v2-xx are final and we don't see a need t=
o have a mechanism to add additional ones because of #(1)

(3)    We want to put a burden on the clients to have to deal with all the =
various error messages/codes from the different token profiles and the clie=
nt has to figure this out

Given the above I'm not sure why we have a registry for the parameters, see=
ms incionsistent.


From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of E=
ran Hammer-Lahav
Sent: Monday, March 21, 2011 9:33 PM
To: Phil Hunt; Manger, James H
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

There are two separate issues here which Mike's latest draft conflated into=
 one.

Issues 1:

The v2 specification currently does not allow for defining additional error=
 codes to the authorization and token endpoints. The only way to define add=
itional error codes is by updating the RFC (once published). Updating an RF=
C is an acceptable way of extending an existing specification, but only if =
it is done very infrequently. The other two options are to allow URI-format=
ted error code, or define a registry.

In any case, all three extensibility model have a single purpose - to reduc=
e the likelihood of an error code name collision. It does not improve inter=
operability unless clients actually implement the additional codes. The goa=
l of the v2 specification must be to cover all possible scenarios so that a=
 client implementing nothing but these codes will be able to handle error c=
ases related to this specification.

After a long discussion, the only valid use case to arise is the one in whi=
ch an extension such as the UX specification (providing a way for the clien=
t to specify the display size of the authorization web page for various dev=
ices) needs additional codes. For example, the UX specification defines the=
 'display' authorization request parameter. If the client provides bad valu=
e, the server may want to return an error specific to this situation.

The open issue is how to address this use case. Since such additional error=
 codes are always a result of an additional request parameter, I am looking=
 for a way to allow parameter registration to specify such related error co=
des without defining yet another registry. This solution is specific to the=
 only use case we have. Defining an error registry is likely to do more har=
m than good, encouraging developers to define new generic error codes that =
are not extension-specific which will only reduce interoperability.

Issue 2:

The bearer token specification includes registration requirements for prote=
cted resource request parameters as well as potential error codes when a pr=
otected resource request fails. A few people have strongly objected to this=
 new proposal since the semantics of the protected resource request is by d=
efinition, outside the scope of any OAuth specification.

The only parameter allowed to infringe on the resource server namespace is =
the currently named 'oauth_token' parameter. There is an ongoing discussion=
 to renamed it to 'bearer_token'.

Hope this helps.

EHL


From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org]<mailto:[mailto:oauth-bounces@ietf.org]> On Behalf Of Phil =
Hunt
Sent: Monday, March 21, 2011 8:17 PM
To: Manger, James H
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

I'm still not understanding why each RFC (e.g. the bearer spec) can't defin=
e its own error codes. If you were to support the bearer token RFC, then yo=
u obviously understand the normative errors. I'm just not getting what the =
value of a central "OAuth" registry is.

An OAuth registry also unnecessarily limits possibility of re-use of token =
schemes in other frameworks outside of OAuth or conversely limits the abili=
ty to use tokens (such as kerberos) in an OAuth "framework".

So again, I ask what the benefit of a registry is achieved that could not b=
e achieved within the token spec itself.

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>



On 2011-03-21, at 4:38 PM, Manger, James H wrote:

The bearer spec defines 3 errors (invalid_request, invalid_token, insuffici=
ent_scope), which accompany 3 different status codes (400 Bad request, 401 =
Unauthorized, 403 Forbidden respectively).
Client apps are probably better off switching behaviour based on the HTTP s=
tatus code, and ignoring the error string (perhaps put it in a log, or on a=
 debug console so a developer can see it).

It seems like overkill to have:
*         An HTTP status code (eg 401)
*         An HTTP status message (eg Unauthorized)
*         An error string (eg invalid_token)
*         An error_description (eg token is formatted incorrectly)
*         An error_uri (eg http://api.example.com/error/45)
*         The body of the HTTP response (eg an HTML page with extensive det=
ails about the error and links to the API documentation)

6 sources of error information -- and all for a bearer token that is usuall=
y opaque to the client app!

Encouraging new error strings to be defined - by having a registry for them=
 - is not ideal. Client apps that don't recognize a value learn nothing. At=
 least with HTTP status codes a client app knows the class of error (eg 4xx=
 or 5xx) and can behave accordingly even if it doesn't recognize the specif=
ic value (eg 538).

I'd vote for F) ditch error string/description/uri for the BEARER HTTP auth=
entication scheme.

--
James Manger


On 2011-03-21, at 9:48 AM, Mike Jones wrote:


People voted as follows in the poll I conducted on the OAuth Errors Registr=
y:

For A:
                Mike Jones
                Igor Faynberg
                Justin Richter
                Anthony Nadalin

For D or C:
                Eran Hammer-Lahav
                William Mills

Given that twice as many people indicated a preference for A as for any oth=
er option, that seems to indicate a consensus for A.  Therefore Eran, when =
you update your draft, can you please proceed on that basis?

                                                                Thanks,
                                                                -- Mike


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_B26C1EF377CB694EAB6BDDC8E624B6E70B6C2893SN1PRD0302MB097_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:317656718;
	mso-list-type:hybrid;
	mso-list-template-ids:462079574 1659432422 67698713 67698715 67698703 6769=
8713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-text:"\(%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There seems to be some ba=
sic disagreements;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">(1)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">The various token=
 specifications standalone (e.g. draft-ietf-oauth-v2-bearer-03, etc.) and a=
re not extensions to draft-ietf-oauth-v2-xx and have no
 need to have common error messages/codes<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">(2)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Errors in draft-i=
etf-oauth-v2-xx are final and we don&#8217;t see a need to have a mechanism=
 to add additional ones because of #(1)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">(3)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">We want to put a =
burden on the clients to have to deal with all the various error messages/c=
odes from the different token profiles and the client
 has to figure this out<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Given the above I&#8217;m=
 not sure why we have a registry for the parameters, seems incionsistent.<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Eran Hammer-Lahav<br>
<b>Sent:</b> Monday, March 21, 2011 9:33 PM<br>
<b>To:</b> Phil Hunt; Manger, James H<br>
<b>Cc:</b> oauth@ietf.org<br>
<b>Subject:</b> Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There are two separate is=
sues here which Mike&#8217;s latest draft conflated into one.<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Issues 1:<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The v2 specification curr=
ently does not allow for defining additional error codes to the authorizati=
on and token endpoints. The only way to define additional
 error codes is by updating the RFC (once published). Updating an RFC is an=
 acceptable way of extending an existing specification, but only if it is d=
one very infrequently. The other two options are to allow URI-formatted err=
or code, or define a registry.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">In any case, all three ex=
tensibility model have a single purpose &#8211; to reduce the likelihood of=
 an error code name collision. It does not improve interoperability
 unless clients actually implement the additional codes. The goal of the v2=
 specification must be to cover all possible scenarios so that a client imp=
lementing nothing but these codes will be able to handle error cases relate=
d to this specification.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">After a long discussion, =
the only valid use case to arise is the one in which an extension such as t=
he UX specification (providing a way for the client to specify
 the display size of the authorization web page for various devices) needs =
additional codes. For example, the UX specification defines the &#8216;disp=
lay&#8217; authorization request parameter. If the client provides bad valu=
e, the server may want to return an error specific
 to this situation.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The open issue is how to =
address this use case. Since such additional error codes are always a resul=
t of an additional request parameter, I am looking for a
 way to allow parameter registration to specify such related error codes wi=
thout defining yet another registry. This solution is specific to the only =
use case we have. Defining an error registry is likely to do more harm than=
 good, encouraging developers to
 define new generic error codes that are not extension-specific which will =
only reduce interoperability.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Issue 2:<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The bearer token specific=
ation includes registration requirements for protected resource request par=
ameters as well as potential error codes when a protected
 resource request fails. A few people have strongly objected to this new pr=
oposal since the semantics of the protected resource request is by definiti=
on, outside the scope of any OAuth specification.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The only parameter allowe=
d to infringe on the resource server namespace is the currently named &#821=
6;oauth_token&#8217; parameter. There is an ongoing discussion to renamed
 it to &#8216;bearer_token&#8217;.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hope this helps.<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">EHL<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> <a hre=
f=3D"mailto:[mailto:oauth-bounces@ietf.org]">
[mailto:oauth-bounces@ietf.org]</a> <b>On Behalf Of </b>Phil Hunt<br>
<b>Sent:</b> Monday, March 21, 2011 8:17 PM<br>
<b>To:</b> Manger, James H<br>
<b>Cc:</b> <a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br>
<b>Subject:</b> Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I'm still not understanding why each RFC (e.g. the b=
earer spec) can't define its own error codes. If you were to support the be=
arer token RFC, then you obviously understand the normative errors. I'm jus=
t not getting what the value of a
 central &quot;OAuth&quot; registry is. &nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">An OAuth registry also unnecessarily limits possibil=
ity of re-use of token schemes in other frameworks outside of OAuth or conv=
ersely limits the ability to use tokens (such as kerberos) in an OAuth &quo=
t;framework&quot;.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">So again, I ask what the benefit of a registry is ac=
hieved that could not be achieved within the token spec itself.<o:p></o:p><=
/p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;;color:black">Phil<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"mailto:phil.hun=
t@oracle.com">phil.hunt@oracle.com</a><o:p></o:p></span></p>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span><=
/p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On 2011-03-21, at 4:38 PM, Manger, James H wrote:<o:=
p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">The bearer=
 spec defines 3 errors (invalid_request, invalid_token, insufficient_scope)=
, which accompany 3 different status codes (400 Bad request,
 401 Unauthorized, 403 Forbidden respectively).</span><span lang=3D"EN-AU">=
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Client app=
s are probably better off switching behaviour based on the HTTP status code=
, and ignoring the error string (perhaps put it in a log,
 or on a debug console so a developer can see it).</span><span lang=3D"EN-A=
U"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">It seems l=
ike overkill to have:</span><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">An
 HTTP status code (eg 401)</span><span lang=3D"EN-AU"><o:p></o:p></span></p=
>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">An
 HTTP status message (eg Unauthorized)</span><span lang=3D"EN-AU"><o:p></o:=
p></span></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">An
 error string (eg invalid_token)</span><span lang=3D"EN-AU"><o:p></o:p></sp=
an></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">An
 error_description (eg token is formatted incorrectly)</span><span lang=3D"=
EN-AU"><o:p></o:p></span></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">An
 error_uri (eg<span class=3D"apple-converted-space">&nbsp;</span><a href=3D=
"http://api.example.com/error/45">http://api.example.com/error/45</a>)</spa=
n><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">The
 body of the HTTP response (eg an HTML page with extensive details about th=
e error and links to the API documentation)</span><span lang=3D"EN-AU"><o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">6 sources =
of error information -- and all for a bearer token that is usually opaque t=
o the client app!</span><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Encouragin=
g new error strings to be defined &#8211; by having a registry for them &#8=
211; is not ideal. Client apps that don&#8217;t recognize a value learn not=
hing.
 At least with HTTP status codes a client app knows the class of error (eg =
4xx or 5xx) and can behave accordingly even if it doesn&#8217;t recognize t=
he specific value (eg 538).</span><span lang=3D"EN-AU"><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I&#8217;d =
vote for F) ditch error string/description/uri for the BEARER HTTP authenti=
cation scheme.</span><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">--</span><=
span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">James Mang=
er</span><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D">&nbsp;<=
/span><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU">On 2011-03-21, at 9:48 AM, Mike=
 Jones wrote:<o:p></o:p></span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span lang=3D"EN-AU">=
<br>
<br>
<o:p></o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">People voted as follows in the poll I c=
onducted on the OAuth Errors Registry:</span><span lang=3D"EN-AU"><o:p></o:=
p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><span lang=3D"EN-AU"><o:p>=
</o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">For A:</span><span lang=3D"EN-AU"><o:p>=
</o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mike Jones</span><span =
lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Igor Faynberg</span><sp=
an lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Justin Richter</span><s=
pan lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Anthony Nadalin</span><=
span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span lang=3D"EN-=
AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">For D or C:</span><span lang=3D"EN-AU">=
<o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Eran Hammer-Lahav</span=
><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; William Mills</span><sp=
an lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><span lang=3D"EN-AU"><o:p>=
</o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Given that twice as many people indicat=
ed a preference for A as for any other option, that seems to indicate a con=
sensus for A.&nbsp; Therefore Eran, when you update your draft,
 can you please proceed on that basis?</span><span lang=3D"EN-AU"><o:p></o:=
p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><span lang=3D"EN-AU"><o:p>=
</o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Thanks,</span><span lang=3D"EN-AU">=
<o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike</span><span lang=3D"EN-AU">=
<o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;">&nbsp;</span><span lang=3D"EN-AU"><o:=
p></o:p></span></p>
</div>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU">&nbsp;<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:13.5pt;font-=
family:&quot;Helvetica&quot;,&quot;sans-serif&quot;">______________________=
_________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.or=
g/mailman/listinfo/oauth</a><o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_B26C1EF377CB694EAB6BDDC8E624B6E70B6C2893SN1PRD0302MB097_--

From tim.freeman@hp.com  Tue Mar 22 20:14:26 2011
Return-Path: <tim.freeman@hp.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 836A63A6892 for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 20:14:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.279
X-Spam-Level: 
X-Spam-Status: No, score=-110.279 tagged_above=-999 required=5 tests=[AWL=0.320, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eu9h+AHjwcSr for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 20:14:23 -0700 (PDT)
Received: from g4t0016.houston.hp.com (g4t0016.houston.hp.com [15.201.24.19]) by core3.amsl.com (Postfix) with ESMTP id B6A553A688B for <oauth@ietf.org>; Tue, 22 Mar 2011 20:14:23 -0700 (PDT)
Received: from G5W2206G.americas.hpqcorp.net (g5w2206g.atlanta.hp.com [16.228.43.185]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g4t0016.houston.hp.com (Postfix) with ESMTPS id 5C38E141AE; Wed, 23 Mar 2011 03:15:56 +0000 (UTC)
Received: from G3W0628.americas.hpqcorp.net (16.233.58.53) by G5W2206G.americas.hpqcorp.net (16.228.43.185) with Microsoft SMTP Server (TLS) id 14.1.270.1; Wed, 23 Mar 2011 03:12:32 +0000
Received: from GVW0432EXB.americas.hpqcorp.net ([16.234.32.145]) by G3W0628.americas.hpqcorp.net ([16.233.58.53]) with mapi; Wed, 23 Mar 2011 03:12:29 +0000
From: "Freeman, Tim" <tim.freeman@hp.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Wed, 23 Mar 2011 03:12:23 +0000
Thread-Topic: Protocol breaks if states are guessable (or redirect uri is guessable and not checked at end) (was RE: [OAUTH-WG] Why give the redirect URI when trading an [authorization] code for an access token?)
Thread-Index: Acu9nyKYMMR/kqxaS1mUgCfUILRoIArTgmxg
Message-ID: <59DD1BA8FD3C0F4C90771C18F2B5B53A654306B0EC@GVW0432EXB.americas.hpqcorp.net>
References: <59DD1BA8FD3C0F4C90771C18F2B5B53A6532547F10@GVW0432EXB.americas.hpqcorp.net> <90C41DD21FB7C64BB94121FBBC2E72343B3F3F0703@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4C8B3721.7000208@lodderstedt.net> <90C41DD21FB7C64BB94121FBBC2E72343B3F3F0A42@P3PW5EX1MB01.EX1.SECURESERVER.NET> <59DD1BA8FD3C0F4C90771C18F2B5B53A6532D8358E@GVW0432EXB.americas.hpqcorp.net> <4D409092.80106@lodderstedt.net>
In-Reply-To: <4D409092.80106@lodderstedt.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: [OAUTH-WG] Protocol breaks if states are guessable (or redirect uri is guessable and not checked at end) (was RE: Why give the redirect URI when trading an [authorization] code for an access token?)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 03:14:26 -0000

Looks like I'm late to the "last call".  The following is old business, but=
 I can't find any replies to it, and I think it's a bigger issue than I tho=
ught it was then.

Briefly: The protocol breaks if the "state" parameter is guessable.  An att=
acker can cause the user to access the attacker's resource when the user's =
expects to access the user's resource, if the attacker's timing is lucky an=
d he guesses a state.  The protocol breaks in the same way if redirect_uri'=
s are guessable and they are not checked, since the reason you'd want to va=
ry a redirect_uri is to incorporate a state into it.

The spec says that the state is an "opaque value" (page 15 of draft-ieft-oa=
uth-v2-13).  If opaque values are unguessable, then I'm not finding fault w=
ith the part of the spec about handling states.  Searching Google for a con=
sensus on the meaning of "opaque value" doesn't seem to give much clarity o=
n whether a value guessable by an adversary might be considered opaque.  Wi=
kipedia's page on "opaque data type" seems to only say it's uninterpreted, =
not that it's unguessable by an adversary.  For example, if the spec permit=
s an implementor of a client to use the integers 1,2,3,... consecutively wh=
en the protocol calls for an "opaque value" for the state, where the opaque=
ness means that the auth server doesn't know or care what those integers me=
an, then the protocol is insecure and the spec is broken.  The scenario for=
 losing is below, but first I want to give credit to Torsten since I'm basi=
cally agreeing with him:

(Beginning of the scenario where we can lose if the redirect_uri is guessab=
le)

From: Freeman, Tim [mailto:tim.freeman@hp.com]
Sent: Tuesday, September 14, 2010 11:03 AM
> After some thought, I think I see the real problem with omitting the chec=
k on
> redirect_uri [when fetching the access token].   Without the check, the f=
ollowing
> can happen:

(Oops, I left out the "when fetching the access token" part in the Sep. 14 =
2010 email.  Torsten found the right interpretation in context, but that co=
ntext isn't present in this email so I have to correct here.  I went on the=
n to describe how the protocol loses if the parts of the redirect_uri that =
are not checked when fetching the access token are guessable.  I'm repeatin=
g that scenario immediately below.)

> 1. Evil user starts OAuth flow on the client using the web-server flow, u=
sing
>    a hacked web browser.
> 2. The hacked web browser does the normal thing in the flow, requesting t=
he
>    evil user's username and password, and at the end the hacked browser i=
s
>    given a redirect like:
>
>     https://www.goodclient.com/oauth/evilUserAcct?code=3DevilAuthCode
>
>    The hacked browser saves evilAuthCode and does not perform the redirec=
t.
> 3. Suppose the evil user's web site can persuade a known victim user with
>    a normal browser to visit goodclient's web site and do OAuth.  The vic=
tim's
>    user id on the client is public knowledge, and the evil user's web sit=
e
>    persuaded the victim to start OAuth at a known time, so it can guess w=
hen
>    the victim will complete the OAuth exchange.  Before then, the evil we=
b site can visit
>
>     https://www.goodclient.com/oauth/victimUserAcct?code=3DevilAuthCode
>
>    which is likely to leave the client associating the victim's user id w=
ith an access
>    token that accesses resources controlled by the evil user.

From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net]
Sent: Wednesday, January 26, 2011 1:22 PM
> Your assumptions is the attacker is able to predict the way the victim's
> session with the client is represented. I would consider that as a
> security vulnerability of the client since this would also allow the
> attacker to take over the session on his own device.

Tim says now:
I agree that I'm assuming that the attacker can predict how the victim's se=
ssion is represented.  So far as I can tell that's consistent with the spec=
, and it is a security vulnerability.  IMO the spec should say not to do th=
at.

Tim said on Sep 14, 2010:
> Checking the redirect URI doesn't solve the problem in the case where the=
 user id on the client is encoded in the "state" opaque value instead of th=
e redirect URI.
>
> Saying "The authorization server SHOULD require the client to pre-registe=
r their redirection URI" (page
> 17 of http://tools.ietf.org/html/draft-ietf-oauth-v2-10)

now page 11 of draft 13

> should have MUST instead of SHOULD, since it is important that we're real=
ly redirecting to the client
> when we're distributing the authorization code by redirecting.

(End of the scenario where we can lose if the redirect_uri is guessable)

(Beginning of the scenario where we can lose if the state is guessable)

We can also illustrate the same problem with guessable state that we had ab=
ove with a guessable redirect_uri.  I'm probably misspelling the URL's, but=
 I'm sure it's clear anyway.  Suppose we have states that are guessable bec=
ause they are successive integers.  Then the following can happen:

1. Evil user starts OAuth flow on the client using the web-server flow, usi=
ng
   a hacked web browser.
2. The hacked web browser does the normal thing in the flow, requesting the
   evil user's username and password, and at the end the hacked browser is
   given a redirect like this that's supposed to go to the client to give i=
t an auth code:

     https://www.goodclient.com/oauth?state=3D37&code=3DevilAuthCode

   The hacked browser saves evilAuthCode, guesses that the state to use on =
the victim
   is 37 + 1 =3D 38, and does not yet perform the redirect.
3. Suppose the evil user's web site can persuade a known victim user with
   a normal browser to visit goodclient's web site and do OAuth.  The evil =
user's
   web site persuaded the victim to start OAuth at a known time, so it can =
guess when
   the victim will complete the OAuth exchange.  Before then, the evil web =
site can visit

      https://www.goodclient.com/oauth?state=3D38&code=3DevilAuthCode

   which is likely to leave the client associating the victim's user id wit=
h an access
   token that accesses resources controlled by the evil user.

(End of the scenario where we can lose if the state is guessable)

If you believe these scenarios, I recommend the following fixes:

* Require states to be unguessable.
* Require clients to register all components of the redirect_uri's when the=
y get their client credentials.
* Since the redirect_uri is a function of the client id, we can drop it fro=
m the protocol, and the issue of when to check it and why goes away.  If yo=
u want backward compatibility with people who implemented earlier revisions=
 of the spec, ignore any redirect_uri's that are offered to the auth server=
.
* Require clients to use the state to keep concurrent users distinct, not t=
weaks to redirect_uri's.

There is an existing argument against getting rid of the redirect_uri's, st=
ated by Torsten perhaps among others:

From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net]
Sent: Wednesday, January 26, 2011 1:22 PM
> [Specifying redirect_uri's at client registration time] might not scale i=
n some
> deployments (manual process) or require dynamic client registration (not
> specified yet). With the lack of dynamic client registration, it only
> works for clients bound to certain deployments at
> development/configuration time. As soon as dynamic resource server
> discovery gets involved, that's no longer feasable.

I don't see how clients get credentials by a path that does not allow them =
to register a redirect_uri at that time.  Somehow the auth server knows tha=
t the client is legitimate.  Why can't the correct redirect_uri to use for =
the client be learned by the same path?  If dynamic resource server discove=
ry is important, can you give a concrete use case for it?  (I haven't recen=
tly read the use cases document.  For all I know it may be in there already=
.  I also have 613 unread emails in my "Oauth" folder, maybe it's in there.=
  If so, my apologies, but realistically I will need a pointer to the exist=
ing document or conversation if I'm going to read it any time soon.)

In any case, this clause in the spec seems likely to greatly reduce the pro=
bability of secure implementations (draft 13, page 12):
>   The authorization server SHOULD require the client to pre-register
>   their redirection URI or at least certain components such as the
>   scheme, host, port and path.  If a redirection URI was registered,
>   the authorization server MUST compare any redirection URI received at
>   the authorization endpoint with the registered URI.

If only some components of the redirect_uri are preregistered, I suppose th=
e auth server is only comparing those components, since it can't compare co=
mponents with a correct value that it doesn't know.  Unless it is obvious t=
o everybody that my arguments above are meritless, we have not yet figured =
out the security considerations of registering or not registering the redir=
ect_uri, much less registering only some components of the redirect_uri.  I=
f we can't easily figure it out, it is not likely that nearly all implement=
ors of the spec are going to figure it out correctly.  Thus this vagueness =
is going to lead to a lot of insecure OAuth 2 implementations.  We should f=
igure out which checks have desirable security consequences and specify tha=
t exactly those checks are performed, not leave it up to each implementor t=
o correctly figure out on their own.

Finally we have this comment from Thorsten that has me confused.  Tim said:
> Saying "The authorization server SHOULD require the client to pre-registe=
r
> their redirection URI" (page 17 of http://tools.ietf.org/html/draft-ietf-=
oauth-v2-10)
> should have MUST instead of SHOULD, since it is important that we're real=
ly
> redirecting to the client when we're distributing the authorization code =
by redirecting.

and then Thorsten said:
> See above. From a security perspective this is clearly a good option.
> From an architectural and operational point of view, I would consider
> this to restrictive.

On the face of it you seem to be saying that every available option is eith=
er insecure or inoperable.  We need things to be both secure and operable, =
so that seems to imply that there is no good path forward.  I am not surpri=
sed to see diagreement on whether a specific solution is secure, or operabl=
e, but I didn't expect to see someone claim there are no good solutions at =
all.  Do you see any good alternatives?

Tim Freeman
Email: tim.freeman@hp.com
Desk in Palo Alto: (650) 857-2581
Home: (408) 774-1298
Cell: (408) 348-7536


-----Original Message-----
From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net]
Sent: Wednesday, January 26, 2011 1:22 PM
To: Freeman, Tim
Cc: Eran Hammer-Lahav; oauth@ietf.org
Subject: Re: [OAUTH-WG] Why give the redirect URI when trading an [authoriz=
ation] code for an access token?

Hi Tim,
> From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]
>> 1. Evil user starts the OAuth flow on the client using the web-server fl=
ow.
>> 2. Client redirects the evil user to the authorization server, including=
 state
>> information about the evil user account on the client.
>> 3. Evil user takes the authorization endpoint URI and changes the
>> redirection to its own site.
>> 4. Evil user tricks victim user to click on the link and authorize acces=
s
>> (phishing or other social engineering attack).
>> 5. Victim user thinking this is a valid authorization request, authorize=
s
>> access.
>> 6. Authorization server sends victim user back to the client, but since =
the
>> redirection URI was changed, back to the evil user site.
> and the rest of the steps were revised to:
>
>> 7. Evil user takes the code and gives it back to the client by
>> constructing the original correct redirection URI.
>> 8. Client exchanges the code for access token, attaching it to the evil =
user's account.
>> 9. Evil user can now access victim user data on his client account.
> Step 6 requires the authorization server to redirect the victim user's br=
owser to the evil user's site, which will only happen if the authorization =
server does not check the redirect URI when returning an authorization code=
.  That check is required by OAuth 2, and isn't the check that I'm question=
ing.

The authorization server either checks the actual redirect_uri against a
pre-configured uri (step 4) and it checks the actual redirect_uri in
step 8.

The first check immediately detects attempts to acquire end-user
authorization under the identity of a legimitate client. That's fine as
long as the authorization server really forces all clients to
pre-register redirect_uri's. That approach might not scale in some
deployments (manual process) or require dynamic client registration (not
specified yet). With the lack of dynamic client registration, it only
works for clients bound to certain deployments at
development/configuration time. As soon as dynamic resource server
discovery gets involved, that's no longer feasable.

The later check detects different uri's used for the end-user
authorization process and the token issuance. That's the characteristics
of a session fixation attack since the attacker MUST use another
redirect_uri in steps 2 and 4. Otherwise it does not get access to the
authorization code of the victim. This approach has the drawback that
the redirect_uri must be associated with the authorization code but it
works for all kinds of deployments and anonymous clients.

> In contrast, I was proposing that the authorization server not check the =
redirect URI when it returns an access token.  Since, in the absence of suc=
h a check, the redirect URI is neither checked nor used to compute the resu=
lt of the query, I was proposing that we drop the redirect URL from that st=
ep of the protocol altogether.
>
> I misspoke in the subject line of the email that started this thread, so =
I just now changed "access code" there to "authorization code".  We have ac=
cess tokens and authorization codes, but not authorization tokens or access=
 codes.
>
> After some thought, I think I see the real problem with omitting the chec=
k on redirect_uri.   Without the check, the following can happen:
>
> 1. Evil user starts OAuth flow on the client using the web-server flow, u=
sing a hacked web browser.
> 2. The hacked web browser does the normal thing in the flow, requesting t=
he evil user's username and password, and at the end the hacked browser is =
given a redirect like:
>
>     https://www.goodclient.com/oauth/evilUserAcct?code=3DevilAuthCode
>
> The hacked browser saves evilAuthCode and does not perform the redirect.
> 3. Suppose the evil user's web site can persuade a known victim user with=
 a normal browser to visit goodclient's web site and do OAuth.  The victim'=
s user id on the client is public knowledge, and the evil user's web site p=
ersuaded the victim to start OAuth at a known time, so it can guess when th=
e victim will complete the OAuth exchange.  Before then, the evil web site =
can visit
>
>     https://www.goodclient.com/oauth/victimUserAcct?code=3DevilAuthCode
>
> which is likely to leave the client associating the victim's user id with=
 an access token that accesses resources controlled by the evil user.

Your assumptions is the attacker is able to predict the way the victim's
session with the client is represented. I would consider that as a
security vulnerability of the client since this would also allow the
attacker to take over the session on his own device.

> Checking the redirect URI doesn't solve the problem in the case where the=
 user id on the client is encoded in the "state" opaque value instead of th=
e redirect URI.
>
> Saying "The authorization server SHOULD require the client to pre-registe=
r their redirection URI" (page 17 of http://tools.ietf.org/html/draft-ietf-=
oauth-v2-10) should have MUST instead of SHOULD, since it is important that=
 we're really redirecting to the client when we're distributing the authori=
zation code by redirecting.

See above. From a security perspective this is clearly a good option.
 From an architectural and operational point of view, I would consider
this to restrictive.

regards,
Torsten.

>
> Writing the spec required thinking through these cases.  It would be help=
ful if the use cases were added to the spec, so people don't have to redisc=
over them, and errors in the use cases can be discovered and fixed rather t=
han being made repeatedly by each person rediscovering the use case.
>
> Tim Freeman
> Email: tim.freeman@hp.com
> Desk in Palo Alto: (650) 857-2581
> Home: (408) 774-1298
> Cell: (408) 348-7536
>
>
> -----Original Message-----
> From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]
> Sent: Saturday, September 11, 2010 7:59 AM
> To: Torsten Lodderstedt
> Cc: Freeman, Tim; oauth@ietf.org
> Subject: RE: [OAUTH-WG] Why give the redirect URI when trading an access =
code for an access token?
>
> Sorry.
>
> 7. Evil user takes the code and gives it back to the client by constructi=
ng the original correct redirection URI.
> 8. Client exchanges the code for access token, attaching it to the evil u=
ser's account.
> 9. Evil user can now access victim user data on his client account.
>
> This is basically a session fixation attack.
>
> EHL
>
>> -----Original Message-----
>> From: Torsten Lodderstedt [mailto:torsten@lodderstedt.net]
>> Sent: Saturday, September 11, 2010 1:01 AM
>> To: Eran Hammer-Lahav
>> Cc: Freeman, Tim; oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Why give the redirect URI when trading an access
>> code for an access token?
>>
>>    Doesn't step 7 require the evil user to know the client's secret?
>>
>> Am 10.09.2010 17:06, schrieb Eran Hammer-Lahav:
>>> 1. Evil user starts the OAuth flow on the client using the web-server f=
low.
>>> 2. Client redirects the evil user to the authorization server, includin=
g state
>> information about the evil user account on the client.
>>> 3. Evil user takes the authorization endpoint URI and changes the
>> redirection to its own site.
>>> 4. Evil user tricks victim user to click on the link and authorize acce=
ss
>> (phishing or other social engineering attack).
>>> 5. Victim user thinking this is a valid authorization request, authoriz=
es
>> access.
>>> 6. Authorization server sends victim user back to the client, but since=
 the
>> redirection URI was changed, back to the evil user site.
>>> 7. Evil user grabs the code and exchanges it for an access token.
>>>
>>> By checking that the callback URI used to deliver the code is the same =
as
>> the one used to initiate the flow, the authorization server can verify t=
hat the
>> user who initiated the flow is the same one to authorize access and fini=
sh the
>> flow.
>>> EHL
>>>
>>>> -----Original Message-----
>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
>>>> Behalf Of Freeman, Tim
>>>> Sent: Wednesday, September 08, 2010 8:05 PM
>>>> To: oauth@ietf.org
>>>> Subject: [OAUTH-WG] Why give the redirect URI when trading an access
>>>> code for an access token?
>>>>
>>>> Hi.  I'm new here.  I searched the archives a bit and didn't
>>>> immediately find an answer to my question below.  My apologies if
>>>> there was some previous discussion of this that I missed.
>>>>
>>>> Looking at the draft spec at
>>>> http://tools.ietf.org/html/draft-ietf-oauth-v2-10,
>>>> I see in section 4.1.1 "Authorization code" on page 22 that it is
>>>> required to give the redirect_uri of the original request when
>>>> exchanging an authorization code for an access token, and the
>>>> authorization server must verify that the redirection URI is correct a=
s well
>> as the authorization code.
>>>> Based on section 4.2 "Access Token Response" on page 25, it seems
>>>> that the redirect_uri is not used when constructing the response from
>>>> the authorization server.
>>>>
>>>> So far as I can tell, the redirect_uri is useless in this request.
>>>> It does not contain any secrets.  The authorization code is verified
>>>> and is meant to be an arbitrary unguessable identifier, so little is
>>>> gained by verifying the redirect_uri also.  It is not used to construc=
t the
>> reply.  Why is it required?
>>>> Tim Freeman
>>>> Email: tim.freeman@hp.com
>>>> Desk in Palo Alto: (650) 857-2581
>>>> Home: (408) 774-1298
>>>> Cell: (408) 348-7536
>>>>
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth

From eran@hueniverse.com  Tue Mar 22 21:51:08 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 93E2F3A68D1 for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 21:51:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.566
X-Spam-Level: 
X-Spam-Status: No, score=-2.566 tagged_above=-999 required=5 tests=[AWL=0.032,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gLv+i7NuKzhE for <oauth@core3.amsl.com>; Tue, 22 Mar 2011 21:50:56 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 2B3583A68CF for <oauth@ietf.org>; Tue, 22 Mar 2011 21:50:55 -0700 (PDT)
Received: (qmail 21312 invoked from network); 23 Mar 2011 04:52:29 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 23 Mar 2011 04:52:28 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Tue, 22 Mar 2011 21:52:25 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Anthony Nadalin <tonynad@microsoft.com>, Phil Hunt <phil.hunt@oracle.com>,  "Manger, James H" <James.H.Manger@team.telstra.com>
Date: Tue, 22 Mar 2011 21:52:20 -0700
Thread-Topic: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
Thread-Index: Acvn58EM+JExiW6yQkawESD8X4iCRgAEF9CAAAo7B4AAB6YDgAACpPYAACHqsyAABvdrQA==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234464F433192@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com> <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com> <3DA41CB6-5E24-4D46-9703-C04FAF4D9571@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432EF4@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E70B6C2893@SN1PRD0302MB097.namprd03.prod.outlook.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E70B6C2893@SN1PRD0302MB097.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234464F433192P3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 04:51:08 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F433192P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

These are separate issues and collapsing them into one list is counterprodu=
ctive (not to mention ignoring many useful points made along the way). What=
 made this entire topic a mess is the original error registry proposal incl=
uded in the bearer token specification which conflated completely different=
 things into one useless registry.

Regarding the v2 specification:

- Should the error codes defined in sections 4.2.2.1 and 5.2 be extensible?

There is agreement that some extensibility is needed. The open question is =
whether such extensibility should be combined with the existing parameter e=
xtension registry or not. The reason for combining it with the existing reg=
istry is that so far, the only valid use case raised on the list was for de=
fining extension-specific errors such as 'unknown display type' for the UX =
extension.

Regarding the bearer token and MAC token specifications:

- Should these specification define error codes beyond the HTTP status code=
 returned (400, 401, 403)?

James Manger and I argue that given that there are three error conditions a=
nd three corresponding codes, there is no point in defining additional erro=
r codes. The HTTP status provides the client with all the information it ne=
eds. Others argue that they need finer error codes for cases such as token =
expiration (which is covered by 401).

- Should the error codes defined for the bearer token specification be exte=
nsible?

Since the MAC specification does not define additional error code and does =
not allow for any extensibility which can alter the protocol behavior (and =
generate additional error states), no error extensibility is needed. Bearer=
 token specification defines an error registry but does not offer any use c=
ases or requirements for such theoretical scenario.

- Should the bearer token and MAC token specification share an error regist=
ry, error response, header format, etc.?

The two specification are dramatically different and each has its own set o=
f utilization methods, terminology, and errors. In addition, the MAC specif=
ication extends OAuth but is not an OAuth extension. OAuth extensions are s=
pecifications directly affecting the process of obtaining tokens, not using=
 tokens.

EHL



From: Anthony Nadalin [mailto:tonynad@microsoft.com]
Sent: Tuesday, March 22, 2011 2:32 PM
To: Eran Hammer-Lahav; Phil Hunt; Manger, James H
Cc: oauth@ietf.org
Subject: RE: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

There seems to be some basic disagreements;


(1)    The various token specifications standalone (e.g. draft-ietf-oauth-v=
2-bearer-03, etc.) and are not extensions to draft-ietf-oauth-v2-xx and hav=
e no need to have common error messages/codes

(2)    Errors in draft-ietf-oauth-v2-xx are final and we don't see a need t=
o have a mechanism to add additional ones because of #(1)

(3)    We want to put a burden on the clients to have to deal with all the =
various error messages/codes from the different token profiles and the clie=
nt has to figure this out

Given the above I'm not sure why we have a registry for the parameters, see=
ms incionsistent.


From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of E=
ran Hammer-Lahav
Sent: Monday, March 21, 2011 9:33 PM
To: Phil Hunt; Manger, James H
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

There are two separate issues here which Mike's latest draft conflated into=
 one.

Issues 1:

The v2 specification currently does not allow for defining additional error=
 codes to the authorization and token endpoints. The only way to define add=
itional error codes is by updating the RFC (once published). Updating an RF=
C is an acceptable way of extending an existing specification, but only if =
it is done very infrequently. The other two options are to allow URI-format=
ted error code, or define a registry.

In any case, all three extensibility model have a single purpose - to reduc=
e the likelihood of an error code name collision. It does not improve inter=
operability unless clients actually implement the additional codes. The goa=
l of the v2 specification must be to cover all possible scenarios so that a=
 client implementing nothing but these codes will be able to handle error c=
ases related to this specification.

After a long discussion, the only valid use case to arise is the one in whi=
ch an extension such as the UX specification (providing a way for the clien=
t to specify the display size of the authorization web page for various dev=
ices) needs additional codes. For example, the UX specification defines the=
 'display' authorization request parameter. If the client provides bad valu=
e, the server may want to return an error specific to this situation.

The open issue is how to address this use case. Since such additional error=
 codes are always a result of an additional request parameter, I am looking=
 for a way to allow parameter registration to specify such related error co=
des without defining yet another registry. This solution is specific to the=
 only use case we have. Defining an error registry is likely to do more har=
m than good, encouraging developers to define new generic error codes that =
are not extension-specific which will only reduce interoperability.

Issue 2:

The bearer token specification includes registration requirements for prote=
cted resource request parameters as well as potential error codes when a pr=
otected resource request fails. A few people have strongly objected to this=
 new proposal since the semantics of the protected resource request is by d=
efinition, outside the scope of any OAuth specification.

The only parameter allowed to infringe on the resource server namespace is =
the currently named 'oauth_token' parameter. There is an ongoing discussion=
 to renamed it to 'bearer_token'.

Hope this helps.

EHL


From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org]<mailto:[mailto:oauth-bounces@ietf.org]> On Behalf Of Phil =
Hunt
Sent: Monday, March 21, 2011 8:17 PM
To: Manger, James H
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

I'm still not understanding why each RFC (e.g. the bearer spec) can't defin=
e its own error codes. If you were to support the bearer token RFC, then yo=
u obviously understand the normative errors. I'm just not getting what the =
value of a central "OAuth" registry is.

An OAuth registry also unnecessarily limits possibility of re-use of token =
schemes in other frameworks outside of OAuth or conversely limits the abili=
ty to use tokens (such as kerberos) in an OAuth "framework".

So again, I ask what the benefit of a registry is achieved that could not b=
e achieved within the token spec itself.

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>



On 2011-03-21, at 4:38 PM, Manger, James H wrote:

The bearer spec defines 3 errors (invalid_request, invalid_token, insuffici=
ent_scope), which accompany 3 different status codes (400 Bad request, 401 =
Unauthorized, 403 Forbidden respectively).
Client apps are probably better off switching behaviour based on the HTTP s=
tatus code, and ignoring the error string (perhaps put it in a log, or on a=
 debug console so a developer can see it).

It seems like overkill to have:
*         An HTTP status code (eg 401)
*         An HTTP status message (eg Unauthorized)
*         An error string (eg invalid_token)
*         An error_description (eg token is formatted incorrectly)
*         An error_uri (eg http://api.example.com/error/45)
*         The body of the HTTP response (eg an HTML page with extensive det=
ails about the error and links to the API documentation)

6 sources of error information -- and all for a bearer token that is usuall=
y opaque to the client app!

Encouraging new error strings to be defined - by having a registry for them=
 - is not ideal. Client apps that don't recognize a value learn nothing. At=
 least with HTTP status codes a client app knows the class of error (eg 4xx=
 or 5xx) and can behave accordingly even if it doesn't recognize the specif=
ic value (eg 538).

I'd vote for F) ditch error string/description/uri for the BEARER HTTP auth=
entication scheme.

--
James Manger


On 2011-03-21, at 9:48 AM, Mike Jones wrote:

People voted as follows in the poll I conducted on the OAuth Errors Registr=
y:

For A:
                Mike Jones
                Igor Faynberg
                Justin Richter
                Anthony Nadalin

For D or C:
                Eran Hammer-Lahav
                William Mills

Given that twice as many people indicated a preference for A as for any oth=
er option, that seems to indicate a consensus for A.  Therefore Eran, when =
you update your draft, can you please proceed on that basis?

                                                                Thanks,
                                                                -- Mike


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_90C41DD21FB7C64BB94121FBBC2E7234464F433192P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:317656718;
	mso-list-type:hybrid;
	mso-list-template-ids:462079574 1659432422 67698713 67698715 67698703 6769=
8713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-text:"\(%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1
	{mso-list-id:773402820;
	mso-list-type:hybrid;
	mso-list-template-ids:1572772366 67698703 67698713 67698715 67698703 67698=
713 67698715 67698703 67698713 67698715;}
@list l1:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l1:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l1:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>These are=
 separate issues and collapsing them into one list is counterproductive (no=
t to mention ignoring many useful points made along the way). What made thi=
s entire topic a mess is the original error registry proposal included in t=
he bearer token specification which conflated completely different things i=
nto one useless registry.<o:p></o:p></span></p><p class=3DMsoNormal><span s=
tyle=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>=
<o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:1=
1.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Regarding the v2 sp=
ecification:<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-=
size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fa=
mily:"Calibri","sans-serif";color:#1F497D'>- Should the error codes defined=
 in sections 4.2.2.1 and 5.2 be extensible?<o:p></o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
>There is agreement that some extensibility is needed. The open question is=
 whether such extensibility should be combined with the existing parameter =
extension registry or not. The reason for combining it with the existing re=
gistry is that so far, the only valid use case raised on the list was for d=
efining extension-specific errors such as &#8216;unknown display type&#8217=
; for the UX extension.<o:p></o:p></span></p><p class=3DMsoNormal><span sty=
le=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o=
:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.=
0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Regarding the bearer =
token and MAC token specifications:<o:p></o:p></span></p><p class=3DMsoNorm=
al><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color=
:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>- Should =
these specification define error codes beyond the HTTP status code returned=
 (400, 401, 403)?<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'=
font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nb=
sp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;fo=
nt-family:"Calibri","sans-serif";color:#1F497D'>James Manger and I argue th=
at given that there are three error conditions and three corresponding code=
s, there is no point in defining additional error codes. The HTTP status pr=
ovides the client with all the information it needs. Others argue that they=
 need finer error codes for cases such as token expiration (which is covere=
d by 401).<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-si=
ze:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:=
p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fami=
ly:"Calibri","sans-serif";color:#1F497D'>- Should the error codes defined f=
or the bearer token specification be extensible?<o:p></o:p></span></p><p cl=
ass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans=
-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><sp=
an style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F49=
7D'>Since the MAC specification does not define additional error code and d=
oes not allow for any extensibility which can alter the protocol behavior (=
and generate additional error states), no error extensibility is needed. Be=
arer token specification defines an error registry but does not offer any u=
se cases or requirements for such theoretical scenario.<o:p></o:p></span></=
p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri=
","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNor=
mal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";colo=
r:#1F497D'>- Should the bearer token and MAC token specification share an e=
rror registry, error response, header format, etc.?<o:p></o:p></span></p><p=
 class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","s=
ans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal>=
<span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1=
F497D'>The two specification are dramatically different and each has its ow=
n set of utilization methods, terminology, and errors. In addition, the MAC=
 specification extends OAuth but is not an OAuth extension. OAuth extension=
s are specifications directly affecting the process of obtaining tokens, no=
t using tokens.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'fo=
nt-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp=
;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font=
-family:"Calibri","sans-serif";color:#1F497D'>EHL<o:p></o:p></span></p><p c=
lass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","san=
s-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F4=
97D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-s=
ize:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o=
:p></span></p><div style=3D'border:none;border-left:solid blue 1.5pt;paddin=
g:0in 0in 0in 4.0pt'><div><div style=3D'border:none;border-top:solid #B5C4D=
F 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span style=3D'f=
ont-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span st=
yle=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> Anthony Nadalin=
 [mailto:tonynad@microsoft.com] <br><b>Sent:</b> Tuesday, March 22, 2011 2:=
32 PM<br><b>To:</b> Eran Hammer-Lahav; Phil Hunt; Manger, James H<br><b>Cc:=
</b> oauth@ietf.org<br><b>Subject:</b> RE: [OAUTH-WG] Apparent consensus on=
 OAuth Errors Registry<o:p></o:p></span></p></div></div><p class=3DMsoNorma=
l><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt=
;font-family:"Calibri","sans-serif";color:#1F497D'>There seems to be some b=
asic disagreements;<o:p></o:p></span></p><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p=
>&nbsp;</o:p></span></p><p class=3DMsoListParagraph style=3D'text-indent:-.=
25in;mso-list:l0 level1 lfo2'><![if !supportLists]><span style=3D'font-size=
:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><span style=3D'ms=
o-list:Ignore'>(1)<span style=3D'font:7.0pt "Times New Roman"'>&nbsp;&nbsp;=
&nbsp; </span></span></span><![endif]><span style=3D'font-size:11.0pt;font-=
family:"Calibri","sans-serif";color:#1F497D'>The various token specificatio=
ns standalone (e.g. draft-ietf-oauth-v2-bearer-03, etc.) and are not extens=
ions to draft-ietf-oauth-v2-xx and have no need to have common error messag=
es/codes<o:p></o:p></span></p><p class=3DMsoListParagraph style=3D'text-ind=
ent:-.25in;mso-list:l0 level1 lfo2'><![if !supportLists]><span style=3D'fon=
t-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><span style=
=3D'mso-list:Ignore'>(2)<span style=3D'font:7.0pt "Times New Roman"'>&nbsp;=
&nbsp;&nbsp; </span></span></span><![endif]><span style=3D'font-size:11.0pt=
;font-family:"Calibri","sans-serif";color:#1F497D'>Errors in draft-ietf-oau=
th-v2-xx are final and we don&#8217;t see a need to have a mechanism to add=
 additional ones because of #(1)<o:p></o:p></span></p><p class=3DMsoListPar=
agraph style=3D'text-indent:-.25in;mso-list:l0 level1 lfo2'><![if !supportL=
ists]><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";co=
lor:#1F497D'><span style=3D'mso-list:Ignore'>(3)<span style=3D'font:7.0pt "=
Times New Roman"'>&nbsp;&nbsp;&nbsp; </span></span></span><![endif]><span s=
tyle=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>=
We want to put a burden on the clients to have to deal with all the various=
 error messages/codes from the different token profiles and the client has =
to figure this out<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D=
'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&n=
bsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;f=
ont-family:"Calibri","sans-serif";color:#1F497D'>Given the above I&#8217;m =
not sure why we have a registry for the parameters, seems incionsistent.<o:=
p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;fon=
t-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p>=
<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><div style=3D'=
border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p cl=
ass=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sa=
ns-serif"'>From:</span></b><span style=3D'font-size:10.0pt;font-family:"Tah=
oma","sans-serif"'> oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] =
<b>On Behalf Of </b>Eran Hammer-Lahav<br><b>Sent:</b> Monday, March 21, 201=
1 9:33 PM<br><b>To:</b> Phil Hunt; Manger, James H<br><b>Cc:</b> oauth@ietf=
.org<br><b>Subject:</b> Re: [OAUTH-WG] Apparent consensus on OAuth Errors R=
egistry<o:p></o:p></span></p></div></div><p class=3DMsoNormal><o:p>&nbsp;</=
o:p></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"C=
alibri","sans-serif";color:#1F497D'>There are two separate issues here whic=
h Mike&#8217;s latest draft conflated into one.<o:p></o:p></span></p><p cla=
ss=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-=
serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><spa=
n style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Issues 1:<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-=
size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fa=
mily:"Calibri","sans-serif";color:#1F497D'>The v2 specification currently d=
oes not allow for defining additional error codes to the authorization and =
token endpoints. The only way to define additional error codes is by updati=
ng the RFC (once published). Updating an RFC is an acceptable way of extend=
ing an existing specification, but only if it is done very infrequently. Th=
e other two options are to allow URI-formatted error code, or define a regi=
stry.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11=
.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></s=
pan></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"C=
alibri","sans-serif";color:#1F497D'>In any case, all three extensibility mo=
del have a single purpose &#8211; to reduce the likelihood of an error code=
 name collision. It does not improve interoperability unless clients actual=
ly implement the additional codes. The goal of the v2 specification must be=
 to cover all possible scenarios so that a client implementing nothing but =
these codes will be able to handle error cases related to this specificatio=
n.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0p=
t;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span=
></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Cali=
bri","sans-serif";color:#1F497D'>After a long discussion, the only valid us=
e case to arise is the one in which an extension such as the UX specificati=
on (providing a way for the client to specify the display size of the autho=
rization web page for various devices) needs additional codes. For example,=
 the UX specification defines the &#8216;display&#8217; authorization reque=
st parameter. If the client provides bad value, the server may want to retu=
rn an error specific to this situation.<o:p></o:p></span></p><p class=3DMso=
Normal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";c=
olor:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>The =
open issue is how to address this use case. Since such additional error cod=
es are always a result of an additional request parameter, I am looking for=
 a way to allow parameter registration to specify such related error codes =
without defining yet another registry. This solution is specific to the onl=
y use case we have. Defining an error registry is likely to do more harm th=
an good, encouraging developers to define new generic error codes that are =
not extension-specific which will only reduce interoperability.<o:p></o:p><=
/span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:=
"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>Issue 2:<o:p></o:p></span></p><p class=3DMsoNormal><spa=
n style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-siz=
e:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>The bearer token=
 specification includes registration requirements for protected resource re=
quest parameters as well as potential error codes when a protected resource=
 request fails. A few people have strongly objected to this new proposal si=
nce the semantics of the protected resource request is by definition, outsi=
de the scope of any OAuth specification.<o:p></o:p></span></p><p class=3DMs=
oNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";=
color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>The =
only parameter allowed to infringe on the resource server namespace is the =
currently named &#8216;oauth_token&#8217; parameter. There is an ongoing di=
scussion to renamed it to &#8216;bearer_token&#8217;.<o:p></o:p></span></p>=
<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNorma=
l><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:=
#1F497D'>Hope this helps.<o:p></o:p></span></p><p class=3DMsoNormal><span s=
tyle=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>=
<o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:1=
1.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>EHL<o:p></o:p></spa=
n></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Cal=
ibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMs=
oNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";=
color:#1F497D'><o:p>&nbsp;</o:p></span></p><div style=3D'border:none;border=
-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><div><div style=3D'border=
:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3D=
MsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-ser=
if"'>From:</span></b><span style=3D'font-size:10.0pt;font-family:"Tahoma","=
sans-serif"'> <a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.=
org</a> <a href=3D"mailto:[mailto:oauth-bounces@ietf.org]">[mailto:oauth-bo=
unces@ietf.org]</a> <b>On Behalf Of </b>Phil Hunt<br><b>Sent:</b> Monday, M=
arch 21, 2011 8:17 PM<br><b>To:</b> Manger, James H<br><b>Cc:</b> <a href=
=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br><b>Subject:</b> Re: [OAUTH=
-WG] Apparent consensus on OAuth Errors Registry<o:p></o:p></span></p></div=
></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I'm s=
till not understanding why each RFC (e.g. the bearer spec) can't define its=
 own error codes. If you were to support the bearer token RFC, then you obv=
iously understand the normative errors. I'm just not getting what the value=
 of a central &quot;OAuth&quot; registry is. &nbsp;<o:p></o:p></p><div><p c=
lass=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>An OA=
uth registry also unnecessarily limits possibility of re-use of token schem=
es in other frameworks outside of OAuth or conversely limits the ability to=
 use tokens (such as kerberos) in an OAuth &quot;framework&quot;.<o:p></o:p=
></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p cla=
ss=3DMsoNormal>So again, I ask what the benefit of a registry is achieved t=
hat could not be achieved within the token spec itself.<o:p></o:p></p><div>=
<p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><div><div><div><div><d=
iv><div><p class=3DMsoNormal><span style=3D'font-size:9.0pt;font-family:"He=
lvetica","sans-serif";color:black'>Phil<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:9.0pt;font-family:"Helvetica","s=
ans-serif";color:black'><a href=3D"mailto:phil.hunt@oracle.com">phil.hunt@o=
racle.com</a><o:p></o:p></span></p></div></div></div></div><p class=3DMsoNo=
rmal><span style=3D'font-size:13.5pt;font-family:"Helvetica","sans-serif";c=
olor:black'><o:p>&nbsp;</o:p></span></p></div><p class=3DMsoNormal style=3D=
'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal><o:p=
>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On 2011-03-21, at 4:38 PM, =
Manger, James H wrote:<o:p></o:p></p></div><p class=3DMsoNormal style=3D'ma=
rgin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal><sp=
an lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif=
";color:#1F497D'>The bearer spec defines 3 errors (invalid_request, invalid=
_token, insufficient_scope), which accompany 3 different status codes (400 =
Bad request, 401 Unauthorized, 403 Forbidden respectively).</span><span lan=
g=3DEN-AU><o:p></o:p></span></p></div><div><p class=3DMsoNormal><span lang=
=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color=
:#1F497D'>Client apps are probably better off switching behaviour based on =
the HTTP status code, and ignoring the error string (perhaps put it in a lo=
g, or on a debug console so a developer can see it).</span><span lang=3DEN-=
AU><o:p></o:p></span></p></div><div><p class=3DMsoNormal><span lang=3DEN-AU=
 style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D=
'>&nbsp;</span><span lang=3DEN-AU><o:p></o:p></span></p></div><div><p class=
=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Cali=
bri","sans-serif";color:#1F497D'>It seems like overkill to have:</span><spa=
n lang=3DEN-AU><o:p></o:p></span></p></div><div style=3D'margin-left:.5in'>=
<p class=3DMsoNormal style=3D'text-indent:-.25in'><span lang=3DEN-AU style=
=3D'font-size:11.0pt;font-family:Symbol;color:#1F497D'>&middot;</span><span=
 lang=3DEN-AU style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3Dapple-converted-space>&nbsp;</span=
></span><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";color:#1F497D'>An HTTP status code (eg 401)</span><span lang=
=3DEN-AU><o:p></o:p></span></p></div><div style=3D'margin-left:.5in'><p cla=
ss=3DMsoNormal style=3D'text-indent:-.25in'><span lang=3DEN-AU style=3D'fon=
t-size:11.0pt;font-family:Symbol;color:#1F497D'>&middot;</span><span lang=
=3DEN-AU style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;<span class=3Dapple-converted-space>&nbsp;</span></sp=
an><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans=
-serif";color:#1F497D'>An HTTP status message (eg Unauthorized)</span><span=
 lang=3DEN-AU><o:p></o:p></span></p></div><div style=3D'margin-left:.5in'><=
p class=3DMsoNormal style=3D'text-indent:-.25in'><span lang=3DEN-AU style=
=3D'font-size:11.0pt;font-family:Symbol;color:#1F497D'>&middot;</span><span=
 lang=3DEN-AU style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3Dapple-converted-space>&nbsp;</span=
></span><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";color:#1F497D'>An error string (eg invalid_token)</span><span =
lang=3DEN-AU><o:p></o:p></span></p></div><div style=3D'margin-left:.5in'><p=
 class=3DMsoNormal style=3D'text-indent:-.25in'><span lang=3DEN-AU style=3D=
'font-size:11.0pt;font-family:Symbol;color:#1F497D'>&middot;</span><span la=
ng=3DEN-AU style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;<span class=3Dapple-converted-space>&nbsp;</span></=
span><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'>An error_description (eg token is formatted incorr=
ectly)</span><span lang=3DEN-AU><o:p></o:p></span></p></div><div style=3D'm=
argin-left:.5in'><p class=3DMsoNormal style=3D'text-indent:-.25in'><span la=
ng=3DEN-AU style=3D'font-size:11.0pt;font-family:Symbol;color:#1F497D'>&mid=
dot;</span><span lang=3DEN-AU style=3D'font-size:7.0pt;color:#1F497D'>&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3Dapple-converted-sp=
ace>&nbsp;</span></span><span lang=3DEN-AU style=3D'font-size:11.0pt;font-f=
amily:"Calibri","sans-serif";color:#1F497D'>An error_uri (eg<span class=3Da=
pple-converted-space>&nbsp;</span><a href=3D"http://api.example.com/error/4=
5">http://api.example.com/error/45</a>)</span><span lang=3DEN-AU><o:p></o:p=
></span></p></div><div style=3D'margin-left:.5in'><p class=3DMsoNormal styl=
e=3D'text-indent:-.25in'><span lang=3DEN-AU style=3D'font-size:11.0pt;font-=
family:Symbol;color:#1F497D'>&middot;</span><span lang=3DEN-AU style=3D'fon=
t-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;<span class=3Dapple-converted-space>&nbsp;</span></span><span lang=3DEN-AU=
 style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D=
'>The body of the HTTP response (eg an HTML page with extensive details abo=
ut the error and links to the API documentation)</span><span lang=3DEN-AU><=
o:p></o:p></span></p></div><div><p class=3DMsoNormal><span lang=3DEN-AU sty=
le=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&n=
bsp;</span><span lang=3DEN-AU><o:p></o:p></span></p></div><div><p class=3DM=
soNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri"=
,"sans-serif";color:#1F497D'>6 sources of error information -- and all for =
a bearer token that is usually opaque to the client app!</span><span lang=
=3DEN-AU><o:p></o:p></span></p></div><div><p class=3DMsoNormal><span lang=
=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color=
:#1F497D'>&nbsp;</span><span lang=3DEN-AU><o:p></o:p></span></p></div><div>=
<p class=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-fami=
ly:"Calibri","sans-serif";color:#1F497D'>Encouraging new error strings to b=
e defined &#8211; by having a registry for them &#8211; is not ideal. Clien=
t apps that don&#8217;t recognize a value learn nothing. At least with HTTP=
 status codes a client app knows the class of error (eg 4xx or 5xx) and can=
 behave accordingly even if it doesn&#8217;t recognize the specific value (=
eg 538).</span><span lang=3DEN-AU><o:p></o:p></span></p></div><div><p class=
=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Cali=
bri","sans-serif";color:#1F497D'>&nbsp;</span><span lang=3DEN-AU><o:p></o:p=
></span></p></div><div><p class=3DMsoNormal><span lang=3DEN-AU style=3D'fon=
t-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>I&#8217;d v=
ote for F) ditch error string/description/uri for the BEARER HTTP authentic=
ation scheme.</span><span lang=3DEN-AU><o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:=
"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><span lang=3DEN-AU><o:p>=
</o:p></span></p></div><div><div><p class=3DMsoNormal><span lang=3DEN-AU st=
yle=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>-=
-</span><span lang=3DEN-AU><o:p></o:p></span></p></div><div><p class=3DMsoN=
ormal><span lang=3DEN-AU style=3D'font-size:11.0pt;font-family:"Calibri","s=
ans-serif";color:#1F497D'>James Manger</span><span lang=3DEN-AU><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span lang=3DEN-AU st=
yle=3D'color:#1F497D'>&nbsp;</span><span lang=3DEN-AU><o:p></o:p></span></p=
></div><div><p class=3DMsoNormal><span lang=3DEN-AU style=3D'font-size:11.0=
pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><span lan=
g=3DEN-AU><o:p></o:p></span></p></div><div><div><div><p class=3DMsoNormal><=
span lang=3DEN-AU>On 2011-03-21, at 9:48 AM, Mike Jones wrote:<o:p></o:p></=
span></p></div></div><div><p class=3DMsoNormal style=3D'margin-bottom:12.0p=
t'><span lang=3DEN-AU><o:p>&nbsp;</o:p></span></p></div><div><div><div><p c=
lass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","san=
s-serif"'>People voted as follows in the poll I conducted on the OAuth Erro=
rs Registry:</span><span lang=3DEN-AU><o:p></o:p></span></p></div></div><di=
v><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Ca=
libri","sans-serif"'>&nbsp;</span><span lang=3DEN-AU><o:p></o:p></span></p>=
</div></div><div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;=
font-family:"Calibri","sans-serif"'>For A:</span><span lang=3DEN-AU><o:p></=
o:p></span></p></div></div><div><div><p class=3DMsoNormal><span style=3D'fo=
nt-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mike Jon=
es</span><span lang=3DEN-AU><o:p></o:p></span></p></div></div><div><div><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; Igor Faynberg</span><span lang=3DEN-AU><o:p></o:=
p></span></p></div></div><div><div><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Justin Ric=
hter</span><span lang=3DEN-AU><o:p></o:p></span></p></div></div><div><div><=
p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","=
sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp; Anthony Nadalin</span><span lang=3DEN-AU><o:p>=
</o:p></span></p></div></div><div><div><p class=3DMsoNormal><span style=3D'=
font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span>=
<span lang=3DEN-AU><o:p></o:p></span></p></div></div><div><div><p class=3DM=
soNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"=
'>For D or C:</span><span lang=3DEN-AU><o:p></o:p></span></p></div></div><d=
iv><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"C=
alibri","sans-serif"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Eran Hammer-Lahav</span><span lang=3D=
EN-AU><o:p></o:p></span></p></div></div><div><div><p class=3DMsoNormal><spa=
n style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp; William Mills</span><span lang=3DEN-AU><o:p></o:p></span></p></div></d=
iv><div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fami=
ly:"Calibri","sans-serif"'>&nbsp;</span><span lang=3DEN-AU><o:p></o:p></spa=
n></p></div></div><div><div><p class=3DMsoNormal><span style=3D'font-size:1=
1.0pt;font-family:"Calibri","sans-serif"'>Given that twice as many people i=
ndicated a preference for A as for any other option, that seems to indicate=
 a consensus for A.&nbsp; Therefore Eran, when you update your draft, can y=
ou please proceed on that basis?</span><span lang=3DEN-AU><o:p></o:p></span=
></p></div></div><div><div><p class=3DMsoNormal><span style=3D'font-size:11=
.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</span><span lang=3DEN-AU><o=
:p></o:p></span></p></div></div><div><div><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Thanks,</span>=
<span lang=3DEN-AU><o:p></o:p></span></p></div></div><div><div><p class=3DM=
soNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"=
'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; -- Mike</span><span lang=3DEN-AU><o:p></o:p></span></p></div></div><d=
iv><div><p class=3DMsoNormal><span style=3D'font-size:13.5pt;font-family:"H=
elvetica","sans-serif"'>&nbsp;</span><span lang=3DEN-AU><o:p></o:p></span><=
/p></div></div></div></div><div><p class=3DMsoNormal><span lang=3DEN-AU>&nb=
sp;<o:p></o:p></span></p></div></div><p class=3DMsoNormal><span lang=3DEN-A=
U style=3D'font-size:13.5pt;font-family:"Helvetica","sans-serif"'>_________=
______________________________________<br>OAuth mailing list<br><a href=3D"=
mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a href=3D"https://www.ietf.or=
g/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><o=
:p></o:p></span></p></div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><=
/div></div></div></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234464F433192P3PW5EX1MB01E_--

From stpeter@stpeter.im  Wed Mar 23 10:03:33 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E7F643A6935 for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 10:03:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.589
X-Spam-Level: 
X-Spam-Status: No, score=-102.589 tagged_above=-999 required=5 tests=[AWL=0.010, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M80XpPHJL1Oo for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 10:03:32 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id B8C483A6934 for <oauth@ietf.org>; Wed, 23 Mar 2011 10:03:32 -0700 (PDT)
Received: from leavealone.cisco.com (72-163-0-129.cisco.com [72.163.0.129]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id AEB6440022 for <oauth@ietf.org>; Wed, 23 Mar 2011 11:06:15 -0600 (MDT)
Message-ID: <4D8A283E.4050502@stpeter.im>
Date: Wed, 23 Mar 2011 11:05:02 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: oauth@ietf.org
References: <389C0727-A69C-4C4B-BB60-53E1172A88AE@gmx.net>
In-Reply-To: <389C0727-A69C-4C4B-BB60-53E1172A88AE@gmx.net>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms000702060003080405010705"
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 17:03:34 -0000

This is a cryptographically signed message in MIME format.

--------------ms000702060003080405010705
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<hat type=3D'AD'/>

On 3/19/11 11:58 AM, Hannes Tschofenig wrote:
> Hi all,
>=20
> the WGLC for the OAuth base specification has been completed and the
> authors think that this document is ready for a WGLC as well.
>=20
> Hence, let us start the last call for comments on
> http://www.ietf.org/id/draft-ietf-oauth-saml2-bearer-03.txt
>=20
> Please have your comments in no later than April 2nd.
>=20
> Do remember to send a note in if you have read the document and have
> no other comments other than "its ready to go".
>=20
> Thanks! Hannes & Blaine=20

I've completed a review of this spec, the bearer token spec, and the
base spec. This is the first WGLC message I found in my inbox, so I'm
posting about this spec first. :)

Overall I think this short spec is in fine shape. I have a few small
comments.

1. The grant type is a URI at oauth.net. Is that a stable URI? Does it
need to be?

We could define a new URN parameters registry for grant types that are
defined in standards-track RFCs:

http://www.iana.org/assignments/params/params.xml

However, that might be perceived as overkill.

2. Both the SAML-bearer and v2-bearer specs borrow text from the base
spec when a reference seems better. For example, in Section 2.1 of the
SAML-bearer spec we find this:

   scope
         OPTIONAL.  The scope of the access request is expressed as a
         list of space-delimited strings.  The value is defined by the
         authorization server.  If the value contains multiple space-
         delimited strings, their order does not matter, and each string
         adds an additional access range to the requested scope.

However, that's already defined in Section 4.1.1 of the base spec:

   scope
         OPTIONAL.  The scope of the access request expressed as a list
         of space-delimited strings.  The value is defined by the
         authorization server.  If the value contains multiple space-
         delimited strings, their order does not matter, and each string
         adds an additional access range to the requested scope.

I think it would be better to reference the definitions in the base spec
so that they don't get out of sync.

3. Regarding "invalid_grant" in Section 2.3, I'll post in the thread
about a possible registry of error parameter values.

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms000702060003080405010705
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms000702060003080405010705--

From stpeter@stpeter.im  Wed Mar 23 11:09:39 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0E31628C0D6 for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 11:09:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.589
X-Spam-Level: 
X-Spam-Status: No, score=-102.589 tagged_above=-999 required=5 tests=[AWL=0.010, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id USmstsHZXvXW for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 11:09:37 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id B98F428C0EB for <oauth@ietf.org>; Wed, 23 Mar 2011 11:09:37 -0700 (PDT)
Received: from leavealone.cisco.com (72-163-0-129.cisco.com [72.163.0.129]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id B3C7540022; Wed, 23 Mar 2011 12:12:20 -0600 (MDT)
Message-ID: <4D8A37BD.2040604@stpeter.im>
Date: Wed, 23 Mar 2011 12:11:09 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net>
In-Reply-To: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms030903070206030307080909"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 18:09:39 -0000

This is a cryptographically signed message in MIME format.

--------------ms030903070206030307080909
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<hat type=3D'AD'/>

On 3/2/11 1:31 AM, Hannes Tschofenig wrote:
> This is a Last Call for comments on=20
>=20
> http://www.ietf.org/id/draft-ietf-oauth-v2-bearer-03.txt
>=20
> Please have your comments in no later than March 25 (extended deadline =
because of the ongoing OAuth base specification WGLC).
>=20
> Do remember to send a note in if you have read the document and have no=
=20
> other comments other than "its ready to go" - we need those as much as =
we need "I found a problem".
>=20
> Thanks!
> Hannes & Blaine

I agree with much of the last call feedback that other folks have
provided. Here are some additional comments.

1. It would be helpful to define "bearer token" in the introduction
because this term is not defined in RFC 4949 or the base OAuth spec.

2. Please cite RFC 2617 when mentioning the "Authorization" request
header in Section 2.

3. Some of the conformance language is confusing, e.g. the construction
"SHOULD only X if Y" is better as "SHOULD NOT X unless Y".

For example (Section 2):

   Clients SHOULD only use the request body or URI when the
   "Authorization" request header field is not available, and MUST NOT
   use more than one method to transport the token in each request.
   Because of the Security Considerations (Section 3) associated with
   the URI method, it SHOULD only be used if no other method is
   feasible.

That is better as:

   Clients SHOULD NOT use the request body or URI unless the
   "Authorization" request header field is not available, and MUST NOT
   use more than one method to transport the token in each request.
   Because of the Security Considerations (Section 3) associated with
   the URI method, it SHOULD NOT be used unless no other method is
   feasible.

In Section 2.2:

   The client can use this method only if the
   following REQUIRED conditions are met:

That is better as:

   The client MUST NOT use this method unless the
   following conditions are met:

In Section 2.2, I think you mean "MUST NOT" instead of "MAY NOT" here:

   o  The HTTP request method is one for which a body is permitted to be
      present in the request.  In particular, this means that the "GET"
      method MAY NOT be used.

In Section 2.2, I think you mean "SHOULD NOT ... unless" here:

   The "application/x-www-form-urlencoded" method should typically only
   be used in application contexts where participating browsers do not
   have access to the "Authorization" request header field.

In Section 2.3, I think you mean "SHOULD NOT ... unless" here:

   Because of the Security Considerations (Section 3) associated with
   the URI method, it SHOULD only be used if no other method is
   feasible.

In Section 2.4.1, change "SHOULD not" to "SHOULD NOT".

4. For the ABNF in Section 2.1, please reference the "auth-param" rule
from RFC 2617. (However, I tend to agree with Eran that extensibility is
not particularly necessary here, and that some justification and
description of the extensibility mechanism is needed.)

5. I'll post separately about the error registry mentioned in Section 2.4=
=2E1.

6. It's nice to see the security considerations about attacks on tokens.
Perhaps we need a similar section in the SAML-bearer spec.

7. Please provide a reference to RFC 5246 for TLS.

8. What is the basis for defining "short-lived" a lifetime less than one
hour? That's plenty of time in which to launch an attack.

9. Regarding identity verification of resource servers, please reference
either RFC 2818 or draft-saintandre-tls-server-id-check.

10. In Section 4.1.1, I would agree with other WG participants that use
of "oauth_token" here is problematic.

11. Why is Section 4.2 on the OAuth Parameters Registry in this
document? It's already defined in the base spec.

12. Regarding Section 4.3, I'll post separately about an OAuth Errors
Registry, but if it's defined it would belong in the base spec, not here.=


Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms030903070206030307080909
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms030903070206030307080909--

From phil.hunt@oracle.com  Wed Mar 23 11:10:25 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A853628C0EB for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 11:10:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.561
X-Spam-Level: 
X-Spam-Status: No, score=-6.561 tagged_above=-999 required=5 tests=[AWL=0.037,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KqwAd2UYulT5 for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 11:10:24 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 6BCC928C0D6 for <oauth@ietf.org>; Wed, 23 Mar 2011 11:10:24 -0700 (PDT)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2NIBuNR021385 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 23 Mar 2011 18:11:57 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by rcsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2NIBtB3027283 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 23 Mar 2011 18:11:55 GMT
Received: from abhmt007.oracle.com (abhmt007.oracle.com [141.146.116.16]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2NIBtQC021253; Wed, 23 Mar 2011 13:11:55 -0500
Received: from dhcp-rmdc-twvpn-1-vpnpool-10-159-15-134.vpn.oracle.com (/10.159.15.134) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 23 Mar 2011 11:11:54 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <4D84F7E2.6090305@redhat.com>
Date: Wed, 23 Mar 2011 11:11:54 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <16B9A882-6204-4CBD-B7E3-1D806AF5056C@oracle.com>
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com>	<AANLkTimGjiCGk5dpA=YVzq5vDkLR2+caSz=pZ5WiZO9H@mail.gmail.com>	<3C84AD7A-F00F-43EC-AAD3-AD2DCFB46B0E@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432BB0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4D84F7E2.6090305@redhat.com>
To: Anil Saldhana <Anil.Saldhana@redhat.com>, Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090201.4D8A37EC.004B,ss=1,fgs=0
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 18:10:25 -0000

FYI. I have posted a new version of the flows on my blog showing the new =
terminology as discussed here.  Feedback appreciated.
=
http://independentidentity.blogspot.com/2011/03/oauth-flows-extended.html

Phil
phil.hunt@oracle.com

On 2011-03-19, at 11:37 AM, Anil Saldhana wrote:

> I agree.  "2 party oauth", "3 party oauth"  tells  what it is, rather =
than
> "3 legged oauth".
>=20
> On 03/18/2011 07:20 PM, Eran Hammer-Lahav wrote:
>> The legs terminology is just plain awful. I prefer parties, roles, =
anything else.
>>=20
>> EHL
>>=20
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf
>>> Of Phillip Hunt
>>> Sent: Friday, March 18, 2011 5:07 PM
>>> To: David Primmer
>>> Cc: OAuth WG
>>> Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
>>>=20
>>> I agree with what you are saying. We were having trouble =
understanding legs
>>> too, so I came up with the diagram. The diagram does show the =
parties
>>> aspect. But I remain uncomfortable about the terminology.
>>>=20
>>> Phil
>>>=20
>>> Sent from my phone.
>>>=20
>>> On 2011-03-18, at 15:55, David Primmer<primmer@google.com>  wrote:
>>>=20
>>>> Hi Phil,
>>>>=20
>>>> I actually think this rephrasing of the rule of thumb is not really
>>>> helpful based on how the word "legs" has been used in my experience =
of
>>>> discussing and teaching OAuth. I actually tried to be pretty =
explicit
>>>> about this topic in a talk I did at Google I/O last year because we
>>>> have lots of questions about 2 versus 3 legged OAuth since the =
launch
>>>> of the Google Apps Marketplace.
>>>> http://www.youtube.com/watch?v=3D0L_dEOjhADQ. I speak about 17mins
>>> in.
>>>> We have traditionally used the terms two legged OAuth and three =
legged
>>>> OAuth to describe the trust relationships involved in the grant. I
>>>> think your interpretation is very different and not a common way to
>>>> use the terms 'legs' in relation to OAuth and will simply confuse
>>>> people. 2LO involves a client authenticating itself to a server. =
3LO
>>>> involves those two previous actors, plus a user/resource owner who
>>>> delegates permissions to the client. In everyday use, 2LO is =
'server
>>>> to server' auth with out of band permissions and user identity and =
3LO
>>>> involves an individual grant where the user's grant is identified =
by a
>>>> token given to the client and passed to the server on access. =
Another
>>>> way to look at it is 2LO is just HTTP request signing.
>>>>=20
>>>> davep
>>>>=20
>>>> On Mon, Feb 21, 2011 at 4:45 PM, Phil Hunt<phil.hunt@oracle.com>  =
wrote:
>>>>> FYI. I published a blog post with a flow-chart explaining the legs =
of OAuth.
>>>>> http://independentidentity.blogspot.com/2011/02/does-oauth-have-
>>> legs.
>>>>> html
>>>>>=20
>>>>> Please let me know if any corrections should be made, or for that =
matter,
>>> any improvements!
>>>>> Phil
>>>>> phil.hunt@oracle.com
>>>>>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From torsten@lodderstedt.net  Wed Mar 23 12:54:33 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7172528C0F1 for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 12:54:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.211
X-Spam-Level: 
X-Spam-Status: No, score=-2.211 tagged_above=-999 required=5 tests=[AWL=0.038,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1mZ4ZyhRc343 for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 12:54:32 -0700 (PDT)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.98]) by core3.amsl.com (Postfix) with ESMTP id 176ED3A67D3 for <oauth@ietf.org>; Wed, 23 Mar 2011 12:54:31 -0700 (PDT)
Received: from [87.142.248.208] (helo=[192.168.71.49]) by smtprelay05.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Q2UA0-00076v-Gh; Wed, 23 Mar 2011 20:56:04 +0100
Message-ID: <4D8A5054.4050006@lodderstedt.net>
Date: Wed, 23 Mar 2011 20:56:04 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Phil Hunt <phil.hunt@oracle.com>
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com>	<AANLkTimGjiCGk5dpA=YVzq5vDkLR2+caSz=pZ5WiZO9H@mail.gmail.com>	<3C84AD7A-F00F-43EC-AAD3-AD2DCFB46B0E@oracle.com>	<90C41DD21FB7C64BB94121FBBC2E7234464F432BB0@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<4D84F7E2.6090305@redhat.com> <16B9A882-6204-4CBD-B7E3-1D806AF5056C@oracle.com>
In-Reply-To: <16B9A882-6204-4CBD-B7E3-1D806AF5056C@oracle.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 19:54:33 -0000

Hi Phil,

looks even better now :-)

As already pointed out 
(http://www.ietf.org/mail-archive/web/oauth/current/msg05599.html), 
"Have client credentials? No" does not automatically imply usage of 
implicit grant. The client could also use the authorization code (for 
various reasons).

regards,
Torsten.


Am 23.03.2011 19:11, schrieb Phil Hunt:
> FYI. I have posted a new version of the flows on my blog showing the new terminology as discussed here.  Feedback appreciated.
> http://independentidentity.blogspot.com/2011/03/oauth-flows-extended.html
>
> Phil
> phil.hunt@oracle.com
>
> On 2011-03-19, at 11:37 AM, Anil Saldhana wrote:
>
>> I agree.  "2 party oauth", "3 party oauth"  tells  what it is, rather than
>> "3 legged oauth".
>>
>> On 03/18/2011 07:20 PM, Eran Hammer-Lahav wrote:
>>> The legs terminology is just plain awful. I prefer parties, roles, anything else.
>>>
>>> EHL
>>>
>>>> -----Original Message-----
>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>>>> Of Phillip Hunt
>>>> Sent: Friday, March 18, 2011 5:07 PM
>>>> To: David Primmer
>>>> Cc: OAuth WG
>>>> Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
>>>>
>>>> I agree with what you are saying. We were having trouble understanding legs
>>>> too, so I came up with the diagram. The diagram does show the parties
>>>> aspect. But I remain uncomfortable about the terminology.
>>>>
>>>> Phil
>>>>
>>>> Sent from my phone.
>>>>
>>>> On 2011-03-18, at 15:55, David Primmer<primmer@google.com>   wrote:
>>>>
>>>>> Hi Phil,
>>>>>
>>>>> I actually think this rephrasing of the rule of thumb is not really
>>>>> helpful based on how the word "legs" has been used in my experience of
>>>>> discussing and teaching OAuth. I actually tried to be pretty explicit
>>>>> about this topic in a talk I did at Google I/O last year because we
>>>>> have lots of questions about 2 versus 3 legged OAuth since the launch
>>>>> of the Google Apps Marketplace.
>>>>> http://www.youtube.com/watch?v=0L_dEOjhADQ. I speak about 17mins
>>>> in.
>>>>> We have traditionally used the terms two legged OAuth and three legged
>>>>> OAuth to describe the trust relationships involved in the grant. I
>>>>> think your interpretation is very different and not a common way to
>>>>> use the terms 'legs' in relation to OAuth and will simply confuse
>>>>> people. 2LO involves a client authenticating itself to a server. 3LO
>>>>> involves those two previous actors, plus a user/resource owner who
>>>>> delegates permissions to the client. In everyday use, 2LO is 'server
>>>>> to server' auth with out of band permissions and user identity and 3LO
>>>>> involves an individual grant where the user's grant is identified by a
>>>>> token given to the client and passed to the server on access. Another
>>>>> way to look at it is 2LO is just HTTP request signing.
>>>>>
>>>>> davep
>>>>>
>>>>> On Mon, Feb 21, 2011 at 4:45 PM, Phil Hunt<phil.hunt@oracle.com>   wrote:
>>>>>> FYI. I published a blog post with a flow-chart explaining the legs of OAuth.
>>>>>> http://independentidentity.blogspot.com/2011/02/does-oauth-have-
>>>> legs.
>>>>>> html
>>>>>>
>>>>>> Please let me know if any corrections should be made, or for that matter,
>>>> any improvements!
>>>>>> Phil
>>>>>> phil.hunt@oracle.com
>>>>>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From torsten@lodderstedt.net  Wed Mar 23 13:50:24 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D5DE33A68D7 for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 13:50:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.215
X-Spam-Level: 
X-Spam-Status: No, score=-2.215 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5n5+JMLqUG5R for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 13:50:23 -0700 (PDT)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.31.35]) by core3.amsl.com (Postfix) with ESMTP id 2DE373A68D6 for <oauth@ietf.org>; Wed, 23 Mar 2011 13:50:22 -0700 (PDT)
Received: from [87.142.248.208] (helo=[192.168.71.49]) by smtprelay01.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Q2V23-0002ct-SJ; Wed, 23 Mar 2011 21:51:55 +0100
Message-ID: <4D8A5D6B.6040003@lodderstedt.net>
Date: Wed, 23 Mar 2011 21:51:55 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net>
In-Reply-To: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net>
Content-Type: multipart/alternative; boundary="------------090802000401010301070803"
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 20:50:24 -0000

This is a multi-part message in MIME format.
--------------090802000401010301070803
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Here are my comments on this draft:

I repeat my proposal to name the URI parameter for passing the token 
"bearer_token" instead of "oauth_token". The same applies to the 
respective body parameter. This is more inline with the I-D's terminology.

section 2.4

"If the protected resource request does not include authentication
    credentials, contains an invalid access token, or is malformed, the
    resource server MUST include the HTTP "WWW-Authenticate" response
    header field. "

If the request is malformed, I would expect the resource server to 
respond with status code 400 (w/o WWW-Authenticate header).

What is the meaning of the component "( token "=" ( token / 
quoted-string ) )" in the definiton of the rule "param"?

"The "scope" attribute MUST NOT appear more than once."

Is the scope optional?

section 2.4.1

I don't see the benefit of those error codes as they replicate the 
meaning of HTTP status codes 400, 401, and 403.

section 3.1

"Token redirect" - does this also cover the threat of a counterfeit 
server phishing and abusing tokens 
(https://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.6.4)? 


"Second,
    confidentiality protection of the exchanges between the client and
    the authorization server and between the client and the resource
    server MUST be applied"

I would suggest to add ", e.g. by using TLS".

I would furthermore suggest to add the following paragraph to this section:

Token abuse by counterfeit server: Clients SHOULD not make authenticated 
requests with an access
       token to unfamiliar resource servers, regardless of the presence
       of a secure channel.  If the resource server address is well-known
       to the client, it MUST authenticate the resource servers by using 
HTTPS server authentication prior sending the request.

section 3.3

"Don't store bearer tokens in cookies As cookies are generally sent in 
the clear, implementations MUST NOT store bearer tokens within
       them."

Every cookie can be declared to be send over encrypted channels only. 
Moreover, it is subject to a same origin policy. So what is the threat 
here? Is it about the storage in the clear?

"Instead, pass browser tokens in message bodies for which confidentiality
       measures are taken."

I suggest to add "authorization headers or" before message bodies.

regards,
Torsten.

Am 02.03.2011 09:31, schrieb Hannes Tschofenig:
> This is a Last Call for comments on
>
> http://www.ietf.org/id/draft-ietf-oauth-v2-bearer-03.txt
>
> Please have your comments in no later than March 25 (extended deadline because of the ongoing OAuth base specification WGLC).
>
> Do remember to send a note in if you have read the document and have no
> other comments other than "its ready to go" - we need those as much as we need "I found a problem".
>
> Thanks!
> Hannes&  Blaine
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--------------090802000401010301070803
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#ffffff" text="#000000">
    Here are my comments on this draft:<br>
    <br>
    I repeat my proposal to name the URI parameter for passing the token
    "bearer_token" instead of "oauth_token". The same applies to the
    respective body parameter. This is more inline with the I-D's
    terminology.<br>
    <br>
    section 2.4<br>
    <br>
    "If the protected resource request does not include authentication<br>
    &nbsp;&nbsp; credentials, contains an invalid access token, or is malformed,
    the<br>
    &nbsp;&nbsp; resource server MUST include the HTTP "WWW-Authenticate" response<br>
    &nbsp;&nbsp; header field. "<br>
    <br>
    If the request is malformed, I would expect the resource server to
    respond with status code 400 (w/o WWW-Authenticate header).<br>
    <br>
    What is the meaning of the component "( token "=" ( token /
    quoted-string ) )" in the definiton of the rule "param"?<br>
    <br>
    "The "scope" attribute MUST NOT appear more than once."&nbsp; <br>
    <br>
    Is the scope optional?<br>
    <br>
    section 2.4.1<br>
    <br>
    I don't see the benefit of those error codes as they replicate the
    meaning of HTTP status codes 400, 401, and 403.<br>
    <br>
    section 3.1<br>
    <br>
    "Token redirect" - does this also cover the threat of a counterfeit
    server phishing and abusing tokens
    (<a class="moz-txt-link-freetext" href="https://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.6.4">https://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.6.4</a>)?
    <br>
    <br>
    "Second,<br>
    &nbsp;&nbsp; confidentiality protection of the exchanges between the client
    and<br>
    &nbsp;&nbsp; the authorization server and between the client and the resource<br>
    &nbsp;&nbsp; server MUST be applied" <br>
    <br>
    I would suggest to add ", e.g. by using TLS".<br>
    <br>
    I would furthermore suggest to add the following paragraph to this
    section:<br>
    <br>
    Token abuse by counterfeit server: Clients SHOULD not make
    authenticated requests with an access<br>
    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; token to unfamiliar resource servers, regardless of the
    presence<br>
    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; of a secure channel.&nbsp; If the resource server address is
    well-known<br>
    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to the client, it MUST authenticate the resource servers by
    using HTTPS server authentication prior sending the request.<br>
    <br>
    section 3.3<br>
    <br>
    <!-- Cookies can be declared to be send over HTTPS only. So what is the meaning of this? -->"Don't
    store bearer tokens in cookies As cookies are generally sent in the
    clear, implementations MUST NOT store bearer tokens within<br>
    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; them."&nbsp;&nbsp;&nbsp; <br>
    <br>
    Every cookie can be declared to be send over encrypted channels
    only. Moreover, it is subject to a same origin policy. So what is
    the threat here? Is it about the storage in the clear?<br>
    <br>
    "Instead, pass browser tokens in message bodies for which
    confidentiality<br>
    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; measures are taken." <br>
    <br>
    I suggest to add "authorization headers or" before message bodies.<br>
    <br>
    regards,<br>
    Torsten.<br>
    <br>
    Am 02.03.2011 09:31, schrieb Hannes Tschofenig:
    <blockquote cite="mid:3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net"
      type="cite">
      <pre wrap="">This is a Last Call for comments on 

<a class="moz-txt-link-freetext" href="http://www.ietf.org/id/draft-ietf-oauth-v2-bearer-03.txt">http://www.ietf.org/id/draft-ietf-oauth-v2-bearer-03.txt</a>

Please have your comments in no later than March 25 (extended deadline because of the ongoing OAuth base specification WGLC).

Do remember to send a note in if you have read the document and have no 
other comments other than "its ready to go" - we need those as much as we need "I found a problem".

Thanks!
Hannes &amp; Blaine
_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
  </body>
</html>

--------------090802000401010301070803--

From stpeter@stpeter.im  Wed Mar 23 14:25:59 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AF36F3A6856 for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 14:25:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.59
X-Spam-Level: 
X-Spam-Status: No, score=-102.59 tagged_above=-999 required=5 tests=[AWL=0.009, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cSuTKW39pOuP for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 14:25:58 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 3BC693A676A for <oauth@ietf.org>; Wed, 23 Mar 2011 14:25:58 -0700 (PDT)
Received: from leavealone.cisco.com (72-163-0-129.cisco.com [72.163.0.129]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id A65BD40022 for <oauth@ietf.org>; Wed, 23 Mar 2011 15:28:41 -0600 (MDT)
Message-ID: <4D8A65BF.7060506@stpeter.im>
Date: Wed, 23 Mar 2011 15:27:27 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
In-Reply-To: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms030409040300010902000208"
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 21:25:59 -0000

This is a cryptographically signed message in MIME format.

--------------ms030409040300010902000208
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<hat type=3D'AD'/>

On 3/2/11 12:32 AM, Hannes Tschofenig wrote:
> This is a Last Call for comments on=20
>=20
> http://www.ietf.org/id/draft-ietf-oauth-v2-13.txt
>=20
> Please have your comments in no later than March 16.
>=20
> Do remember to send a note in if you have read the document and have no=
=20
> other comments other than "its ready to go" - we need those as much as =
we need "I found a problem".
>=20
> Thanks!
> Hannes & Blaine

Sorry about the late comments.

Overall the spec is much improved from the last time I read it.
Naturally we all await the addition of the security considerations
section, so I won't comment on those aspects until I've had a chance to
read draft-lodderstedt-oauth-security in the next few days. Also I won't
comment on aspects that others have raised in during WGLC. Here are a
few additional points...

1. I think it would help in the Introduction to state specifically that
this protocol is designed for use on the web and with HTTP (i.e., use
with other application protocols is out of scope).

2. I find the concept of "implicit grant" to be a bit foggy in Section
1.4.2. A forward reference to Section 4.2 might help. (Also, it would be
good to reference draft-ietf-websec-origin from Section 4.2.)

3. In the definition of "token endpoint" in Section 2, should "used to
exchange an authorization grant for an access token" be "used to
exchange an authorization grant or refresh token for an access token"?

4. In Section 2.1, a reference to RFC 2616 would be nice at
"authorization server MUST support the use of the HTTP "GET" method".

5. Section 3 states:

   The authorization server SHOULD NOT issue client credentials to
   clients incapable of keeping their secrets confidential.

How does the authorization server know that a client is not capable of
keeping its secrets confidential?

6. Section 3.2 states:

   In cases where client password authentication is not suitable or
   sufficient, the authorization server MAY support other existing HTTP
   authentication schemes or define new methods.

What is meant by "new methods"?

7. The various subsections of Section 4 have lots of repeated text for
the parameter definitions (e.g., "client_id" and "scope", as well as the
error codes). I think it would be cleaner to define these once and
reference those definitions throughout the spec.

8. The various subsections of Section 4 also provide conflicting
information about various parameter values. For example, Section 4.1.1
says of "response_type" that it "MUST be set to "code"" whereas Section
4.2.1 says "MUST be set to "token"". It would reduce the possibility of
confusion to say "When the request is an authorization request, the
response_type MUST be set to "code"" or somesuch.

9. What is the expected lifetime of access tokens? Does it make sense to
have expires_at (in UTC) instead of, or in addition to, expires_in (a
number of seconds)?

10. In Section 4.3.2 there is an open issue regarding
internationalization of the client's username and password. What is the
current thinking about a resolution?

11. In Section 5.1, a reference to RFC 2616 would be good regarding the
HTTP "Cache-Control" response header field.

12. In Section 7, a reference to RFC 2671 would be good regarding the
HTTP "Authorization" request header.

13. In Section 8.2, are we really recommending "x_"? I must finish work
on draft-saintandre-xdash-considered-harmful...

14. In Sections 10.1 and 10.2, I'm uncomfortable with this text:

   Before a period of 14 days has passed, the Designated Expert(s) will
   either approve or deny the registration request, communicating this
   decision both to the review list and to IANA.  Denials should include
   an explanation and, if applicable, suggestions as to how to make the
   request successful.  Registration requests that are undetermined for
   a period longer than 21 days can be brought to the IESG's attention
   (using the iesg@iesg.org mailing list) for resolution.

I suggest that we re-use the text from RFC 5988:

   Within at most 14 days of the request, the Designated Expert(s) will
   either approve or deny the registration request, communicating this
   decision to the review list and IANA.  Denials should include an
   explanation and, if applicable, suggestions as to how to make the
   request successful.

   Decisions (or lack thereof) made by the Designated Expert can be
   first appealed to Application Area Directors (contactable using
   app-ads@tools.ietf.org email address or directly by looking up their
   email addresses on http://www.iesg.org/ website) and, if the
   appellant is not satisfied with the response, to the full IESG (using
   the iesg@iesg.org mailing list).

15. Section 10.2.1 says:

   Parameter usage location:
      The location(s) where parameter can be used.  The possible
      locations are: authorization request, authorization response,
      token request, or token response.

Are those the only allowable locations? I notice that the bearer token
spec adds a locations of "resource request" and "resource response". I'm
not quite saying we need a registry of locations, but it might be good
to have a well-defined way of adding to the list of allowable locations
(otherwise a document like the bearer spec might need to say that it
updates the base spec).

16. In Section 11.1, I think RFC 2616 needs to be a normative reference.

That's it for now!

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms030409040300010902000208
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms030409040300010902000208--

From bcampbell@pingidentity.com  Wed Mar 23 14:38:51 2011
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D57A13A6934 for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 14:38:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.177
X-Spam-Level: 
X-Spam-Status: No, score=-5.177 tagged_above=-999 required=5 tests=[AWL=0.800,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RfBKc4W9hZJB for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 14:38:46 -0700 (PDT)
Received: from na3sys009aog114.obsmtp.com (na3sys009aog114.obsmtp.com [74.125.149.211]) by core3.amsl.com (Postfix) with ESMTP id 4DDED3A68B5 for <oauth@ietf.org>; Wed, 23 Mar 2011 14:38:44 -0700 (PDT)
Received: from source ([209.85.161.54]) (using TLSv1) by na3sys009aob114.postini.com ([74.125.148.12]) with SMTP ID DSNKTYpowh267bvecDjNMbedpkDxZYjXarKJ@postini.com; Wed, 23 Mar 2011 14:40:20 PDT
Received: by mail-fx0-f54.google.com with SMTP id 11so9387059fxm.13 for <oauth@ietf.org>; Wed, 23 Mar 2011 14:40:18 -0700 (PDT)
Received: by 10.223.86.200 with SMTP id t8mr6717613fal.26.1300916376180; Wed, 23 Mar 2011 14:39:36 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.70.142 with HTTP; Wed, 23 Mar 2011 14:38:57 -0700 (PDT)
In-Reply-To: <4D8A283E.4050502@stpeter.im>
References: <389C0727-A69C-4C4B-BB60-53E1172A88AE@gmx.net> <4D8A283E.4050502@stpeter.im>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Wed, 23 Mar 2011 15:38:57 -0600
Message-ID: <AANLkTinE1EGEJxaBLewp4rqs7T2eSaWj_ezD4uzaCsVd@mail.gmail.com>
To: Peter Saint-Andre <stpeter@stpeter.im>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-saml2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 21:38:51 -0000

Thank for the review and comment, Peter, some replies and new
questions are inline below.

On Wed, Mar 23, 2011 at 11:05 AM, Peter Saint-Andre <stpeter@stpeter.im> wr=
ote:
> I've completed a review of this spec, the bearer token spec, and the
> base spec. This is the first WGLC message I found in my inbox, so I'm
> posting about this spec first. :)
>
> Overall I think this short spec is in fine shape. I have a few small
> comments.
>
> 1. The grant type is a URI at oauth.net. Is that a stable URI? Does it
> need to be?

I honestly don't know the answer to either question.  I certainly
don't own the domain.  I needed *some* URI to identify the grant type
and, for lack of knowing any better, just used http://oauth.net as it
seemed semi-appropriate and threw on a path that sort of described
what it was.  I think I might even asked you about it early on in this
process and gotten a "it's fine for now" type of response :)  Perhaps
that now is over and it needs to be something else?

> We could define a new URN parameters registry for grant types that are
> defined in standards-track RFCs:
>
> http://www.iana.org/assignments/params/params.xml
>
> However, that might be perceived as overkill.

That does seem a bit overkill but I don't know.  Is there some middle groun=
d?

> 2. Both the SAML-bearer and v2-bearer specs borrow text from the base
> spec when a reference seems better. For example, in Section 2.1 of the
> SAML-bearer spec we find this:
>
> =A0 scope
> =A0 =A0 =A0 =A0 OPTIONAL. =A0The scope of the access request is expressed=
 as a
> =A0 =A0 =A0 =A0 list of space-delimited strings. =A0The value is defined =
by the
> =A0 =A0 =A0 =A0 authorization server. =A0If the value contains multiple s=
pace-
> =A0 =A0 =A0 =A0 delimited strings, their order does not matter, and each =
string
> =A0 =A0 =A0 =A0 adds an additional access range to the requested scope.
>
> However, that's already defined in Section 4.1.1 of the base spec:
>
> =A0 scope
> =A0 =A0 =A0 =A0 OPTIONAL. =A0The scope of the access request expressed as=
 a list
> =A0 =A0 =A0 =A0 of space-delimited strings. =A0The value is defined by th=
e
> =A0 =A0 =A0 =A0 authorization server. =A0If the value contains multiple s=
pace-
> =A0 =A0 =A0 =A0 delimited strings, their order does not matter, and each =
string
> =A0 =A0 =A0 =A0 adds an additional access range to the requested scope.
>
> I think it would be better to reference the definitions in the base spec
> so that they don't get out of sync.

Up though -12 of the base spec, this spec did use that definition of
the scope parameter from the base spec.  In those earlier versions,
all the base parameters for the token endpoint were defined in one
place and it was very natural to 'inherit' scope from it.  The way the
base spec was reorganized in -13 made that inheritance awkward because
each individual type of request redefines all the parameters.  In
fact, in the base spec, that exact text is repeated in three or four
places and slight variations of it show up in several other paces.
Generally, I think the re-org made it more readable but it also
resulted in more such duplication.

Anyway, I digress. Is it reasonable/possible to reference the
definition in the base spec when the definition is the same but the
context of use is a little off? Can you suggest some text? Or point me
to an I-D/RFC that has done something similar?


> 3. Regarding "invalid_grant" in Section 2.3, I'll post in the thread
> about a possible registry of error parameter values.

I'm trying to stay out of the debate regarding additional registries:)
 But I will say that, from the perspective of this specification, I
think that the top level "invalid_grant" error code with optionally
more descriptive content in the error_description parameter is
probably sufficient.

From tonynad@microsoft.com  Wed Mar 23 15:10:31 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0DEB93A63CB for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 15:10:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.372
X-Spam-Level: 
X-Spam-Status: No, score=-7.372 tagged_above=-999 required=5 tests=[AWL=0.094,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sZVa37qFeZv8 for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 15:10:17 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 984943A63C9 for <oauth@ietf.org>; Wed, 23 Mar 2011 15:10:17 -0700 (PDT)
Received: from TK5EX14MLTC101.redmond.corp.microsoft.com (157.54.79.178) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Wed, 23 Mar 2011 15:11:49 -0700
Received: from DB3EHSOBE003.bigfish.com (157.54.51.114) by mail.microsoft.com (157.54.79.178) with Microsoft SMTP Server (TLS) id 14.1.270.2; Wed, 23 Mar 2011 15:11:49 -0700
Received: from mail64-db3-R.bigfish.com (10.3.81.241) by DB3EHSOBE003.bigfish.com (10.3.84.23) with Microsoft SMTP Server id 14.1.225.8; Wed, 23 Mar 2011 22:11:43 +0000
Received: from mail64-db3 (localhost.localdomain [127.0.0.1])	by mail64-db3-R.bigfish.com (Postfix) with ESMTP id 4DA991AA028D	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Wed, 23 Mar 2011 22:11:43 +0000 (UTC)
X-SpamScore: -47
X-BigFish: PS-47(zz936eK98dN4015L328cM9371PzzdafM1202h1082kzz8275bh8275dh1033ILd311fiz31h2a8h668h)
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT001.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail64-db3 (localhost.localdomain [127.0.0.1]) by mail64-db3 (MessageSwitch) id 1300918290357952_18240; Wed, 23 Mar 2011 22:11:30 +0000 (UTC)
Received: from DB3EHSMHS009.bigfish.com (unknown [10.3.81.246])	by mail64-db3.bigfish.com (Postfix) with ESMTP id 84F7D16281B6; Wed, 23 Mar 2011 22:11:09 +0000 (UTC)
Received: from SN1PRD0302HT001.namprd03.prod.outlook.com (65.55.94.9) by DB3EHSMHS009.bigfish.com (10.3.87.109) with Microsoft SMTP Server (TLS) id 14.1.225.8; Wed, 23 Mar 2011 22:11:04 +0000
Received: from SN1PRD0302MB100.namprd03.prod.outlook.com ([169.254.10.146]) by SN1PRD0302HT001.namprd03.prod.outlook.com ([10.14.149.47]) with mapi id 14.01.0225.027; Wed, 23 Mar 2011 22:10:59 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, Phil Hunt <phil.hunt@oracle.com>,  "Manger, James H" <James.H.Manger@team.telstra.com>
Thread-Topic: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
Thread-Index: Acvn58EM+JExiW6yQkawESD8X4iCRgAEF9CAAAo7B4AAB6YDgAACpPYAACHqsyAABvdrQAAjht5A
Date: Wed, 23 Mar 2011 22:10:58 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E70EB9C6B2@SN1PRD0302MB100.namprd03.prod.outlook.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com> <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com> <3DA41CB6-5E24-4D46-9703-C04FAF4D9571@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432EF4@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E70B6C2893@SN1PRD0302MB097.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234464F433192@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F433192@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [131.107.0.107]
Content-Type: multipart/alternative; boundary="_000_B26C1EF377CB694EAB6BDDC8E624B6E70EB9C6B2SN1PRD0302MB100_"
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT001.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%HUENIVERSE.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%ORACLE.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%TEAM.TELSTRA.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14MLTC101.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14MLTC101.redmond.corp.microsoft.com
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 22:10:31 -0000

--_000_B26C1EF377CB694EAB6BDDC8E624B6E70EB9C6B2SN1PRD0302MB100_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Not ignoring points made along the way as there are points from each view p=
oint, and not sure it's counterproductive to state the issues and what is d=
riving the issues on a single list. So let's move on.

I don't believe that there is anything wrong in combining into a single reg=
istry, as this has been done in other specifications. I don't believe that =
HTTP status codes can convey all the information that may be needed by the =
client, you may be able to shoehorn all into the three but that is a disser=
vice to the poor client who may have to figure these codes out.

What I'm hearing is that some folks feel that we will ever have any OAuth E=
xtensions and anything that extends OAuth can do whatever it likes and we d=
on't want to have any conventions dictated by the base.

From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]
Sent: Tuesday, March 22, 2011 9:52 PM
To: Anthony Nadalin; Phil Hunt; Manger, James H
Cc: oauth@ietf.org
Subject: RE: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

These are separate issues and collapsing them into one list is counterprodu=
ctive (not to mention ignoring many useful points made along the way). What=
 made this entire topic a mess is the original error registry proposal incl=
uded in the bearer token specification which conflated completely different=
 things into one useless registry.

Regarding the v2 specification:

- Should the error codes defined in sections 4.2.2.1 and 5.2 be extensible?

There is agreement that some extensibility is needed. The open question is =
whether such extensibility should be combined with the existing parameter e=
xtension registry or not. The reason for combining it with the existing reg=
istry is that so far, the only valid use case raised on the list was for de=
fining extension-specific errors such as 'unknown display type' for the UX =
extension.

Regarding the bearer token and MAC token specifications:

- Should these specification define error codes beyond the HTTP status code=
 returned (400, 401, 403)?

James Manger and I argue that given that there are three error conditions a=
nd three corresponding codes, there is no point in defining additional erro=
r codes. The HTTP status provides the client with all the information it ne=
eds. Others argue that they need finer error codes for cases such as token =
expiration (which is covered by 401).

- Should the error codes defined for the bearer token specification be exte=
nsible?

Since the MAC specification does not define additional error code and does =
not allow for any extensibility which can alter the protocol behavior (and =
generate additional error states), no error extensibility is needed. Bearer=
 token specification defines an error registry but does not offer any use c=
ases or requirements for such theoretical scenario.

- Should the bearer token and MAC token specification share an error regist=
ry, error response, header format, etc.?

The two specification are dramatically different and each has its own set o=
f utilization methods, terminology, and errors. In addition, the MAC specif=
ication extends OAuth but is not an OAuth extension. OAuth extensions are s=
pecifications directly affecting the process of obtaining tokens, not using=
 tokens.

EHL



From: Anthony Nadalin [mailto:tonynad@microsoft.com]<mailto:[mailto:tonynad=
@microsoft.com]>
Sent: Tuesday, March 22, 2011 2:32 PM
To: Eran Hammer-Lahav; Phil Hunt; Manger, James H
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: RE: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

There seems to be some basic disagreements;


(1)    The various token specifications standalone (e.g. draft-ietf-oauth-v=
2-bearer-03, etc.) and are not extensions to draft-ietf-oauth-v2-xx and hav=
e no need to have common error messages/codes

(2)    Errors in draft-ietf-oauth-v2-xx are final and we don't see a need t=
o have a mechanism to add additional ones because of #(1)

(3)    We want to put a burden on the clients to have to deal with all the =
various error messages/codes from the different token profiles and the clie=
nt has to figure this out

Given the above I'm not sure why we have a registry for the parameters, see=
ms incionsistent.


From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org]<mailto:[mailto:oauth-bounces@ietf.org]> On Behalf Of Eran =
Hammer-Lahav
Sent: Monday, March 21, 2011 9:33 PM
To: Phil Hunt; Manger, James H
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

There are two separate issues here which Mike's latest draft conflated into=
 one.

Issues 1:

The v2 specification currently does not allow for defining additional error=
 codes to the authorization and token endpoints. The only way to define add=
itional error codes is by updating the RFC (once published). Updating an RF=
C is an acceptable way of extending an existing specification, but only if =
it is done very infrequently. The other two options are to allow URI-format=
ted error code, or define a registry.

In any case, all three extensibility model have a single purpose - to reduc=
e the likelihood of an error code name collision. It does not improve inter=
operability unless clients actually implement the additional codes. The goa=
l of the v2 specification must be to cover all possible scenarios so that a=
 client implementing nothing but these codes will be able to handle error c=
ases related to this specification.

After a long discussion, the only valid use case to arise is the one in whi=
ch an extension such as the UX specification (providing a way for the clien=
t to specify the display size of the authorization web page for various dev=
ices) needs additional codes. For example, the UX specification defines the=
 'display' authorization request parameter. If the client provides bad valu=
e, the server may want to return an error specific to this situation.

The open issue is how to address this use case. Since such additional error=
 codes are always a result of an additional request parameter, I am looking=
 for a way to allow parameter registration to specify such related error co=
des without defining yet another registry. This solution is specific to the=
 only use case we have. Defining an error registry is likely to do more har=
m than good, encouraging developers to define new generic error codes that =
are not extension-specific which will only reduce interoperability.

Issue 2:

The bearer token specification includes registration requirements for prote=
cted resource request parameters as well as potential error codes when a pr=
otected resource request fails. A few people have strongly objected to this=
 new proposal since the semantics of the protected resource request is by d=
efinition, outside the scope of any OAuth specification.

The only parameter allowed to infringe on the resource server namespace is =
the currently named 'oauth_token' parameter. There is an ongoing discussion=
 to renamed it to 'bearer_token'.

Hope this helps.

EHL


From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org]<mailto:[mailto:oauth-bounces@ietf.org]> On Behalf Of Phil =
Hunt
Sent: Monday, March 21, 2011 8:17 PM
To: Manger, James H
Cc: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry

I'm still not understanding why each RFC (e.g. the bearer spec) can't defin=
e its own error codes. If you were to support the bearer token RFC, then yo=
u obviously understand the normative errors. I'm just not getting what the =
value of a central "OAuth" registry is.

An OAuth registry also unnecessarily limits possibility of re-use of token =
schemes in other frameworks outside of OAuth or conversely limits the abili=
ty to use tokens (such as kerberos) in an OAuth "framework".

So again, I ask what the benefit of a registry is achieved that could not b=
e achieved within the token spec itself.

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>



On 2011-03-21, at 4:38 PM, Manger, James H wrote:

The bearer spec defines 3 errors (invalid_request, invalid_token, insuffici=
ent_scope), which accompany 3 different status codes (400 Bad request, 401 =
Unauthorized, 403 Forbidden respectively).
Client apps are probably better off switching behaviour based on the HTTP s=
tatus code, and ignoring the error string (perhaps put it in a log, or on a=
 debug console so a developer can see it).

It seems like overkill to have:
*         An HTTP status code (eg 401)
*         An HTTP status message (eg Unauthorized)
*         An error string (eg invalid_token)
*         An error_description (eg token is formatted incorrectly)
*         An error_uri (eg http://api.example.com/error/45)
*         The body of the HTTP response (eg an HTML page with extensive det=
ails about the error and links to the API documentation)

6 sources of error information -- and all for a bearer token that is usuall=
y opaque to the client app!

Encouraging new error strings to be defined - by having a registry for them=
 - is not ideal. Client apps that don't recognize a value learn nothing. At=
 least with HTTP status codes a client app knows the class of error (eg 4xx=
 or 5xx) and can behave accordingly even if it doesn't recognize the specif=
ic value (eg 538).

I'd vote for F) ditch error string/description/uri for the BEARER HTTP auth=
entication scheme.

--
James Manger


On 2011-03-21, at 9:48 AM, Mike Jones wrote:

People voted as follows in the poll I conducted on the OAuth Errors Registr=
y:

For A:
                Mike Jones
                Igor Faynberg
                Justin Richter
                Anthony Nadalin

For D or C:
                Eran Hammer-Lahav
                William Mills

Given that twice as many people indicated a preference for A as for any oth=
er option, that seems to indicate a consensus for A.  Therefore Eran, when =
you update your draft, can you please proceed on that basis?

                                                                Thanks,
                                                                -- Mike


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_B26C1EF377CB694EAB6BDDC8E624B6E70EB9C6B2SN1PRD0302MB100_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle22
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle23
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:317656718;
	mso-list-type:hybrid;
	mso-list-template-ids:462079574 1659432422 67698713 67698715 67698703 6769=
8713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-text:"\(%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Not ignoring points made =
along the way as there are points from each view point, and not sure it&#82=
17;s counterproductive to state the issues and what is driving
 the issues on a single list. So let&#8217;s move on.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I don&#8217;t believe tha=
t there is anything wrong in combining into a single registry, as this has =
been done in other specifications. I don&#8217;t believe that HTTP status
 codes can convey all the information that may be needed by the client, you=
 may be able to shoehorn all into the three but that is a disservice to the=
 poor client who may have to figure these codes out.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">What I&#8217;m hearing is=
 that some folks feel that we will ever have any OAuth Extensions and anyth=
ing that extends OAuth can do whatever it likes and we don&#8217;t want
 to have any conventions dictated by the base.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Eran Ham=
mer-Lahav [mailto:eran@hueniverse.com]
<br>
<b>Sent:</b> Tuesday, March 22, 2011 9:52 PM<br>
<b>To:</b> Anthony Nadalin; Phil Hunt; Manger, James H<br>
<b>Cc:</b> oauth@ietf.org<br>
<b>Subject:</b> RE: [OAUTH-WG] Apparent consensus on OAuth Errors Registry<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">These are separate issues=
 and collapsing them into one list is counterproductive (not to mention ign=
oring many useful points made along the way). What made
 this entire topic a mess is the original error registry proposal included =
in the bearer token specification which conflated completely different thin=
gs into one useless registry.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Regarding the v2 specific=
ation:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">- Should the error codes =
defined in sections 4.2.2.1 and 5.2 be extensible?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There is agreement that s=
ome extensibility is needed. The open question is whether such extensibilit=
y should be combined with the existing parameter extension
 registry or not. The reason for combining it with the existing registry is=
 that so far, the only valid use case raised on the list was for defining e=
xtension-specific errors such as &#8216;unknown display type&#8217; for the=
 UX extension.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Regarding the bearer toke=
n and MAC token specifications:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">- Should these specificat=
ion define error codes beyond the HTTP status code returned (400, 401, 403)=
?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">James Manger and I argue =
that given that there are three error conditions and three corresponding co=
des, there is no point in defining additional error codes.
 The HTTP status provides the client with all the information it needs. Oth=
ers argue that they need finer error codes for cases such as token expirati=
on (which is covered by 401).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">- Should the error codes =
defined for the bearer token specification be extensible?<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Since the MAC specificati=
on does not define additional error code and does not allow for any extensi=
bility which can alter the protocol behavior (and generate
 additional error states), no error extensibility is needed. Bearer token s=
pecification defines an error registry but does not offer any use cases or =
requirements for such theoretical scenario.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">- Should the bearer token=
 and MAC token specification share an error registry, error response, heade=
r format, etc.?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The two specification are=
 dramatically different and each has its own set of utilization methods, te=
rminology, and errors. In addition, the MAC specification
 extends OAuth but is not an OAuth extension. OAuth extensions are specific=
ations directly affecting the process of obtaining tokens, not using tokens=
.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">EHL<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Anthony =
Nadalin
<a href=3D"mailto:[mailto:tonynad@microsoft.com]">[mailto:tonynad@microsoft=
.com]</a>
<br>
<b>Sent:</b> Tuesday, March 22, 2011 2:32 PM<br>
<b>To:</b> Eran Hammer-Lahav; Phil Hunt; Manger, James H<br>
<b>Cc:</b> <a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br>
<b>Subject:</b> RE: [OAUTH-WG] Apparent consensus on OAuth Errors Registry<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There seems to be some ba=
sic disagreements;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">(1)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">The various token=
 specifications standalone (e.g. draft-ietf-oauth-v2-bearer-03, etc.) and a=
re not extensions to draft-ietf-oauth-v2-xx and have no
 need to have common error messages/codes<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">(2)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Errors in draft-i=
etf-oauth-v2-xx are final and we don&#8217;t see a need to have a mechanism=
 to add additional ones because of #(1)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo2"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">(3)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbs=
p;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">We want to put a =
burden on the clients to have to deal with all the various error messages/c=
odes from the different token profiles and the client
 has to figure this out<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Given the above I&#8217;m=
 not sure why we have a registry for the parameters, seems incionsistent.<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> <a hre=
f=3D"mailto:[mailto:oauth-bounces@ietf.org]">
[mailto:oauth-bounces@ietf.org]</a> <b>On Behalf Of </b>Eran Hammer-Lahav<b=
r>
<b>Sent:</b> Monday, March 21, 2011 9:33 PM<br>
<b>To:</b> Phil Hunt; Manger, James H<br>
<b>Cc:</b> <a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br>
<b>Subject:</b> Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There are two separate is=
sues here which Mike&#8217;s latest draft conflated into one.<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Issues 1:<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The v2 specification curr=
ently does not allow for defining additional error codes to the authorizati=
on and token endpoints. The only way to define additional
 error codes is by updating the RFC (once published). Updating an RFC is an=
 acceptable way of extending an existing specification, but only if it is d=
one very infrequently. The other two options are to allow URI-formatted err=
or code, or define a registry.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">In any case, all three ex=
tensibility model have a single purpose &#8211; to reduce the likelihood of=
 an error code name collision. It does not improve interoperability
 unless clients actually implement the additional codes. The goal of the v2=
 specification must be to cover all possible scenarios so that a client imp=
lementing nothing but these codes will be able to handle error cases relate=
d to this specification.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">After a long discussion, =
the only valid use case to arise is the one in which an extension such as t=
he UX specification (providing a way for the client to specify
 the display size of the authorization web page for various devices) needs =
additional codes. For example, the UX specification defines the &#8216;disp=
lay&#8217; authorization request parameter. If the client provides bad valu=
e, the server may want to return an error specific
 to this situation.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The open issue is how to =
address this use case. Since such additional error codes are always a resul=
t of an additional request parameter, I am looking for a
 way to allow parameter registration to specify such related error codes wi=
thout defining yet another registry. This solution is specific to the only =
use case we have. Defining an error registry is likely to do more harm than=
 good, encouraging developers to
 define new generic error codes that are not extension-specific which will =
only reduce interoperability.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Issue 2:<o:p></o:p></span=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The bearer token specific=
ation includes registration requirements for protected resource request par=
ameters as well as potential error codes when a protected
 resource request fails. A few people have strongly objected to this new pr=
oposal since the semantics of the protected resource request is by definiti=
on, outside the scope of any OAuth specification.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The only parameter allowe=
d to infringe on the resource server namespace is the currently named &#821=
6;oauth_token&#8217; parameter. There is an ongoing discussion to renamed
 it to &#8216;bearer_token&#8217;.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hope this helps.<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">EHL<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> <a hre=
f=3D"mailto:[mailto:oauth-bounces@ietf.org]">
[mailto:oauth-bounces@ietf.org]</a> <b>On Behalf Of </b>Phil Hunt<br>
<b>Sent:</b> Monday, March 21, 2011 8:17 PM<br>
<b>To:</b> Manger, James H<br>
<b>Cc:</b> <a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a><br>
<b>Subject:</b> Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry<=
o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I'm still not understanding why each RFC (e.g. the b=
earer spec) can't define its own error codes. If you were to support the be=
arer token RFC, then you obviously understand the normative errors. I'm jus=
t not getting what the value of a
 central &quot;OAuth&quot; registry is. &nbsp;<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">An OAuth registry also unnecessarily limits possibil=
ity of re-use of token schemes in other frameworks outside of OAuth or conv=
ersely limits the ability to use tokens (such as kerberos) in an OAuth &quo=
t;framework&quot;.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">So again, I ask what the benefit of a registry is ac=
hieved that could not be achieved within the token spec itself.<o:p></o:p><=
/p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;;color:black">Phil<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"mailto:phil.hun=
t@oracle.com">phil.hunt@oracle.com</a><o:p></o:p></span></p>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span><=
/p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On 2011-03-21, at 4:38 PM, Manger, James H wrote:<o:=
p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">The bearer=
 spec defines 3 errors (invalid_request, invalid_token, insufficient_scope)=
, which accompany 3 different status codes (400 Bad request,
 401 Unauthorized, 403 Forbidden respectively).</span><span lang=3D"EN-AU">=
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Client app=
s are probably better off switching behaviour based on the HTTP status code=
, and ignoring the error string (perhaps put it in a log,
 or on a debug console so a developer can see it).</span><span lang=3D"EN-A=
U"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">It seems l=
ike overkill to have:</span><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">An
 HTTP status code (eg 401)</span><span lang=3D"EN-AU"><o:p></o:p></span></p=
>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">An
 HTTP status message (eg Unauthorized)</span><span lang=3D"EN-AU"><o:p></o:=
p></span></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">An
 error string (eg invalid_token)</span><span lang=3D"EN-AU"><o:p></o:p></sp=
an></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">An
 error_description (eg token is formatted incorrectly)</span><span lang=3D"=
EN-AU"><o:p></o:p></span></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">An
 error_uri (eg<span class=3D"apple-converted-space">&nbsp;</span><a href=3D=
"http://api.example.com/error/45">http://api.example.com/error/45</a>)</spa=
n><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span lang=3D"EN-AU" st=
yle=3D"font-size:11.0pt;font-family:Symbol;color:#1F497D">&middot;</span><s=
pan lang=3D"EN-AU" style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp=
;</span></span><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-family:&=
quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">The
 body of the HTTP response (eg an HTML page with extensive details about th=
e error and links to the API documentation)</span><span lang=3D"EN-AU"><o:p=
></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">6 sources =
of error information -- and all for a bearer token that is usually opaque t=
o the client app!</span><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Encouragin=
g new error strings to be defined &#8211; by having a registry for them &#8=
211; is not ideal. Client apps that don&#8217;t recognize a value learn not=
hing.
 At least with HTTP status codes a client app knows the class of error (eg =
4xx or 5xx) and can behave accordingly even if it doesn&#8217;t recognize t=
he specific value (eg 538).</span><span lang=3D"EN-AU"><o:p></o:p></span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">I&#8217;d =
vote for F) ditch error string/description/uri for the BEARER HTTP authenti=
cation scheme.</span><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">--</span><=
span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">James Mang=
er</span><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D">&nbsp;<=
/span><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</sp=
an><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU">On 2011-03-21, at 9:48 AM, Mike=
 Jones wrote:<o:p></o:p></span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span lang=3D"EN-AU">=
<o:p>&nbsp;</o:p></span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">People voted as follows in the poll I c=
onducted on the OAuth Errors Registry:</span><span lang=3D"EN-AU"><o:p></o:=
p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><span lang=3D"EN-AU"><o:p>=
</o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">For A:</span><span lang=3D"EN-AU"><o:p>=
</o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mike Jones</span><span =
lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Igor Faynberg</span><sp=
an lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Justin Richter</span><s=
pan lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Anthony Nadalin</span><=
span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span><span lang=3D"EN-=
AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">For D or C:</span><span lang=3D"EN-AU">=
<o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Eran Hammer-Lahav</span=
><span lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; William Mills</span><sp=
an lang=3D"EN-AU"><o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><span lang=3D"EN-AU"><o:p>=
</o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Given that twice as many people indicat=
ed a preference for A as for any other option, that seems to indicate a con=
sensus for A.&nbsp; Therefore Eran, when you update your draft,
 can you please proceed on that basis?</span><span lang=3D"EN-AU"><o:p></o:=
p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><span lang=3D"EN-AU"><o:p>=
</o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Thanks,</span><span lang=3D"EN-AU">=
<o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike</span><span lang=3D"EN-AU">=
<o:p></o:p></span></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;">&nbsp;</span><span lang=3D"EN-AU"><o:=
p></o:p></span></p>
</div>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU">&nbsp;<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"font-size:13.5pt;font-=
family:&quot;Helvetica&quot;,&quot;sans-serif&quot;">______________________=
_________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.or=
g/mailman/listinfo/oauth</a><o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_B26C1EF377CB694EAB6BDDC8E624B6E70EB9C6B2SN1PRD0302MB100_--

From eran@hueniverse.com  Wed Mar 23 15:29:09 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8ED963A63D3 for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 15:29:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.567
X-Spam-Level: 
X-Spam-Status: No, score=-2.567 tagged_above=-999 required=5 tests=[AWL=0.032,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RePHjZInrD6V for <oauth@core3.amsl.com>; Wed, 23 Mar 2011 15:29:08 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 199803A63D2 for <oauth@ietf.org>; Wed, 23 Mar 2011 15:29:06 -0700 (PDT)
Received: (qmail 24995 invoked from network); 23 Mar 2011 22:30:39 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 23 Mar 2011 22:30:39 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Wed, 23 Mar 2011 15:30:19 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Anthony Nadalin <tonynad@microsoft.com>, Phil Hunt <phil.hunt@oracle.com>,  "Manger, James H" <James.H.Manger@team.telstra.com>
Date: Wed, 23 Mar 2011 15:30:11 -0700
Thread-Topic: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
Thread-Index: Acvn58EM+JExiW6yQkawESD8X4iCRgAEF9CAAAo7B4AAB6YDgAACpPYAACHqsyAABvdrQAAjht5AAAr3OgA=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FBE8@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com> <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com> <3DA41CB6-5E24-4D46-9703-C04FAF4D9571@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432EF4@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E70B6C2893@SN1PRD0302MB097.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234464F433192@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E70EB9C6B2@SN1PRD0302MB100.namprd03.prod.outlook.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E70EB9C6B2@SN1PRD0302MB100.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Mar 2011 22:29:09 -0000

> -----Original Message-----
> From: Anthony Nadalin [mailto:tonynad@microsoft.com]
> Sent: Wednesday, March 23, 2011 3:11 PM

> I don't believe that there is anything wrong in combining into a single
> registry, as this has been done in other specifications.

There are very different endpoints with different extensibility models. Try=
ing to put protected resource endpoints in the same bucket as OAuth endpoin=
t is a violation of the protocol design.

> I don't believe that
> HTTP status codes can convey all the information that may be needed by th=
e
> client, you may be able to shoehorn all into the three but that is a diss=
ervice
> to the poor client who may have to figure these codes out.

Do you have actual use cases to support this?
=20
> What I'm hearing is that some folks feel that we will ever have any OAuth
> Extensions and anything that extends OAuth can do whatever it likes and w=
e
> don't want to have any conventions dictated by the base.

Hearing where? We already have OAuth extensions (not token types and scheme=
s but actual extensions to the OAuth endpoints).

The problem with the current registry proposal is that it is not backed by =
any requirements or use cases. After repeated requests, Mike Jones posted s=
ome examples which I replied to and demonstrated how they are invalid. I di=
dn't see any counter arguments.

Like most other disagreements we had, you offer vague and non-technical arg=
uments, ignore my extensive attempts at having a technical discussion, prov=
ide no concrete use cases or requirements, and try to get your point by mak=
ing sweeping declarations about it being 'unusable'.

Based on the requirements I presented to the group with regard to error cod=
e extensibility (using the UX extension example), I will draft a proposal a=
nd seek feedback.

EHL

From tonynad@microsoft.com  Thu Mar 24 14:13:58 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3FD4A28C143 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 14:13:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.38
X-Spam-Level: 
X-Spam-Status: No, score=-7.38 tagged_above=-999 required=5 tests=[AWL=0.087,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y9LMoL5IBuFr for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 14:13:57 -0700 (PDT)
Received: from smtp.microsoft.com (mailc.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id 3D6B828C0ED for <oauth@ietf.org>; Thu, 24 Mar 2011 14:13:57 -0700 (PDT)
Received: from TK5EX14MLTC101.redmond.corp.microsoft.com (157.54.79.178) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 24 Mar 2011 14:15:31 -0700
Received: from VA3EHSOBE008.bigfish.com (157.54.51.80) by mail.microsoft.com (157.54.79.178) with Microsoft SMTP Server (TLS) id 14.1.270.2; Thu, 24 Mar 2011 14:15:31 -0700
Received: from mail98-va3-R.bigfish.com (10.7.14.246) by VA3EHSOBE008.bigfish.com (10.7.40.28) with Microsoft SMTP Server id 14.1.225.8; Thu, 24 Mar 2011 21:14:37 +0000
Received: from mail98-va3 (localhost.localdomain [127.0.0.1])	by mail98-va3-R.bigfish.com (Postfix) with ESMTP id AD55D102862D	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Thu, 24 Mar 2011 21:14:37 +0000 (UTC)
X-SpamScore: -36
X-BigFish: PS-36(zz542N9371PzzdafM1202h1082kzz8275dh1033ILz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT003.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail98-va3 (localhost.localdomain [127.0.0.1]) by mail98-va3 (MessageSwitch) id 1301001277342285_2472; Thu, 24 Mar 2011 21:14:37 +0000 (UTC)
Received: from VA3EHSMHS008.bigfish.com (unknown [10.7.14.241])	by mail98-va3.bigfish.com (Postfix) with ESMTP id 1355BE80053; Thu, 24 Mar 2011 21:14:37 +0000 (UTC)
Received: from SN1PRD0302HT003.namprd03.prod.outlook.com (65.55.94.9) by VA3EHSMHS008.bigfish.com (10.7.99.18) with Microsoft SMTP Server (TLS) id 14.1.225.8; Thu, 24 Mar 2011 21:14:32 +0000
Received: from SN1PRD0302MB100.namprd03.prod.outlook.com ([169.254.10.146]) by SN1PRD0302HT003.namprd03.prod.outlook.com ([10.14.148.113]) with mapi id 14.01.0225.027; Thu, 24 Mar 2011 21:14:32 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, Phil Hunt <phil.hunt@oracle.com>,  "Manger, James H" <James.H.Manger@team.telstra.com>
Thread-Topic: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
Thread-Index: Acvn58EM+JExiW6yQkawESD8X4iCRgAEF9CAAAo7B4AAB6YDgAACpPYAACHqsyAABvdrQAAjht5AAAr3OgAAIyojAA==
Date: Thu, 24 Mar 2011 21:14:31 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E70EB9DEE3@SN1PRD0302MB100.namprd03.prod.outlook.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com> <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com> <3DA41CB6-5E24-4D46-9703-C04FAF4D9571@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432EF4@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E70B6C2893@SN1PRD0302MB097.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234464F433192@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E70EB9C6B2@SN1PRD0302MB100.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FBE8@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FBE8@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [131.107.0.107]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT003.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%HUENIVERSE.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%ORACLE.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%TEAM.TELSTRA.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14MLTC101.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14MLTC101.redmond.corp.microsoft.com
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 21:13:58 -0000

Amusing like your past rants but they don't help or offer solutions. We pro=
posed a solution in the bearer token specification, I have not seen you off=
er alternative to this proposal, so you're not being constructive here and =
trying to reach consensus. You don't agree with our use cases and requireme=
nts that we present, I can't help that.

>. Trying to put protected resource endpoints in the same bucket as OAuth e=
ndpoint is a violation of the protocol design.
Not a violation of protocol design, maybe in your mind it is.

> Do you have actual use cases to support this?
Yes, as pointed out there are many cases that the client needs or can have =
further information, and the HTTP Status codes don't cut it, like in the be=
arer token specification with "insufficient_scope", there is also the case =
authorization server is busy and the HTTP 503 Service Unavailable does not =
cut it but you want to let the requestor know to retry, as I indicated you =
can shoehorn all errors into just "invalid".=20

> The problem with the current registry proposal is that it is not backed b=
y any requirements or use cases. After repeated requests, Mike Jones posted=
 some examples which I replied to and demonstrated how they are invalid. I =
didn't see any counter arguments.
The registry proposal is backed by several requirements and use cases, (1) =
I don't believe that the errors defined in oauth-v2 are future proof; regis=
try provides a means to protect us here (2) There are no real processing re=
quirements in the oauth-v2 document thus the authorization server may need =
to provide additional errors that correspond with their processing rules.

> Like most other disagreements we had, you offer vague and non-technical a=
rguments
We actually have to make this stuff work, and why we had to go off and do W=
RAP as OAuth 1.0a was not meeting ours and others business needs, so techno=
logy or technical discussions are only part of the equation of our requirem=
ents.


-----Original Message-----
From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]=20
Sent: Wednesday, March 23, 2011 3:30 PM
To: Anthony Nadalin; Phil Hunt; Manger, James H
Cc: oauth@ietf.org
Subject: RE: [OAUTH-WG] Apparent consensus on OAuth Errors Registry



> -----Original Message-----
> From: Anthony Nadalin [mailto:tonynad@microsoft.com]
> Sent: Wednesday, March 23, 2011 3:11 PM

> I don't believe that there is anything wrong in combining into a=20
> single registry, as this has been done in other specifications.

There are very different endpoints with different extensibility models. Try=
ing to put protected resource endpoints in the same bucket as OAuth endpoin=
t is a violation of the protocol design.

> I don't believe that
> HTTP status codes can convey all the information that may be needed by=20
> the client, you may be able to shoehorn all into the three but that is=20
> a disservice to the poor client who may have to figure these codes out.

Do you have actual use cases to support this?
=20
> What I'm hearing is that some folks feel that we will ever have any=20
> OAuth Extensions and anything that extends OAuth can do whatever it=20
> likes and we don't want to have any conventions dictated by the base.

Hearing where? We already have OAuth extensions (not token types and scheme=
s but actual extensions to the OAuth endpoints).

The problem with the current registry proposal is that it is not backed by =
any requirements or use cases. After repeated requests, Mike Jones posted s=
ome examples which I replied to and demonstrated how they are invalid. I di=
dn't see any counter arguments.

Like most other disagreements we had, you offer vague and non-technical arg=
uments, ignore my extensive attempts at having a technical discussion, prov=
ide no concrete use cases or requirements, and try to get your point by mak=
ing sweeping declarations about it being 'unusable'.

Based on the requirements I presented to the group with regard to error cod=
e extensibility (using the UX extension example), I will draft a proposal a=
nd seek feedback.

EHL





From eran@hueniverse.com  Thu Mar 24 14:16:08 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8DEC828C144 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 14:16:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.633
X-Spam-Level: 
X-Spam-Status: No, score=-2.633 tagged_above=-999 required=5 tests=[AWL=-0.034, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KOGDQaoK5kfr for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 14:16:07 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 7BFAC28C143 for <oauth@ietf.org>; Thu, 24 Mar 2011 14:16:07 -0700 (PDT)
Received: (qmail 18723 invoked from network); 24 Mar 2011 21:17:41 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 24 Mar 2011 21:17:41 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Thu, 24 Mar 2011 14:17:28 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Anthony Nadalin <tonynad@microsoft.com>, Phil Hunt <phil.hunt@oracle.com>,  "Manger, James H" <James.H.Manger@team.telstra.com>
Date: Thu, 24 Mar 2011 14:17:19 -0700
Thread-Topic: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
Thread-Index: Acvn58EM+JExiW6yQkawESD8X4iCRgAEF9CAAAo7B4AAB6YDgAACpPYAACHqsyAABvdrQAAjht5AAAr3OgAAIyojAAANHHWQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE07@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B1680429673943252A0A60@TK5EX14MBXC207.redmond.corp.microsoft.com> <BBF14087-532E-428F-819E-323C113872AF@oracle.com> <255B9BB34FB7D647A506DC292726F6E1127FD7E69B@WSMSG3153V.srv.dir.telstra.com> <3DA41CB6-5E24-4D46-9703-C04FAF4D9571@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432EF4@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E70B6C2893@SN1PRD0302MB097.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234464F433192@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E70EB9C6B2@SN1PRD0302MB100.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FBE8@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E70EB9DEE3@SN1PRD0302MB100.namprd03.prod.outlook.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E70EB9DEE3@SN1PRD0302MB100.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 21:16:08 -0000

You should probably go read RFC 2616 again...

EHL

> -----Original Message-----
> From: Anthony Nadalin [mailto:tonynad@microsoft.com]
> Sent: Thursday, March 24, 2011 2:15 PM
> To: Eran Hammer-Lahav; Phil Hunt; Manger, James H
> Cc: oauth@ietf.org
> Subject: RE: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
>=20
> Amusing like your past rants but they don't help or offer solutions. We
> proposed a solution in the bearer token specification, I have not seen yo=
u
> offer alternative to this proposal, so you're not being constructive here=
 and
> trying to reach consensus. You don't agree with our use cases and
> requirements that we present, I can't help that.
>=20
> >. Trying to put protected resource endpoints in the same bucket as OAuth
> endpoint is a violation of the protocol design.
> Not a violation of protocol design, maybe in your mind it is.
>=20
> > Do you have actual use cases to support this?
> Yes, as pointed out there are many cases that the client needs or can hav=
e
> further information, and the HTTP Status codes don't cut it, like in the =
bearer
> token specification with "insufficient_scope", there is also the case
> authorization server is busy and the HTTP 503 Service Unavailable does no=
t
> cut it but you want to let the requestor know to retry, as I indicated yo=
u can
> shoehorn all errors into just "invalid".
>=20
> > The problem with the current registry proposal is that it is not backed=
 by
> any requirements or use cases. After repeated requests, Mike Jones posted
> some examples which I replied to and demonstrated how they are invalid. I
> didn't see any counter arguments.
> The registry proposal is backed by several requirements and use cases, (1=
) I
> don't believe that the errors defined in oauth-v2 are future proof; regis=
try
> provides a means to protect us here (2) There are no real processing
> requirements in the oauth-v2 document thus the authorization server may
> need to provide additional errors that correspond with their processing r=
ules.
>=20
> > Like most other disagreements we had, you offer vague and non-technical
> arguments
> We actually have to make this stuff work, and why we had to go off and do
> WRAP as OAuth 1.0a was not meeting ours and others business needs, so
> technology or technical discussions are only part of the equation of our
> requirements.
>=20
>=20
> -----Original Message-----
> From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]
> Sent: Wednesday, March 23, 2011 3:30 PM
> To: Anthony Nadalin; Phil Hunt; Manger, James H
> Cc: oauth@ietf.org
> Subject: RE: [OAUTH-WG] Apparent consensus on OAuth Errors Registry
>=20
>=20
>=20
> > -----Original Message-----
> > From: Anthony Nadalin [mailto:tonynad@microsoft.com]
> > Sent: Wednesday, March 23, 2011 3:11 PM
>=20
> > I don't believe that there is anything wrong in combining into a
> > single registry, as this has been done in other specifications.
>=20
> There are very different endpoints with different extensibility models. T=
rying
> to put protected resource endpoints in the same bucket as OAuth endpoint
> is a violation of the protocol design.
>=20
> > I don't believe that
> > HTTP status codes can convey all the information that may be needed by
> > the client, you may be able to shoehorn all into the three but that is
> > a disservice to the poor client who may have to figure these codes out.
>=20
> Do you have actual use cases to support this?
>=20
> > What I'm hearing is that some folks feel that we will ever have any
> > OAuth Extensions and anything that extends OAuth can do whatever it
> > likes and we don't want to have any conventions dictated by the base.
>=20
> Hearing where? We already have OAuth extensions (not token types and
> schemes but actual extensions to the OAuth endpoints).
>=20
> The problem with the current registry proposal is that it is not backed b=
y any
> requirements or use cases. After repeated requests, Mike Jones posted
> some examples which I replied to and demonstrated how they are invalid. I
> didn't see any counter arguments.
>=20
> Like most other disagreements we had, you offer vague and non-technical
> arguments, ignore my extensive attempts at having a technical discussion,
> provide no concrete use cases or requirements, and try to get your point =
by
> making sweeping declarations about it being 'unusable'.
>=20
> Based on the requirements I presented to the group with regard to error
> code extensibility (using the UX extension example), I will draft a propo=
sal
> and seek feedback.
>=20
> EHL
>=20
>=20
>=20


From eran@hueniverse.com  Thu Mar 24 14:42:45 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6B2E728C145 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 14:42:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.632
X-Spam-Level: 
X-Spam-Status: No, score=-2.632 tagged_above=-999 required=5 tests=[AWL=-0.034, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BozszmHb9+Qo for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 14:42:43 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 99AF128C13D for <oauth@ietf.org>; Thu, 24 Mar 2011 14:42:42 -0700 (PDT)
Received: (qmail 27887 invoked from network); 24 Mar 2011 21:44:17 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 24 Mar 2011 21:44:17 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 24 Mar 2011 14:44:11 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Thu, 24 Mar 2011 14:44:03 -0700
Thread-Topic: [OAUTH-WG] -13 4.3.2: internationalization consideration for username and password
Thread-Index: AcvOC/iQzATQaPWxSbeso9r0AiPmCQcYJnjA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE27@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723445A91D3F54@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723445A91D3F54@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234465642FE27P3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] -13 4.3.2: internationalization consideration for username and password
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 21:42:45 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234465642FE27P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Removed.

EHL

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of E=
ran Hammer-Lahav
Sent: Wednesday, February 16, 2011 11:03 AM
To: OAuth WG
Subject: [OAUTH-WG] -13 4.3.2: internationalization consideration for usern=
ame and password

Unless someone provides a proposed text to address internationalization con=
sideration for username and password, I am going to remove this note unaddr=
essed.

EHL


--_000_90C41DD21FB7C64BB94121FBBC2E7234465642FE27P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:Consolas;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'c=
olor:#1F497D'>Removed.<o:p></o:p></span></p><p class=3DMsoNormal><span styl=
e=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'color:#1F497D'>EHL<o:p></o:p></span></p><p class=3DMsoNormal><span=
 style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><div style=3D'border:n=
one;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><div><div style=
=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><=
p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma"=
,"sans-serif"'>From:</span></b><span style=3D'font-size:10.0pt;font-family:=
"Tahoma","sans-serif"'> oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.o=
rg] <b>On Behalf Of </b>Eran Hammer-Lahav<br><b>Sent:</b> Wednesday, Februa=
ry 16, 2011 11:03 AM<br><b>To:</b> OAuth WG<br><b>Subject:</b> [OAUTH-WG] -=
13 4.3.2: internationalization consideration for username and password<o:p>=
</o:p></span></p></div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p c=
lass=3DMsoNormal>Unless someone provides a proposed text to address interna=
tionalization consideration for username and password, I am going to remove=
 this note unaddressed.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p=
></p><p class=3DMsoNormal>EHL<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp=
;</o:p></p></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234465642FE27P3PW5EX1MB01E_--

From eran@hueniverse.com  Thu Mar 24 14:51:49 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2DDE628C11F for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 14:51:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.632
X-Spam-Level: 
X-Spam-Status: No, score=-2.632 tagged_above=-999 required=5 tests=[AWL=-0.033, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FXfVzNFilprR for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 14:51:47 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 4F85328C10E for <oauth@ietf.org>; Thu, 24 Mar 2011 14:51:47 -0700 (PDT)
Received: (qmail 10427 invoked from network); 24 Mar 2011 21:53:22 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 24 Mar 2011 21:53:22 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 24 Mar 2011 14:53:16 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phil Hunt <phil.hunt@oracle.com>, OAuth WG <oauth@ietf.org>
Date: Thu, 24 Mar 2011 14:53:08 -0700
Thread-Topic: [OAUTH-WG] Draft13: What are the possible OAuth related access errors for section 7?
Thread-Index: AcvSKltDzztkqEQbSzaXHjWamsW/1AYQqIow
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE2D@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <40798DAC-8F44-480E-8677-F765F2C1871B@oracle.com>
In-Reply-To: <40798DAC-8F44-480E-8677-F765F2C1871B@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Draft13: What are the possible OAuth related access	errors for section 7?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 21:51:49 -0000

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Phil Hunt
> Sent: Monday, February 21, 2011 4:49 PM
> To: OAuth WG
> Subject: [OAUTH-WG] Draft13: What are the possible OAuth related access
> errors for section 7?
>=20
> When accessing a protected resource with what a client believes to be an
> valid token, what errors are possible/valid?  Is this specifically out of=
 scope?

Made this clear (added parenthesis):

     "The methods used by the resource server
        to validate the access token (as well as any error responses) are b=
eyond the scope of this
        specification, but generally involve an interaction or coordination=
 between the resource
        server and the authorization server."

> Section 7 doesn't seem to cover possible error conditions.  E.g. the one =
that
> hit me just now, is how is an expired token indicated if at all (vs. inva=
lid
> authorization).

A specific error for expired token (in the various steps of the protocol) w=
as discussed multiple times and each one concluded with such an error code =
not being that valuable. I don't have a position on the matter but there is=
 no consensus to define one for v2.

> Obviously in some cases, most sites won't give details. But still I found=
 the
> issue of an expired token causing someone to try a refresh (section 6) to=
 be a
> little unclear in draft 13.

What is unclear? If you have a valid refresh token and an invalid access to=
ken (for whatever reason), try it.
=20
> Also, would/should more specific errors be defined in the various Bearer,
> Mac, etc specifications?

I have taken the position that the HTTP error codes (400, 401, and 403) suf=
ficiently cover any error state related to the MAC protocol. I am not going=
 to define any additional error codes in the response.

EHL


From eran@hueniverse.com  Thu Mar 24 14:53:27 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 785E428C134 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 14:53:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.09
X-Spam-Level: 
X-Spam-Status: No, score=-2.09 tagged_above=-999 required=5 tests=[AWL=-0.575,  BAYES_00=-2.599, HTML_MESSAGE=0.001, URIBL_RHS_DOB=1.083]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o-U9QPFk6DFm for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 14:53:22 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 00CB428C10E for <oauth@ietf.org>; Thu, 24 Mar 2011 14:53:21 -0700 (PDT)
Received: (qmail 13765 invoked from network); 24 Mar 2011 21:54:56 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 24 Mar 2011 21:54:56 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 24 Mar 2011 14:54:46 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>, OAuth Mailing List <oauth@ietf.org>, "websec@ietf.org" <websec@ietf.org>
Date: Thu, 24 Mar 2011 14:54:38 -0700
Thread-Topic: [OAUTH-WG] Indicating origin of OAuth credentials to combat login	CSRF
Thread-Index: AcvUgCPYCfnEh2l8Tj+BafbhN2rcIQV7eaqQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE30@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <255B9BB34FB7D647A506DC292726F6E1127DCD2142@WSMSG3153V.srv.dir.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E1127DCD2142@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234465642FE30P3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login	CSRF
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 21:53:27 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234465642FE30P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Was there any conclusion?

EHL

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of M=
anger, James H
Sent: Thursday, February 24, 2011 4:09 PM
To: OAuth Mailing List; websec@ietf.org
Subject: [OAUTH-WG] Indicating origin of OAuth credentials to combat login =
CSRF

Q. Should an OAuth client app list the authorization server in the Origin h=
eader of requests to resource servers?

In OAuth (delegation) flows a server dynamically issues credentials (such a=
s a bearer token) to a client app to use in subsequent HTTP requests to oth=
er servers. To combat login cross-site request forgery (CSRF) attacks [1] (=
where an attacker's server issues the attacker's credentials to a client ap=
p to use on behalf of a victim at a legitimate server) the client app needs=
 to indicate where the credentials came from. The Origin header [2] looks l=
ike the right place to indicate this.

[For the OAuth list: The Origin HTTP request header "indicates the origin(s=
) that caused the user agent to issue the request" [http://tools.ietf.org/h=
tml/draft-ietf-websec-origin-00#section-6.2].]

[For the WebSec list: An OAuth credential from an authorization server is a=
 bit like a cookie, but not restricted to the same origin.]


Example:

  Client to (malicious) authorization server: ->
    POST /token HTTP/1.1
    Host: login.example.com
    ...
  <-
    HTTP/1.1 200 OK
    ...
    { "access_token": "SlAV32hkKG", ...}

  Client to resource server: ->
    POST /uploadData HTTP/1.1
    Host: api.exampledata.com
    Authorization: BEARER SlAV32hkKG
    Origin: https://login.example.com
    ...


There can be other servers that contribute to a client app making a request=
. For instance, one server can redirect to another. A Origin request header=
 can list multiple origins. The server will not be able to distinguish whic=
h origin issued OAuth credentials from which issued a redirect etc. That mi=
ght not matter if a server has to trust all the values listed in the Origin=
 header.
Q. Is it the group's expectation that servers checking the Origin header wi=
ll require all the listed origins to be trusted?

[1] Robust Defenses for Cross Site Request Forgery, http://www.adambarth.co=
m/papers/2008/barth-jackson-mitchell-b.pdf
[2] The Web Origin Concept, http://tools.ietf.org/html/draft-ietf-websec-or=
igin
[3] Principles of the Same Origin Policy, http://tools.ietf.org/html/draft-=
abarth-principles-of-origin

--
James Manger


--_000_90C41DD21FB7C64BB94121FBBC2E7234465642FE30P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'c=
olor:#1F497D'>Was there any conclusion?<o:p></o:p></span></p><p class=3DMso=
Normal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=
=3DMsoNormal><span style=3D'color:#1F497D'>EHL<o:p></o:p></span></p><p clas=
s=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><di=
v style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0=
pt'><div><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3=
.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;f=
ont-family:"Tahoma","sans-serif"'>From:</span></b><span style=3D'font-size:=
10.0pt;font-family:"Tahoma","sans-serif"'> oauth-bounces@ietf.org [mailto:o=
auth-bounces@ietf.org] <b>On Behalf Of </b>Manger, James H<br><b>Sent:</b> =
Thursday, February 24, 2011 4:09 PM<br><b>To:</b> OAuth Mailing List; webse=
c@ietf.org<br><b>Subject:</b> [OAUTH-WG] Indicating origin of OAuth credent=
ials to combat login CSRF<o:p></o:p></span></p></div></div><p class=3DMsoNo=
rmal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span lang=3DEN-AU>Q. Should=
 an OAuth client app list the authorization server in the Origin header of =
requests to resource servers?<o:p></o:p></span></p><p class=3DMsoNormal><sp=
an lang=3DEN-AU><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span lang=
=3DEN-AU>In OAuth (delegation) flows a server dynamically issues credential=
s (such as a bearer token) to a client app to use in subsequent HTTP reques=
ts to other servers. To combat login cross-site request forgery (CSRF) atta=
cks [1] (where an attacker&#8217;s server issues the attacker&#8217;s crede=
ntials to a client app to use on behalf of a victim at a legitimate server)=
 the client app needs to indicate where the credentials came from. The Orig=
in header [2] looks like the right place to indicate this.<o:p></o:p></span=
></p><p class=3DMsoNormal><span lang=3DEN-AU><o:p>&nbsp;</o:p></span></p><p=
 class=3DMsoNormal><span lang=3DEN-AU>[For the OAuth list: The Origin HTTP =
request header &#8220;indicates the origin(s) that caused the user agent to=
 issue the request&#8221; [http://tools.ietf.org/html/draft-ietf-websec-ori=
gin-00#section-6.2].]<o:p></o:p></span></p><p class=3DMsoNormal><span lang=
=3DEN-AU><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span lang=3DEN-A=
U>[For the WebSec list: An OAuth credential from an authorization server is=
 a bit like a cookie, but not restricted to the same origin.]<o:p></o:p></s=
pan></p><p class=3DMsoNormal><span lang=3DEN-AU><o:p>&nbsp;</o:p></span></p=
><p class=3DMsoNormal><span lang=3DEN-AU><o:p>&nbsp;</o:p></span></p><p cla=
ss=3DMsoNormal><span lang=3DEN-AU>Example:<o:p></o:p></span></p><p class=3D=
MsoNormal><span lang=3DEN-AU><o:p>&nbsp;</o:p></span></p><p class=3DMsoNorm=
al><span lang=3DEN-AU>&nbsp; Client to (malicious) authorization server: -&=
gt;<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-AU>&nbsp; &nb=
sp;&nbsp;POST /token HTTP/1.1<o:p></o:p></span></p><p class=3DMsoNormal><sp=
an lang=3DEN-AU>&nbsp; &nbsp;&nbsp;Host: login.example.com<o:p></o:p></span=
></p><p class=3DMsoNormal><span lang=3DEN-AU>&nbsp; &nbsp;&nbsp;&#8230;<o:p=
></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-AU>&nbsp; &lt;-<o:p>=
</o:p></span></p><p class=3DMsoNormal><span lang=3DEN-AU>&nbsp; &nbsp;&nbsp=
;HTTP/1.1 200 OK<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-=
AU>&nbsp; &nbsp;&nbsp;&#8230;<o:p></o:p></span></p><p class=3DMsoNormal><sp=
an lang=3DEN-AU>&nbsp; &nbsp;&nbsp;{ &quot;access_token&quot;: &quot;SlAV32=
hkKG&quot;, &#8230;}<o:p></o:p></span></p><p class=3DMsoNormal><span lang=
=3DEN-AU><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span lang=3DEN-A=
U>&nbsp; Client to resource server: -&gt;<o:p></o:p></span></p><p class=3DM=
soNormal><span lang=3DEN-AU>&nbsp; &nbsp;&nbsp;POST /uploadData HTTP/1.1<o:=
p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-AU>&nbsp; &nbsp;&nb=
sp;Host: api.exampledata.com<o:p></o:p></span></p><p class=3DMsoNormal><spa=
n lang=3DEN-AU>&nbsp; &nbsp;&nbsp;Authorization: BEARER SlAV32hkKG<o:p></o:=
p></span></p><p class=3DMsoNormal><span lang=3DEN-AU>&nbsp; &nbsp;&nbsp;Ori=
gin: <a href=3D"https://login.example.com">https://login.example.com</a><o:=
p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-AU>&nbsp;&nbsp;&nbs=
p; &#8230;<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-AU><o:=
p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span lang=3DEN-AU><o:p>&nbsp=
;</o:p></span></p><p class=3DMsoNormal><span lang=3DEN-AU>There can be othe=
r servers that contribute to a client app making a request. For instance, o=
ne server can redirect to another. A Origin request header can list multipl=
e origins. The server will not be able to distinguish which origin issued O=
Auth credentials from which issued a redirect etc. That might not matter if=
 a server has to trust all the values listed in the Origin header.<o:p></o:=
p></span></p><p class=3DMsoNormal><span lang=3DEN-AU>Q. Is it the group&#82=
17;s expectation that servers checking the Origin header will require all t=
he listed origins to be trusted?<o:p></o:p></span></p><p class=3DMsoNormal>=
<span lang=3DEN-AU><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span l=
ang=3DEN-AU>[1] Robust Defenses for Cross Site Request Forgery, <a href=3D"=
http://www.adambarth.com/papers/2008/barth-jackson-mitchell-b.pdf">http://w=
ww.adambarth.com/papers/2008/barth-jackson-mitchell-b.pdf</a><o:p></o:p></s=
pan></p><p class=3DMsoNormal><span lang=3DEN-AU>[2] The Web Origin Concept,=
 <a href=3D"http://tools.ietf.org/html/draft-ietf-websec-origin">http://too=
ls.ietf.org/html/draft-ietf-websec-origin</a><o:p></o:p></span></p><p class=
=3DMsoNormal><span lang=3DEN-AU>[3] Principles of the Same Origin Policy, <=
a href=3D"http://tools.ietf.org/html/draft-abarth-principles-of-origin">htt=
p://tools.ietf.org/html/draft-abarth-principles-of-origin</a><o:p></o:p></s=
pan></p><p class=3DMsoNormal><span lang=3DEN-AU><o:p>&nbsp;</o:p></span></p=
><p class=3DMsoNormal><span lang=3DEN-AU>--<o:p></o:p></span></p><p class=
=3DMsoNormal><span lang=3DEN-AU>James Manger<o:p></o:p></span></p><p class=
=3DMsoNormal><span lang=3DEN-AU><o:p>&nbsp;</o:p></span></p></div></div></b=
ody></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234465642FE30P3PW5EX1MB01E_--

From eran@hueniverse.com  Thu Mar 24 15:07:39 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D59F028C14A for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 15:07:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[AWL=-0.020, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OUlVVbtPdFVD for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 15:07:39 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 0480628C10B for <oauth@ietf.org>; Thu, 24 Mar 2011 15:07:38 -0700 (PDT)
Received: (qmail 913 invoked from network); 24 Mar 2011 22:09:14 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 24 Mar 2011 22:09:13 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 24 Mar 2011 15:09:13 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>, OAuth WG <oauth@ietf.org>
Date: Thu, 24 Mar 2011 15:09:05 -0700
Thread-Topic: [OAUTH-WG] Breaking change for authorization code flow?
Thread-Index: AcvVtX1CepHPdBwnSSKoFnMtR0GPvAUun4Xg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE39@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4D68F9FB.3070802@lodderstedt.net>
In-Reply-To: <4D68F9FB.3070802@lodderstedt.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Breaking change for authorization code flow?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 22:07:39 -0000

New text (moved the first half from sub section 3.2 to 3):

        In addition, the authorization server MAY allow unauthenticated acc=
ess token requests
        when the client identity does not matter (e.g. anonymous client) or=
 when the client
        identity is established via other means. For readability purposes o=
nly, this specification
        is written under the assumption that the authorization server requi=
res some form of client
        authentication. However, such language does not affect the authoriz=
ation server's discretion
        in allowing unauthenticated client requests.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Torsten Lodderstedt
> Sent: Saturday, February 26, 2011 5:03 AM
> To: OAuth WG
> Subject: [OAUTH-WG] Breaking change for authorization code flow?
>=20
> Hi all,
>=20
> I just noticed a change between draft 11 and 13 I would like to bring to =
your
> attention.
>=20
> Until draft 11, the spec left open whether the client of the authz code g=
rant
> type had to present a secret or not. It had been a decision of the authz
> server and I assume some deployments already work that way (at least our'=
s
> does).
>=20
> Accordingly the text for the request to change a code for token is:
> "Validate the client credentials (if present) and ensure they match the
> authorization code."
>=20
> In drafts 12/13, the text has been changed to:
> "Validate the client credentials and ensure they match the authorization
> code."
>=20
> Given the assumption that, w/o a dynamic client registration feature, nat=
ive
> application cannot securely manage secrets, this means native apps cannot
> use the authorization code flow any longer.
>=20
> The only interactive flows left would be "implicit grant", which is not c=
apable
> of issuing refresh tokens. Which in turn means, native app would be force=
d
> to acquire access tokens interactively in every session.
>=20
> Am I right? Or do I just misinterpret the text?
>=20
> I would suggest to stick to the -11s semantics of the authorization code =
flow.
>=20
> regards,
> Torsten.
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From eran@hueniverse.com  Thu Mar 24 15:10:22 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1EE6828C153 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 15:10:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[AWL=-0.020, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m80qteMxXKRW for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 15:10:21 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 482F028C14C for <oauth@ietf.org>; Thu, 24 Mar 2011 15:10:21 -0700 (PDT)
Received: (qmail 4849 invoked from network); 24 Mar 2011 22:11:56 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 24 Mar 2011 22:11:56 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 24 Mar 2011 15:11:45 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, OAuth WG <oauth@ietf.org>
Date: Thu, 24 Mar 2011 15:11:36 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvYq/VRfyCqRH/sTkq26EXkRBWSkwRxEtag
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE3B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
In-Reply-To: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 22:10:22 -0000

I have started processing all the incoming feedback (expect responses to ea=
ch note received). If you have additional feedback, I suggest it waits for =
the next draft (-14). However, if it is a blocking comment, please post to =
the list as soon as possible.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Hannes Tschofenig
> Sent: Tuesday, March 01, 2011 11:32 PM
> To: OAuth WG
> Subject: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> This is a Last Call for comments on
>=20
> http://www.ietf.org/id/draft-ietf-oauth-v2-13.txt
>=20
> Please have your comments in no later than March 16.
>=20
> Do remember to send a note in if you have read the document and have no
> other comments other than "its ready to go" - we need those as much as we
> need "I found a problem".
>=20
> Thanks!
> Hannes & Blaine
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From eran@hueniverse.com  Thu Mar 24 15:14:24 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 953E928C157 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 15:14:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[AWL=-0.020, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D9EaJcWalYEd for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 15:14:23 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id A114528C152 for <oauth@ietf.org>; Thu, 24 Mar 2011 15:14:23 -0700 (PDT)
Received: (qmail 11218 invoked from network); 24 Mar 2011 22:15:58 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 24 Mar 2011 22:15:58 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 24 Mar 2011 15:15:48 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Brian Campbell <bcampbell@pingidentity.com>
Date: Thu, 24 Mar 2011 15:15:39 -0700
Thread-Topic: slightly alternative preamble (was: Re: [OAUTH-WG] Draft -12 feedback deadline)
Thread-Index: AcvY4vFwGdrtkMPDTSW/C7M9A1lTVgRjew9w
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE3C@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com>
In-Reply-To: <AANLkTi=gYxfKFoa3wp6LjcE=uFBZfr0H8JPnhUpqVxNq@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] slightly alternative preamble (was: Re: Draft -12 feedback deadline)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 22:14:24 -0000

Done.

Also removed ' and the authentication of the client is based on the user-ag=
ent's same-origin policy'.

EHL

> -----Original Message-----
> From: Brian Campbell [mailto:bcampbell@pingidentity.com]
> Sent: Wednesday, March 02, 2011 6:05 AM
> To: Eran Hammer-Lahav
> Cc: Marius Scurtescu; OAuth WG
> Subject: slightly alternative preamble (was: Re: [OAUTH-WG] Draft -12
> feedback deadline)
>=20
> I propose that the "or native applications" text be dropped from the firs=
t
> paragraph in section 4.2 Implicit Grant  [1].
>=20
> There is clearly some disagreement about what is most appropriate for
> mobile/native applications and many, including myself, don't feel that th=
e
> implicit grant works well to support them (due to the lack of a refresh t=
oken
> and need to repeat the authorization steps).  I understand that the text =
in
> section 4 is non-normative, however, I feel that the mention of native ap=
ps
> in 4.2 biases thinking in a particular way (it's already led to one lengt=
hy
> internal discussion that I'd rather not have again and again).  I believe=
 it'd be
> more appropriate for the draft to remain silent on how native apps should
> acquire tokens and leave it up to implementations/deployments to decide
> (or an extension draft as Marius has proposed).
>=20
> The "or native applications" text in is also somewhat inconsistent with t=
he
> text in the following sentence that talks about the authentication of the
> client being based on the user-agent's same-origin policy.
>=20
> Removing those three words is a small change but one that I feel would be
> beneficial on a number of fronts.
>=20
> Thanks,
> Brian
>=20
>=20
> [1] http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-4.2
>=20
> On Wed, Feb 16, 2011 at 2:57 PM, Eran Hammer-Lahav
> <eran@hueniverse.com> wrote:
> > Feel free to propose alternative preamble for the implicit and authoriz=
ation
> code sections, describing the characteristics of what they are good for. =
It
> should fit in a single paragraph. Such a proposal would fit right in with=
 last call
> feedback to -13.
>=20
> >
> > EHL
> >
> >> -----Original Message-----
> >> From: Marius Scurtescu [mailto:mscurtescu@google.com]
> >> Sent: Wednesday, February 16, 2011 1:39 PM
> >> To: Eran Hammer-Lahav
> >> Cc: Brian Campbell; OAuth WG
> >> Subject: Re: [OAUTH-WG] Draft -12 feedback deadline
> >>
> >> On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav
> >> <eran@hueniverse.com> wrote:
> >> > The reason why we don't return a refresh token in the implicit
> >> > grant is
> >> exactly because there is no client authentication...
> >>
> >> Not sure that's the main reason. AFAIK it is because the response is
> >> sent through the user-agent and it could leak.
> >>
> >>
> >> > These are all well-balanced flows with specific security
> >> > properties. If you
> >> need something else, even if it is just a tweak, it must be
> >> considered a different flow. That doesn't mean you need to register a
> >> new grant type, just that you are dealing with different
> >> implementation details unique to your server.
> >>
> >> The Authorization Code flow, with no client secret, is perfectly fine
> >> for Native Apps IMO.
> >>
> >> Marius
> >

From eran@hueniverse.com  Thu Mar 24 15:44:09 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1B57E3A63EB for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 15:44:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[AWL=-0.020, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FLwgn9Y7R25X for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 15:44:07 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id DE5013A6359 for <oauth@ietf.org>; Thu, 24 Mar 2011 15:44:07 -0700 (PDT)
Received: (qmail 15959 invoked from network); 24 Mar 2011 22:45:41 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 24 Mar 2011 22:45:41 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 24 Mar 2011 15:45:28 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Mark Kent <mkent@proofpoint.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 24 Mar 2011 15:45:19 -0700
Thread-Topic: draft-ietf-oauth-v2-13 comments
Thread-Index: AcvcRBIdj4Jn5D8EPUCvBXh/THroSAOLRs0A
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE4C@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <C9993A33.A0BA%mkent@proofpoint.com>
In-Reply-To: <C9993A33.A0BA%mkent@proofpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] draft-ietf-oauth-v2-13 comments
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 22:44:09 -0000

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Mark Kent
> Sent: Sunday, March 06, 2011 1:19 PM

> 1. The error response mechanism for the authorization endpoint depends on
> the response_type being requested. Assuming that the client and redirect
> URI are valid, the endpoint might place the error information in the quer=
y
> string (for repsonse_type "code", section 4.1.2.1) or in the fragment (fo=
r
> response type "token", section 4.2.2.1). I believe it is ambiguous what s=
hould
> be done if the response_type is missing, or invalid. Clarification would =
be
> appreciated.

I am not sure we can fully resolve this edge case. If the server only suppo=
rts one response type, it should default the error method to that. If it su=
pports both, it should default to the query, as the fragment will not alway=
s accessible.

Added to the end of section 2.1:

   If the request is missing the
   REQUIRED "response_type" parameter (described in Section 4.1.1 and
   Section 4.2.1), the authorization server SHOULD return an error
   response as described in Section 4.1.2.1.
=20
> 2. The error response for the authorization endpoint is directed to inclu=
de
> the state, if a state were supplied in the request (sections 4.1.2.1, 4.2=
.2.1).
> Assuming that including multiple state parameters in the request makes th=
e
> request malformed, how should the server include state in the error
> response if the request contains multiple state parameters? I could see
> justifications for a number of options (not including the state, includin=
g all the
> state parameters, including just the first state parameter, etc). Clarifi=
cation
> would be appreciated. Note that, if multiple state parameters may be lega=
lly
> included in the request, this same question applies to the grant response=
,
> rather than the error response.

Parameters must not repeat so this will make the request malformed.=20

Added the following text to 2.1 and 2.2:

          Request and response parameters MUST NOT repeat more than once, u=
nless noted otherwise.

Also, changed the 'state' parameter in error responses to:

   state
         REQUIRED if a valid "state" parameter was present in the client
         authorization request.  Set to the exact value received from
         the client.

> 3. I believe that section 5.2 is ambiguous as to the error code that shou=
ld be
> returned from the token endpoint when the client credentials are valid,
> when the client is authorized to use the authorization code grant type in
> general, but when the authorization code supplied is not valid for the cl=
ient. I
> could see unauthorized_client being right, but the wording of the section
> doesn't include the exact case above. Please clarify.

Why not 'invalid_grant'? If I understand your use case, the client is tryin=
g to use a code issued to another client, which makes the code invalid.

> 4. I believe that section 5.2 is ambiguous as to the error code that shou=
ld be
> returned from the token endpoint when the grant type is "password", and
> the resource owner's credentials are invalid. Section 4.3.3 implies that =
such a
> request is "invalid", suggesting that invalid_request is the correct resp=
onse,
> but section 5.2 could be clearer on this. Please clarify.

Same, ' invalid_grant'. The prose 'invalid request' is any error condition,=
 while the error code 'invalid_request' has specific definition.

> In addition, I wonder if the authors have given any thought to the
> applicability of the protocol in a federated authentication domain
> environment, for example where the authorization endpoint and token
> endpoints are on different servers that retain a trust relationship with =
each
> other. Clearly, in this case, the format of the authorization code is an
> integration point, much in the same way as the access token is in the
> currently provided use cases. Whereas a number of access token formats ar=
e
> provided in companion specifications, I see no references for authorizati=
on
> codes. Any thoughts on this would be gratefully received.

There is nothing to preclude this. It's just out of scope.

EHL


From eran@hueniverse.com  Thu Mar 24 15:45:17 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 507933A6904 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 15:45:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.619
X-Spam-Level: 
X-Spam-Status: No, score=-2.619 tagged_above=-999 required=5 tests=[AWL=-0.020, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0u-SX7fR6PPe for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 15:45:15 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id BDB343A6900 for <oauth@ietf.org>; Thu, 24 Mar 2011 15:45:15 -0700 (PDT)
Received: (qmail 18012 invoked from network); 24 Mar 2011 22:46:50 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 24 Mar 2011 22:46:50 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 24 Mar 2011 15:46:46 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Craig Heath <craig.heath@wacapps.net>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 24 Mar 2011 15:46:37 -0700
Thread-Topic: Implicit Grant Client Authentication
Thread-Index: AcvfUIidK8z3GS/uTvO/heH3kGh+NwLJLmAg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE4E@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4EDB411A4D566C45BE3AB6E0152BFAF92761BB6C74@EX-BE-016-SFO.shared.themessagecenter.com>
In-Reply-To: <4EDB411A4D566C45BE3AB6E0152BFAF92761BB6C74@EX-BE-016-SFO.shared.themessagecenter.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Implicit Grant Client Authentication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 22:45:17 -0000

This line was left over from an earlier draft. It's now removed. It may rea=
ppear in the security considerations section.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Craig Heath
> Sent: Thursday, March 10, 2011 10:33 AM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] Implicit Grant Client Authentication
>=20
> I'm sure this has been gone over before, so apologies for that, but I hav=
en't
> found a clear answer (is there a better way than just Google to search th=
e
> mailing list archive, by the way?)
>=20
> I've been puzzling over this text in 4.2: "... the authentication of the =
client is
> based on the user-agent's same-origin policy."
>=20
> I get that the client can't be provisioned with secret credentials and th=
at's
> why we're using this flow, but I'm puzzled by the implication that it mig=
ht still
> be possible to authenticate the client.  Isn't the point of this flow tha=
t you
> can't?
>=20
> Specifically, how would you verify that the request is coming from a user
> agent that even has a same-origin policy?
>=20
> Thanks!
>=20
> - Craig.
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From mkent@proofpoint.com  Thu Mar 24 16:41:02 2011
Return-Path: <mkent@proofpoint.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1C72428C14C for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 16:41:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.532
X-Spam-Level: 
X-Spam-Status: No, score=-0.532 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_NUMERIC_HELO=2.067]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dyb53BupdDtx for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 16:41:01 -0700 (PDT)
Received: from mx2.proofpoint.com (mx2.proofpoint.com [208.86.202.10]) by core3.amsl.com (Postfix) with ESMTP id 58ADF28C11A for <oauth@ietf.org>; Thu, 24 Mar 2011 16:41:01 -0700 (PDT)
Received: from CUP-POSTAL1.corp.proofpoint.com (cup-sv11.corp.proofpoint.com [10.20.7.111]) by admin1009 (8.14.3/8.14.3) with ESMTP id p2ONgZOX027300; Thu, 24 Mar 2011 16:42:35 -0700
Received: from 208.86.202.10 ([208.86.202.10]) by CUP-POSTAL1.corp.proofpoint.com ([10.20.7.22]) via Exchange Front-End Server owa.proofpoint.com ([10.20.7.23]) with Microsoft Exchange Server HTTP-DAV ; Thu, 24 Mar 2011 23:42:35 +0000
User-Agent: Microsoft-Entourage/12.28.0.101117
Date: Thu, 24 Mar 2011 16:42:34 -0700
From: Mark Kent <mkent@proofpoint.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, "oauth@ietf.org" <oauth@ietf.org>
Message-ID: <C9B124FA.B520%mkent@proofpoint.com>
Thread-Topic: draft-ietf-oauth-v2-13 comments
Thread-Index: AcvcRBIdj4Jn5D8EPUCvBXh/THroSAOLRs0AAAL+LfY=
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FE4C@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Mime-version: 1.0
Content-type: text/plain; charset="US-ASCII"
Content-transfer-encoding: 7bit
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.2.15, 1.0.148, 0.0.0000 definitions=2011-03-24_10:2011-03-24, 2011-03-24, 1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 suspectscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx engine=5.0.0-1012030000 definitions=main-1103240145
Subject: Re: [OAUTH-WG] draft-ietf-oauth-v2-13 comments
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2011 23:41:02 -0000

>> 3. I believe that section 5.2 is ambiguous as to the error code that should
>> be
>> returned from the token endpoint when the client credentials are valid,
>> when the client is authorized to use the authorization code grant type in
>> general, but when the authorization code supplied is not valid for the
>> client. I
>> could see unauthorized_client being right, but the wording of the section
>> doesn't include the exact case above. Please clarify.
> 
> Why not 'invalid_grant'? If I understand your use case, the client is trying
> to use a code issued to another client, which makes the code invalid.

It wasn't clear to me, when combining the last paragraph in section 4.1.3
with section 5.2 that the code not matching the client meant that the code
was invalid. While you intend the term "invalid" in the context of a
code/grant (in, e.g. Section 5.2) to be a general catch-all for errors, I
missed that when reading the document. Perhaps a quick nod to this concept
somewhere in either section 1.4 or 5.2 might have helped me out.

Thanks for the other answers - quite clear.



From eran@hueniverse.com  Thu Mar 24 17:03:06 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3CEC728C11A for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 17:03:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.077
X-Spam-Level: 
X-Spam-Status: No, score=-2.077 tagged_above=-999 required=5 tests=[AWL=-0.561, BAYES_00=-2.599, URIBL_RHS_DOB=1.083]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b+zuUaVit9lv for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 17:03:04 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 35B553A6916 for <oauth@ietf.org>; Thu, 24 Mar 2011 17:03:03 -0700 (PDT)
Received: (qmail 12887 invoked from network); 25 Mar 2011 00:04:38 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 00:04:36 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Thu, 24 Mar 2011 17:04:36 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>, Hannes Tschofenig <hannes.tschofenig@gmx.net>
Date: Thu, 24 Mar 2011 17:04:26 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: Acvh0SjaIdt92eKuTuaY+WlMJZNTugIph7rQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE5F@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <4D7D4A5C.8050406@lodderstedt.net>
In-Reply-To: <4D7D4A5C.8050406@lodderstedt.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 00:03:06 -0000

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Torsten Lodderstedt
> Sent: Sunday, March 13, 2011 3:51 PM

> section 1.4: "An authorization grant is a general term used to describe t=
he
> intermediate credentials ..."
>=20
> Since passwords represent authorization grants as well, I would suggest t=
o
> adjust the wording to "intermediate or permanent"

Intermediate refers to their use in OAuth, and does not apply to their exte=
rnal existence.
=20
> section 1.4.4:
>=20
> "The client credentials can be used as an authorization grant ..., or to
> protected resources previously arranged with the authorization server."
>=20
> Does this mean, the client is not the resource owner but gets access beca=
use
> of an existing authorization? How does this differ from an implicit grant=
?

The authorization server can provide users with a control panel with a list=
 of pre-selected clients. The users can chose to authorize these clients di=
rectly without going through the authorization flow. Later, the client can =
use this grant type to access the user's protected resources because they h=
ave been pre-approved.
=20
> "Client credentials are used as an
> authorization grant typically when the client is acting on its own behalf=
 (the
> client is also the resource owner)."
>=20
> What are the alternatives? I would suggest to remove "typically".

See above.
=20
> section 2.1:
>=20
> 4. paragraph: "If the response does not include an access token, the
> authorization server SHOULD require TLS 1.2 and any additional transport-
> layer mechanism meeting its security requirements."
>=20
> Why only "SHOULD" and not "MUST"? Otherwise, alternative means for
> preventing abuse of the response parameters MUST be required, e.g.
> client authentication for authorization code exchange.
>=20
> Moreover, this is about the redirect_uri, isn't it? What about the endpoi=
nt's
> security itself, i.e. requests to this endpoint?

This is only about the confidentiality of the response, if the response inc=
ludes credentials (bearer token, MAC token secret, etc.).

> section 2.1.1:
>=20
> 3. paragraph: "The authorization server SHOULD require the client to pre-
> register their redirection URI or at least certain components such as the
> scheme, host, port and path."
>=20
> Pre-registered redirect_uri facilitate client authentication while tying =
a client
> to a certain deployment. Although this is typical practice nowdays I expe=
ct
> this to change if OAuth really gains traction for standard client softwar=
e, such
> as mail clients.
>=20
> Proposal: Should by MAY in my opinion + some explanation on the purpose
> of redirect_uri registration.

I think this should stay a SHOULD given it can improve security.

> section 2.2:
>=20
> 4. paragraph: "The token endpoint requires client authentication as
> described in Section 3."
>=20
> That's to restrictive, probably client identification but not authenticat=
ion.
> Otherwise, this endpoint cannot be used for most native apps.

New text in section 3 clarifies this:

   In addition, the authorization server MAY allow unauthenticated
   access token requests when the client identity does not matter (e.g.
   anonymous client) or when the client identity is established via
   other means.  For readability purposes only, this specification is
   written under the assumption that the authorization server requires
   some form of client authentication.  However, such language does not
   affect the authorization server's discretion in allowing
   unauthenticated client requests.

> section 3:
> "Client credentials are used to identify and authenticate the client."
>=20
> I think it would be helpful for the reader to explain the purposes client
> identitification and authentication serve in OAuth. I see the following u=
se
> cases (more text can be found in
> http://tools.ietf.org/html/draft-lodderstedt-oauth-security-00#section-3.=
8):
>=20
> In the context of delegated authorization, client identity is used to:
> - Establish trust to the client and display relevant registration informa=
tion to a
> user when requesting consent for authorization
> - Authorize clients for certain authorization server features
> - Collate associated request to the same originator (e.g. a particular en=
d-user
> authorization process and the corresponding request on the tokens endpoin=
t
> to exchange the authorization code for tokens)

This goes beyond what the specification offers on other protocol elements. =
I added the following to section 3:

        The methods through which the client obtains its client credentials=
 are beyond the scope of
        this specification. However, the client registration process typica=
lly includes gathering
        relevant information used to inform the resource owner about the cl=
ient when requesting
        authorization.

> "The authorization server SHOULD NOT issue client credentials to clients
> incapable of keeping their secrets confidential."
>=20
> I would suggest to add some explanation here. Proposal "For example, the
> same client credentials should not be used for multiple installations of =
the
> same software, e.g. all instances of the same native app running on diffe=
rent
> PCs or smartphones."

I don't think this is necessary, but can be expanded in the security consid=
erations section.
=20
> section 3.2:
> "In addition, the
> authorization server MAY allow unauthenticated access token requests
> when the client identity does not matter (e.g. anonymous client) or when
> the client identity is established via other means."
>=20
> I would suggest to move this sentence after the BASIC authentication
> example.

Moved up to 3.
=20
> section 4.1:
>=20
> In my opinion, the introduction of this section over-emphasizes the aspec=
t of
> client secrets & authentication while neglecting the other properties of =
the
> authorization code flow. Moreover, it encourages the impression this flow
> can only be used by clients equipped with a secret.
> This is wrong as this flow should be usable by clients w/o client secrets=
 as well
> because it offers unique properties beside its aibility to support client
> authentication. In my opinion these are:
>=20
> - user identity and credentials are not exposed to client (in contrast to
> resource owner password grant)
> - user authentication and consent controlled by authorization server (in
> contrast to resource owner password grant)
> - flow is especially suited for clients which are web applications (in co=
ntrast to
> implicit grant)
> - refresh token issuance (in contrast to implicit grant)
> - client credentials and tokens are sent over protected, direct communica=
tion
> channels between client and authorization server (no browser caches and
> HTTP referers involved)
> - aibility to authenticate clients (for completeness)
>=20
> The introduction should explain all properties of the flow and offer some
> guidance when and how to use the flow.

I disagree. The code and implicit grants were explicitly designed to accomm=
odate the two cases of clients with and without secrets. While the code gra=
nt can be used without a secret, it loses many of its properties. By narrow=
ly defining the two profiles in such a way, we simplify the security consid=
erations section, without restricting their applicability. Note that there =
is no MUST when it comes to client secrets. It is just an introduction.

I expect others to define and publish profiles of how to apply these two gr=
ant types to various cases typical for native applications. But beside good=
 intentions, this group has not produced such a comprehensive document and =
it is too late to delay this work.

Also, as your list above shows, this is not a simple list but a feature mat=
rix, comparing it to multiple grant types. I don't think an introduction wi=
ll be helpful in selecting the right grant type, but a comprehensive analys=
is. If someone wants to try writing one, we can consider adding it, but it =
will have to be done in a matter of 2-3 weeks. Overall, I think a blog post=
 will be as useful.

> section 4.1.3:
> Why is the name of the response type "code" whereas the name of the
> grant type is "authorization_code"?

Trying to be succinct on the wire. The prose is more descriptive.
=20
> "redirect_uri" should only be required if it was an input parameter to th=
e
> corresponding authz request.

No. It should be set to wherever the callback was sent to since sometimes s=
ervers allow both pre-registered and override.

> last paragraph: "Validate the client credentials and ensure they match th=
e
> authorization code." should be "Validate the client credentials (if
> present) and ensure they match the
> authorization code." (see also:
> http://www.mail-archive.com/oauth@ietf.org/msg04540.html)

See reply to your previous post.

> section 4.1.4:
>=20
> "If the request failed due to failed client authentication or is invalid"=
 - Some
> words missing here?
>=20
> example response: The JSON document contains a field
> "example_parameter":"example-value". Some copy and paste remainings? -
> The same holds true for other example JSON documents.

Not sure what you mean.

> section 4.2.:
>=20
> I'm struggeling with the name "implicit grant". Why not just stick with "=
User
> Agent Flow"? It has been designed for that kind of app.

The name should be descriptive of the grant characteristics, not its intend=
ed purpose (which would be incomplete and misleading). I'm open to other na=
mes, but not 'user agent'.

> As already mentioned for section 4.1., also this introduction puts to muc=
h
> emphasize on the client secret story. I don't think this was the original=
 driver
> of its development. I would expect the intro to focus on the functional
> properties of the flow:
>=20
> As I understand, it has been designed with JavaScript clients in mind, wh=
ich
> due to the same origin policy, are unable to send requests directly to an
> authorization server outside of its origin. So instead of obtaining token=
s
> through a POST request (via authz code), the access token is delivered
> directly via the redirect URI. In order to reduce the exposure of the tok=
en
> (and because it is sufficient), the access token is sent via the fragment=
. As a
> consequence of the design this flow does not support client authenticatio=
n
> via secrets. The client's identity can nevertheless be validated using pr=
e-
> registered redirect_uri's.
>=20
> This flow cannot be used with web applications. And as long as the flow d=
oes
> not support refresh tokens, the same holds true for native apps (see also
> http://tools.ietf.org/html/draft-zeltsan-oauth-use-cases-01).
> So please remove "or native applications" from the text (see
> http://www.ietf.org/mail-archive/web/oauth/current/msg05551.html).

The design accommodates a few features:

1. Use fragment to improve performance (caching)
2. Use fragment to prevent token from being sent to the server hosting the =
client script for the redirection
3. Limited functionality (no refresh token) because of lack of client secre=
ts

But again, If we want to provide a feature matrix to help developers choose=
 the right grant type, that's one thing, but I am not going to change the s=
imple introductions because it makes the rest of the protocol much simpler =
to explain and does not take sides in a debate (which profile to use when) =
which is far from settled.

> section 4.3:
>=20
> 2. paragraph: I suggest to add "It is even possible to migrate from store=
d
> credentials to stored refresh tokens. Leakage of the later would have les=
s
> impact."

I think this is redundant.

> Figure 5/ Step C) I suggest to add ", and optionally a refresh token."

Diagram has it. I think keep repeating it makes the document less readable.

> section 4.3.3
>=20
> "If the access token request is valid and authorized, the authorization s=
erver
> issues an access token and optional refresh token as described in Section
> 5.1."
>=20
> How is determined and by whom whether a refresh token is being issued?
> Since this is not an interactive flow, the authorization server cannot as=
k the
> resource owner.

Server policy.

> section 6:
> "The authorization server MUST validate the client credentials, ..."
> should be "The authorization server MUST validate the client credentials =
(if
> present), ..."

See above.

EHL


From ruhrstadt@agentur-com4.com  Thu Mar 24 17:13:30 2011
Return-Path: <ruhrstadt@agentur-com4.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 90EFB28C134 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 17:13:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.292
X-Spam-Level: 
X-Spam-Status: No, score=0.292 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, URIBL_RHS_DOB=1.083]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YZQs9UFUushX for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 17:13:29 -0700 (PDT)
Received: from moutng.kundenserver.de (moutng.kundenserver.de [212.227.17.8]) by core3.amsl.com (Postfix) with ESMTP id BEB4B28C11A for <OAuth@ietf.org>; Thu, 24 Mar 2011 17:13:25 -0700 (PDT)
Received: from [78.50.69.47] (f050069047.adsl.alicedsl.de [78.50.69.47]) by mrelayeu.kundenserver.de (node=mreu2) with ESMTP (Nemesis) id 0MeOaJ-1QMt4u241X-00QH9V; Fri, 25 Mar 2011 01:15:00 +0100
Message-ID: <4D8BDE71.4040507@agentur-com4.com>
Date: Fri, 25 Mar 2011 01:14:41 +0100
From: Ruhrstadt-Agentur Com4 <ruhrstadt@agentur-com4.com>
Organization: Ruhrstadt-Agentur Com4
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.15) Gecko/20110303 Lightning/1.0b2 Thunderbird/3.1.9 ThunderBrowse/3.3.5
MIME-Version: 1.0
To: OAuth@ietf.org
Content-Type: multipart/related; boundary="------------030202020704020208050107"
X-Provags-ID: V02:K0:3g4PLngTGKJufMP0L43sn2z1brUj9g9MBykOo4OWLlh 7eR2qQQ6YKISjtoPD8sSsMa0Fok9QcjhXb+zk2dZWsFotJL/vr 3O38wEY6d18YyqncjXIH2z9j02+nYnn7imPWAxnx6CwIE770kU 0FFCu/7Ewc0TPaFgVx/Vj+rJqdnZFSGldNrSgvuH/y2sti3+Aj huOHOM4sj2YLajOSV0EkVqdcHn5cfn7R3Q/ocOVsJ0=
Subject: [OAUTH-WG] Fwd: Re: Implicit Grant Client Authentication - Pls. Remove
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 00:13:30 -0000

This is a multi-part message in MIME format.
--------------030202020704020208050107
Content-Type: text/html; charset=ISO-8859-15
Content-Transfer-Encoding: 8bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=ISO-8859-15">
  </head>
  <body bgcolor="#ffffff" text="#000000">
    <font face="Helvetica, Arial, sans-serif">Hi Craig,<br>
      <br>
      could you pls. remove me from the lists. <br>
      I coudn't find a unsubscribe-buton on the site.<br>
      <br>
      Thx. and regards,<br>
      <br>
      Gabi<br>
      <br>
    </font><br>
    <!--WISESTAMP_SIG_61606_START--><span style="color: black;">
      <div dir="ltr">
        <div><span style="color: black;">
            <div dir="ltr">
              <div><span style="color: black;">
                  <div dir="ltr">
                    <div> <font style="font-family: tahoma,sans-serif;"
                        size="3"><span style=""><strong><span
                              style="font-weight: bold;">Gabi Banfield</span><br>
                          </strong></span></font><font
                        style="font-family: tahoma,sans-serif;" size="2"><span
                          style=""><span style="font-weight: bold;"><br>
                          </span>Ruhrstadt-Agentur Com4</span></font><span
                        style="" 3="" ;="" font-family:=""
                        tahoma,sans-serif;="">
                        <div style="margin: 0pt 0pt 8px;">
                          <p style="margin: 0pt; font-family:
                            tahoma,sans-serif;"><font size="2"><span
                                style="">Düsseldorfer Str. 35</span></font></p>
                          <p style="margin: 0pt; font-family:
                            tahoma,sans-serif;"><font size="2"><span
                                style="" 2="">44143 Dortmund <br>
                              </span></font></p>
                          <p style="margin: 0pt; font-family:
                            tahoma,sans-serif;"><font size="2"><span
                                style="" 2=""><strong>Mobil:</strong>
                                0151.22685714 </span></font></p>
                          <p style="margin: 0pt; font-family:
                            tahoma,sans-serif;"><font size="2"><span
                                style=""><strong>Fax:</strong>   
                                0321.21324606 </span></font></p>
                          <p style="margin: 0pt; font-family:
                            tahoma,sans-serif;"><font size="2"><span
                                style="" 2=""><strong>Web:</strong>  
                                <a href="http://agentur-com4.com/">agentur-com4.com</a>
                              </span></font></p>
                          <p style="margin: 0pt; font-family:
                            tahoma,sans-serif;"><font size="2"><span
                                style="" 2=""><strong>Mail: </strong>  <a
href="mailto:banfield@agentur-com4.com">banfield@agentur-com4.com</a></span></font></p>
                          <p style="margin: 0pt; font-family:
                            tahoma,sans-serif;"><font size="2"><span
                                style="color: rgb(153, 153, 153);" 2=""><br>
                              </span></font></p>
                          <p style="margin: 0pt; font-family:
                            tahoma,sans-serif;"><font size="2"><span
                                style="color: rgb(153, 153, 153);
                                font-size: x-small;">Amtsgericht
                                Dortmund HRA 16316 </span></font></p>
                          <p style="margin: 0pt; font-family:
                            tahoma,sans-serif;"><font size="2"><span
                                style="color: rgb(153, 153, 153);
                                font-size: x-small;">UStNr:
                                317/5702/0638 <br>
                              </span></font></p>
                          <p style="margin: 0pt; font-family:
                            tahoma,sans-serif;"><font size="2"><span
                                style="color: rgb(153, 153, 153);" 2="">Inhaber

                                Ruhrstadt-Agentur Com4 e.K.: Gabi
                                Banfield</span></font></p>
                        </div>
                      </span></div>
                  </div>
                </span></div>
            </div>
          </span></div>
        <div style="padding: 5px 0pt; font-family: arial,sans-serif;
          font-size: 13.3px;"><a
            href="http://www.linkedin.com/in/gabibanfield"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part1.03080203.07050702@agentur-com4.com"
              alt="Linkedin" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="https://www.xing.com/profile/Gabi_Banfield"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part2.03000400.04020807@agentur-com4.com"
              alt="Xing" style="vertical-align: middle; padding-bottom:
              5px;" border="0" height="16" width="16"></a><a
            href="http://ruhrstadtagentur.wordpress.com/"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part3.06060209.03060505@agentur-com4.com"
              alt="Wordpress" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://ruhrstadtagenturcom4.blogspot.com/"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part4.08020906.00010706@agentur-com4.com"
              alt="Blogger" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://ruhrstadt-agenturcom4.posterous.com/rss.xml"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part5.03070101.06070709@agentur-com4.com"
              alt="Blog RSS" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://twitter.com/RuhrstadtCom4" style="padding: 0pt
            2px; color: blue; font-size: 10pt;" _service=""><img
              src="cid:part6.08030207.03060904@agentur-com4.com"
              alt="Twitter" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://twitter.com/GoogleWaveGER" style="padding: 0pt
            2px; color: blue; font-size: 10pt;" _service=""><img
              src="cid:part6.08030207.03060904@agentur-com4.com"
              alt="Twitter" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://twitter.com/RuhrCompilation" style="padding:
            0pt 2px; color: blue; font-size: 10pt;" _service=""><img
              src="cid:part6.08030207.03060904@agentur-com4.com"
              alt="Twitter" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://www.delicious.com/AgenturCom4" style="padding:
            0pt 2px; color: blue; font-size: 10pt;" _service=""><img
              src="cid:part9.04060607.04080201@agentur-com4.com"
              alt="del.icio.us" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://digg.com/agenturcom4" style="padding: 0pt 2px;
            color: blue; font-size: 10pt;" _service=""><img
              src="cid:part10.01080009.03060904@agentur-com4.com"
              alt="Digg" style="vertical-align: middle; padding-bottom:
              5px;" border="0" height="16" width="16"></a><a
            href="http://www.facebook.com/ruhrstadtagentur"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part11.08090002.04050300@agentur-com4.com"
              alt="Facebook" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://www.youtube.com/user/RuhrstadtAgenturCom4"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part12.02090109.07020008@agentur-com4.com"
              alt="YouTube" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://profile.typepad.com/ruhrstadtagenturcom4"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part13.00070708.06000205@agentur-com4.com"
              alt="TypePad" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://ruhrstadtagenturcom4.tumblr.com/"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part14.06000309.06030901@agentur-com4.com"
              alt="Tumblr" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://www.stumbleupon.com/stumbler/AgenturCom4/"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part15.02040302.03030803@agentur-com4.com"
              alt="Stumbleupon" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://www.myspace.com/ruhrstadt-agenturcom4"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part16.09080901.09040104@agentur-com4.com"
              alt="MySpace" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://www.google.com/profiles/agenturcom4"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part17.03090202.01020302@agentur-com4.com"
              alt="Google" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
href="http://www.slideshare.net/rss/user/RuhrstadtAgenturCom4"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part18.03060600.09040801@agentur-com4.com"
              alt="SlideShare" style="vertical-align: middle;
              padding-bottom: 5px;" border="0" height="16" width="16"></a><a
            href="http://www.bebo.com/RuhrstadtAgentCom4"
            style="padding: 0pt 2px; color: blue; font-size: 10pt;"
            _service=""><img
              src="cid:part19.00070402.04020503@agentur-com4.com"
              alt="Bebo" style="vertical-align: middle; padding-bottom:
              5px;" border="0" height="16" width="16"></a></div>
      </div>
    </span><!--WISESTAMP_SIG_61606_END--><br>
    <br>
    -------- Original-Nachricht --------
    <table class="moz-email-headers-table" border="0" cellpadding="0"
      cellspacing="0">
      <tbody>
        <tr>
          <th align="RIGHT" nowrap="nowrap" valign="BASELINE">Betreff: </th>
          <td>Re: [OAUTH-WG] Implicit Grant Client Authentication</td>
        </tr>
        <tr>
          <th align="RIGHT" nowrap="nowrap" valign="BASELINE">Datum: </th>
          <td>Thu, 24 Mar 2011 15:46:37 -0700</td>
        </tr>
        <tr>
          <th align="RIGHT" nowrap="nowrap" valign="BASELINE">Von: </th>
          <td>Eran Hammer-Lahav <a class="moz-txt-link-rfc2396E" href="mailto:eran@hueniverse.com">&lt;eran@hueniverse.com&gt;</a></td>
        </tr>
        <tr>
          <th align="RIGHT" nowrap="nowrap" valign="BASELINE">An: </th>
          <td>Craig Heath <a class="moz-txt-link-rfc2396E" href="mailto:craig.heath@wacapps.net">&lt;craig.heath@wacapps.net&gt;</a>,
            <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">"oauth@ietf.org"</a> <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a></td>
        </tr>
      </tbody>
    </table>
    <br>
    <br>
    <pre>This line was left over from an earlier draft. It's now removed. It may reappear in the security considerations section.

EHL

&gt; -----Original Message-----
&gt; From: <a class="moz-txt-link-abbreviated" href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<a class="moz-txt-link-freetext" href="mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>] On Behalf
&gt; Of Craig Heath
&gt; Sent: Thursday, March 10, 2011 10:33 AM
&gt; To: <a class="moz-txt-link-abbreviated" href="mailto:oauth@ietf.org">oauth@ietf.org</a>
&gt; Subject: [OAUTH-WG] Implicit Grant Client Authentication
&gt; 
&gt; I'm sure this has been gone over before, so apologies for that, but I haven't
&gt; found a clear answer (is there a better way than just Google to search the
&gt; mailing list archive, by the way?)
&gt; 
&gt; I've been puzzling over this text in 4.2: "... the authentication of the client is
&gt; based on the user-agent's same-origin policy."
&gt; 
&gt; I get that the client can't be provisioned with secret credentials and that's
&gt; why we're using this flow, but I'm puzzled by the implication that it might still
&gt; be possible to authenticate the client.  Isn't the point of this flow that you
&gt; can't?
&gt; 
&gt; Specifically, how would you verify that the request is coming from a user
&gt; agent that even has a same-origin policy?
&gt; 
&gt; Thanks!
&gt; 
&gt; - Craig.
&gt; 
&gt; _______________________________________________
&gt; OAuth mailing list
&gt; <a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
&gt; <a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
  </body>
</html>

--------------030202020704020208050107
Content-Type: image/png;
 name="linkedin.png"
Content-Transfer-Encoding: base64
Content-ID: <part1.03080203.07050702@agentur-com4.com>
Content-Disposition: inline;
 filename="linkedin.png"
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--------------030202020704020208050107
Content-Type: image/png;
 name="xing.png"
Content-Transfer-Encoding: base64
Content-ID: <part2.03000400.04020807@agentur-com4.com>
Content-Disposition: inline;
 filename="xing.png"
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--------------030202020704020208050107
Content-Type: image/png;
 name="wordpress.png"
Content-Transfer-Encoding: base64
Content-ID: <part3.06060209.03060505@agentur-com4.com>
Content-Disposition: inline;
 filename="wordpress.png"
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--------------030202020704020208050107
Content-Type: image/png;
 name="blogger.png"
Content-Transfer-Encoding: base64
Content-ID: <part4.08020906.00010706@agentur-com4.com>
Content-Disposition: inline;
 filename="blogger.png"
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--------------030202020704020208050107
Content-Type: image/png;
 name="blogRSS.png"
Content-Transfer-Encoding: base64
Content-ID: <part5.03070101.06070709@agentur-com4.com>
Content-Disposition: inline;
 filename="blogRSS.png"
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--------------030202020704020208050107
Content-Type: image/png;
 name="twitter.png"
Content-Transfer-Encoding: base64
Content-ID: <part6.08030207.03060904@agentur-com4.com>
Content-Disposition: inline;
 filename="twitter.png"
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--------------030202020704020208050107
Content-Type: image/png;
 name="delicious.png"
Content-Transfer-Encoding: base64
Content-ID: <part9.04060607.04080201@agentur-com4.com>
Content-Disposition: inline;
 filename="delicious.png"

iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAABmJLR0QA/wD/AP+gvaeTAAAA
CXBIWXMAAABIAAAASABGyWs+AAAACXZwQWcAAAAQAAAAEABcxq3DAAAAMElEQVQ4y2P8////
fwY8gJGRAS9gYqAQjBowGAxgZGBgwJsO7t69O8i9MGoAFQwAAF6uB7MFb4zJAAAAAElFTkSu
QmCC
--------------030202020704020208050107
Content-Type: image/png;
 name="digg.png"
Content-Transfer-Encoding: base64
Content-ID: <part10.01080009.03060904@agentur-com4.com>
Content-Disposition: inline;
 filename="digg.png"

iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAABmJLR0QA/wD/AP+gvaeTAAAA
CXBIWXMAAABIAAAASABGyWs+AAAACXZwQWcAAAAQAAAAEABcxq3DAAABF0lEQVQ4y6VSwa2F
IBAcf97dHqzgFaEVeLADepKbRyvwQAEmFmEJJpioQAD/aRWV//KSPzdgZ5idXeCfSPZ9/1jQ
tu2jQEoJxlgCAC+65JwfhfRIqKrqIsA5xziOe5ZlyYvIjDEAgDGGzheRdV2hlIJS6tpCXdcX
8rZtmOcZXdchTdPDwTRNUEpBaw0hxPH2Q0oheVkWAEBZlsdPRCYH7/cbUsozg5BMRd57SCnB
Of8z5EMgJDvnAADOORRFgdBldIzhBAj3/q21sNbCOQdrLYQQpwNK/J4+7cCdTA7zPD9D/IQ7
mQQuU6A2Yu0QeRiGh8BjkWKthLajAgCgtYYxBtZaxByEAt77p0DTNA9ibAf6vv8mtu/xC+6J
BSsBeyEmAAAAAElFTkSuQmCC
--------------030202020704020208050107
Content-Type: image/png;
 name="facebook.png"
Content-Transfer-Encoding: base64
Content-ID: <part11.08090002.04050300@agentur-com4.com>
Content-Disposition: inline;
 filename="facebook.png"

iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAIAAACQkWg2AAAABGdBTUEAAK/INwWK6QAAABl0
RVh0U29mdHdhcmUAQWRvYmUgSW1hZ2VSZWFkeXHJZTwAAACUSURBVHjaYvz//z8DKYAFiJOq
1t568IagUjUFkXltwUxAFjGq4cpY8KhQlRfuLvMUEeQGsm2iZkIEmfBogKtG9wMugGY2YRtw
hhImOLIsHY0Ntwe7hjfvv8KdBGETsCEgewncbAibfD+Q5WkuTjYNJTFcKoy0ZSCMG/dekWuD
jDjfuatPMOXQogyY+IAkI6nJGyDAAI2/LmEFAi5lAAAAAElFTkSuQmCC
--------------030202020704020208050107
Content-Type: image/png;
 name="youtube.png"
Content-Transfer-Encoding: base64
Content-ID: <part12.02090109.07020008@agentur-com4.com>
Content-Disposition: inline;
 filename="youtube.png"
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--------------030202020704020208050107
Content-Type: image/png;
 name="typepad.png"
Content-Transfer-Encoding: base64
Content-ID: <part13.00070708.06000205@agentur-com4.com>
Content-Disposition: inline;
 filename="typepad.png"
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--------------030202020704020208050107
Content-Type: image/png;
 name="tumblr.png"
Content-Transfer-Encoding: base64
Content-ID: <part14.06000309.06030901@agentur-com4.com>
Content-Disposition: inline;
 filename="tumblr.png"
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--------------030202020704020208050107
Content-Type: image/png;
 name="stumbleupon.png"
Content-Transfer-Encoding: base64
Content-ID: <part15.02040302.03030803@agentur-com4.com>
Content-Disposition: inline;
 filename="stumbleupon.png"

iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAABmJLR0QA/wD/AP+gvaeTAAAA
CXBIWXMAAABIAAAASABGyWs+AAAACXZwQWcAAAAQAAAAEABcxq3DAAAC0klEQVQ4y2WTT2hU
dxDHP7/3e7uJ222ikbhrGitKY0IrGtG2CmopttBq9KIVFG+56qXQa3sRpNCDbS/iQVQq0ovY
UJVCbSSlNLTU/lGCyapEN9lkN7vZze6+93bfv+lhX9qAPxgGhpnfDPP9jOLFpwAD0JFXUTwE
gshkZTKACfiA6n+09e0FckNrzNRwJVlIN5wmhqV+9vPBuHPA/gqoAvbyR2pl5/6Hb+yObYj/
WHLnE1bdwnM9ml6TMAhbrWzDZne4H8gCFcBTK4u9lDOaL+fbXNfF930EaRWGUVZR8fStbHNz
Z+/7wBSwqJbHrqjy3UJxLtHlbyIZewlDa0BQ2uBZMEHQaIAHC+9W+PbWg8LpI/uOApMAhrqs
zuq7MRmt/yaNMJSiF0jRC6TkB+KHofzpPRbjjha+V1IIynL1j5yw/dRFYKcJ6Hg6vq+vfRvv
JHbx0Y1J7ow9xnNslFJ88Gaam8N7SevXyFmT0d4VJLveA34wAEMnzP3ZpSwOLucPbeHaJwc4
NjSIWyzyz/QCAB3xjv/VVApS/ZuAtAEoQyuqdp7B8T18XThHd/cEVw730b0lhcTaWjqbCtpa
yotpgqEBkgaA9bv1xfquAaqWzaWHl7g6cx0NeKFH3glxBI6vP87e1EE6VZL7s4tQnikscxR/
lMl87oWh+JE1glAuTC2KOvGNcOKafPZXSewgFDcIZDRfE316ROj78DpwRkUUruv/cixTqToJ
1/eolOtIrgZrOqHpQaKdlzemSJhC/u8nMPvcZvTTi8CvZoRkvTGbuVAIXv1YPA10QM/q1oCr
BJSilslRqyyBU20yMz4C5ICsjlYrS7+MTKie12O44Q6qlqbhQMMG24a61fK1ks3Te9+RuT0F
TACZ/1AGkkAvMMCe4SFeGTyJJe0oYHG6wPz9n5i+NwfMAZmIwpmVx6SBBLAW6AE2AOkoBlAH
8tEhzQElwP4Xjs9XW4OLdFsAAAAASUVORK5CYII=
--------------030202020704020208050107
Content-Type: image/png;
 name="myspace.png"
Content-Transfer-Encoding: base64
Content-ID: <part16.09080901.09040104@agentur-com4.com>
Content-Disposition: inline;
 filename="myspace.png"
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--------------030202020704020208050107
Content-Type: image/png;
 name="google.png"
Content-Transfer-Encoding: base64
Content-ID: <part17.03090202.01020302@agentur-com4.com>
Content-Disposition: inline;
 filename="google.png"

iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAMAAAAoLQ9TAAAAAXNSR0IArs4c6QAAAARnQU1B
AACxjwv8YQUAAAAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAA
AwBQTFRFABNWKTB0DxKfFR+ACxakACKWGiWPHDiMFzuTACW9BDaxEyygFSqqEzO6Fj+/HDi1
KCaLIzWZJTO2JDqxMTexDirLEzHFGjLGIC7FHUK0HEmwHFqxIm65MWC4G17RGV/bFVz2H1b3
FWPPFWvSB2PoFGHhHWjnIFzKJlvLJ1PWL1vYN1vWIVjoImDZWmivV3O8Qm7bRnTKLbdAPLVE
SLY5TLQ7VbM5ULg9T61VR7lKTbFBTbNFQ7hQTbVSVrZKYoSpZYXYfI/Hb5rpfp7peqTWb6zv
yxQOzhQZ0RAH1h8N3BoA0R8d3RgSxyMAziYAzSoA0igP0iQZ2yUazC4i1iAvho/QiY/ZgZnf
o6nNqrbCr9L6vNf/v97wytLUws7+xNvjytPyydf/zdzz09n5yur5wfX/0OX/0uf/3ev/1/L/
4d/s//jZ4Ob87u7/5Pb25fb95Pb/5/j/6P/27//z7f/26vn/6//+6P//7v/97f//9vrr9P/q
9f/r9//t//Tt+//g+P/h+P/m//jm/v/j+v7v/f/p8PD49/H/8P/39v/x9f/z8vz98f//9vr9
9fv/9//79v3/9v//+/X3//D2//T0//b2//H5//L///X6//X///b/+Pv0//nz/P/z/P33/v/0
/f/2+vr/+P3/+//++f////j6//n7//r4//j///r8//r+//r///34//z6/v/4//z9/vz//v//
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
AAAAAAAAAAAAAAAAAAAAAAAAHF750wAAABh0RVh0U29mdHdhcmUAUGFpbnQuTkVUIHYzLjM1
MO6znwAAAQ5JREFUKFNjULEzsbC2MbOyNTa3NDUyNmbQqto4qblsSUFWT9uiWcunBTMoLFlS
memsJyzOJesa09Xkx6C0riTVkDejfGN5Ijtj7nQPBvXmJQ6Cpc0t6xdtSIrtmhPAoNYXzpE8
sbGjoXPWwg2drf4MOhOd+Geunb+qp2fKkvm1K90YNCtkpFvXrJ61YcOMDQuql/kwqFZqSC2d
PL971rq1ize0ZocwyPUYsM5e375xYlF8SnpCqy+Dbo0Lp2PJktUL4kR4hELnBTIobiyUYIru
31i3YWEac0SzO4P8/PocAZawwrnFlVEMkc2eDMqVEybk67Nxi/GJStrnbfRm0J7evBEKejes
mBrEYIwKvACGZWYWnj2XbwAAAABJRU5ErkJggg==
--------------030202020704020208050107
Content-Type: image/png;
 name="slideshare.png"
Content-Transfer-Encoding: base64
Content-ID: <part18.03060600.09040801@agentur-com4.com>
Content-Disposition: inline;
 filename="slideshare.png"
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--------------030202020704020208050107
Content-Type: image/png;
 name="bebo.png"
Content-Transfer-Encoding: base64
Content-ID: <part19.00070402.04020503@agentur-com4.com>
Content-Disposition: inline;
 filename="bebo.png"

iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAMAAAAoLQ9TAAAABGdBTUEAAK/INwWK6QAAABl0
RVh0U29mdHdhcmUAQWRvYmUgSW1hZ2VSZWFkeXHJZTwAAABLUExURfUAA/////qAgfdAQv7v
7/qPkPhgYfUQEvhQUvufoPhAQvYgI/lwcfl/gPcwMv7f4PYQE/uvr/3f3/yvsPufofuPkf3P
0P2/wPlgYs1IZmwAAACKSURBVHjaVI+JDsMgDEPtQjh7rzv+/0uXtJRpRkjJA0cOqPKSnHOy
Ww29EnFpukBAaQDBgGDkgP4HPmL4AezIMDDa6KMCgtCBogqn57Ykz+MPIHHR9rQ8Okg2dCY/
2teXPgioMd+85OfowQ1Yn2e/zBCLPpm/lLK26OTWlovStiVzcC5kb+VXgAEAmeUDYxzBHEYA
AAAASUVORK5CYII=
--------------030202020704020208050107--

From eran@hueniverse.com  Thu Mar 24 18:34:28 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 985183A691E for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 18:34:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.613
X-Spam-Level: 
X-Spam-Status: No, score=-2.613 tagged_above=-999 required=5 tests=[AWL=-0.014, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id por7aAc44XEz for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 18:34:26 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id CE0E63A691D for <oauth@ietf.org>; Thu, 24 Mar 2011 18:34:25 -0700 (PDT)
Received: (qmail 13262 invoked from network); 25 Mar 2011 01:35:59 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 01:35:59 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 24 Mar 2011 18:35:42 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Chuck Mortimore <cmortimore@salesforce.com>
Date: Thu, 24 Mar 2011 18:35:33 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvYq/YbFPHT3ougQOe8/lz6rJ3BkgKAceXCAfczQdA=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com>
In-Reply-To: <C9A40A87.1603D%cmortimore@salesforce.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 01:34:29 -0000

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Chuck Mortimore
> Sent: Monday, March 14, 2011 6:10 PM

> 1) I'd vote for dropping the following from 1.4.2. =A0=A0In turn I'd disc=
uss some of
> the security considerations, such as difficulty of protecting a client_se=
cret in
> almost all use-cases of this profile.
>=20
> =A0=A0=A0=A0"Implicit grants improve the responsiveness and efficiency of=
 some
> =A0=A0=A0clients (such as a client implemented as an in-browser applicati=
on)
> =A0=A0=A0since it reduces the number of round trips required to obtain an
> =A0=A0=A0access token."

Why drop it? What about it isn't accurate?

> 2) Section 2.1, we should MUST TLS even for Authorization Code.

Why? What's the attack vector?
=20
> 3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED since in =
4.1.1
> it's "REQUIRED unless"

The client should always confirm where the code was sent to. It can omit th=
e redirection is one was provided but should tell the server where it went =
to. This is more consistent on the verification side, but if the original f=
low designers want to chime in (Dick, Brian, etc.?), I'm open to change thi=
s.

> 4) Section 4.2.2 - when did we drop refresh_token? =A0=A0=A0=A0I assume t=
his goes
> back to disagreement on how best to handle native clients. I'd prefer it =
to
> simply reference 5.1 and leave what is issued up to the security profile =
of the
> particular deployment as to what is issued.

-08 June 2010.

This has been decided for a long time. I'm not eager to change it.

EHL



From stpeter@stpeter.im  Thu Mar 24 18:41:12 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 42F473A691A for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 18:41:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.604
X-Spam-Level: 
X-Spam-Status: No, score=-102.604 tagged_above=-999 required=5 tests=[AWL=-0.005, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bPbQ3oCC4vxC for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 18:41:11 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id E74CA3A676A for <OAuth@ietf.org>; Thu, 24 Mar 2011 18:41:10 -0700 (PDT)
Received: from squire.local (dsl-251-69.dynamic-dsl.frii.net [216.17.251.69]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id A469340022; Thu, 24 Mar 2011 19:44:01 -0600 (MDT)
Message-ID: <4D8BF309.3020302@stpeter.im>
Date: Thu, 24 Mar 2011 19:42:33 -0600
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Ruhrstadt-Agentur Com4 <ruhrstadt@agentur-com4.com>
References: <4D8BDE71.4040507@agentur-com4.com>
In-Reply-To: <4D8BDE71.4040507@agentur-com4.com>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms040403010707070001080009"
Cc: OAuth@ietf.org
Subject: Re: [OAUTH-WG] Fwd: Re: Implicit Grant Client Authentication - Pls. Remove
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 01:41:12 -0000

This is a cryptographically signed message in MIME format.

--------------ms040403010707070001080009
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Done.

On 3/24/11 6:14 PM, Ruhrstadt-Agentur Com4 wrote:
> Hi Craig,
>=20
> could you pls. remove me from the lists.
> I coudn't find a unsubscribe-buton on the site.
>=20
> Thx. and regards,
>=20
> Gabi
>=20
>=20
> *Gabi Banfield
> *
> Ruhrstadt-Agentur Com4
>=20
> D=C3=BCsseldorfer Str. 35
>=20
> 44143 Dortmund
>=20
> *Mobil:* 0151.22685714
>=20
> *Fax:*    0321.21324606
>=20
> *Web:*   agentur-com4.com <http://agentur-com4.com/>
>=20
> *Mail: *  banfield@agentur-com4.com <mailto:banfield@agentur-com4.com>
>=20
>=20
> Amtsgericht Dortmund HRA 16316
>=20
> UStNr: 317/5702/0638
>=20
> Inhaber Ruhrstadt-Agentur Com4 e.K.: Gabi Banfield
>=20
> Linkedin <http://www.linkedin.com/in/gabibanfield>Xing
> <https://www.xing.com/profile/Gabi_Banfield>Wordpress
> <http://ruhrstadtagentur.wordpress.com/>Blogger
> <http://ruhrstadtagenturcom4.blogspot.com/>Blog RSS
> <http://ruhrstadt-agenturcom4.posterous.com/rss.xml>Twitter
> <http://twitter.com/RuhrstadtCom4>Twitter
> <http://twitter.com/GoogleWaveGER>Twitter
> <http://twitter.com/RuhrCompilation>del.icio.us
> <http://www.delicious.com/AgenturCom4>Digg
> <http://digg.com/agenturcom4>Facebook
> <http://www.facebook.com/ruhrstadtagentur>YouTube
> <http://www.youtube.com/user/RuhrstadtAgenturCom4>TypePad
> <http://profile.typepad.com/ruhrstadtagenturcom4>Tumblr
> <http://ruhrstadtagenturcom4.tumblr.com/>Stumbleupon
> <http://www.stumbleupon.com/stumbler/AgenturCom4/>MySpace
> <http://www.myspace.com/ruhrstadt-agenturcom4>Google
> <http://www.google.com/profiles/agenturcom4>SlideShare
> <http://www.slideshare.net/rss/user/RuhrstadtAgenturCom4>Bebo
> <http://www.bebo.com/RuhrstadtAgentCom4>
>=20
>=20
> -------- Original-Nachricht --------
> Betreff: 	Re: [OAUTH-WG] Implicit Grant Client Authentication
> Datum: 	Thu, 24 Mar 2011 15:46:37 -0700
> Von: 	Eran Hammer-Lahav <eran@hueniverse.com>
> An: 	Craig Heath <craig.heath@wacapps.net>, "oauth@ietf.org"
> <oauth@ietf.org>
>=20
>=20
>=20
> This line was left over from an earlier draft. It's now removed. It may=
 reappear in the security considerations section.
>=20
> EHL
>=20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf=

>> Of Craig Heath
>> Sent: Thursday, March 10, 2011 10:33 AM
>> To: oauth@ietf.org
>> Subject: [OAUTH-WG] Implicit Grant Client Authentication
>>=20
>> I'm sure this has been gone over before, so apologies for that, but I =
haven't
>> found a clear answer (is there a better way than just Google to search=
 the
>> mailing list archive, by the way?)
>>=20
>> I've been puzzling over this text in 4.2: "... the authentication of t=
he client is
>> based on the user-agent's same-origin policy."
>>=20
>> I get that the client can't be provisioned with secret credentials and=
 that's
>> why we're using this flow, but I'm puzzled by the implication that it =
might still
>> be possible to authenticate the client.  Isn't the point of this flow =
that you
>> can't?
>>=20
>> Specifically, how would you verify that the request is coming from a u=
ser
>> agent that even has a same-origin policy?
>>=20
>> Thanks!
>>=20
>> - Craig.
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------ms040403010707070001080009
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms040403010707070001080009--

From phil.hunt@oracle.com  Thu Mar 24 18:44:35 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ED56F3A679F for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 18:44:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.562
X-Spam-Level: 
X-Spam-Status: No, score=-6.562 tagged_above=-999 required=5 tests=[AWL=0.036,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WcX13Sy84Buu for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 18:44:35 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id E96903A679C for <oauth@ietf.org>; Thu, 24 Mar 2011 18:44:34 -0700 (PDT)
Received: from rcsinet13.oracle.com (rcsinet13.oracle.com [148.87.113.125]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2P1k72u002280 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 25 Mar 2011 01:46:09 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by rcsinet13.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2P1k6JM032178 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 25 Mar 2011 01:46:07 GMT
Received: from abhmt006.oracle.com (abhmt006.oracle.com [141.146.116.15]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2P1k69n012414; Thu, 24 Mar 2011 20:46:06 -0500
Received: from 133.31.224.10.in-addr.arpa (/208.54.4.25) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 24 Mar 2011 18:46:06 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Thu, 24 Mar 2011 18:46:03 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <692E41D3-E4EE-4D82-89F9-5276D71D488A@oracle.com>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090203.4D8BF3DF.0131,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 01:44:36 -0000

Phil
phil.hunt@oracle.com




On 2011-03-24, at 6:35 PM, Eran Hammer-Lahav wrote:

>=20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf
>> Of Chuck Mortimore
>> Sent: Monday, March 14, 2011 6:10 PM
>=20
>> 1) I'd vote for dropping the following from 1.4.2.   In turn I'd =
discuss some of
>> the security considerations, such as difficulty of protecting a =
client_secret in
>> almost all use-cases of this profile.
>>=20
>>     "Implicit grants improve the responsiveness and efficiency of =
some
>>    clients (such as a client implemented as an in-browser =
application)
>>    since it reduces the number of round trips required to obtain an
>>    access token."
>=20
> Why drop it? What about it isn't accurate?
>=20
>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
>=20
> Why? What's the attack vector?

This was a big issue in the SAML Artifact profiles for which the OAuth =
authorization code is pretty much the same. You don't want to have the =
code hijacked/sniffed, etc, even if it is a one-time code or limited =
time code. I believe we talked about this in security considerations =
extensively.

>=20
>> 3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED since =
in 4.1.1
>> it's "REQUIRED unless"
>=20
> The client should always confirm where the code was sent to. It can =
omit the redirection is one was provided but should tell the server =
where it went to. This is more consistent on the verification side, but =
if the original flow designers want to chime in (Dick, Brian, etc.?), =
I'm open to change this.
>=20
>> 4) Section 4.2.2 - when did we drop refresh_token?     I assume this =
goes
>> back to disagreement on how best to handle native clients. I'd prefer =
it to
>> simply reference 5.1 and leave what is issued up to the security =
profile of the
>> particular deployment as to what is issued.
>=20
> -08 June 2010.
>=20
> This has been decided for a long time. I'm not eager to change it.
>=20
> EHL
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From cmortimore@salesforce.com  Thu Mar 24 19:20:37 2011
Return-Path: <cmortimore@salesforce.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EA3323A67B4 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 19:20:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[AWL=0.001,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xe73k4V4xZR0 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 19:20:36 -0700 (PDT)
Received: from exprod8og103.obsmtp.com (exprod8og103.obsmtp.com [64.18.3.86]) by core3.amsl.com (Postfix) with SMTP id 5021C3A6856 for <oauth@ietf.org>; Thu, 24 Mar 2011 19:20:35 -0700 (PDT)
Received: from source ([204.14.239.233]) by exprod8ob103.postini.com ([64.18.7.12]) with SMTP ID DSNKTYv8UsD3DvGmBGsFid9Q2YIm6DEyE6Vl@postini.com; Thu, 24 Mar 2011 19:22:11 PDT
Received: from EXSFM-MB01.internal.salesforce.com ([10.1.127.46]) by exsfm-hub5.internal.salesforce.com ([10.1.127.5]) with mapi; Thu, 24 Mar 2011 19:22:10 -0700
From: Chuck Mortimore <cmortimore@salesforce.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Date: Thu, 24 Mar 2011 19:22:05 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: Acvqk3G2fozeZgG0RL2UhKjpQlabhg==
Message-ID: <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 02:20:38 -0000

On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav" <eran@hueniverse.com> wrot=
e:

>=20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>> Of Chuck Mortimore
>> Sent: Monday, March 14, 2011 6:10 PM
>=20
>> 1) I'd vote for dropping the following from 1.4.2.   In turn I'd discuss=
 some of
>> the security considerations, such as difficulty of protecting a client_s=
ecret in
>> almost all use-cases of this profile.
>>=20
>>     "Implicit grants improve the responsiveness and efficiency of some
>>    clients (such as a client implemented as an in-browser application)
>>    since it reduces the number of round trips required to obtain an
>>    access token."
>=20
> Why drop it? What about it isn't accurate?

It's accurate, but my opinion is it sends the wrong message.   It's clearly=
 the less secure of the response types.  By positioning it as the most perf=
ormant people may find that attractive and make the wrong security decision=
.=20


>=20
>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
>=20
> Why? What's the attack vector?

See Phils comment on past experience with artifact bindings.  Spec should d=
efault for security always on, and let deployments that don't want to use H=
TTPs simply be non-conformant. =20

>=20
>> 3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED since in=
 4.1.1
>> it's "REQUIRED unless"
>=20
> The client should always confirm where the code was sent to. It can omit =
the redirection is one was provided but should tell the server where it wen=
t to. This is more consistent on the verification side, but if the original=
 flow designers want to chime in (Dick, Brian, etc.?), I'm open to change t=
his.
>=20
>> 4) Section 4.2.2 - when did we drop refresh_token?     I assume this goe=
s
>> back to disagreement on how best to handle native clients. I'd prefer it=
 to
>> simply reference 5.1 and leave what is issued up to the security profile=
 of the
>> particular deployment as to what is issued.
>=20
> -08 June 2010.
>=20
> This has been decided for a long time. I'm not eager to change it.

Thanks - I can live with it.  Unfortunately we still seem to be fragmenting=
 on the native client approach.   Good topic for IIW I suspect

-cmort

>=20
> EHL
>=20
>=20

From eran@hueniverse.com  Thu Mar 24 19:21:05 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 981AA3A691A for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 19:21:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.613
X-Spam-Level: 
X-Spam-Status: No, score=-2.613 tagged_above=-999 required=5 tests=[AWL=-0.014, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x-7sunKaFmSj for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 19:21:04 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 7DF4B3A67B0 for <oauth@ietf.org>; Thu, 24 Mar 2011 19:21:04 -0700 (PDT)
Received: (qmail 21280 invoked from network); 25 Mar 2011 02:22:37 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 02:22:37 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 24 Mar 2011 19:22:37 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Date: Thu, 24 Mar 2011 19:22:27 -0700
Thread-Topic: Feedback on draft-ietf-oauth-v2-13
Thread-Index: AcvjIIlY9nhc1m+fQaqTlLWHoqRYTwHbHUlA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FE90@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432529379F@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432529379F@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 02:21:05 -0000

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Mike Jones
> Sent: Tuesday, March 15, 2011 7:52 AM

> 2.1.1: =A0"If no valid redirection URI is available, the authorization se=
rver
> SHOULD" - I don't understand why this is a SHOULD and not a MUST

Because we cannot mandate how the authorization server interacts with the r=
esource owner. Some server may choose ignore the error and send the user to=
 some landing page.

> 3:=A0 Restore Client Assertion Credentials
>=20
> Restore the Client Assertion Credentials feature that was present in draf=
t 11,
> section 3.2.

Previously rejected due to no working group consensus.
=20
> 4.1.1:=A0 Scope string matching rules are ambiguous
>=20
> In the "scope" definition, add "The space-delimited strings are case
> insensitive."

Good call.

> 4.1, 4.2, 4.3.2, 4.4.2, 5.1, 6: =A0"Scope" parameter should be paired wit=
h
> complimentary "resource" parameter
=20
Previously rejected due to no working group consensus.

> 4.2.2:=A0 Add optional "expires_at" parameter

Previously rejected due to no working group consensus.

> 4.4.2 etc.: =A0The name "client_credentials" is confusing
>=20
> The name client_credentials does not refer to the same concept as the use=
s
> of the term "Client Credentials" in 1.4.4 and other locations in the
> document.=A0 It would be far better to rename this parameter "none" or
> "implicit", to indicate that no explicit credentials are being passed in =
the
> protocol.=A0 It might also clarify this concept if you added an example.

We had a long discussion about this and the consensus was to name it 'clien=
t_credentials'. Both 'none' and 'implicit' were rejected.

> 7:=A0 Restore WWW-Authenticate Response Header Field
>=20
> Restore the WWW-Authenticate Response Header Field that was present in
> draft 11, section 6.2.

Previously rejected due to no working group consensus.
=20
> 10:=A0 Add OAuth Errors Registry
>=20
> Add the OAuth Errors Registry from the bearer token specification, draft =
03,
> section 4.3, to the IANA Considerations.

Previously rejected due to no working group consensus. An alternative propo=
sal coming.

> 10.2:=A0 Add parameter locations to OAuth Parameters Registry
>=20
> Add the "resource request" and "resource response" parameter locations, a=
s
> defined in the bearer token specification, draft 03, section 4.2, to the =
OAuth
> Parameters Registry.

Previously rejected due to no working group consensus.

> 2.1.1: =A0"resource owner's user-agent" this may not be possible if the r=
esource
> owner is a device or if the resource owner does not have a user agent

User-agent is an generic HTTP term.

   user agent
      The client which initiates a request. These are often browsers,
      editors, spiders (web-traversing robots), or other end user tools.

> 4.1.1: =A0"parameters are present and valid" - there are no processing
> requirements section to determine what "valid" means; suggest that a
> processing section be added to understand what "valid" means otherwise
> remove the references to "valid"

It is pretty obvious that valid =3D=3D as defined (case sensitive, value fo=
rmat, not repeating, etc.).

> 4.2.1:=A0 "Due to lack of client authentication" - not sure what this is =
trying to
> get at here as this is just a client id; nothing about its usage is calle=
d out, thus
> this should go in the Security Considerations section, not here in the ma=
in
> text

This has been a big PR issue for part versions and needs to be called out e=
xplicitly right there. Changed to:

    "The client identifier alone MUST NOT be relied upon for client identif=
ication as it provides no means for authentication."

> 4.5:  Remove "I-D.ietf-oauth-saml2-bearer" until this becomes a standard
> 11.2: =A0remove references to "I-D.hammer-oauth-v2-mac-token-02", "I-D.ie=
tf-
> oauth-v2-bearer-02", "I-D.ietf-oauth-saml2-bearer-03" until these become
> standards

The RFC editor takes care of that.

EHL


From eran@hueniverse.com  Thu Mar 24 22:58:03 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AD4D33A6958 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 22:58:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.612
X-Spam-Level: 
X-Spam-Status: No, score=-2.612 tagged_above=-999 required=5 tests=[AWL=-0.013, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j2b90q2Nc-3d for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 22:58:02 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 0AD203A6821 for <oauth@ietf.org>; Thu, 24 Mar 2011 22:58:02 -0700 (PDT)
Received: (qmail 1347 invoked from network); 25 Mar 2011 05:59:36 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 05:59:36 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 24 Mar 2011 22:59:37 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Chuck Mortimore <cmortimore@salesforce.com>
Date: Thu, 24 Mar 2011 22:59:26 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: Acvqk3G2fozeZgG0RL2UhKjpQlabhgAHdeMw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FEA4@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com>
In-Reply-To: <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 05:58:04 -0000

> -----Original Message-----
> From: Chuck Mortimore [mailto:cmortimore@salesforce.com]
> Sent: Thursday, March 24, 2011 7:22 PM
> To: Eran Hammer-Lahav
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
>=20
> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav" <eran@hueniverse.com>
> wrote:
>=20
> >
> >> -----Original Message-----
> >> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
> >> Behalf Of Chuck Mortimore
> >> Sent: Monday, March 14, 2011 6:10 PM
> >
> >> 1) I'd vote for dropping the following from 1.4.2.   In turn I'd discu=
ss some
> of
> >> the security considerations, such as difficulty of protecting a
> >> client_secret in almost all use-cases of this profile.
> >>
> >>     "Implicit grants improve the responsiveness and efficiency of some
> >>    clients (such as a client implemented as an in-browser application)
> >>    since it reduces the number of round trips required to obtain an
> >>    access token."
> >
> > Why drop it? What about it isn't accurate?
>=20
> It's accurate, but my opinion is it sends the wrong message.   It's clear=
ly the
> less secure of the response types.  By positioning it as the most perform=
ant
> people may find that attractive and make the wrong security decision.

It is not less secure if you can't authenticate the client. If the applicat=
ion is running inside the browser, how is any other profile better? It is p=
erforming better for browsers and is actually more secure by not sending an=
ything over to the server hosting the static scripts.

> >> 2) Section 2.1, we should MUST TLS even for Authorization Code.
> >
> > Why? What's the attack vector?
>=20
> See Phils comment on past experience with artifact bindings.  Spec should
> default for security always on, and let deployments that don't want to us=
e
> HTTPs simply be non-conformant.

That does not explain the attack vector... The code is useless unless you h=
ave the ability to authenticate the client it was issued for. We have been =
requiring TLS solely because of secrets confidentiality (bearer token, MAC =
secret, client secret, etc.). This sounds like a different reason to requir=
e TLS, and I'm just trying to understand what it is.
=20
EHL


From eran@hueniverse.com  Thu Mar 24 23:39:43 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A6C9928B797 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 23:39:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.292
X-Spam-Level: 
X-Spam-Status: No, score=-2.292 tagged_above=-999 required=5 tests=[AWL=-0.333, BAYES_00=-2.599, SARE_OBFU_PART_ICR=0.64]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gIlIt2YDk-y3 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 23:39:42 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 544793A695F for <oauth@ietf.org>; Thu, 24 Mar 2011 23:39:42 -0700 (PDT)
Received: (qmail 9542 invoked from network); 25 Mar 2011 06:41:16 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 06:41:16 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 24 Mar 2011 23:40:56 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Freeman, Tim" <tim.freeman@hp.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 24 Mar 2011 23:40:46 -0700
Thread-Topic: Feedback on draft-ieft-oauth-v2-13.txt
Thread-Index: AcvjW9M3Qju0javhRxG3cWlQdEgu4AHVmU+w
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FEA7@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <59DD1BA8FD3C0F4C90771C18F2B5B53A6542CFF4BF@GVW0432EXB.americas.hpqcorp.net>
In-Reply-To: <59DD1BA8FD3C0F4C90771C18F2B5B53A6542CFF4BF@GVW0432EXB.americas.hpqcorp.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Feedback on draft-ieft-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 06:39:43 -0000

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Freeman, Tim
> Sent: Tuesday, March 15, 2011 2:56 PM

<snip>

I think authorization, user-agent, endpoint are well understood terms among=
 those working with HTTP which OAuth clearly requires a certain level of fa=
miliarity, but I'll sprinkle some references to make it clearer.

> Section 2.1.1, "Redirection URI".  "If a redirection URI was registered, =
the
> authorization server MUST compare any redirection URI received at the
> authorization endpoint with the registered URI."  Section 2.1 says the
> authorization endpoint is where the user (presumably also the resource
> owner, using the user-agent) interacts with the authorization server.
> Therefore, I conclude that the communication path between the client and
> the authorization server in figure 3 does not happen by the authorization
> endpoint, since the client is not the user.

The authorization endpoint response to the user-agent, redirects it back to=
 the client's callback URI.

>  I suspect it's the token endpoint,
> since there's a token in Figure 3 step E.  (If that's wrong, section 2.1 =
needs to
> be changed to say that the client uses the authorization endpoint too.)

Yes.

> Section 2.1.1 says "If a redirection URI was registered, the authorizatio=
n
> server MUST compare any redirection URI received at the authorization
> endpoint with the registered URI."  Thus I conclude that that phrase requ=
ires
> the authorization server to check the redirection URI at step A of figure=
 3, but
> not step D, since that communication comes from the client instead of the
> user and therefore is not going to the authorization endpoint.  If there =
is no
> requirement to check the redirection URI in step D, it's unclear why it's=
 there.

The client sets the redirection URI used by the resource owner to communica=
te with the authorization endpoint. Once complete, the client uses the same=
 redirection URI value to obtain a token. In the second step, it is used fo=
r verification and protection against an attack, not to redirect anything. =
Explaining the purpose of the redirection URI in step E belongs in the secu=
rity considerations section.
=20
> Section 3 "Client Authentication".  I think the intent is that client ide=
ntifiers
> are public, since they are disclosed to the user-agent in section 4.1,
> "Authorization Code".  You might want to say so, otherwise one might reas=
on
> that clients are required to publish their client identifiers (in section=
 4.1), and
> client identifiers are part of the client credentials (section 3), no cli=
ents can
> keep their credentials confidential, so no authorization servers should i=
ssue
> client credentials to any clients.
> Perhaps client identifiers are not part of the client credentials?

New text:

        Client credentials are used to identify and authenticate the client=
. The client
        credentials include a client identifier - a unique string issued to=
 the client to
        identify itself to the authorization server. The client identifier =
is not a secret, it is
        exposed to the resource owner, and MUST NOT be used alone for clien=
t authentication. Client
        authentication is accomplished via additional means such as a match=
ing client password.

> Figure 3 in section 4.1.  "User authenticates" is a two-way communication
> because the authorization server will typically prompt the user to
> authenticate, but the arrow only points from user-agent to authorization
> server, so there is no opportunity to prompt.  I think you want arrows
> pointing in both directions on the "User authenticates" path.

The arrow passes through the user-agent to the resource-owner... the limita=
tions of ascii art.

> We should get clear on whether the redirect URI is public or not.  If it'=
s public,
> and the client, all possible entities wishing to impersonate the client, =
and the
> authorization server all know it, then there's no value in communicating =
it
> from the client to the authorization server.  If it's private, that shoul=
d be
> specified when the redirection URI is introduced at step A, and the
> alternative of omitting it because it's common knowledge to the client an=
d
> the authentication server (in section 2.1.1, first paragraph) goes away s=
ince
> it's disclosed to (possibly adversarial) user agents in Figure 3, step A.

It's a session fixation attack protection which I can't recall anymore. It'=
s explained somewhere in the list archives.
=20
> Figure 3 step B: You'll need to make clear that if the resource owner is =
a
> human, there will be a need to uniquely identify the client and the reque=
sted
> resource in a human-readable way.  For example, if the actual client is
> "Microsoft, Inc.", and I am able to register a client "M1crosoft, Inc.", =
and
> humans in practice cannot distinguish "Microsoft" from "M1crosoft", peopl=
e
> might give my client authorizations that they intended to give to Microso=
ft.
>=20
> I can imagine using social engineering to leave the user in the middle of=
 one
> OAuth exchange while they start another in another window, and if popup
> windows are used for interacting with the user while authenticating, they
> might authenticate the wrong client.  In other words, the rhythm of the
> interaction is not a reliable cue to tell a human which client he's
> authenticating to, so the human-readable name of the client must be
> unambiguously stated on the screen when the user is accepting or denying
> the authorization.
>=20
> The human-readable name corresponding to a client id has to come from a
> database on the authorization server, since the client cannot be trusted =
to
> provide it.
>=20
> A similar scenario can be created where imperfect human reading
> comprehension can cause authentication to the wrong resource, if the
> operators of the authorization server allow arbitrary names for resources=
.

All good feedback for the security considerations section.

> Section 10.2.2: It says the "state" parameter can be present in the
> authorization request and authorization response.  I suppose the
> authorization response is the response to the authorization request, but =
in
> the figures up to this point the phrases "authorization grant" (Figure 1)=
 or
> "authorization code"
> (Figure 3) are used, not authorization response.  I see that there is a s=
ection
> 4.1.2 "Authorization Response".  It would be good to identify which arrow=
s in
> Figures 1 and 3 are Authorization Responses (I suspect B and C, respectiv=
ely).
> It looks like that text would not fit into the space available in the fig=
ure, but it
> would fit well in the steps listed below each of the figures.

Just (C).

EHL


From eran@hueniverse.com  Thu Mar 24 23:54:08 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 29BC028B797 for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 23:54:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.609
X-Spam-Level: 
X-Spam-Status: No, score=-2.609 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IO77ukrAb0dX for <oauth@core3.amsl.com>; Thu, 24 Mar 2011 23:54:07 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 2430028C15B for <oauth@ietf.org>; Thu, 24 Mar 2011 23:54:07 -0700 (PDT)
Received: (qmail 10519 invoked from network); 25 Mar 2011 06:55:41 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 06:55:41 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 24 Mar 2011 23:55:40 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 24 Mar 2011 23:55:30 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvkLqEL39XfVMpzQyumFx6Tv+pjkAGiPySQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FEA8@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <4D814226.9090101@mitre.org>
In-Reply-To: <4D814226.9090101@mitre.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 06:54:08 -0000

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Justin Richer
> Sent: Wednesday, March 16, 2011 4:05 PM

> Preamble:
>=20
> Does this document actually obsolete 5849? Since OAuth2 is explicitly not
> backwards compatible, is this WG really making the claim that we're updat=
ing
> OAuth, or rather defining a newer (and better) way of doing it?

People considering implementing 5849 should reconsider and implement this. =
So yeah.
=20
> 1.4.2 (et al)
>=20
> I still don't like the word "implicit" being used here, since there's rea=
lly
> nothing implicit about it. The grant being made is explicit as far as the=
 end
> user is concerned, and could even have an intermediary "do you authorize
> this?" screen in the middle. I'm still failing to come up with a better t=
erm than
> the original "user-agent" wording. What we're really talking about here i=
s a
> way for an end user to directly authorize a client as opposed to doing a
> traditional double-redirect. So it's direct like client-credentials and u=
sername-
> and-password, but it's on behalf of a user and the client still never see=
s the
> user's credentials to the AS. We need, and have needed for some time, a
> better way to say this.

Implicit as in, there isn't any string or value being issues which represen=
ts it (as in authorization code, user password, etc.). You go from request =
to access token without anything in the middle - an authorization grant.

> 2.0
>=20
> The phrase "extension grant types MAY define" should probably be the
> more encompasing "extensions MAY define".

The only use cases we've seen for new endpoints are from new grant types (e=
.g. device flow).

> 4.1.3
>=20
> "Validate the client credentials and ensure they match the authorization
> code." makes it sound like the client credentials and the authorization c=
ode
> are the same, or derived from each other. Suggest: "Validate the client
> credentials  and ensure that the client presenting the code is the same o=
ne
> the code was originally issued to." This phrasing also implies an archite=
cture
> decision: access codes need to be bound to client id's.

                Verify that the authorization code is valid, and that the r=
edirection URI matches
                the redirection URI used by the authorization server to del=
iver the authorization
                code.

> 4.1.4 (and other flows)
>=20
> What's with the "example_parameter" bit in all the examples? I think we
> only need this in 5.1's example. It's confusing when peppered throughout
> the spec without context.

I refuse to use bearer tokens as examples throughout the spec (or to waste =
a month talking about it), and I figured people will not be happy with usin=
g MAC examples exclusively (except for the two in section 7). So I am using=
 a made up access token type 'example'. I'm happy to change it to MAC examp=
les.

> 5
>=20
> This section should probably point out that the poorly-named implicit flo=
w
> doesn't use the format in here, and that the reader should go check out
> section 4.2 instead.

It's pretty clear when you read 4.2.
=20
> 6
>=20
> Do we need to say that downscoping an access token doesn't change the
> issued scope for the refresh token? It seems obvious to me, but I'm
> wondering if we want to head off questions about this behavior. In
> general, I'd still like to see an explicit section about this behavior
> apart from the (well-written) paragraph about the scope parameter.
> Particularly since we've had someone propose a rescoping proposal
> already (but I can't seem to find this in my email archives now.) I can
> propose text if the WG agrees this is of use; otherwise it probably
> belongs in developer guides.

I rather not touch the balance we have. This belongs elsewhere where scopes=
 are expanded into something more specific.

EHL

From eran@hueniverse.com  Fri Mar 25 00:04:52 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 161E73A6964 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:04:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.609
X-Spam-Level: 
X-Spam-Status: No, score=-2.609 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6zUnPEe+RpXJ for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:04:51 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 537483A695B for <oauth@ietf.org>; Fri, 25 Mar 2011 00:04:51 -0700 (PDT)
Received: (qmail 7295 invoked from network); 25 Mar 2011 07:06:26 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 07:06:26 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Fri, 25 Mar 2011 00:06:26 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Lu, Hui-Lan (Huilan)" <huilan.lu@alcatel-lucent.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Fri, 25 Mar 2011 00:06:16 -0700
Thread-Topic: One more comment on draft-ietf-oauth-v2-13
Thread-Index: Acvk2kseVH/L3D9RQXG2oC3qUM7r0wAC+IFQAXUbUrA=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FEA9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <AANLkTikNk-aYy-tFua09yBCexiwUtNDBtt+ESzxitV7C@mail.gmail.com> <0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DE5@USNAVSXCHMBSB3.ndc.alcatel-lucent.com>
In-Reply-To: <0E96A74B7DFCF844A9BE2A0BBE2C425F058DBA1DE5@USNAVSXCHMBSB3.ndc.alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] One more comment on draft-ietf-oauth-v2-13
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 07:04:52 -0000

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Lu, Hui-Lan (Huilan)
> Sent: Thursday, March 17, 2011 2:31 PM
=20
> The required binding of the client and refresh token is implied. For clar=
ity, I
> would suggest to make it explcit with the following edits:
>=20
> + In section 1.5, after the first sentence, add "Unlike the access token,=
 the
> refresh token is bound to the client and is consumed only by the
> authorization server."

          The refresh token is bound to the
          client it was issued to, and its usage requires client authentica=
tion.
=20
> + On p. 33, the sentence "The client includes its authentication credenti=
als as
> described in Section 3" is descriptive. Make it prescriptive to read "The=
 client
> MUST include its authentication credentials as described in Section 3."

Added instead:

        The authorization server MUST validate the client credentials, ensu=
re that the refresh
        token was issued to the authenticated client, validate the refresh =
token, and
        verify that the resource owner's authorization is still valid.

EHL


From eran@hueniverse.com  Fri Mar 25 00:07:21 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 12A7C3A6964 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:07:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.609
X-Spam-Level: 
X-Spam-Status: No, score=-2.609 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WRCRKLb6p0PM for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:07:20 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 0DF0F3A695B for <oauth@ietf.org>; Fri, 25 Mar 2011 00:07:20 -0700 (PDT)
Received: (qmail 10306 invoked from network); 25 Mar 2011 07:08:54 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 07:08:53 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Fri, 25 Mar 2011 00:08:53 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Paul Madsen <paul.madsen@gmail.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Fri, 25 Mar 2011 00:08:43 -0700
Thread-Topic: [OAUTH-WG] (late) feedback on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvoxbJphHOKW9cMRImZYgp874MkuAB9cASA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAA@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4D88F598.8010205@gmail.com>
In-Reply-To: <4D88F598.8010205@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] (late) feedback on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 07:07:21 -0000

How about:

            REQUIRED. The refresh token issued to the client.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Paul Madsen
> Sent: Tuesday, March 22, 2011 12:17 PM
> To: oauth@ietf.org
> Subject: [OAUTH-WG] (late) feedback on draft-ietf-oauth-v2-13.txt
>=20
> In Section 6. Refreshing an Access Token
> (http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-6) the text
>=20
> refresh_token
>           REQUIRED.  The refresh token issued along the access token bein=
g
> refreshed.
>=20
>=20
> seems both somewhat contorted and somewhat misleading
>=20
> Suggest  'along' --> 'along with' or 'along side'
>=20
> Even with the above change, the access token being refreshed may well not
> be the same as that originally issued with the refresh token (ie the firs=
t in the
> chain of access tokens issued 'off' the refresh token)
>=20
> Suggest   'The refresh token associated with the access token being
> refreshed'
>=20
> paul
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From James.H.Manger@team.telstra.com  Fri Mar 25 00:11:19 2011
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 23A603A6964 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:11:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.477
X-Spam-Level: 
X-Spam-Status: No, score=-0.477 tagged_above=-999 required=5 tests=[AWL=0.168,  BAYES_00=-2.599, FU_ENDS_2_WRDS=0.255, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, HTML_MESSAGE=0.001, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xJGnV8B0sGwH for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:11:12 -0700 (PDT)
Received: from ipxcno.tcif.telstra.com.au (ipxcno.tcif.telstra.com.au [203.35.82.208]) by core3.amsl.com (Postfix) with ESMTP id 4A0A53A6807 for <oauth@ietf.org>; Fri, 25 Mar 2011 00:11:10 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.63,242,1299416400"; d="scan'208,217";a="28547607"
Received: from unknown (HELO ipcani.tcif.telstra.com.au) ([10.97.216.200]) by ipocni.tcif.telstra.com.au with ESMTP; 25 Mar 2011 18:12:45 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6295"; a="22606709"
Received: from wsmsg3751.srv.dir.telstra.com ([172.49.40.172]) by ipcani.tcif.telstra.com.au with ESMTP; 25 Mar 2011 18:12:45 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by WSMSG3751.srv.dir.telstra.com ([172.49.40.172]) with mapi; Fri, 25 Mar 2011 18:12:45 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Fri, 25 Mar 2011 18:12:43 +1100
Thread-Topic: Authorization grant abstraction
Thread-Index: AcvqvAj2slGKEajaRm6rb+cBIbFGgw==
Message-ID: <255B9BB34FB7D647A506DC292726F6E1127FF61216@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: multipart/alternative; boundary="_000_255B9BB34FB7D647A506DC292726F6E1127FF61216WSMSG3153Vsrv_"
MIME-Version: 1.0
Subject: [OAUTH-WG] Authorization grant abstraction
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 07:11:19 -0000

--_000_255B9BB34FB7D647A506DC292726F6E1127FF61216WSMSG3153Vsrv_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

OAuth2 now defines a single URI - the token endpoint - that has to be capab=
le of processing:

*         State from a user approval interaction (encoded into a 'code' par=
ameter);

*         User passwords;

*         Client app credentials;

*         SAML tokens;

*         JSON Web Tokens (JWT);

*         Whatever other mechanisms might emerge (perhaps Kerberos tokens).

A server might only support a subset of these modes - but it always has to =
support that subset from the same URI.



This is not a useful constraint.



A better approach would be to specify the format of a token response as a s=
tandalone item (eg with its own application/credential media type). Any mod=
e get use its own URI, but link to the standardised OAuth2 processing by us=
ing the standard response format.



Alternatively, if OAuth2 insists servers supported all modes at a single to=
ken endpoint URI, it may as well take the minor extra step fixing that URI.=
 Perhaps /.well-known/oauth2.





--(more details notes on this issue)



A service might start supporting user-delegation with some off-the-shelf so=
ftware. If it later wants to support, say, JWTs using some other software i=
t has to graft some de-multiplexing layers in front. If a service want to e=
xperiment with a new mode it needs to integrate it closely with its existin=
g production parts.



Another consequence is the confusing "authorization grant" abstraction. The=
 spec makes a valiant effort to describe an abstraction that covers an app =
orchestrating a user-to-server approval flow, plus an app swapping its secr=
et for a temporary token, plus an app presenting say a SAML token, plus mor=
e.



Another consequence is the need for grant_types. Various hassles with these=
 have come up in the last month - most seem minor, but they do add confusio=
n and complexity none the less: what the labels should be (eg "code" vs "au=
thorization_code"; "client_credentials" comments); whether there should be =
a registry; if http://oauth.net/grant_type URIs are stable or need some pro=
cess control.



Mike Jones' recent draft "JSON Web Token (JWT) Bearer Profile for OAuth 2.0=
" [draft-jones-oauth-jwt-bearer] is illustrative. It defines how to swap a =
JSON Web Token for other credentials to access resources. It says to POST t=
he JWT in a 'jwt' parameter, along with an optional 'scope', to the server.=
 It also has to specify the grant type http://oauth.net/grant_type/jwt/1.0/=
bearer. Any implementation needs to be configured with a server's URI to PO=
ST the JWT to. It is hard to see how adding grant_type=3Dhttp://oauth.net/g=
rant_type/jwt/1.0/bearer to that URI is any simpler than the service just p=
roviding a JWT-specific URI (eg http://api.example.com/token/jwt).



Some services will be able to side-step the "one token endpoint" rule by ac=
ting as multiple authorization servers - simply document different token en=
dpoints (eg use http://example.com/token/delegate, http://idp.example.com/o=
auth2, and http://example.com/token/jwt as the token endpoint for "normal",=
 SAML, and JWT flows). In such a scenario grant_types look superfluous. How=
ever, a server doing this risks clashing with some future discovery protoco=
l that assumes the "one token endpoint" rule.



About the only potential benefit from the single token endpoint is that a c=
lient app (using some future discovery protocol) only needs to discover one=
 URI. But that is not realistic. A client app will also need to discover wh=
ether or not a particular mode is supported (and probably more details abou=
t that mode) so it may as well discover a mode-specific URI.



--

James Manger




--_000_255B9BB34FB7D647A506DC292726F6E1127FF61216WSMSG3153Vsrv_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
 /* List Definitions */
 @list l0
	{mso-list-id:2119829393;
	mso-list-type:hybrid;
	mso-list-template-ids:690498730 -1825799750 201916419 201916421 201916417 =
201916419 201916421 201916417 201916419 201916421;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
-->
</style><!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-AU" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">OAuth2 now defines a single URI &#8211; the token en=
dpoint &#8211; that has to be capable of processing:<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>State from a user approval interaction (enco=
ded into a &#8216;code&#8217; parameter);<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>User passwords;<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>Client app credentials;<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>SAML tokens;<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>JSON Web Tokens (JWT);<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>Whatever other mechanisms might emerge (perh=
aps Kerberos tokens).<o:p></o:p></p>
<p class=3D"MsoNormal">A server might only support a subset of these modes =
&#8211; but it always has to support that subset from the same URI.<o:p></o=
:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">This is not a useful constraint.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">A better approach would be to specify the format of =
a token response as a standalone item (eg with its own application/credenti=
al media type). Any mode get use its own URI, but link to the standardised =
OAuth2 processing by using the standard
 response format.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Alternatively, if OAuth2 insists servers supported a=
ll modes at a single token endpoint URI, it may as well take the minor extr=
a step fixing that URI. Perhaps /.well-known/oauth2.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">--(more details notes on this issue)<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">A service might start supporting user-delegation wit=
h some off-the-shelf software. If it later wants to support, say, JWTs usin=
g some other software it has to graft some de-multiplexing layers in front.=
 If a service want to experiment with
 a new mode it needs to integrate it closely with its existing production p=
arts.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Another consequence is the confusing &#8220;authoriz=
ation grant&#8221; abstraction. The spec makes a valiant effort to describe=
 an abstraction that covers an app orchestrating a user-to-server approval =
flow, plus an app swapping its secret for a temporary
 token, plus an app presenting say a SAML token, plus more.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Another consequence is the need for grant_types. Var=
ious hassles with these have come up in the last month &#8211; most seem mi=
nor, but they do add confusion and complexity none the less: what the label=
s should be (eg &#8220;code&#8221; vs &#8220;authorization_code&#8221;;
 &#8220;client_credentials&#8221; comments); whether there should be a regi=
stry; if http://oauth.net/grant_type URIs are stable or need some process c=
ontrol.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Mike Jones&#8217; recent draft &#8220;JSON Web Token=
 (JWT) Bearer Profile for OAuth 2.0&#8221; [draft-jones-oauth-jwt-bearer] i=
s illustrative. It defines how to swap a JSON Web Token for other credentia=
ls to access resources. It says to POST the JWT in a
 &#8216;jwt&#8217; parameter, along with an optional &#8216;scope&#8217;, t=
o the server. It also has to specify the grant type http://oauth.net/grant_=
type/jwt/1.0/bearer. Any implementation needs to be configured with a serve=
r&#8217;s URI to POST the JWT to. It is hard to see how adding
 grant_type=3Dhttp://oauth.net/grant_type/jwt/1.0/bearer to that URI is any=
 simpler than the service just providing a JWT-specific URI (eg http://api.=
example.com/token/jwt).<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Some services will be able to side-step the &#8220;o=
ne token endpoint&#8221; rule by acting as multiple authorization servers &=
#8211; simply document different token endpoints (eg use
<a href=3D"http://example.com/token/delegate">http://example.com/token/dele=
gate</a>,
<a href=3D"http://idp.example.com/oauth2">http://idp.example.com/oauth2</a>=
, and <a href=3D"http://example.com/token/jwt">
http://example.com/token/jwt</a> as the token endpoint for &#8220;normal&#8=
221;, SAML, and JWT flows). In such a scenario grant_types look superfluous=
. However, a server doing this risks clashing with some future discovery pr=
otocol that assumes the &#8220;one token endpoint&#8221;
 rule.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">About the only potential benefit from the single tok=
en endpoint is that a client app (using some future discovery protocol) onl=
y needs to discover one URI. But that is not realistic. A client app will a=
lso need to discover whether or not
 a particular mode is supported (and probably more details about that mode)=
 so it may as well discover a mode-specific URI.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">--<o:p></o:p></p>
<p class=3D"MsoNormal">James Manger<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_255B9BB34FB7D647A506DC292726F6E1127FF61216WSMSG3153Vsrv_--

From eran@hueniverse.com  Fri Mar 25 00:41:44 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2BEF43A696D for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:41:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.609
X-Spam-Level: 
X-Spam-Status: No, score=-2.609 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xr-K8VseO2dB for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:41:43 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 248853A6967 for <oauth@ietf.org>; Fri, 25 Mar 2011 00:41:41 -0700 (PDT)
Received: (qmail 13867 invoked from network); 25 Mar 2011 07:43:16 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 07:43:16 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Fri, 25 Mar 2011 00:42:53 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Peter Saint-Andre <stpeter@stpeter.im>, OAuth WG <oauth@ietf.org>
Date: Fri, 25 Mar 2011 00:42:43 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvpoSJtXN0TwOThQQCjkQGJ9TlF+QBGnvpQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAB@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <4D8A65BF.7060506@stpeter.im>
In-Reply-To: <4D8A65BF.7060506@stpeter.im>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 07:41:44 -0000
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From eran@hueniverse.com  Fri Mar 25 00:43:28 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 747E63A6967 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:43:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.609
X-Spam-Level: 
X-Spam-Status: No, score=-2.609 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oRVeQTX17DzO for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:43:27 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id A7DC93A6972 for <oauth@ietf.org>; Fri, 25 Mar 2011 00:43:27 -0700 (PDT)
Received: (qmail 15164 invoked from network); 25 Mar 2011 07:45:03 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 07:45:03 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Fri, 25 Mar 2011 00:45:02 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Mark Kent <mkent@proofpoint.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Fri, 25 Mar 2011 00:44:52 -0700
Thread-Topic: draft-ietf-oauth-v2-13 comments
Thread-Index: AcvcRBIdj4Jn5D8EPUCvBXh/THroSAOLRs0AAAL+LfYAENNukA==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAC@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E7234465642FE4C@P3PW5EX1MB01.EX1.SECURESERVER.NET> <C9B124FA.B520%mkent@proofpoint.com>
In-Reply-To: <C9B124FA.B520%mkent@proofpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] draft-ietf-oauth-v2-13 comments
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 07:43:28 -0000

Changed 'invalid_grand' to:

                  The provided authorization grant is invalid, expired, rev=
oked, does not match the
                  redirection URI used in the authorization request, or was=
 issued to another client.

EHL

> -----Original Message-----
> From: Mark Kent [mailto:mkent@proofpoint.com]
> Sent: Thursday, March 24, 2011 4:43 PM
> To: Eran Hammer-Lahav; oauth@ietf.org
> Subject: Re: draft-ietf-oauth-v2-13 comments
>=20
> >> 3. I believe that section 5.2 is ambiguous as to the error code that
> >> should be returned from the token endpoint when the client
> >> credentials are valid, when the client is authorized to use the
> >> authorization code grant type in general, but when the authorization
> >> code supplied is not valid for the client. I could see
> >> unauthorized_client being right, but the wording of the section
> >> doesn't include the exact case above. Please clarify.
> >
> > Why not 'invalid_grant'? If I understand your use case, the client is
> > trying to use a code issued to another client, which makes the code inv=
alid.
>=20
> It wasn't clear to me, when combining the last paragraph in section 4.1.3=
 with
> section 5.2 that the code not matching the client meant that the code was
> invalid. While you intend the term "invalid" in the context of a code/gra=
nt (in,
> e.g. Section 5.2) to be a general catch-all for errors, I missed that whe=
n
> reading the document. Perhaps a quick nod to this concept somewhere in
> either section 1.4 or 5.2 might have helped me out.
>=20
> Thanks for the other answers - quite clear.
>=20


From eran@hueniverse.com  Fri Mar 25 00:51:51 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 459703A6978 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:51:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.608
X-Spam-Level: 
X-Spam-Status: No, score=-2.608 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2hxeFM+HL4t6 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 00:51:47 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 80AC03A6976 for <oauth@ietf.org>; Fri, 25 Mar 2011 00:51:47 -0700 (PDT)
Received: (qmail 32751 invoked from network); 25 Mar 2011 07:53:22 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 07:53:21 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Fri, 25 Mar 2011 00:53:19 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Fri, 25 Mar 2011 00:53:10 -0700
Thread-Topic: Preview of -14
Thread-Index: AcvqwOe9QMhiroi5Q9qG5yk75noeKw==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAD@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234465642FEADP3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: [OAUTH-WG] Preview of -14
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 07:51:51 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234465642FEADP3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

https://github.com/hueniverse/draft-ietf-oauth/raw/master/draft-ietf-oauth-=
v2.txt

This includes all the feedback received until now. My queue is now empty ex=
cept for the need to propose a new error code extensibility solution to acc=
ommodate the needs of protocol extensions.

I replied back to all feedback, and unless your suggestions were purely edi=
torial or accepted in which case I ignored them in my response, I clearly i=
ndicated why they were rejected. Feel free to reply back. However, if your =
request was rejected due to past consensus (or lack of), you should talk to=
 the chairs and try to get the subject back on the WG's agenda.

-14 does not include any normative changes, no new features, and no changes=
 to existing code compliant with -13.

While anything can happen between now and publication as RFC, OAuth 2.0 can=
 be considered done.

I will publish this once the queue is open again.

EHL



--_000_90C41DD21FB7C64BB94121FBBC2E7234465642FEADP3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><a href=3D"https=
://github.com/hueniverse/draft-ietf-oauth/raw/master/draft-ietf-oauth-v2.tx=
t">https://github.com/hueniverse/draft-ietf-oauth/raw/master/draft-ietf-oau=
th-v2.txt</a><o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p cl=
ass=3DMsoNormal>This includes all the feedback received until now. My queue=
 is now empty except for the need to propose a new error code extensibility=
 solution to accommodate the needs of protocol extensions.<o:p></o:p></p><p=
 class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I replied back=
 to all feedback, and unless your suggestions were purely editorial or acce=
pted in which case I ignored them in my response, I clearly indicated why t=
hey were rejected. Feel free to reply back. However, if your request was re=
jected due to past consensus (or lack of), you should talk to the chairs an=
d try to get the subject back on the WG&#8217;s agenda.<o:p></o:p></p><p cl=
ass=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>-14 does not incl=
ude any normative changes, no new features, and no changes to existing code=
 compliant with -13. <o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p><=
/p><p class=3DMsoNormal>While anything can happen between now and publicati=
on as RFC, OAuth 2.0 can be considered done.<o:p></o:p></p><p class=3DMsoNo=
rmal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I will publish this once the=
 queue is open again.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p><=
/p><p class=3DMsoNormal>EHL<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;<=
/o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234465642FEADP3PW5EX1MB01E_--

From bcampbell@pingidentity.com  Fri Mar 25 07:59:10 2011
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9087A28C100 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 07:59:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.31
X-Spam-Level: 
X-Spam-Status: No, score=-5.31 tagged_above=-999 required=5 tests=[AWL=0.667,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Se9fJ4uzXFSF for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 07:59:09 -0700 (PDT)
Received: from na3sys009aog117.obsmtp.com (na3sys009aog117.obsmtp.com [74.125.149.242]) by core3.amsl.com (Postfix) with ESMTP id 2330528C0E7 for <oauth@ietf.org>; Fri, 25 Mar 2011 07:59:08 -0700 (PDT)
Received: from source ([209.85.161.50]) (using TLSv1) by na3sys009aob117.postini.com ([74.125.148.12]) with SMTP ID DSNKTYyuG+Q8cpaQe7ALY0FZPZBO3rjfTDv1@postini.com; Fri, 25 Mar 2011 08:00:45 PDT
Received: by mail-fx0-f50.google.com with SMTP id 16so1424780fxm.37 for <oauth@ietf.org>; Fri, 25 Mar 2011 08:00:43 -0700 (PDT)
Received: by 10.223.23.195 with SMTP id s3mr1008225fab.83.1301065238061; Fri, 25 Mar 2011 08:00:38 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.70.142 with HTTP; Fri, 25 Mar 2011 08:00:02 -0700 (PDT)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FE90@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432529379F@TK5EX14MBXC207.redmond.corp.microsoft.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE90@P3PW5EX1MB01.EX1.SECURESERVER.NET>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Fri, 25 Mar 2011 09:00:02 -0600
Message-ID: <AANLkTikEq2Mz2jfnzXwR_BfT5AtmS=A9AX+Kvm+wvuUx@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 14:59:10 -0000

>> 4.1.1:=A0 Scope string matching rules are ambiguous
>>
>> In the "scope" definition, add "The space-delimited strings are case
>> insensitive."
>
> Good call.

I'd like to better understand why?  Other than a means to delimit and
allow for multiple values, the spec is otherwise leaving the
interpretation of scope values up to the implementation/deployment.

From eran@hueniverse.com  Fri Mar 25 08:01:25 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C533E28C11A for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 08:01:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.609
X-Spam-Level: 
X-Spam-Status: No, score=-2.609 tagged_above=-999 required=5 tests=[AWL=-0.010, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H2-C0rGnVTQD for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 08:01:24 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id C8C2928C110 for <oauth@ietf.org>; Fri, 25 Mar 2011 08:01:24 -0700 (PDT)
Received: (qmail 901 invoked from network); 25 Mar 2011 15:02:59 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 15:02:59 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Fri, 25 Mar 2011 08:02:58 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Brian Campbell <bcampbell@pingidentity.com>
Date: Fri, 25 Mar 2011 08:02:48 -0700
Thread-Topic: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
Thread-Index: Acvq/W9hGjTLZ/CDRICLH55z+bxSwAAAB3Uw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FEF6@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432529379F@TK5EX14MBXC207.redmond.corp.microsoft.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE90@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTikEq2Mz2jfnzXwR_BfT5AtmS=A9AX+Kvm+wvuUx@mail.gmail.com>
In-Reply-To: <AANLkTikEq2Mz2jfnzXwR_BfT5AtmS=A9AX+Kvm+wvuUx@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 15:01:25 -0000

It's a safe language to align it with common assumptions. Also, in the case=
 of URI values, they are usually case insensitive.

EHL

> -----Original Message-----
> From: Brian Campbell [mailto:bcampbell@pingidentity.com]
> Sent: Friday, March 25, 2011 8:00 AM
> To: Eran Hammer-Lahav
> Cc: Mike Jones; oauth@ietf.org
> Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
>=20
> >> 4.1.1:=A0 Scope string matching rules are ambiguous
> >>
> >> In the "scope" definition, add "The space-delimited strings are case
> >> insensitive."
> >
> > Good call.
>=20
> I'd like to better understand why?  Other than a means to delimit and all=
ow
> for multiple values, the spec is otherwise leaving the interpretation of =
scope
> values up to the implementation/deployment.

From bcampbell@pingidentity.com  Fri Mar 25 09:15:33 2011
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 953813A67B0 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 09:15:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.406
X-Spam-Level: 
X-Spam-Status: No, score=-5.406 tagged_above=-999 required=5 tests=[AWL=0.571,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sM68X2nCrhaS for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 09:15:32 -0700 (PDT)
Received: from na3sys009aog103.obsmtp.com (na3sys009aog103.obsmtp.com [74.125.149.71]) by core3.amsl.com (Postfix) with ESMTP id 6416E3A67A6 for <oauth@ietf.org>; Fri, 25 Mar 2011 09:15:31 -0700 (PDT)
Received: from source ([209.85.161.42]) (using TLSv1) by na3sys009aob103.postini.com ([74.125.148.12]) with SMTP ID DSNKTYzAAo4mtitsuzpm+LVG1syOCyB+LfyH@postini.com; Fri, 25 Mar 2011 09:17:08 PDT
Received: by mail-fx0-f42.google.com with SMTP id 1so1418166fxm.29 for <oauth@ietf.org>; Fri, 25 Mar 2011 09:17:06 -0700 (PDT)
Received: by 10.223.23.195 with SMTP id s3mr1099963fab.83.1301069826245; Fri, 25 Mar 2011 09:17:06 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.70.142 with HTTP; Fri, 25 Mar 2011 09:16:36 -0700 (PDT)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FEF6@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432529379F@TK5EX14MBXC207.redmond.corp.microsoft.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE90@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTikEq2Mz2jfnzXwR_BfT5AtmS=A9AX+Kvm+wvuUx@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FEF6@P3PW5EX1MB01.EX1.SECURESERVER.NET>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Fri, 25 Mar 2011 10:16:36 -0600
Message-ID: <AANLkTikdph6=M289u4cfsUmCVy=DoGdGqA=39ViC=swY@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 16:15:33 -0000

It didn't align with the my assumption when I was implementing, which
is why I asked:)

With respect to URIs, I believe that the scheme and host are always
case-intensive but the case-sensitivity of the other parts are scheme
dependent and that, in general, comparison is hard and error prone. It
just feels like a slippery slope to start adding
normalization/comparison rules to scope.  But with that said, it's not
a big deal and I won't quibble about it.

On Fri, Mar 25, 2011 at 9:02 AM, Eran Hammer-Lahav <eran@hueniverse.com> wr=
ote:
> It's a safe language to align it with common assumptions. Also, in the ca=
se of URI values, they are usually case insensitive.
>
> EHL
>
>> -----Original Message-----
>> From: Brian Campbell [mailto:bcampbell@pingidentity.com]
>> Sent: Friday, March 25, 2011 8:00 AM
>> To: Eran Hammer-Lahav
>> Cc: Mike Jones; oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
>>
>> >> 4.1.1:=A0 Scope string matching rules are ambiguous
>> >>
>> >> In the "scope" definition, add "The space-delimited strings are case
>> >> insensitive."
>> >
>> > Good call.
>>
>> I'd like to better understand why? =A0Other than a means to delimit and =
allow
>> for multiple values, the spec is otherwise leaving the interpretation of=
 scope
>> values up to the implementation/deployment.
>

From Michael.Jones@microsoft.com  Fri Mar 25 09:22:28 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 41D253A67B5 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 09:22:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level: 
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UwatChggkwc6 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 09:22:26 -0700 (PDT)
Received: from smtp.microsoft.com (mailb.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id D5CD23A67B1 for <oauth@ietf.org>; Fri, 25 Mar 2011 09:22:26 -0700 (PDT)
Received: from TK5EX14HUBC103.redmond.corp.microsoft.com (157.54.86.9) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 25 Mar 2011 09:24:02 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14HUBC103.redmond.corp.microsoft.com ([157.54.86.9]) with mapi id 14.01.0270.002; Fri, 25 Mar 2011 09:24:02 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Brian Campbell <bcampbell@pingidentity.com>, Eran Hammer-Lahav <eran@hueniverse.com>
Thread-Topic: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
Thread-Index: AcvjIIlY9nhc1m+fQaqTlLWHoqRYTwHbHUlAACq/xQAAABi8AAACk9MAAA6CNLA=
Date: Fri, 25 Mar 2011 16:24:01 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252A8653@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B16804296739432529379F@TK5EX14MBXC207.redmond.corp.microsoft.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE90@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTikEq2Mz2jfnzXwR_BfT5AtmS=A9AX+Kvm+wvuUx@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FEF6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTikdph6=M289u4cfsUmCVy=DoGdGqA=39ViC=swY@mail.gmail.com>
In-Reply-To: <AANLkTikdph6=M289u4cfsUmCVy=DoGdGqA=39ViC=swY@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 16:22:28 -0000

Actually, despite having submitted this comment, I'm having second thoughts=
 about it as well based upon some possible use cases I'm aware of.  If, for=
 instance, a scope element contains base64url encoded content in a URL, cas=
e-folding it will destroy it.  Therefore, on reconsideration, I'd like to w=
ithdraw the comment and have the sentence about scope elements being case-i=
nsensitive removed from the draft.

				Thanks,
				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of B=
rian Campbell
Sent: Friday, March 25, 2011 9:17 AM
To: Eran Hammer-Lahav
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13

It didn't align with the my assumption when I was implementing, which is wh=
y I asked:)

With respect to URIs, I believe that the scheme and host are always case-in=
tensive but the case-sensitivity of the other parts are scheme dependent an=
d that, in general, comparison is hard and error prone. It just feels like =
a slippery slope to start adding normalization/comparison rules to scope.  =
But with that said, it's not a big deal and I won't quibble about it.

On Fri, Mar 25, 2011 at 9:02 AM, Eran Hammer-Lahav <eran@hueniverse.com> wr=
ote:
> It's a safe language to align it with common assumptions. Also, in the ca=
se of URI values, they are usually case insensitive.
>
> EHL
>
>> -----Original Message-----
>> From: Brian Campbell [mailto:bcampbell@pingidentity.com]
>> Sent: Friday, March 25, 2011 8:00 AM
>> To: Eran Hammer-Lahav
>> Cc: Mike Jones; oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
>>
>> >> 4.1.1:=A0 Scope string matching rules are ambiguous
>> >>
>> >> In the "scope" definition, add "The space-delimited strings are=20
>> >> case insensitive."
>> >
>> > Good call.
>>
>> I'd like to better understand why? =A0Other than a means to delimit and=
=20
>> allow for multiple values, the spec is otherwise leaving the=20
>> interpretation of scope values up to the implementation/deployment.
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


From zachary.zeltsan@alcatel-lucent.com  Fri Mar 25 11:31:40 2011
Return-Path: <zachary.zeltsan@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5F2CD28C0F7 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 11:31:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.252
X-Spam-Level: 
X-Spam-Status: No, score=-6.252 tagged_above=-999 required=5 tests=[AWL=0.346,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QYVv4-9rjs9w for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 11:31:37 -0700 (PDT)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by core3.amsl.com (Postfix) with ESMTP id 3AA8828C0E7 for <oauth@ietf.org>; Fri, 25 Mar 2011 11:31:36 -0700 (PDT)
Received: from usnavsmail1.ndc.alcatel-lucent.com (usnavsmail1.ndc.alcatel-lucent.com [135.3.39.9]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id p2PIX9VB018877 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 25 Mar 2011 13:33:10 -0500 (CDT)
Received: from USNAVSXCHHUB02.ndc.alcatel-lucent.com (usnavsxchhub02.ndc.alcatel-lucent.com [135.3.39.111]) by usnavsmail1.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id p2PIX95O031912 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Fri, 25 Mar 2011 13:33:09 -0500
Received: from USNAVSXCHMBSA3.ndc.alcatel-lucent.com ([135.3.39.119]) by USNAVSXCHHUB02.ndc.alcatel-lucent.com ([135.3.39.111]) with mapi; Fri, 25 Mar 2011 13:33:09 -0500
From: "Zeltsan, Zachary (Zachary)" <zachary.zeltsan@alcatel-lucent.com>
To: "'Eran Hammer-Lahav'" <eran@hueniverse.com>
Date: Fri, 25 Mar 2011 13:33:08 -0500
Thread-Topic: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
Thread-Index: AcvrGxZv82VDNMbPT2mEu5lI3KKnQw==
Message-ID: <5710F82C0E73B04FA559560098BF95B12505F04196@USNAVSXCHMBSA3.ndc.alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_5710F82C0E73B04FA559560098BF95B12505F04196USNAVSXCHMBSA_"
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.9
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 18:31:40 -0000

--_000_5710F82C0E73B04FA559560098BF95B12505F04196USNAVSXCHMBSA_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


The spelling of the name "Bearer" authentication scheme in the draft is inc=
onsistent with the spelling in
draft-ietf-oauth-v2-bearer-03.

In draft-ietf-oauth-v2-13, section 7.1:
"For example, the "bearer" token type defined...",
and
"Authorization: BEARER h480djs93hd8"

In draft-ietf-oauth-v2-bearer-03, section 2.1:
"Authorization: Bearer vF9dft4qmT"

The definition of the "Authorization" header field in draft-ietf-oauth-v2-b=
earer-03 is as follows:
credentials =3D "Bearer" RWS access-token [ RWS 1#auth-param ]
...
The core specification references the definition of the token type in the b=
earer tokens specification. So, the spelling needs to be corrected in the c=
ore specification.

Zachary






--_000_5710F82C0E73B04FA559560098BF95B12505F04196USNAVSXCHMBSA_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from rtf -->
<style><!-- .EmailQuote { margin-left: 1pt; padding-left: 4pt; border-left:=
 #800000 2px solid; } --></style>
</head>
<body>
<font face=3D"FuturaA Bk BT, sans-serif" size=3D"2">
<div>&nbsp;</div>
<div><font face=3D"Arial, sans-serif" size=3D"2">The spelling of the name &=
#8220;Bearer&#8221; authentication scheme in the draft is inconsistent with=
 the spelling in </font></div>
<div><font face=3D"Arial, sans-serif" size=3D"2">draft-ietf-oauth-v2-bearer=
-03.</font></div>
<div>&nbsp;</div>
<div><font face=3D"Arial, sans-serif" size=3D"2">In draft-ietf-oauth-v2-13,=
 section 7.1: </font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">&#8220;For example, t=
he &quot;bearer&quot; token type defined...&#8221;, </font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">and </font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">&#8220;Authorization:=
 BEARER h480djs93hd8&#8221;</font></div>
<div><font face=3D"Courier New, monospace" size=3D"3">&nbsp;</font></div>
<div><font face=3D"Arial, sans-serif" size=3D"2">In draft-ietf-oauth-v2-bea=
rer-03, section 2.1:</font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">&#8220;Authorization:=
 Bearer vF9dft4qmT&#8221;</font></div>
<div><font face=3D"Courier New, monospace" size=3D"3">&nbsp;</font></div>
<div><font face=3D"Arial, sans-serif" size=3D"2">The definition of the &#82=
20;Authorization&#8221; header field in draft-ietf-oauth-v2-bearer-03 is as=
 follows:</font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">credentials =3D &quot=
;Bearer&quot; RWS access-token [ RWS 1#auth-param ]</font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">...</font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">The core specificatio=
n references the definition of the token type in the bearer tokens specific=
ation. So, the spelling needs to be corrected in the core specification.</f=
ont></div>
<div><font face=3D"Courier New, monospace" size=3D"2">&nbsp;</font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">Zachary</font></div>
<div><font face=3D"Courier New, monospace" size=3D"3">&nbsp;</font></div>
<div>&nbsp;</div>
<div>&nbsp;</div>
<div>&nbsp;</div>
<div>&nbsp;</div>
</font>
</body>
</html>

--_000_5710F82C0E73B04FA559560098BF95B12505F04196USNAVSXCHMBSA_--

From tim.freeman@hp.com  Fri Mar 25 11:47:14 2011
Return-Path: <tim.freeman@hp.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6233928C0CF for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 11:47:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -108.119
X-Spam-Level: 
X-Spam-Status: No, score=-108.119 tagged_above=-999 required=5 tests=[AWL=-2.160, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SARE_OBFU_PART_ICR=0.64, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O97I0DphlFk3 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 11:47:12 -0700 (PDT)
Received: from g5t0009.atlanta.hp.com (g5t0009.atlanta.hp.com [15.192.0.46]) by core3.amsl.com (Postfix) with ESMTP id A440428C0CE for <oauth@ietf.org>; Fri, 25 Mar 2011 11:47:12 -0700 (PDT)
Received: from G6W0640.americas.hpqcorp.net (g6w0640.atlanta.hp.com [16.230.34.76]) (using TLSv1 with cipher RC4-MD5 (128/128 bits)) (No client certificate requested) by g5t0009.atlanta.hp.com (Postfix) with ESMTPS id DB9A630568; Fri, 25 Mar 2011 18:48:47 +0000 (UTC)
Received: from G3W0628.americas.hpqcorp.net (16.233.58.53) by G6W0640.americas.hpqcorp.net (16.230.34.76) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 25 Mar 2011 18:47:40 +0000
Received: from GVW0432EXB.americas.hpqcorp.net ([16.234.32.145]) by G3W0628.americas.hpqcorp.net ([16.233.58.53]) with mapi; Fri, 25 Mar 2011 18:47:39 +0000
From: "Freeman, Tim" <tim.freeman@hp.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Fri, 25 Mar 2011 18:47:38 +0000
Thread-Topic: Feedback on draft-ieft-oauth-v2-13.txt
Thread-Index: AcvjW9M3Qju0javhRxG3cWlQdEgu4AHVmU+wABfU5KA=
Message-ID: <59DD1BA8FD3C0F4C90771C18F2B5B53A65430EBC02@GVW0432EXB.americas.hpqcorp.net>
References: <59DD1BA8FD3C0F4C90771C18F2B5B53A6542CFF4BF@GVW0432EXB.americas.hpqcorp.net> <90C41DD21FB7C64BB94121FBBC2E7234465642FEA7@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FEA7@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Feedback on draft-ieft-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 18:47:14 -0000

Snipping out everything I agree with, there's only this remaining, includin=
g some context so this email might make sense in isolation:

Tim:
> Section 2.1.1 says "If a redirection URI was registered, the authorizatio=
n
> server MUST compare any redirection URI received at the authorization
> endpoint with the registered URI."  Thus I conclude that that phrase requ=
ires
> the authorization server to check the redirection URI at step A of figure=
 3, but
> not step D, since that communication comes from the client instead of the
> user and therefore is not going to the authorization endpoint.  If there =
is no
> requirement to check the redirection URI in step D, it's unclear why it's=
 there.

Eran:
>The client sets the redirection URI used by the resource owner to communic=
ate=20
>with the authorization endpoint.=20

Agreed.

>Once complete, the client uses the same=20
>redirection URI value to obtain a token.=20

Agreed.

>In the second step, it is used for=20
>verification and protection against an attack, not to redirect anything.=20

I agree with that statement.  My point was that the spec should say so.  Si=
nce in Section 2.1 "Authorization Endpoint" you have the sentence

   If a redirection URI was registered, the authorization
   server MUST compare any redirection URI received at the authorization
   endpoint with the registered URI.

IMO somewhere in Section 2.2 "Token Endpoint" you want to at least have a s=
entence like

   If a redirection URI was registered, the authorization
   server MUST compare any redirection URI received at the token
   endpoint with the registered URI.

or perhaps

   If a redirection URI was registered, the authorization
   server MUST compare any redirection URI received at the token
   endpoint with the redirection URI used earlier at the authorization=20
   endpoint.

depending on what you meant.  IMO the latter is more secure.
=20
>Explaining the purpose of the redirection URI in step E belongs in the=20
>security considerations section.

I suppose we agree that the security considerations section should say why =
we're doing it, but so far we're failing to discuss whether step E should s=
ay what we're doing.  IMO step E of Figure 3 should change from:

        The authorization server validates the client credentials and
        the authorization code and if valid, responds back with an
        access token.

to:

        The authorization server validates the client credentials and
        the authorization code and checks that the redirect URI matches=20
        the value used at step A.  If all these checks pass, it responds=20
        with an access token.

Actually, I'm a little confused here.  The spec seems to allow registering =
some but not all components of the redirect URI.  In that case, should step=
 E be checking that all of the redirect URI is equal to the value used in s=
tep A, or checking that it's consistent with those components that were reg=
istered?  The security works better if you do the former, but I'm not aware=
 that the spec says that anywhere.
=20
Tim Freeman
Email: tim.freeman@hp.com
Desk in Palo Alto: (650) 857-2581
Home: (408) 774-1298
Cell: (408) 348-7536

-----Original Message-----
From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]=20
Sent: Thursday, March 24, 2011 11:41 PM
To: Freeman, Tim; oauth@ietf.org
Subject: RE: Feedback on draft-ieft-oauth-v2-13.txt



> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Freeman, Tim
> Sent: Tuesday, March 15, 2011 2:56 PM

<snip>

I think authorization, user-agent, endpoint are well understood terms among=
 those working with HTTP which OAuth clearly requires a certain level of fa=
miliarity, but I'll sprinkle some references to make it clearer.

> Section 2.1.1, "Redirection URI".  "If a redirection URI was registered, =
the
> authorization server MUST compare any redirection URI received at the
> authorization endpoint with the registered URI."  Section 2.1 says the
> authorization endpoint is where the user (presumably also the resource
> owner, using the user-agent) interacts with the authorization server.
> Therefore, I conclude that the communication path between the client and
> the authorization server in figure 3 does not happen by the authorization
> endpoint, since the client is not the user.

The authorization endpoint response to the user-agent, redirects it back to=
 the client's callback URI.

>  I suspect it's the token endpoint,
> since there's a token in Figure 3 step E.  (If that's wrong, section 2.1 =
needs to
> be changed to say that the client uses the authorization endpoint too.)

Yes.

> Section 2.1.1 says "If a redirection URI was registered, the authorizatio=
n
> server MUST compare any redirection URI received at the authorization
> endpoint with the registered URI."  Thus I conclude that that phrase requ=
ires
> the authorization server to check the redirection URI at step A of figure=
 3, but
> not step D, since that communication comes from the client instead of the
> user and therefore is not going to the authorization endpoint.  If there =
is no
> requirement to check the redirection URI in step D, it's unclear why it's=
 there.

The client sets the redirection URI used by the resource owner to communica=
te with the authorization endpoint. Once complete, the client uses the same=
 redirection URI value to obtain a token. In the second step, it is used fo=
r verification and protection against an attack, not to redirect anything. =
Explaining the purpose of the redirection URI in step E belongs in the secu=
rity considerations section.
=20
> Section 3 "Client Authentication".  I think the intent is that client ide=
ntifiers
> are public, since they are disclosed to the user-agent in section 4.1,
> "Authorization Code".  You might want to say so, otherwise one might reas=
on
> that clients are required to publish their client identifiers (in section=
 4.1), and
> client identifiers are part of the client credentials (section 3), no cli=
ents can
> keep their credentials confidential, so no authorization servers should i=
ssue
> client credentials to any clients.
> Perhaps client identifiers are not part of the client credentials?

New text:

        Client credentials are used to identify and authenticate the client=
. The client
        credentials include a client identifier - a unique string issued to=
 the client to
        identify itself to the authorization server. The client identifier =
is not a secret, it is
        exposed to the resource owner, and MUST NOT be used alone for clien=
t authentication. Client
        authentication is accomplished via additional means such as a match=
ing client password.

> Figure 3 in section 4.1.  "User authenticates" is a two-way communication
> because the authorization server will typically prompt the user to
> authenticate, but the arrow only points from user-agent to authorization
> server, so there is no opportunity to prompt.  I think you want arrows
> pointing in both directions on the "User authenticates" path.

The arrow passes through the user-agent to the resource-owner... the limita=
tions of ascii art.

> We should get clear on whether the redirect URI is public or not.  If it'=
s public,
> and the client, all possible entities wishing to impersonate the client, =
and the
> authorization server all know it, then there's no value in communicating =
it
> from the client to the authorization server.  If it's private, that shoul=
d be
> specified when the redirection URI is introduced at step A, and the
> alternative of omitting it because it's common knowledge to the client an=
d
> the authentication server (in section 2.1.1, first paragraph) goes away s=
ince
> it's disclosed to (possibly adversarial) user agents in Figure 3, step A.

It's a session fixation attack protection which I can't recall anymore. It'=
s explained somewhere in the list archives.
=20
> Figure 3 step B: You'll need to make clear that if the resource owner is =
a
> human, there will be a need to uniquely identify the client and the reque=
sted
> resource in a human-readable way.  For example, if the actual client is
> "Microsoft, Inc.", and I am able to register a client "M1crosoft, Inc.", =
and
> humans in practice cannot distinguish "Microsoft" from "M1crosoft", peopl=
e
> might give my client authorizations that they intended to give to Microso=
ft.
>=20
> I can imagine using social engineering to leave the user in the middle of=
 one
> OAuth exchange while they start another in another window, and if popup
> windows are used for interacting with the user while authenticating, they
> might authenticate the wrong client.  In other words, the rhythm of the
> interaction is not a reliable cue to tell a human which client he's
> authenticating to, so the human-readable name of the client must be
> unambiguously stated on the screen when the user is accepting or denying
> the authorization.
>=20
> The human-readable name corresponding to a client id has to come from a
> database on the authorization server, since the client cannot be trusted =
to
> provide it.
>=20
> A similar scenario can be created where imperfect human reading
> comprehension can cause authentication to the wrong resource, if the
> operators of the authorization server allow arbitrary names for resources=
.

All good feedback for the security considerations section.

> Section 10.2.2: It says the "state" parameter can be present in the
> authorization request and authorization response.  I suppose the
> authorization response is the response to the authorization request, but =
in
> the figures up to this point the phrases "authorization grant" (Figure 1)=
 or
> "authorization code"
> (Figure 3) are used, not authorization response.  I see that there is a s=
ection
> 4.1.2 "Authorization Response".  It would be good to identify which arrow=
s in
> Figures 1 and 3 are Authorization Responses (I suspect B and C, respectiv=
ely).
> It looks like that text would not fit into the space available in the fig=
ure, but it
> would fit well in the steps listed below each of the figures.

Just (C).

EHL


From wmills@yahoo-inc.com  Fri Mar 25 11:49:48 2011
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A37873A63D2 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 11:49:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.598
X-Spam-Level: 
X-Spam-Status: No, score=-17.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5TxAWDw6mE-i for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 11:49:47 -0700 (PDT)
Received: from web32314.mail.mud.yahoo.com (web32314.mail.mud.yahoo.com [68.142.207.162]) by core3.amsl.com (Postfix) with SMTP id 5ECC73A6804 for <oauth@ietf.org>; Fri, 25 Mar 2011 11:49:47 -0700 (PDT)
Received: (qmail 20625 invoked by uid 60001); 25 Mar 2011 18:51:20 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1301079079; bh=nIaOw3dsEROoJFBg4+WRUkCC/36AhbdAFIt14lRGugQ=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=peafH68QY1AASiTT/r9ZZauQDfbe/T8n0s+G5PKCRLlZtuPF+LxECh09tv6Bws+pgc4x86KYuhP5lrtzzhfetxeAudjzEwthdVI2fyJAA0FmNm9STo7J52uvNpje6Yg+Y6mxrRYKadAM5dyXy8pSEIcCOfqkhqN7L7xLu4i+jNY=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=TfS0hP2FhLGNryl6NAnVpgzxZsPyiuVxjv90mNMmXkvgY9ijej1wv0LXBP+GQZMN9uGozbonR58A56Hbylsvm0f9p0FaCCUx3RP9qLDyjykXzvR4VgKgDROePUM08uOoJCtPrW+3aqQFP2GbobCfyEf9XbHKVBt3q3287Ldah54=;
Message-ID: <954418.16834.qm@web32314.mail.mud.yahoo.com>
X-YMail-OSG: NE8RsHMVM1ml068VOudsfhGv0dlFFkDrVwTkWMH6L5hGjkv QgAM1lAfJ8eKN26vDdp8pbFG6LwkntPL1YOVgeFQYZBI2WLuZv3NnYM4vM4v M7sar9HRsO8CvhXEdUHlmerGaXr1qWGnammIy_rjFrOuNzq7.VjAT1af_W7H VsFtPj_oZL5XitFcXU4_szwox9xNXMlcSHrvFmSBGKUECbTX7if3bJrga0rw jEQna1OwFyN4KjGwA69NvfA1eacE8IkJC2W6YHfumyXo.SrHpeHrUONkeP7q q7xEyxscYN8o6BEIKhk4Rzmstn.Dg0hsxphZY_tac.gbGXjR5D6DtXR_LfA6 PlIuQYESmY_2e2IIU8noAxGQEwFDA3KmREwgmrrkM0yNna2pm1FEm
Received: from [209.131.62.115] by web32314.mail.mud.yahoo.com via HTTP; Fri, 25 Mar 2011 11:51:19 PDT
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.110.299900
References: <5710F82C0E73B04FA559560098BF95B12505F04196@USNAVSXCHMBSA3.ndc.alcatel-lucent.com>
Date: Fri, 25 Mar 2011 11:51:19 -0700 (PDT)
From: "William J. Mills" <wmills@yahoo-inc.com>
To: "Zeltsan, Zachary \(Zachary\)" <zachary.zeltsan@alcatel-lucent.com>, 'Eran Hammer-Lahav' <eran@hueniverse.com>
In-Reply-To: <5710F82C0E73B04FA559560098BF95B12505F04196@USNAVSXCHMBSA3.ndc.alcatel-lucent.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-517925020-1301079079=:16834"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "William J. Mills" <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 18:49:48 -0000

--0-517925020-1301079079=:16834
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Authentication scheme names in HTTP are case insensitive.=0A=0A=0A=0A______=
__________________________=0AFrom: "Zeltsan, Zachary (Zachary)" <zachary.ze=
ltsan@alcatel-lucent.com>=0ATo: 'Eran Hammer-Lahav' <eran@hueniverse.com>=
=0ACc: OAuth WG <oauth@ietf.org>=0ASent: Friday, March 25, 2011 11:33 AM=0A=
Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13=0A=0A=0A =C2=A0=
=0AThe spelling of the name =E2=80=9CBearer=E2=80=9D authentication scheme =
in the draft is inconsistent with the spelling in =0Adraft-ietf-oauth-v2-be=
arer-03.=0A=C2=A0=0AIn draft-ietf-oauth-v2-13, section 7.1: =0A=E2=80=9CFor=
 example, the "bearer" token type defined...=E2=80=9D, =0Aand =0A=E2=80=9CA=
uthorization: BEARER h480djs93hd8=E2=80=9D=0A=C2=A0=0AIn draft-ietf-oauth-v=
2-bearer-03, section 2.1:=0A=E2=80=9CAuthorization: Bearer vF9dft4qmT=E2=80=
=9D=0A=C2=A0=0AThe definition of the =E2=80=9CAuthorization=E2=80=9D header=
 field in draft-ietf-oauth-v2-bearer-03 is as follows:=0Acredentials =3D "B=
earer" RWS access-token [ RWS 1#auth-param ]=0A...=0AThe core specification=
 references the definition of the token type in the bearer tokens specifica=
tion. So, the spelling needs to be corrected in the core specification.=0A=
=C2=A0=0AZachary=0A=C2=A0=0A=C2=A0=0A=C2=A0=0A=C2=A0=0A=C2=A0 =0A__________=
_____________________________________=0AOAuth mailing list=0AOAuth@ietf.org=
=0Ahttps://www.ietf.org/mailman/listinfo/oauth
--0-517925020-1301079079=:16834
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:ti=
mes new roman, new york, times, serif;font-size:12pt"><div><span>Authentica=
tion scheme names in HTTP are case insensitive.<br></span></div><div><br></=
div><div style=3D"font-family: times new roman, new york, times, serif; fon=
t-size: 12pt;"><div style=3D"font-family: times new roman, new york, times,=
 serif; font-size: 12pt;"><font size=3D"2" face=3D"Arial"><hr size=3D"1"><b=
><span style=3D"font-weight:bold;">From:</span></b> "Zeltsan, Zachary (Zach=
ary)" &lt;zachary.zeltsan@alcatel-lucent.com&gt;<br><b><span style=3D"font-=
weight: bold;">To:</span></b> 'Eran Hammer-Lahav' &lt;eran@hueniverse.com&g=
t;<br><b><span style=3D"font-weight: bold;">Cc:</span></b> OAuth WG &lt;oau=
th@ietf.org&gt;<br><b><span style=3D"font-weight: bold;">Sent:</span></b> F=
riday, March 25, 2011 11:33 AM<br><b><span style=3D"font-weight: bold;">Sub=
ject:</span></b> Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13<br></fon=
t><br>=0A<meta http-equiv=3D"x-dns-prefetch-control" content=3D"off"><div i=
d=3D"yiv666400132">=0A=0A =0A =0A=0A<style><!--#yiv666400132 .yiv666400132E=
mailQuote {margin-left:1pt;padding-left:4pt;border-left:#800000 2px solid;}=
--></style>=0A=0A =0A<font size=3D"2" face=3D"FuturaA Bk BT, sans-serif">=
=0A<div>&nbsp;</div>=0A<div><font size=3D"2" face=3D"Arial, sans-serif">The=
 spelling of the name =E2=80=9CBearer=E2=80=9D authentication scheme in the=
 draft is inconsistent with the spelling in </font></div>=0A<div><font size=
=3D"2" face=3D"Arial, sans-serif">draft-ietf-oauth-v2-bearer-03.</font></di=
v>=0A<div>&nbsp;</div>=0A<div><font size=3D"2" face=3D"Arial, sans-serif">I=
n draft-ietf-oauth-v2-13, section 7.1: </font></div>=0A<div><font size=3D"2=
" face=3D"Courier New, monospace">=E2=80=9CFor example, the "bearer" token =
type defined...=E2=80=9D, </font></div>=0A<div><font size=3D"2" face=3D"Cou=
rier New, monospace">and </font></div>=0A<div><font size=3D"2" face=3D"Cour=
ier New, monospace">=E2=80=9CAuthorization: BEARER h480djs93hd8=E2=80=9D</f=
ont></div>=0A<div><font size=3D"3" face=3D"Courier New, monospace">&nbsp;</=
font></div>=0A<div><font size=3D"2" face=3D"Arial, sans-serif">In draft-iet=
f-oauth-v2-bearer-03, section 2.1:</font></div>=0A<div><font size=3D"2" fac=
e=3D"Courier New, monospace">=E2=80=9CAuthorization: Bearer vF9dft4qmT=E2=
=80=9D</font></div>=0A<div><font size=3D"3" face=3D"Courier New, monospace"=
>&nbsp;</font></div>=0A<div><font size=3D"2" face=3D"Arial, sans-serif">The=
 definition of the =E2=80=9CAuthorization=E2=80=9D header field in draft-ie=
tf-oauth-v2-bearer-03 is as follows:</font></div>=0A<div><font size=3D"2" f=
ace=3D"Courier New, monospace">credentials =3D "Bearer" RWS access-token [ =
RWS 1#auth-param ]</font></div>=0A<div><font size=3D"2" face=3D"Courier New=
, monospace">...</font></div>=0A<div><font size=3D"2" face=3D"Courier New, =
monospace">The core specification references the definition of the token ty=
pe in the bearer tokens specification. So, the spelling needs to be correct=
ed in the core specification.</font></div>=0A<div><font size=3D"2" face=3D"=
Courier New, monospace">&nbsp;</font></div>=0A<div><font size=3D"2" face=3D=
"Courier New, monospace">Zachary</font></div>=0A<div><font size=3D"3" face=
=3D"Courier New, monospace">&nbsp;</font></div>=0A<div>&nbsp;</div>=0A<div>=
&nbsp;</div>=0A<div>&nbsp;</div>=0A<div>&nbsp;</div>=0A</font>=0A =0A=0A</d=
iv><meta http-equiv=3D"x-dns-prefetch-control" content=3D"on"><br>_________=
______________________________________<br>OAuth mailing list<br><a ymailto=
=3D"mailto:OAuth@ietf.org" href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a=
><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br><br><br></div></div>=
</div></body></html>
--0-517925020-1301079079=:16834--

From eran@hueniverse.com  Fri Mar 25 12:10:11 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 855053A6827 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 12:10:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.644
X-Spam-Level: 
X-Spam-Status: No, score=-2.644 tagged_above=-999 required=5 tests=[AWL=-0.045, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rolUrDM-+zK4 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 12:10:10 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 68B643A6826 for <oauth@ietf.org>; Fri, 25 Mar 2011 12:10:10 -0700 (PDT)
Received: (qmail 17497 invoked from network); 25 Mar 2011 19:11:45 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 19:11:45 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Fri, 25 Mar 2011 12:11:24 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Mike Jones <Michael.Jones@microsoft.com>, Brian Campbell <bcampbell@pingidentity.com>
Date: Fri, 25 Mar 2011 12:11:11 -0700
Thread-Topic: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
Thread-Index: AcvjIIlY9nhc1m+fQaqTlLWHoqRYTwHbHUlAACq/xQAAABi8AAACk9MAAA6CNLAAFx4Q8A==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FFCE@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4E1F6AAD24975D4BA5B16804296739432529379F@TK5EX14MBXC207.redmond.corp.microsoft.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE90@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTikEq2Mz2jfnzXwR_BfT5AtmS=A9AX+Kvm+wvuUx@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FEF6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTikdph6=M289u4cfsUmCVy=DoGdGqA=39ViC=swY@mail.gmail.com> <4E1F6AAD24975D4BA5B1680429673943252A8653@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943252A8653@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 19:10:11 -0000

That makes sense too. I'll change it to explicitly say case sensitive. Eith=
er way, this is a useful comment.

EHL

> -----Original Message-----
> From: Mike Jones [mailto:Michael.Jones@microsoft.com]
> Sent: Friday, March 25, 2011 9:24 AM
> To: Brian Campbell; Eran Hammer-Lahav
> Cc: oauth@ietf.org
> Subject: RE: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
>=20
> Actually, despite having submitted this comment, I'm having second
> thoughts about it as well based upon some possible use cases I'm aware of=
.
> If, for instance, a scope element contains base64url encoded content in a
> URL, case-folding it will destroy it.  Therefore, on reconsideration, I'd=
 like to
> withdraw the comment and have the sentence about scope elements being
> case-insensitive removed from the draft.
>=20
> 				Thanks,
> 				-- Mike
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Brian Campbell
> Sent: Friday, March 25, 2011 9:17 AM
> To: Eran Hammer-Lahav
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
>=20
> It didn't align with the my assumption when I was implementing, which is
> why I asked:)
>=20
> With respect to URIs, I believe that the scheme and host are always case-
> intensive but the case-sensitivity of the other parts are scheme dependen=
t
> and that, in general, comparison is hard and error prone. It just feels l=
ike a
> slippery slope to start adding normalization/comparison rules to scope.  =
But
> with that said, it's not a big deal and I won't quibble about it.
>=20
> On Fri, Mar 25, 2011 at 9:02 AM, Eran Hammer-Lahav
> <eran@hueniverse.com> wrote:
> > It's a safe language to align it with common assumptions. Also, in the =
case
> of URI values, they are usually case insensitive.
> >
> > EHL
> >
> >> -----Original Message-----
> >> From: Brian Campbell [mailto:bcampbell@pingidentity.com]
> >> Sent: Friday, March 25, 2011 8:00 AM
> >> To: Eran Hammer-Lahav
> >> Cc: Mike Jones; oauth@ietf.org
> >> Subject: Re: [OAUTH-WG] Feedback on draft-ietf-oauth-v2-13
> >>
> >> >> 4.1.1:=A0 Scope string matching rules are ambiguous
> >> >>
> >> >> In the "scope" definition, add "The space-delimited strings are
> >> >> case insensitive."
> >> >
> >> > Good call.
> >>
> >> I'd like to better understand why? =A0Other than a means to delimit an=
d
> >> allow for multiple values, the spec is otherwise leaving the
> >> interpretation of scope values up to the implementation/deployment.
> >
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From eran@hueniverse.com  Fri Mar 25 12:34:39 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0BB1B3A6835 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 12:34:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.644
X-Spam-Level: 
X-Spam-Status: No, score=-2.644 tagged_above=-999 required=5 tests=[AWL=-0.045, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M-9vl8NNgtGl for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 12:34:36 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id BB6263A682D for <oauth@ietf.org>; Fri, 25 Mar 2011 12:34:36 -0700 (PDT)
Received: (qmail 22920 invoked from network); 25 Mar 2011 19:36:11 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 19:36:11 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Fri, 25 Mar 2011 12:35:29 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Freeman, Tim" <tim.freeman@hp.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Fri, 25 Mar 2011 12:35:18 -0700
Thread-Topic: Feedback on draft-ieft-oauth-v2-13.txt
Thread-Index: AcvjW9M3Qju0javhRxG3cWlQdEgu4AHVmU+wABfU5KAABEZrwA==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FFE4@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <59DD1BA8FD3C0F4C90771C18F2B5B53A6542CFF4BF@GVW0432EXB.americas.hpqcorp.net> <90C41DD21FB7C64BB94121FBBC2E7234465642FEA7@P3PW5EX1MB01.EX1.SECURESERVER.NET> <59DD1BA8FD3C0F4C90771C18F2B5B53A65430EBC02@GVW0432EXB.americas.hpqcorp.net>
In-Reply-To: <59DD1BA8FD3C0F4C90771C18F2B5B53A65430EBC02@GVW0432EXB.americas.hpqcorp.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Feedback on draft-ieft-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 19:34:39 -0000

> -----Original Message-----
> From: Freeman, Tim [mailto:tim.freeman@hp.com]
> Sent: Friday, March 25, 2011 11:48 AM

> Tim:
> > Section 2.1.1 says "If a redirection URI was registered, the
> > authorization server MUST compare any redirection URI received at the
> > authorization endpoint with the registered URI."  Thus I conclude that
> > that phrase requires the authorization server to check the redirection
> > URI at step A of figure 3, but not step D, since that communication
> > comes from the client instead of the user and therefore is not going
> > to the authorization endpoint.  If there is no requirement to check the
> redirection URI in step D, it's unclear why it's there.
>=20
> Eran:
> >The client sets the redirection URI used by the resource owner to
> >communicate with the authorization endpoint.
>=20
> Agreed.
>=20
> >Once complete, the client uses the same redirection URI value to obtain
> >a token.
>=20
> Agreed.
>=20
> >In the second step, it is used for
> >verification and protection against an attack, not to redirect anything.
>=20
> I agree with that statement.  My point was that the spec should say so.  =
Since
> in Section 2.1 "Authorization Endpoint" you have the sentence
>=20
>    If a redirection URI was registered, the authorization
>    server MUST compare any redirection URI received at the authorization
>    endpoint with the registered URI.
>=20
> IMO somewhere in Section 2.2 "Token Endpoint" you want to at least have a
> sentence like
>=20
>    If a redirection URI was registered, the authorization
>    server MUST compare any redirection URI received at the token
>    endpoint with the registered URI.
>=20
> or perhaps
>=20
>    If a redirection URI was registered, the authorization
>    server MUST compare any redirection URI received at the token
>    endpoint with the redirection URI used earlier at the authorization
>    endpoint.
>=20
> depending on what you meant.  IMO the latter is more secure.

Since the redirection URI is required to be explicitly included when using =
the authorization code grant type, the fact whether it was pre-registered i=
s irrelevant at this point. The client simply has to provide the redirectio=
n URI where the code was received which will surface anyone messing with th=
e flow in the middle and manipulating the code.

I have tweaked the language around the redirection verification in a few pl=
aces in -14. Can you take a look again and see if it works better for you?

> >Explaining the purpose of the redirection URI in step E belongs in the
> >security considerations section.
>=20
> I suppose we agree that the security considerations section should say wh=
y
> we're doing it, but so far we're failing to discuss whether step E should=
 say
> what we're doing.  IMO step E of Figure 3 should change from:
>=20
>         The authorization server validates the client credentials and
>         the authorization code and if valid, responds back with an
>         access token.
>=20
> to:
>=20
>         The authorization server validates the client credentials and
>         the authorization code and checks that the redirect URI matches
>         the value used at step A.  If all these checks pass, it responds
>         with an access token.

How about:

              The authorization server validates the client credentials, th=
e authorization code,
              and ensures the redirection URI received matches the URI used=
 to redirect the client
              in step (C). If valid, responds back with an access token.

EHL

From phil.hunt@oracle.com  Fri Mar 25 12:40:21 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 654E83A682D for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 12:40:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.563
X-Spam-Level: 
X-Spam-Status: No, score=-6.563 tagged_above=-999 required=5 tests=[AWL=0.036,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aLTEaTUvTjeV for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 12:40:19 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id CC7A83A6774 for <oauth@ietf.org>; Fri, 25 Mar 2011 12:40:19 -0700 (PDT)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2PJfrux020082 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 25 Mar 2011 19:41:54 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by rcsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2PJfqIC020429 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 25 Mar 2011 19:41:52 GMT
Received: from abhmt002.oracle.com (abhmt002.oracle.com [141.146.116.11]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2PJfpHO019579; Fri, 25 Mar 2011 14:41:52 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Fri, 25 Mar 2011 12:41:51 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com>
Date: Fri, 25 Mar 2011 12:41:51 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <A12B7D5A-F7B4-4DC8-A6D1-4C4ADB53B38C@oracle.com>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt358.oracle.com [141.146.40.158]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090202.4D8CF001.0059,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 19:40:21 -0000

Regarding the message: =
http://www.ietf.org/mail-archive/web/oauth/current/msg05762.html  (sorry =
I somehow lost the message in my email).

This issue is theft of the authorization code during the redirect. =
Authenticating the client is an important feature and goes a long way, =
but it is not sufficient since in many cases, the =
client_id/client_secret will likely be hard coded and relatively easy to =
deduce (e.g. mobile client apps).  Of course a strong client =
authentication won't have this issue. This makes many consumer =
situations very susceptible to an attack where the authorization code is =
intercepted.

For more information look at the SAML Artifact issues in section 6.5 =
(specifically stolen artifact, replay, etc) of this document: =
http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf=


There are a number of remediations suggested (small lifetime, single =
use), but the foundational one is confidentiality of the exchange (TLS). =
Hence the recommendation that the return of an authorization code be =
kept secure with a MUST for TLS.

Phil
phil.hunt@oracle.com




On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:

>=20
> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav" <eran@hueniverse.com> =
wrote:
>=20
>>=20
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On =
Behalf
>>> Of Chuck Mortimore
>>> Sent: Monday, March 14, 2011 6:10 PM
>>=20
>>> 1) I'd vote for dropping the following from 1.4.2.   In turn I'd =
discuss some of
>>> the security considerations, such as difficulty of protecting a =
client_secret in
>>> almost all use-cases of this profile.
>>>=20
>>>    "Implicit grants improve the responsiveness and efficiency of =
some
>>>   clients (such as a client implemented as an in-browser =
application)
>>>   since it reduces the number of round trips required to obtain an
>>>   access token."
>>=20
>> Why drop it? What about it isn't accurate?
>=20
> It's accurate, but my opinion is it sends the wrong message.   It's =
clearly the less secure of the response types.  By positioning it as the =
most performant people may find that attractive and make the wrong =
security decision.=20
>=20
>=20
>>=20
>>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
>>=20
>> Why? What's the attack vector?
>=20
> See Phils comment on past experience with artifact bindings.  Spec =
should default for security always on, and let deployments that don't =
want to use HTTPs simply be non-conformant. =20
>=20
>>=20
>>> 3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED =
since in 4.1.1
>>> it's "REQUIRED unless"
>>=20
>> The client should always confirm where the code was sent to. It can =
omit the redirection is one was provided but should tell the server =
where it went to. This is more consistent on the verification side, but =
if the original flow designers want to chime in (Dick, Brian, etc.?), =
I'm open to change this.
>>=20
>>> 4) Section 4.2.2 - when did we drop refresh_token?     I assume this =
goes
>>> back to disagreement on how best to handle native clients. I'd =
prefer it to
>>> simply reference 5.1 and leave what is issued up to the security =
profile of the
>>> particular deployment as to what is issued.
>>=20
>> -08 June 2010.
>>=20
>> This has been decided for a long time. I'm not eager to change it.
>=20
> Thanks - I can live with it.  Unfortunately we still seem to be =
fragmenting on the native client approach.   Good topic for IIW I =
suspect
>=20
> -cmort
>=20
>>=20
>> EHL
>>=20
>>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From eran@hueniverse.com  Fri Mar 25 13:02:31 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8201428C0E2 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 13:02:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.644
X-Spam-Level: 
X-Spam-Status: No, score=-2.644 tagged_above=-999 required=5 tests=[AWL=-0.045, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ke4nJ0-7Kk+u for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 13:02:30 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 3AF8C28C0E1 for <oauth@ietf.org>; Fri, 25 Mar 2011 13:02:30 -0700 (PDT)
Received: (qmail 6788 invoked from network); 25 Mar 2011 20:04:05 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 25 Mar 2011 20:04:05 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Fri, 25 Mar 2011 13:03:47 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phil Hunt <phil.hunt@oracle.com>
Date: Fri, 25 Mar 2011 13:03:36 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvrJM5WbXjqN/e6Q4uryKbkT9QgdgAAuCrQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465642FFF1@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com> <A12B7D5A-F7B4-4DC8-A6D1-4C4ADB53B38C@oracle.com>
In-Reply-To: <A12B7D5A-F7B4-4DC8-A6D1-4C4ADB53B38C@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2011 20:02:31 -0000

Unless someone has an objection, I'll make the change from SHOULD to MUST.

EHL

> -----Original Message-----
> From: Phil Hunt [mailto:phil.hunt@oracle.com]
> Sent: Friday, March 25, 2011 12:42 PM
> To: Eran Hammer-Lahav
> Cc: OAuth WG; Chuck & Mara Mortimore
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> Regarding the message: http://www.ietf.org/mail-
> archive/web/oauth/current/msg05762.html  (sorry I somehow lost the
> message in my email).
>=20
> This issue is theft of the authorization code during the redirect.
> Authenticating the client is an important feature and goes a long way, bu=
t it is
> not sufficient since in many cases, the client_id/client_secret will like=
ly be
> hard coded and relatively easy to deduce (e.g. mobile client apps).  Of c=
ourse
> a strong client authentication won't have this issue. This makes many
> consumer situations very susceptible to an attack where the authorization
> code is intercepted.
>=20
> For more information look at the SAML Artifact issues in section 6.5
> (specifically stolen artifact, replay, etc) of this document: http://docs=
.oasis-
> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
>=20
> There are a number of remediations suggested (small lifetime, single use)=
,
> but the foundational one is confidentiality of the exchange (TLS). Hence =
the
> recommendation that the return of an authorization code be kept secure
> with a MUST for TLS.
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
>=20
> >
> > On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
> <eran@hueniverse.com> wrote:
> >
> >>
> >>> -----Original Message-----
> >>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
> >>> Behalf Of Chuck Mortimore
> >>> Sent: Monday, March 14, 2011 6:10 PM
> >>
> >>> 1) I'd vote for dropping the following from 1.4.2.   In turn I'd disc=
uss some
> of
> >>> the security considerations, such as difficulty of protecting a
> >>> client_secret in almost all use-cases of this profile.
> >>>
> >>>    "Implicit grants improve the responsiveness and efficiency of some
> >>>   clients (such as a client implemented as an in-browser application)
> >>>   since it reduces the number of round trips required to obtain an
> >>>   access token."
> >>
> >> Why drop it? What about it isn't accurate?
> >
> > It's accurate, but my opinion is it sends the wrong message.   It's cle=
arly the
> less secure of the response types.  By positioning it as the most perform=
ant
> people may find that attractive and make the wrong security decision.
> >
> >
> >>
> >>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
> >>
> >> Why? What's the attack vector?
> >
> > See Phils comment on past experience with artifact bindings.  Spec shou=
ld
> default for security always on, and let deployments that don't want to us=
e
> HTTPs simply be non-conformant.
> >
> >>
> >>> 3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED
> >>> since in 4.1.1 it's "REQUIRED unless"
> >>
> >> The client should always confirm where the code was sent to. It can om=
it
> the redirection is one was provided but should tell the server where it w=
ent
> to. This is more consistent on the verification side, but if the original=
 flow
> designers want to chime in (Dick, Brian, etc.?), I'm open to change this.
> >>
> >>> 4) Section 4.2.2 - when did we drop refresh_token?     I assume this =
goes
> >>> back to disagreement on how best to handle native clients. I'd
> >>> prefer it to simply reference 5.1 and leave what is issued up to the
> >>> security profile of the particular deployment as to what is issued.
> >>
> >> -08 June 2010.
> >>
> >> This has been decided for a long time. I'm not eager to change it.
> >
> > Thanks - I can live with it.  Unfortunately we still seem to be fragmen=
ting on
> the native client approach.   Good topic for IIW I suspect
> >
> > -cmort
> >
> >>
> >> EHL
> >>
> >>
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth


From tim.freeman@hp.com  Fri Mar 25 17:15:45 2011
Return-Path: <tim.freeman@hp.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7CCEA3A683A for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 17:15:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -107.719
X-Spam-Level: 
X-Spam-Status: No, score=-107.719 tagged_above=-999 required=5 tests=[AWL=-1.121, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dM48wAok2Toe for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 17:15:41 -0700 (PDT)
Received: from g5t0009.atlanta.hp.com (g5t0009.atlanta.hp.com [15.192.0.46]) by core3.amsl.com (Postfix) with ESMTP id A9B723A680B for <oauth@ietf.org>; Fri, 25 Mar 2011 17:15:41 -0700 (PDT)
Received: from G6W0641.americas.hpqcorp.net (g6w0641.atlanta.hp.com [16.230.34.77]) (using TLSv1 with cipher RC4-MD5 (128/128 bits)) (No client certificate requested) by g5t0009.atlanta.hp.com (Postfix) with ESMTPS id 183D630794; Sat, 26 Mar 2011 00:17:17 +0000 (UTC)
Received: from G3W0628.americas.hpqcorp.net (16.233.58.53) by G6W0641.americas.hpqcorp.net (16.230.34.77) with Microsoft SMTP Server (TLS) id 8.2.176.0; Sat, 26 Mar 2011 00:16:06 +0000
Received: from GVW0432EXB.americas.hpqcorp.net ([16.234.32.145]) by G3W0628.americas.hpqcorp.net ([16.233.58.53]) with mapi; Sat, 26 Mar 2011 00:16:06 +0000
From: "Freeman, Tim" <tim.freeman@hp.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, OAuth WG <oauth@ietf.org>
Date: Sat, 26 Mar 2011 00:16:04 +0000
Thread-Topic: What's up with the secuity considerations? (was RE: Preview of -14)
Thread-Index: AcvqwOe9QMhiroi5Q9qG5yk75noeKwAiTuxw
Message-ID: <59DD1BA8FD3C0F4C90771C18F2B5B53A654314923A@GVW0432EXB.americas.hpqcorp.net>
References: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAD@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAD@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_59DD1BA8FD3C0F4C90771C18F2B5B53A654314923AGVW0432EXBame_"
MIME-Version: 1.0
Subject: [OAUTH-WG] What's up with the secuity considerations? (was RE: Preview of -14)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Mar 2011 00:15:45 -0000

--_000_59DD1BA8FD3C0F4C90771C18F2B5B53A654314923AGVW0432EXBame_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

What's the plan for filling in the security considerations?  In the draft b=
elow I see:

>9.  Security Considerations
>
>   [[ TBD ]]

Tim Freeman
Email: tim.freeman@hp.com<mailto:tim.freeman@hp.com>
Desk in Palo Alto: (650) 857-2581
Home: (408) 774-1298
Cell: (408) 348-7536

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of E=
ran Hammer-Lahav
Sent: Friday, March 25, 2011 12:53 AM
To: OAuth WG
Subject: [OAUTH-WG] Preview of -14

https://github.com/hueniverse/draft-ietf-oauth/raw/master/draft-ietf-oauth-=
v2.txt

This includes all the feedback received until now. My queue is now empty ex=
cept for the need to propose a new error code extensibility solution to acc=
ommodate the needs of protocol extensions.

I replied back to all feedback, and unless your suggestions were purely edi=
torial or accepted in which case I ignored them in my response, I clearly i=
ndicated why they were rejected. Feel free to reply back. However, if your =
request was rejected due to past consensus (or lack of), you should talk to=
 the chairs and try to get the subject back on the WG's agenda.

-14 does not include any normative changes, no new features, and no changes=
 to existing code compliant with -13.

While anything can happen between now and publication as RFC, OAuth 2.0 can=
 be considered done.

I will publish this once the queue is open again.

EHL



--_000_59DD1BA8FD3C0F4C90771C18F2B5B53A654314923AGVW0432EXBame_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 12 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'c=
olor:#1F497D'>What's the plan for filling in the security considerations?&n=
bsp; In the draft below I see:<o:p></o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNorma=
l><span style=3D'color:#1F497D'>&gt;9.&nbsp; Security Considerations<o:p></=
o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'>&gt;<o:p>=
&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'>&=
gt;&nbsp;&nbsp; [[ TBD ]]<o:p></o:p></span></p><p class=3DMsoNormal><span s=
tyle=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><p class=3DMsoNorma=
l><span style=3D'font-size:10.0pt;font-family:"Times New Roman","serif";col=
or:#1F497D'>Tim Freeman<br>Email: <a href=3D"mailto:tim.freeman@hp.com">tim=
.freeman@hp.com</a><br>Desk in Palo Alto: (650) 857-2581<br>Home: (408) 774=
-1298<br>Cell: (408) 348-7536<o:p></o:p></span></p></div><p class=3DMsoNorm=
al><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><div styl=
e=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'>=
<p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma=
","sans-serif"'>From:</span></b><span style=3D'font-size:10.0pt;font-family=
:"Tahoma","sans-serif"'> oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.=
org] <b>On Behalf Of </b>Eran Hammer-Lahav<br><b>Sent:</b> Friday, March 25=
, 2011 12:53 AM<br><b>To:</b> OAuth WG<br><b>Subject:</b> [OAUTH-WG] Previe=
w of -14<o:p></o:p></span></p></div></div><p class=3DMsoNormal><o:p>&nbsp;<=
/o:p></p><p class=3DMsoNormal><a href=3D"https://github.com/hueniverse/draf=
t-ietf-oauth/raw/master/draft-ietf-oauth-v2.txt">https://github.com/huenive=
rse/draft-ietf-oauth/raw/master/draft-ietf-oauth-v2.txt</a><o:p></o:p></p><=
p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>This includes=
 all the feedback received until now. My queue is now empty except for the =
need to propose a new error code extensibility solution to accommodate the =
needs of protocol extensions.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp=
;</o:p></p><p class=3DMsoNormal>I replied back to all feedback, and unless =
your suggestions were purely editorial or accepted in which case I ignored =
them in my response, I clearly indicated why they were rejected. Feel free =
to reply back. However, if your request was rejected due to past consensus =
(or lack of), you should talk to the chairs and try to get the subject back=
 on the WG&#8217;s agenda.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</=
o:p></p><p class=3DMsoNormal>-14 does not include any normative changes, no=
 new features, and no changes to existing code compliant with -13. <o:p></o=
:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>While=
 anything can happen between now and publication as RFC, OAuth 2.0 can be c=
onsidered done.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>I will publish this once the queue is open again.<o:p></o=
:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>EHL<o=
:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal=
><o:p>&nbsp;</o:p></p></div></body></html>=

--_000_59DD1BA8FD3C0F4C90771C18F2B5B53A654314923AGVW0432EXBame_--

From tim.freeman@hp.com  Fri Mar 25 17:29:54 2011
Return-Path: <tim.freeman@hp.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4CF463A6863 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 17:29:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -107.439
X-Spam-Level: 
X-Spam-Status: No, score=-107.439 tagged_above=-999 required=5 tests=[AWL=-0.840, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 57uNdBPW-qLb for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 17:29:53 -0700 (PDT)
Received: from g4t0014.houston.hp.com (g4t0014.houston.hp.com [15.201.24.17]) by core3.amsl.com (Postfix) with ESMTP id 178D63A6853 for <oauth@ietf.org>; Fri, 25 Mar 2011 17:29:52 -0700 (PDT)
Received: from G6W0641.americas.hpqcorp.net (g6w0641.atlanta.hp.com [16.230.34.77]) (using TLSv1 with cipher RC4-MD5 (128/128 bits)) (No client certificate requested) by g4t0014.houston.hp.com (Postfix) with ESMTPS id 333B7247A7; Sat, 26 Mar 2011 00:31:24 +0000 (UTC)
Received: from G4W0659.americas.hpqcorp.net (16.234.40.187) by G6W0641.americas.hpqcorp.net (16.230.34.77) with Microsoft SMTP Server (TLS) id 8.2.176.0; Sat, 26 Mar 2011 00:30:24 +0000
Received: from GVW0432EXB.americas.hpqcorp.net ([16.234.32.145]) by G4W0659.americas.hpqcorp.net ([16.234.40.187]) with mapi; Sat, 26 Mar 2011 00:30:24 +0000
From: "Freeman, Tim" <tim.freeman@hp.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Sat, 26 Mar 2011 00:30:21 +0000
Thread-Topic: pre-registered not relevant; figure 3 step E (was RE: Feedback on draft-ieft-oauth-v2-13.txt)
Thread-Index: AcvjW9M3Qju0javhRxG3cWlQdEgu4AHVmU+wABfU5KAABEZrwAAKUIEw
Message-ID: <59DD1BA8FD3C0F4C90771C18F2B5B53A6543149246@GVW0432EXB.americas.hpqcorp.net>
References: <59DD1BA8FD3C0F4C90771C18F2B5B53A6542CFF4BF@GVW0432EXB.americas.hpqcorp.net> <90C41DD21FB7C64BB94121FBBC2E7234465642FEA7@P3PW5EX1MB01.EX1.SECURESERVER.NET> <59DD1BA8FD3C0F4C90771C18F2B5B53A65430EBC02@GVW0432EXB.americas.hpqcorp.net> <90C41DD21FB7C64BB94121FBBC2E7234465642FFE4@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FFE4@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [OAUTH-WG] pre-registered not relevant; figure 3 step E (was RE: Feedback on draft-ieft-oauth-v2-13.txt)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Mar 2011 00:29:54 -0000

From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]=20
> Since the redirection URI is required to be explicitly included=20
> when using the authorization code grant type, the fact whether it=20
> was pre-registered is irrelevant at this point.=20

That makes sense, thanks.

> The client simply has to provide the redirection URI where the code=20
> was received which will surface anyone messing with the flow in the=20
> middle and manipulating the code.
>
> I have tweaked the language around the redirection verification in a=20
> few places in -14. Can you take a look again and see if it works better=20
> for you?

I looked a bit and didn't see the change beyond the Figure 3 step (E) revis=
ion you mention below.  It might be there, I didn't look for long.  I'm inc=
lined to drop the issue at this point.  I'm sure you did something reasonab=
le.

> How about:
>
>     The authorization server validates the client credentials, the author=
ization code,
>     and ensures the redirection URI received matches the URI used to redi=
rect the client
>     in step (C). If valid, responds back with an access token.

Makes perfect sense technically, but I have minor grammar issues: the list =
separated by commas feels irregular.  I think the English teacher would wri=
te "Parallelism" in the margin in red ink.  Also, the second sentence has n=
o subject, and "responds back" is redundant.  I would write:

>     The authorization server validates the client credentials, validates =
the authorization code,
>     and ensures the redirection URI received matches the URI used to redi=
rect the client
>     in step (C). If valid, the authorization server responds with an acce=
ss token.
=20
Tim Freeman
Email: tim.freeman@hp.com
Desk in Palo Alto: (650) 857-2581
Home: (408) 774-1298
Cell: (408) 348-7536


-----Original Message-----
From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]=20
Sent: Friday, March 25, 2011 12:35 PM
To: Freeman, Tim; oauth@ietf.org
Subject: RE: Feedback on draft-ieft-oauth-v2-13.txt



> -----Original Message-----
> From: Freeman, Tim [mailto:tim.freeman@hp.com]
> Sent: Friday, March 25, 2011 11:48 AM

> Tim:
> > Section 2.1.1 says "If a redirection URI was registered, the
> > authorization server MUST compare any redirection URI received at the
> > authorization endpoint with the registered URI."  Thus I conclude that
> > that phrase requires the authorization server to check the redirection
> > URI at step A of figure 3, but not step D, since that communication
> > comes from the client instead of the user and therefore is not going
> > to the authorization endpoint.  If there is no requirement to check the
> redirection URI in step D, it's unclear why it's there.
>=20
> Eran:
> >The client sets the redirection URI used by the resource owner to
> >communicate with the authorization endpoint.
>=20
> Agreed.
>=20
> >Once complete, the client uses the same redirection URI value to obtain
> >a token.
>=20
> Agreed.
>=20
> >In the second step, it is used for
> >verification and protection against an attack, not to redirect anything.
>=20
> I agree with that statement.  My point was that the spec should say so.  =
Since
> in Section 2.1 "Authorization Endpoint" you have the sentence
>=20
>    If a redirection URI was registered, the authorization
>    server MUST compare any redirection URI received at the authorization
>    endpoint with the registered URI.
>=20
> IMO somewhere in Section 2.2 "Token Endpoint" you want to at least have a
> sentence like
>=20
>    If a redirection URI was registered, the authorization
>    server MUST compare any redirection URI received at the token
>    endpoint with the registered URI.
>=20
> or perhaps
>=20
>    If a redirection URI was registered, the authorization
>    server MUST compare any redirection URI received at the token
>    endpoint with the redirection URI used earlier at the authorization
>    endpoint.
>=20
> depending on what you meant.  IMO the latter is more secure.

Since the redirection URI is required to be explicitly included when using =
the authorization code grant type, the fact whether it was pre-registered i=
s irrelevant at this point. The client simply has to provide the redirectio=
n URI where the code was received which will surface anyone messing with th=
e flow in the middle and manipulating the code.

I have tweaked the language around the redirection verification in a few pl=
aces in -14. Can you take a look again and see if it works better for you?

> >Explaining the purpose of the redirection URI in step E belongs in the
> >security considerations section.
>=20
> I suppose we agree that the security considerations section should say wh=
y
> we're doing it, but so far we're failing to discuss whether step E should=
 say
> what we're doing.  IMO step E of Figure 3 should change from:
>=20
>         The authorization server validates the client credentials and
>         the authorization code and if valid, responds back with an
>         access token.
>=20
> to:
>=20
>         The authorization server validates the client credentials and
>         the authorization code and checks that the redirect URI matches
>         the value used at step A.  If all these checks pass, it responds
>         with an access token.

How about:

              The authorization server validates the client credentials, th=
e authorization code,
              and ensures the redirection URI received matches the URI used=
 to redirect the client
              in step (C). If valid, responds back with an access token.

EHL

From eran@hueniverse.com  Fri Mar 25 18:03:23 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8D45A28C104 for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 18:03:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.643
X-Spam-Level: 
X-Spam-Status: No, score=-2.643 tagged_above=-999 required=5 tests=[AWL=-0.045, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1GYVkRgq1wDI for <oauth@core3.amsl.com>; Fri, 25 Mar 2011 18:03:18 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 1D23328C102 for <oauth@ietf.org>; Fri, 25 Mar 2011 18:03:17 -0700 (PDT)
Received: (qmail 13002 invoked from network); 26 Mar 2011 01:04:51 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 26 Mar 2011 01:04:50 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Fri, 25 Mar 2011 18:04:38 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Freeman, Tim" <tim.freeman@hp.com>, OAuth WG <oauth@ietf.org>
Date: Fri, 25 Mar 2011 18:04:27 -0700
Thread-Topic: What's up with the secuity considerations? (was RE: Preview of -14)
Thread-Index: AcvqwOe9QMhiroi5Q9qG5yk75noeKwAiTuxwAAHkg/A=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E72344656430064@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAD@P3PW5EX1MB01.EX1.SECURESERVER.NET> <59DD1BA8FD3C0F4C90771C18F2B5B53A654314923A@GVW0432EXB.americas.hpqcorp.net>
In-Reply-To: <59DD1BA8FD3C0F4C90771C18F2B5B53A654314923A@GVW0432EXB.americas.hpqcorp.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E72344656430064P3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] What's up with the secuity considerations? (was RE: Preview of -14)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Mar 2011 01:03:23 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E72344656430064P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Coming right after IETF-80 in -15.

EHL

From: Freeman, Tim [mailto:tim.freeman@hp.com]
Sent: Friday, March 25, 2011 5:16 PM
To: Eran Hammer-Lahav; OAuth WG
Subject: What's up with the secuity considerations? (was RE: Preview of -14=
)

What's the plan for filling in the security considerations?  In the draft b=
elow I see:

>9.  Security Considerations
>
>   [[ TBD ]]

Tim Freeman
Email: tim.freeman@hp.com<mailto:tim.freeman@hp.com>
Desk in Palo Alto: (650) 857-2581
Home: (408) 774-1298
Cell: (408) 348-7536

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of E=
ran Hammer-Lahav
Sent: Friday, March 25, 2011 12:53 AM
To: OAuth WG
Subject: [OAUTH-WG] Preview of -14

https://github.com/hueniverse/draft-ietf-oauth/raw/master/draft-ietf-oauth-=
v2.txt

This includes all the feedback received until now. My queue is now empty ex=
cept for the need to propose a new error code extensibility solution to acc=
ommodate the needs of protocol extensions.

I replied back to all feedback, and unless your suggestions were purely edi=
torial or accepted in which case I ignored them in my response, I clearly i=
ndicated why they were rejected. Feel free to reply back. However, if your =
request was rejected due to past consensus (or lack of), you should talk to=
 the chairs and try to get the subject back on the WG's agenda.

-14 does not include any normative changes, no new features, and no changes=
 to existing code compliant with -13.

While anything can happen between now and publication as RFC, OAuth 2.0 can=
 be considered done.

I will publish this once the queue is open again.

EHL



--_000_90C41DD21FB7C64BB94121FBBC2E72344656430064P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'c=
olor:#1F497D'>Coming right after IETF-80 in -15.<o:p></o:p></span></p><p cl=
ass=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><=
p class=3DMsoNormal><span style=3D'color:#1F497D'>EHL<o:p></o:p></span></p>=
<p class=3DMsoNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span>=
</p><div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in =
0in 4.0pt'><div><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;pa=
dding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span style=3D'font-size:1=
0.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span style=3D'fon=
t-size:10.0pt;font-family:"Tahoma","sans-serif"'> Freeman, Tim [mailto:tim.=
freeman@hp.com] <br><b>Sent:</b> Friday, March 25, 2011 5:16 PM<br><b>To:</=
b> Eran Hammer-Lahav; OAuth WG<br><b>Subject:</b> What's up with the secuit=
y considerations? (was RE: Preview of -14)<o:p></o:p></span></p></div></div=
><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span style=
=3D'color:#1F497D'>What's the plan for filling in the security consideratio=
ns?&nbsp; In the draft below I see:<o:p></o:p></span></p><p class=3DMsoNorm=
al><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMso=
Normal><span style=3D'color:#1F497D'>&gt;9.&nbsp; Security Considerations<o=
:p></o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F497D'>&gt;=
<o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'color:#1F49=
7D'>&gt;&nbsp;&nbsp; [[ TBD ]]<o:p></o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><p class=3DMso=
Normal><span style=3D'font-size:10.0pt;font-family:"Times New Roman","serif=
";color:#1F497D'>Tim Freeman<br>Email: <a href=3D"mailto:tim.freeman@hp.com=
">tim.freeman@hp.com</a><br>Desk in Palo Alto: (650) 857-2581<br>Home: (408=
) 774-1298<br>Cell: (408) 348-7536<o:p></o:p></span></p></div><p class=3DMs=
oNormal><span style=3D'color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><div=
 style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in =
0in'><p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"T=
ahoma","sans-serif"'>From:</span></b><span style=3D'font-size:10.0pt;font-f=
amily:"Tahoma","sans-serif"'> oauth-bounces@ietf.org [mailto:oauth-bounces@=
ietf.org] <b>On Behalf Of </b>Eran Hammer-Lahav<br><b>Sent:</b> Friday, Mar=
ch 25, 2011 12:53 AM<br><b>To:</b> OAuth WG<br><b>Subject:</b> [OAUTH-WG] P=
review of -14<o:p></o:p></span></p></div></div><p class=3DMsoNormal><o:p>&n=
bsp;</o:p></p><p class=3DMsoNormal><a href=3D"https://github.com/hueniverse=
/draft-ietf-oauth/raw/master/draft-ietf-oauth-v2.txt">https://github.com/hu=
eniverse/draft-ietf-oauth/raw/master/draft-ietf-oauth-v2.txt</a><o:p></o:p>=
</p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>This inc=
ludes all the feedback received until now. My queue is now empty except for=
 the need to propose a new error code extensibility solution to accommodate=
 the needs of protocol extensions.<o:p></o:p></p><p class=3DMsoNormal><o:p>=
&nbsp;</o:p></p><p class=3DMsoNormal>I replied back to all feedback, and un=
less your suggestions were purely editorial or accepted in which case I ign=
ored them in my response, I clearly indicated why they were rejected. Feel =
free to reply back. However, if your request was rejected due to past conse=
nsus (or lack of), you should talk to the chairs and try to get the subject=
 back on the WG&#8217;s agenda.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nb=
sp;</o:p></p><p class=3DMsoNormal>-14 does not include any normative change=
s, no new features, and no changes to existing code compliant with -13. <o:=
p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>=
While anything can happen between now and publication as RFC, OAuth 2.0 can=
 be considered done.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></=
p><p class=3DMsoNormal>I will publish this once the queue is open again.<o:=
p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>=
EHL<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoN=
ormal><o:p>&nbsp;</o:p></p></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E72344656430064P3PW5EX1MB01E_--

From Michael.Jones@microsoft.com  Fri Mar 25 22:24:13 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 344083A6805; Fri, 25 Mar 2011 22:24:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1HvIeJ3rv-No; Fri, 25 Mar 2011 22:24:08 -0700 (PDT)
Received: from smtp.microsoft.com (mail2.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 9BBDD3A68D2; Fri, 25 Mar 2011 22:24:07 -0700 (PDT)
Received: from TK5EX14MLTC101.redmond.corp.microsoft.com (157.54.79.178) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 25 Mar 2011 22:25:37 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14MLTC101.redmond.corp.microsoft.com ([157.54.79.178]) with mapi id 14.01.0270.002; Fri, 25 Mar 2011 22:25:37 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: "oauth@ietf.org" <oauth@ietf.org>, "woes@ietf.org" <woes@ietf.org>, "openid-specs-ab@lists.openid.net" <openid-specs-ab@lists.openid.net>
Thread-Topic: JSON Web Token (JWT) and JSON Web Signature (JWS) now in separate specs
Thread-Index: AcvrdjytBVRrDTgeReCPOh8gPYdaIg==
Date: Sat, 26 Mar 2011 05:25:36 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252A9198@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943252A9198TK5EX14MBXC207r_"
MIME-Version: 1.0
Cc: "openid-specs@lists.openid.net" <openid-specs@lists.openid.net>
Subject: [OAUTH-WG] JSON Web Token (JWT) and JSON Web Signature (JWS) now in separate specs
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Mar 2011 05:24:13 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943252A9198TK5EX14MBXC207r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

As promised, I have split the contents of the JWT spec draft-jones-json-web=
-token-01<http://self-issued.info/docs/draft-jones-json-web-token-01.html> =
into two simpler specs:
                draft-jones-json-web-token-02<http://self-issued.info/docs/=
draft-jones-json-web-token-02.html>
                draft-jones-json-web-signature-00<http://self-issued.info/d=
ocs/draft-jones-json-web-signature-00.html>
These should have introduced no semantic changes from the previous spec.

I then applied the feedback that I received since JWT -01 and created revis=
ed versions of the split specs:
                draft-jones-json-web-token-03<http://self-issued.info/docs/=
draft-jones-json-web-token-03.html>
                draft-jones-json-web-signature-01<http://self-issued.info/d=
ocs/draft-jones-json-web-signature-01.html>
The only breaking change introduced was that x5t (X.509 Certificate Thumbpr=
int) is now a SHA-1 hash of the DER-encoded certificate, rather than a SHA-=
256 has, as SHA-1 is the prevailing existing practice for certificate thumb=
print calculations.  See the Document History sections for details on each =
change made.

.txt and .xml versions are also available.  I plan to publish these as IETF=
 drafts once the submission window re-opens on Monday.  Feedback welcome!

                                                            -- Mike

P.S.  Yes, work on the companion encryption spec is now under way...


--_000_4E1F6AAD24975D4BA5B1680429673943252A9198TK5EX14MBXC207r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">As promised, I have split the contents of the JWT sp=
ec <a href=3D"http://self-issued.info/docs/draft-jones-json-web-token-01.ht=
ml">
draft-jones-json-web-token-01</a> into two simpler specs:<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"http://self-issued.info/d=
ocs/draft-jones-json-web-token-02.html">
draft-jones-json-web-token-02</a><o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"http://self-issued.info/d=
ocs/draft-jones-json-web-signature-00.html">
draft-jones-json-web-signature-00</a><o:p></o:p></p>
<p class=3D"MsoNormal">These should have introduced no semantic changes fro=
m the previous spec.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I then applied the feedback that I received since JW=
T -01 and created revised versions of the split specs:<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"http://self-issued.info/d=
ocs/draft-jones-json-web-token-03.html">
draft-jones-json-web-token-03</a><o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"http://self-issued.info/d=
ocs/draft-jones-json-web-signature-01.html">
draft-jones-json-web-signature-01</a><o:p></o:p></p>
<p class=3D"MsoNormal">The only breaking change introduced was that x5t (X.=
509 Certificate Thumbprint) is now a SHA-1 hash of the DER-encoded certific=
ate, rather than a SHA-256 has, as SHA-1 is the prevailing existing practic=
e for certificate thumbprint calculations.&nbsp;
 See the Document History sections for details on each change made.<o:p></o=
:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">.txt and .xml versions are also available.&nbsp; I p=
lan to publish these as IETF drafts once the submission window re-opens on =
Monday.&nbsp; Feedback welcome!<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">P.S.&nbsp; Yes, work on the companion encryption spe=
c is now under way&#8230;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943252A9198TK5EX14MBXC207r_--

From stpeter@stpeter.im  Sat Mar 26 13:30:46 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7CFA23A6836 for <oauth@core3.amsl.com>; Sat, 26 Mar 2011 13:30:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.962
X-Spam-Level: 
X-Spam-Status: No, score=-101.962 tagged_above=-999 required=5 tests=[AWL=-0.432, BAYES_00=-2.599, DATE_IN_PAST_06_12=1.069, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CERsbEpsROUK for <oauth@core3.amsl.com>; Sat, 26 Mar 2011 13:30:16 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id B07BB3A6821 for <oauth@ietf.org>; Sat, 26 Mar 2011 13:30:16 -0700 (PDT)
Received: from dhcp-104b.meeting.ietf.org (dhcp-104b.meeting.ietf.org [130.129.16.75]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 04D5540046; Sat, 26 Mar 2011 14:33:17 -0600 (MDT)
Message-ID: <4D8DF070.30106@stpeter.im>
Date: Sat, 26 Mar 2011 14:56:00 +0100
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <4D8A65BF.7060506@stpeter.im> <90C41DD21FB7C64BB94121FBBC2E7234465642FEAB@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAB@P3PW5EX1MB01.EX1.SECURESERVER.NET>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms070201080204060305080808"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Mar 2011 20:30:46 -0000

This is a cryptographically signed message in MIME format.

--------------ms070201080204060305080808
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

[written while in transit, delivery will be delayed]

Thanks for the clarifications. A few comments and questions inline,
other topics elided for brevity.

On 3/25/11 1:42 AM, Eran Hammer-Lahav wrote:
>=20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf=

>> Of Peter Saint-Andre
>> Sent: Wednesday, March 23, 2011 2:27 PM
>=20
>> 3. In the definition of "token endpoint" in Section 2, should "used to=

>> exchange an authorization grant for an access token" be "used to excha=
nge
>> an authorization grant or refresh token for an access token"?
>=20
> I guess. A refresh token is an authorization grant of sorts.

Section 1.4 is about authorization grants and Section 1.5 is about
refresh tokens, so I assumed that the latter is not included in the
former. Thus my confusion.

>> 5. Section 3 states:
>>
>>    The authorization server SHOULD NOT issue client credentials to
>>    clients incapable of keeping their secrets confidential.
>>
>> How does the authorization server know that a client is not capable of=

>> keeping its secrets confidential?
>=20
> Ask. Most services ask about the client type in their registration proc=
ess.

Now that you phrase it that way, it makes sense (no in-band discovery
needed). Perhaps add a parenthetical phrase such as:

   The authorization server SHOULD NOT issue client credentials to
   clients incapable of keeping their secrets confidential (e.g., as
   determined when the client registers with the authorization server).

>> 7. The various subsections of Section 4 have lots of repeated text for=
 the
>> parameter definitions (e.g., "client_id" and "scope", as well as the e=
rror
>> codes). I think it would be cleaner to define these once and reference=
 those
>> definitions throughout the spec.
>=20
> Tried that. It was nicer for the editor but much less readable. Most pe=
ople are not expected to read the entire specification, just the parts th=
ey care about. This is the result of many long rewrites.

OK, I just worry about saying the same thing in different places but in
slightly different ways. We'll want to harmonize them at the end (could
be handled via XML entities within the source document).

>> 8. The various subsections of Section 4 also provide conflicting infor=
mation
>> about various parameter values. For example, Section 4.1.1 says of
>> "response_type" that it "MUST be set to "code"" whereas Section
>> 4.2.1 says "MUST be set to "token"". It would reduce the possibility o=
f
>> confusion to say "When the request is an authorization request, the
>> response_type MUST be set to "code"" or somesuch.
>=20
> Added to 2.1:
>=20
>    The REQUIRED "response_type" request parameter is used to identify
>    which grant type the client is requesting: authorization code or
>    implicit, described in Section 4.1.1 and Section 4.2.1 respectively.=

>    If the request is missing the "response_type" parameter, the
>    authorization server SHOULD return an error response as described in=

>    Section 4.1.2.1.

WFM.

>> 9. What is the expected lifetime of access tokens? Does it make sense =
to
>> have expires_at (in UTC) instead of, or in addition to, expires_in (a =
number
>> of seconds)?
>=20
> Lifetime is out of scope. As for the parameter, we had a few long threa=
ds and the conclusion was that expires_in is easier to issue and as easy =
to parse. The client can always take the Date header and add the value to=
 it. In low latency environments, this reduces the need for clock synchro=
nization since the value is relative.

OK.

>> 10. In Section 4.3.2 there is an open issue regarding internationaliza=
tion of
>> the client's username and password. What is the current thinking about=
 a
>> resolution?
>=20
> Nothing. Leave it where HTTP Basic left it. Not ideal but after almost =
a year, no one offered a text (including the person who raised the issue)=
=2E

I think that's fine here given that these are the usernames and
passwords of automated clients, not human users (as RFC 2277 says,
"internationalization is for humans").

>> 13. In Section 8.2, are we really recommending "x_"? I must finish wor=
k on
>> draft-saintandre-xdash-considered-harmful...
>=20
> It's the simplest way to curve out a namespace for vendor specific para=
meters that have no value or place being registered. We can't use URI's f=
or parameter names (that would be awful). Got other suggestions?

Not yet. I'll give it more thought.

>> 14. In Sections 10.1 and 10.2, I'm uncomfortable with this text:
>>
>>    Before a period of 14 days has passed, the Designated Expert(s) wil=
l
>>    either approve or deny the registration request, communicating this=

>>    decision both to the review list and to IANA.  Denials should inclu=
de
>>    an explanation and, if applicable, suggestions as to how to make th=
e
>>    request successful.  Registration requests that are undetermined fo=
r
>>    a period longer than 21 days can be brought to the IESG's attention=

>>    (using the iesg@iesg.org mailing list) for resolution.
>=20
> It's from RFC 5785 which was negotiated with the IESG before RFC 5988. =
I'll make the switch to 5988.

This was a bone of contention during IESG discussions of what became RFC
5988, so the language from the latter spec should be less controversial.

>> 15. Section 10.2.1 says:
>>
>>    Parameter usage location:
>>       The location(s) where parameter can be used.  The possible
>>       locations are: authorization request, authorization response,
>>       token request, or token response.
>>
>> Are those the only allowable locations? I notice that the bearer token=
 spec
>> adds a locations of "resource request" and "resource response". I'm no=
t
>> quite saying we need a registry of locations, but it might be good to =
have a
>> well-defined way of adding to the list of allowable locations (otherwi=
se a
>> document like the bearer spec might need to say that it updates the ba=
se
>> spec).
>=20
> The bearer token proposal to extend the locations available is in viola=
tion of the protocol and specification architecture. It is just a really =
bad idea. Specifically, the idea of any registry defining HTTP URI query =
request parameters is a violation of the provider's namespace. We can def=
ine a registry for OAuth endpoints but not for protected resources which =
may not even support any URI query or form-encoded body parameters. Doing=
 so would REQUIRE updating 2616.
>=20
> There are no use cases or requirements for extending the locations and =
no extensibility is needed.

So will draft-ietf-oauth-v2-bearer be fixed?

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms070201080204060305080808
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIITzjCC
BjQwggQcoAMCAQICASMwDQYJKoZIhvcNAQELBQAwfTELMAkGA1UEBhMCSUwxFjAUBgNVBAoT
DVN0YXJ0Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNp
Z25pbmcxKTAnBgNVBAMTIFN0YXJ0Q29tIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA3
MTAyNDIxMDMzM1oXDTE3MTAyNDIxMDMzM1owgYwxCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1T
dGFydENvbSBMdGQuMSswKQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWdu
aW5nMTgwNgYDVQQDEy9TdGFydENvbSBDbGFzcyAzIFByaW1hcnkgSW50ZXJtZWRpYXRlIENs
aWVudCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALmjSW4SPiDKlAinvVeL
ZOVfItiuP1aRHL530E7QUc9icCwL33+PH+Js1HAh8CgWFl34sOxx1FJyS/C4VLPRsqDfP72j
tzCVUAL0DAxZ7wgzQvFz7x61jGxfhYhqYb1+PPOLkYBbkRIrPMg3dLEdKmXIYJYXDH+mB/V/
jLo73/Kb7h/rNoNg/oHHSv5Jolyvp5IY2btfcTBfW/telEFj5rDTX2juTvZ3Qhf3XQX5ca3Q
7A10zrUV/cWJOJ7F5RltbEIaboZmX5JBUb3FhUiAdBotehAX6DbDOuYoJtVxmGof6GuVGcPo
98K4TJf8FHo+UA9EOVDp/W7fCqKT4sXk/XkCAwEAAaOCAa0wggGpMA8GA1UdEwEB/wQFMAMB
Af8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBR7iZySlyShhEcCy3T8LvSs3DLl8zAfBgNV
HSMEGDAWgBROC+8apEBbpRdphzDKNGhD0EGu8jBmBggrBgEFBQcBAQRaMFgwJwYIKwYBBQUH
MAGGG2h0dHA6Ly9vY3NwLnN0YXJ0c3NsLmNvbS9jYTAtBggrBgEFBQcwAoYhaHR0cDovL3d3
dy5zdGFydHNzbC5jb20vc2ZzY2EuY3J0MFsGA1UdHwRUMFIwJ6AloCOGIWh0dHA6Ly93d3cu
c3RhcnRzc2wuY29tL3Nmc2NhLmNybDAnoCWgI4YhaHR0cDovL2NybC5zdGFydHNzbC5jb20v
c2ZzY2EuY3JsMIGABgNVHSAEeTB3MHUGCysGAQQBgbU3AQIBMGYwLgYIKwYBBQUHAgEWImh0
dHA6Ly93d3cuc3RhcnRzc2wuY29tL3BvbGljeS5wZGYwNAYIKwYBBQUHAgEWKGh0dHA6Ly93
d3cuc3RhcnRzc2wuY29tL2ludGVybWVkaWF0ZS5wZGYwDQYJKoZIhvcNAQELBQADggIBAGpd
SbdLFMhirxK37V4gE00+uW74UdAXtDgQI3AsRZWtaRtKHgAxFBSteqz4kDkeAjH/1b+K8tQR
6cxSI2nho7qOaPW/UpzOfSS/MeKK/9vfM2lfs+uItXH7LWtvS9wD1erfH1a+BXHCrCp4LA1l
fADDhRIiGTSS3i0Zu5xV3INNRHrCCCl6patltQ8RZTqzDMri7ombgIxjN51Zo7xV77EZcThV
0GA8iIN+7T53uHhUJpjfLIztHs/69OclRvHux9hCflfOm7GY5Sc4nqjfES+5XPArGGWiQSEk
ez37QfXqsxO3oCHK4b3DFZysG4uyOuC/WL80ab3muQ3tgwjBhq0D3JZN5kvu5gSuNZPa1WrV
hEgXkd6C7s5stqB6/htVpshG08jRz9DEutGM9oKQ1ncTivbfPNx7pILoHWvvT7N5i/puVoNu
bPUmLXh/2wA6wzAzuuoONiIL14Xpw6jLSnqpaLWElo2yTIFZ/CU/nCvvpW1Dj1457P3Ci9bD
0RPkWSR+CuucpgxrEmaw4UOLxflzuYYaq1RJwygOO5K0s2bAWOcXpgteyUOnQ3d/EjJAWRri
2v0ubiq+4H3KUOMlbznlPAY/1T8YyyJPM88+Ueahe/AW1zoUwZayNcTnuM7cq6yBV8Wr3GOI
LFXhtT0UVuJLChPMJKVKVsa7qNorlLkMMIIGxzCCBa+gAwIBAgICAIswDQYJKoZIhvcNAQEF
BQAwgYwxCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQuMSswKQYDVQQLEyJT
ZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMTgwNgYDVQQDEy9TdGFydENvbSBD
bGFzcyAzIFByaW1hcnkgSW50ZXJtZWRpYXRlIENsaWVudCBDQTAeFw0xMDEwMTQwMTM2MzRa
Fw0xMjEwMTQxMjAxMDdaMIHAMSAwHgYDVQQNExcyNzQ1ODEtOU5YMDRxeExEYjBvNDY5VDEL
MAkGA1UEBhMCVVMxETAPBgNVBAgTCENvbG9yYWRvMQ8wDQYDVQQHEwZEZW52ZXIxLDAqBgNV
BAsTI1N0YXJ0Q29tIFRydXN0ZWQgQ2VydGlmaWNhdGUgTWVtYmVyMRowGAYDVQQDExFQZXRl
ciBTYWludC1BbmRyZTEhMB8GCSqGSIb3DQEJARYSc3RwZXRlckBzdHBldGVyLmltMIIBIjAN
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuERvnrkpQTx9wbJfgxbNKEYvt0IilecZRUM6
wrbCzIUPCocuYhaAJcQoqIyHaKybPQ7f+DIGIAolAa3dHnNdlsXP2smTft/ZNpj10PIG5bil
NAqLUYwmLJaEaqY7BMW8423U3blW43/luLJk/Pq4OsWcw7AK3LeVh1U/HOgqhin26N3h72X1
nbLEpZFrgcp8egmWtXLCbLBDMqUK3j6wjLldni79muzYEVqU0A5GqSeb8Wc4kIx8VI5yL24J
KzinG2iVRP5ZDEbOZETzBXJabUsV56XSxqPG9DK6ke+ybCiL/wKV1HFqdtFB1y25lfvHgOP2
gyEApBKEDNjgLmKyyQIDAQABo4IC+zCCAvcwCQYDVR0TBAIwADALBgNVHQ8EBAMCBLAwHQYD
VR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMEMB0GA1UdDgQWBBS2EW2iNB+g0EibKJLBdv8I
eLovVDAfBgNVHSMEGDAWgBR7iZySlyShhEcCy3T8LvSs3DLl8zAdBgNVHREEFjAUgRJzdHBl
dGVyQHN0cGV0ZXIuaW0wggFCBgNVHSAEggE5MIIBNTCCATEGCysGAQQBgbU3AQICMIIBIDAu
BggrBgEFBQcCARYiaHR0cDovL3d3dy5zdGFydHNzbC5jb20vcG9saWN5LnBkZjA0BggrBgEF
BQcCARYoaHR0cDovL3d3dy5zdGFydHNzbC5jb20vaW50ZXJtZWRpYXRlLnBkZjCBtwYIKwYB
BQUHAgIwgaowFBYNU3RhcnRDb20gTHRkLjADAgEBGoGRTGltaXRlZCBMaWFiaWxpdHksIHNl
ZSBzZWN0aW9uICpMZWdhbCBMaW1pdGF0aW9ucyogb2YgdGhlIFN0YXJ0Q29tIENlcnRpZmlj
YXRpb24gQXV0aG9yaXR5IFBvbGljeSBhdmFpbGFibGUgYXQgaHR0cDovL3d3dy5zdGFydHNz
bC5jb20vcG9saWN5LnBkZjBjBgNVHR8EXDBaMCugKaAnhiVodHRwOi8vd3d3LnN0YXJ0c3Ns
LmNvbS9jcnR1My1jcmwuY3JsMCugKaAnhiVodHRwOi8vY3JsLnN0YXJ0c3NsLmNvbS9jcnR1
My1jcmwuY3JsMIGOBggrBgEFBQcBAQSBgTB/MDkGCCsGAQUFBzABhi1odHRwOi8vb2NzcC5z
dGFydHNzbC5jb20vc3ViL2NsYXNzMy9jbGllbnQvY2EwQgYIKwYBBQUHMAKGNmh0dHA6Ly93
d3cuc3RhcnRzc2wuY29tL2NlcnRzL3N1Yi5jbGFzczMuY2xpZW50LmNhLmNydDAjBgNVHRIE
HDAahhhodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS8wDQYJKoZIhvcNAQEFBQADggEBADVtbXJG
tKAr55xc/OUM546gXUybI72Bank0w739Mv+9BBNtq9rMEvCnLmSKhBi76c1mdXh6zXs8RQDo
6nR/aPabE3llF2T4z80smi9jfnl3y9dpu9TcgDoqDLZ7a2lBlW656XAAQzHjvLp2MC7/mxlg
PYH2axa+q40mAYM20GbNsAEGbWQT1IqIh0BcLLsgbaMJHbyG/57zd9JLyMX3Vry1L1fJRQr3
GeLxMV5RtxN+mBgxrwFz/cOc09COiFExlsHgekpB5O43gqsAU16MXypyoSt4MrSfKTMHIGx6
2RF/M6vqUlvhi28gk2ZUvQ/+OX5+gjcZyooEzAAn4RuOKNswggbHMIIFr6ADAgECAgIAizAN
BgkqhkiG9w0BAQUFADCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0ZC4x
KzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcxODA2BgNVBAMT
L1N0YXJ0Q29tIENsYXNzIDMgUHJpbWFyeSBJbnRlcm1lZGlhdGUgQ2xpZW50IENBMB4XDTEw
MTAxNDAxMzYzNFoXDTEyMTAxNDEyMDEwN1owgcAxIDAeBgNVBA0TFzI3NDU4MS05TlgwNHF4
TERiMG80NjlUMQswCQYDVQQGEwJVUzERMA8GA1UECBMIQ29sb3JhZG8xDzANBgNVBAcTBkRl
bnZlcjEsMCoGA1UECxMjU3RhcnRDb20gVHJ1c3RlZCBDZXJ0aWZpY2F0ZSBNZW1iZXIxGjAY
BgNVBAMTEVBldGVyIFNhaW50LUFuZHJlMSEwHwYJKoZIhvcNAQkBFhJzdHBldGVyQHN0cGV0
ZXIuaW0wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC4RG+euSlBPH3Bsl+DFs0o
Ri+3QiKV5xlFQzrCtsLMhQ8Khy5iFoAlxCiojIdorJs9Dt/4MgYgCiUBrd0ec12Wxc/ayZN+
39k2mPXQ8gbluKU0CotRjCYsloRqpjsExbzjbdTduVbjf+W4smT8+rg6xZzDsArct5WHVT8c
6CqGKfbo3eHvZfWdssSlkWuBynx6CZa1csJssEMypQrePrCMuV2eLv2a7NgRWpTQDkapJ5vx
ZziQjHxUjnIvbgkrOKcbaJVE/lkMRs5kRPMFclptSxXnpdLGo8b0MrqR77JsKIv/ApXUcWp2
0UHXLbmV+8eA4/aDIQCkEoQM2OAuYrLJAgMBAAGjggL7MIIC9zAJBgNVHRMEAjAAMAsGA1Ud
DwQEAwIEsDAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwHQYDVR0OBBYEFLYRbaI0
H6DQSJsoksF2/wh4ui9UMB8GA1UdIwQYMBaAFHuJnJKXJKGERwLLdPwu9KzcMuXzMB0GA1Ud
EQQWMBSBEnN0cGV0ZXJAc3RwZXRlci5pbTCCAUIGA1UdIASCATkwggE1MIIBMQYLKwYBBAGB
tTcBAgIwggEgMC4GCCsGAQUFBwIBFiJodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS9wb2xpY3ku
cGRmMDQGCCsGAQUFBwIBFihodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS9pbnRlcm1lZGlhdGUu
cGRmMIG3BggrBgEFBQcCAjCBqjAUFg1TdGFydENvbSBMdGQuMAMCAQEagZFMaW1pdGVkIExp
YWJpbGl0eSwgc2VlIHNlY3Rpb24gKkxlZ2FsIExpbWl0YXRpb25zKiBvZiB0aGUgU3RhcnRD
b20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUG9saWN5IGF2YWlsYWJsZSBhdCBodHRwOi8v
d3d3LnN0YXJ0c3NsLmNvbS9wb2xpY3kucGRmMGMGA1UdHwRcMFowK6ApoCeGJWh0dHA6Ly93
d3cuc3RhcnRzc2wuY29tL2NydHUzLWNybC5jcmwwK6ApoCeGJWh0dHA6Ly9jcmwuc3RhcnRz
c2wuY29tL2NydHUzLWNybC5jcmwwgY4GCCsGAQUFBwEBBIGBMH8wOQYIKwYBBQUHMAGGLWh0
dHA6Ly9vY3NwLnN0YXJ0c3NsLmNvbS9zdWIvY2xhc3MzL2NsaWVudC9jYTBCBggrBgEFBQcw
AoY2aHR0cDovL3d3dy5zdGFydHNzbC5jb20vY2VydHMvc3ViLmNsYXNzMy5jbGllbnQuY2Eu
Y3J0MCMGA1UdEgQcMBqGGGh0dHA6Ly93d3cuc3RhcnRzc2wuY29tLzANBgkqhkiG9w0BAQUF
AAOCAQEANW1tcka0oCvnnFz85QznjqBdTJsjvYFqeTTDvf0y/70EE22r2swS8KcuZIqEGLvp
zWZ1eHrNezxFAOjqdH9o9psTeWUXZPjPzSyaL2N+eXfL12m71NyAOioMtntraUGVbrnpcABD
MeO8unYwLv+bGWA9gfZrFr6rjSYBgzbQZs2wAQZtZBPUioiHQFwsuyBtowkdvIb/nvN30kvI
xfdWvLUvV8lFCvcZ4vExXlG3E36YGDGvAXP9w5zT0I6IUTGWweB6SkHk7jeCqwBTXoxfKnKh
K3gytJ8pMwcgbHrZEX8zq+pSW+GLbyCTZlS9D/45fn6CNxnKigTMACfhG44o2zGCA80wggPJ
AgEBMIGTMIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UE
CxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4MDYGA1UEAxMvU3RhcnRD
b20gQ2xhc3MgMyBQcmltYXJ5IEludGVybWVkaWF0ZSBDbGllbnQgQ0ECAgCLMAkGBSsOAwIa
BQCgggIOMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTExMDMy
NjEzNTYwMFowIwYJKoZIhvcNAQkEMRYEFF93/2bEe9X6c4ZyWy0pHw4XvREsMF8GCSqGSIb3
DQEJDzFSMFAwCwYJYIZIAWUDBAECMAoGCCqGSIb3DQMHMA4GCCqGSIb3DQMCAgIAgDANBggq
hkiG9w0DAgIBQDAHBgUrDgMCBzANBggqhkiG9w0DAgIBKDCBpAYJKwYBBAGCNxAEMYGWMIGT
MIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2Vj
dXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4MDYGA1UEAxMvU3RhcnRDb20gQ2xh
c3MgMyBQcmltYXJ5IEludGVybWVkaWF0ZSBDbGllbnQgQ0ECAgCLMIGmBgsqhkiG9w0BCRAC
CzGBlqCBkzCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0ZC4xKzApBgNV
BAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcxODA2BgNVBAMTL1N0YXJ0
Q29tIENsYXNzIDMgUHJpbWFyeSBJbnRlcm1lZGlhdGUgQ2xpZW50IENBAgIAizANBgkqhkiG
9w0BAQEFAASCAQCgxkEUrg5TOLcO6Awx9fXnY7LHTWHedvDNyfIisDgd2cXIEcZ2BkkCCV7O
22RfZLxD0VoCT1P6NcEAKW+UVPpMKEL6vQUosMVVXqWml2mMhj1ikqClJjLLiiRYjpwxdCXN
GlnMZhWbrMfhWrOxacDuHh2sdfcq3/K4gk2m4xKB9vWNxTy1vHI99vGxR2Vg6LWMC9oWFG1l
L8Nuc5/yXWAJwPCe9QOqKuAQP6ROWzZrpVMMFqqlklt2QjWgdvjP0eNGrnk7SyJIILo8Zx/n
5uYQhfNK6oBDTn/1W+DP/+P3bitHSAr/S5QGU9qAmEf1KNFrI7tmMJlWmZ34au0yAaUhAAAA
AAAA
--------------ms070201080204060305080808--

From stpeter@stpeter.im  Sat Mar 26 13:59:26 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BFB8C3A6962 for <oauth@core3.amsl.com>; Sat, 26 Mar 2011 13:59:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.431
X-Spam-Level: 
X-Spam-Status: No, score=-102.431 tagged_above=-999 required=5 tests=[AWL=0.168, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tKw55rxtuUWU for <oauth@core3.amsl.com>; Sat, 26 Mar 2011 13:59:25 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 60FD73A695C for <oauth@ietf.org>; Sat, 26 Mar 2011 13:59:25 -0700 (PDT)
Received: from dhcp-104b.meeting.ietf.org (dhcp-104b.meeting.ietf.org [130.129.16.75]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id A688E40022; Sat, 26 Mar 2011 15:02:27 -0600 (MDT)
Message-ID: <4D8E540B.40009@stpeter.im>
Date: Sat, 26 Mar 2011 22:00:59 +0100
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: "Freeman, Tim" <tim.freeman@hp.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAD@P3PW5EX1MB01.EX1.SECURESERVER.NET> <59DD1BA8FD3C0F4C90771C18F2B5B53A654314923A@GVW0432EXB.americas.hpqcorp.net>
In-Reply-To: <59DD1BA8FD3C0F4C90771C18F2B5B53A654314923A@GVW0432EXB.americas.hpqcorp.net>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms080608090403070409010809"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] What's up with the secuity considerations? (was RE: Preview of -14)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Mar 2011 20:59:26 -0000

This is a cryptographically signed message in MIME format.

--------------ms080608090403070409010809
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/26/11 1:16 AM, Freeman, Tim wrote:
> What's the plan for filling in the security considerations?  In the
> draft below I see:
>=20
>>9.  Security Considerations
>=20
>>   [[ TBD ]]

This might answer some of your questions:

http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms080608090403070409010809
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms080608090403070409010809--

From eran@hueniverse.com  Sat Mar 26 14:55:58 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C248C28C0E2 for <oauth@core3.amsl.com>; Sat, 26 Mar 2011 14:55:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.643
X-Spam-Level: 
X-Spam-Status: No, score=-2.643 tagged_above=-999 required=5 tests=[AWL=-0.044, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eVaoSC3R2bRl for <oauth@core3.amsl.com>; Sat, 26 Mar 2011 14:55:57 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 413BD28C0DF for <oauth@ietf.org>; Sat, 26 Mar 2011 14:55:57 -0700 (PDT)
Received: (qmail 6165 invoked from network); 26 Mar 2011 21:57:32 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 26 Mar 2011 21:57:32 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Sat, 26 Mar 2011 14:56:33 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Peter Saint-Andre <stpeter@stpeter.im>
Date: Sat, 26 Mar 2011 14:56:20 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: Acvr9QF6dwcR2aRUSDeJVS3F6B8ZJQACmSMw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564300A8@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <4D8A65BF.7060506@stpeter.im> <90C41DD21FB7C64BB94121FBBC2E7234465642FEAB@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4D8DF070.30106@stpeter.im>
In-Reply-To: <4D8DF070.30106@stpeter.im>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Mar 2011 21:55:58 -0000

DQo+IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQo+IEZyb206IFBldGVyIFNhaW50LUFuZHJl
IFttYWlsdG86c3RwZXRlckBzdHBldGVyLmltXQ0KPiBTZW50OiBTYXR1cmRheSwgTWFyY2ggMjYs
IDIwMTEgNjo1NiBBTQ0KDQo+ID4+IDEwLiBJbiBTZWN0aW9uIDQuMy4yIHRoZXJlIGlzIGFuIG9w
ZW4gaXNzdWUgcmVnYXJkaW5nIGludGVybmF0aW9uYWxpemF0aW9uIG9mDQo+ID4+IHRoZSBjbGll
bnQncyB1c2VybmFtZSBhbmQgcGFzc3dvcmQuIFdoYXQgaXMgdGhlIGN1cnJlbnQgdGhpbmtpbmcg
YWJvdXQgYQ0KPiA+PiByZXNvbHV0aW9uPw0KPiA+DQo+ID4gTm90aGluZy4gTGVhdmUgaXQgd2hl
cmUgSFRUUCBCYXNpYyBsZWZ0IGl0LiBOb3QgaWRlYWwgYnV0IGFmdGVyIGFsbW9zdCBhIHllYXIs
DQo+IG5vIG9uZSBvZmZlcmVkIGEgdGV4dCAoaW5jbHVkaW5nIHRoZSBwZXJzb24gd2hvIHJhaXNl
ZCB0aGUgaXNzdWUpLg0KPiANCj4gSSB0aGluayB0aGF0J3MgZmluZSBoZXJlIGdpdmVuIHRoYXQg
dGhlc2UgYXJlIHRoZSB1c2VybmFtZXMgYW5kDQo+IHBhc3N3b3JkcyBvZiBhdXRvbWF0ZWQgY2xp
ZW50cywgbm90IGh1bWFuIHVzZXJzIChhcyBSRkMgMjI3NyBzYXlzLA0KPiAiaW50ZXJuYXRpb25h
bGl6YXRpb24gaXMgZm9yIGh1bWFucyIpLg0KDQpUaGlzIGlzIHRoZSBzYW1lIGFzIEhUVFAgQmFz
aWMsIHNvIHRoZXNlIGNyZWRlbnRpYWxzIGJlbG9uZyB0byBodW1hbiB1c2Vycy4gV2UncmUganVz
dCBzdGlja2luZyBvdXQgaGVhZHMgaW4gdGhlIEJhc2ljIEF1dGggc2FuZC4NCiANCj4gPj4gMTMu
IEluIFNlY3Rpb24gOC4yLCBhcmUgd2UgcmVhbGx5IHJlY29tbWVuZGluZyAieF8iPyBJIG11c3Qg
ZmluaXNoIHdvcmsgb24NCj4gPj4gZHJhZnQtc2FpbnRhbmRyZS14ZGFzaC1jb25zaWRlcmVkLWhh
cm1mdWwuLi4NCj4gPg0KPiA+IEl0J3MgdGhlIHNpbXBsZXN0IHdheSB0byBjdXJ2ZSBvdXQgYSBu
YW1lc3BhY2UgZm9yIHZlbmRvciBzcGVjaWZpYw0KPiBwYXJhbWV0ZXJzIHRoYXQgaGF2ZSBubyB2
YWx1ZSBvciBwbGFjZSBiZWluZyByZWdpc3RlcmVkLiBXZSBjYW4ndCB1c2UgVVJJJ3MNCj4gZm9y
IHBhcmFtZXRlciBuYW1lcyAodGhhdCB3b3VsZCBiZSBhd2Z1bCkuIEdvdCBvdGhlciBzdWdnZXN0
aW9ucz8NCj4gDQo+IE5vdCB5ZXQuIEknbGwgZ2l2ZSBpdCBtb3JlIHRob3VnaHQuDQoNCk9uZSBv
cHRpb24gaXMgdG8gdXNlIHBlcmlvZCBhcyBhIHJlc2VydmVkIGNoYXJhY3RlciBmb3IgdmVuZG9y
LXNwZWNpZmljIHBhcmFtZXRlcnMgc3VjaCBhcyAgJ3lhaG9vLmlkJyBhbmQgJ2dvb2dsZS5sYW5n
Jy4gVGhpcyB1c2VkIHRvIGJlIGEgcHJvYmxlbSB3aXRoIG9sZGVyIHZlcnNpb25zIG9mIFBIUDQg
YnV0IEkgZG9uJ3QgdGhpbmsgaXQgaXMgYW4gaXNzdWUgYW55bW9yZS4NCiANCj4gPj4gMTQuIElu
IFNlY3Rpb25zIDEwLjEgYW5kIDEwLjIsIEknbSB1bmNvbWZvcnRhYmxlIHdpdGggdGhpcyB0ZXh0
Og0KPiA+Pg0KPiA+PiAgICBCZWZvcmUgYSBwZXJpb2Qgb2YgMTQgZGF5cyBoYXMgcGFzc2VkLCB0
aGUgRGVzaWduYXRlZCBFeHBlcnQocykgd2lsbA0KPiA+PiAgICBlaXRoZXIgYXBwcm92ZSBvciBk
ZW55IHRoZSByZWdpc3RyYXRpb24gcmVxdWVzdCwgY29tbXVuaWNhdGluZyB0aGlzDQo+ID4+ICAg
IGRlY2lzaW9uIGJvdGggdG8gdGhlIHJldmlldyBsaXN0IGFuZCB0byBJQU5BLiAgRGVuaWFscyBz
aG91bGQgaW5jbHVkZQ0KPiA+PiAgICBhbiBleHBsYW5hdGlvbiBhbmQsIGlmIGFwcGxpY2FibGUs
IHN1Z2dlc3Rpb25zIGFzIHRvIGhvdyB0byBtYWtlIHRoZQ0KPiA+PiAgICByZXF1ZXN0IHN1Y2Nl
c3NmdWwuICBSZWdpc3RyYXRpb24gcmVxdWVzdHMgdGhhdCBhcmUgdW5kZXRlcm1pbmVkIGZvcg0K
PiA+PiAgICBhIHBlcmlvZCBsb25nZXIgdGhhbiAyMSBkYXlzIGNhbiBiZSBicm91Z2h0IHRvIHRo
ZSBJRVNHJ3MgYXR0ZW50aW9uDQo+ID4+ICAgICh1c2luZyB0aGUgaWVzZ0BpZXNnLm9yZyBtYWls
aW5nIGxpc3QpIGZvciByZXNvbHV0aW9uLg0KPiA+DQo+ID4gSXQncyBmcm9tIFJGQyA1Nzg1IHdo
aWNoIHdhcyBuZWdvdGlhdGVkIHdpdGggdGhlIElFU0cgYmVmb3JlIFJGQyA1OTg4LiBJJ2xsDQo+
IG1ha2UgdGhlIHN3aXRjaCB0byA1OTg4Lg0KPiANCj4gVGhpcyB3YXMgYSBib25lIG9mIGNvbnRl
bnRpb24gZHVyaW5nIElFU0cgZGlzY3Vzc2lvbnMgb2Ygd2hhdCBiZWNhbWUgUkZDDQo+IDU5ODgs
IHNvIHRoZSBsYW5ndWFnZSBmcm9tIHRoZSBsYXR0ZXIgc3BlYyBzaG91bGQgYmUgbGVzcyBjb250
cm92ZXJzaWFsLg0KDQpZZXAuIEJlZW4gdGhlcmUuDQogDQo+ID4+IDE1LiBTZWN0aW9uIDEwLjIu
MSBzYXlzOg0KPiA+Pg0KPiA+PiAgICBQYXJhbWV0ZXIgdXNhZ2UgbG9jYXRpb246DQo+ID4+ICAg
ICAgIFRoZSBsb2NhdGlvbihzKSB3aGVyZSBwYXJhbWV0ZXIgY2FuIGJlIHVzZWQuICBUaGUgcG9z
c2libGUNCj4gPj4gICAgICAgbG9jYXRpb25zIGFyZTogYXV0aG9yaXphdGlvbiByZXF1ZXN0LCBh
dXRob3JpemF0aW9uIHJlc3BvbnNlLA0KPiA+PiAgICAgICB0b2tlbiByZXF1ZXN0LCBvciB0b2tl
biByZXNwb25zZS4NCj4gPj4NCj4gPj4gQXJlIHRob3NlIHRoZSBvbmx5IGFsbG93YWJsZSBsb2Nh
dGlvbnM/IEkgbm90aWNlIHRoYXQgdGhlIGJlYXJlciB0b2tlbg0KPiBzcGVjDQo+ID4+IGFkZHMg
YSBsb2NhdGlvbnMgb2YgInJlc291cmNlIHJlcXVlc3QiIGFuZCAicmVzb3VyY2UgcmVzcG9uc2Ui
LiBJJ20gbm90DQo+ID4+IHF1aXRlIHNheWluZyB3ZSBuZWVkIGEgcmVnaXN0cnkgb2YgbG9jYXRp
b25zLCBidXQgaXQgbWlnaHQgYmUgZ29vZCB0byBoYXZlIGENCj4gPj4gd2VsbC1kZWZpbmVkIHdh
eSBvZiBhZGRpbmcgdG8gdGhlIGxpc3Qgb2YgYWxsb3dhYmxlIGxvY2F0aW9ucyAob3RoZXJ3aXNl
IGENCj4gPj4gZG9jdW1lbnQgbGlrZSB0aGUgYmVhcmVyIHNwZWMgbWlnaHQgbmVlZCB0byBzYXkg
dGhhdCBpdCB1cGRhdGVzIHRoZSBiYXNlDQo+ID4+IHNwZWMpLg0KPiA+DQo+ID4gVGhlIGJlYXJl
ciB0b2tlbiBwcm9wb3NhbCB0byBleHRlbmQgdGhlIGxvY2F0aW9ucyBhdmFpbGFibGUgaXMgaW4g
dmlvbGF0aW9uIG9mDQo+IHRoZSBwcm90b2NvbCBhbmQgc3BlY2lmaWNhdGlvbiBhcmNoaXRlY3R1
cmUuIEl0IGlzIGp1c3QgYSByZWFsbHkgYmFkIGlkZWEuDQo+IFNwZWNpZmljYWxseSwgdGhlIGlk
ZWEgb2YgYW55IHJlZ2lzdHJ5IGRlZmluaW5nIEhUVFAgVVJJIHF1ZXJ5IHJlcXVlc3QNCj4gcGFy
YW1ldGVycyBpcyBhIHZpb2xhdGlvbiBvZiB0aGUgcHJvdmlkZXIncyBuYW1lc3BhY2UuIFdlIGNh
biBkZWZpbmUgYQ0KPiByZWdpc3RyeSBmb3IgT0F1dGggZW5kcG9pbnRzIGJ1dCBub3QgZm9yIHBy
b3RlY3RlZCByZXNvdXJjZXMgd2hpY2ggbWF5IG5vdA0KPiBldmVuIHN1cHBvcnQgYW55IFVSSSBx
dWVyeSBvciBmb3JtLWVuY29kZWQgYm9keSBwYXJhbWV0ZXJzLiBEb2luZyBzbw0KPiB3b3VsZCBS
RVFVSVJFIHVwZGF0aW5nIDI2MTYuDQo+ID4NCj4gPiBUaGVyZSBhcmUgbm8gdXNlIGNhc2VzIG9y
IHJlcXVpcmVtZW50cyBmb3IgZXh0ZW5kaW5nIHRoZSBsb2NhdGlvbnMgYW5kIG5vDQo+IGV4dGVu
c2liaWxpdHkgaXMgbmVlZGVkLg0KPiANCj4gU28gd2lsbCBkcmFmdC1pZXRmLW9hdXRoLXYyLWJl
YXJlciBiZSBmaXhlZD8NCg0KTWlrZSBKb25lcyBpcyBzdGlsbCBwdXNoaW5nIGZvciB0aGlzIGNo
YW5nZSwgYW5kIGluIGEgd2F5LCBob2xkaW5nIHRoZSBiZWFyZXIgdG9rZW4gc3BlYyBob3N0YWdl
Li4uIDotKQ0KDQpFSEwNCg0KDQoNCg==

From eran@hueniverse.com  Sat Mar 26 16:35:40 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 966BB28C0E4 for <oauth@core3.amsl.com>; Sat, 26 Mar 2011 16:35:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.642
X-Spam-Level: 
X-Spam-Status: No, score=-2.642 tagged_above=-999 required=5 tests=[AWL=-0.044, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2n2jer0PSVO1 for <oauth@core3.amsl.com>; Sat, 26 Mar 2011 16:35:33 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 1007F28C0EF for <oauth@ietf.org>; Sat, 26 Mar 2011 16:35:32 -0700 (PDT)
Received: (qmail 16819 invoked from network); 26 Mar 2011 23:37:05 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 26 Mar 2011 23:37:05 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Sat, 26 Mar 2011 16:36:38 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Sat, 26 Mar 2011 16:36:25 -0700
Thread-Topic: Authors, Contributors, Acknowledgement
Thread-Index: AcvsDlla3PqGbxonRmi5NxtnawZEPQ==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E723446564300B3P3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: [OAUTH-WG] Authors, Contributors, Acknowledgement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Mar 2011 23:35:40 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E723446564300B3P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

The security consideration section pending, this is the last open issue I h=
ave to close as editor before the document is ready to leave the working gr=
oup. While this is silly business for many, it is very important to others,=
 so bear with me. I want to make sure we give everyone the proper recogniti=
on they deserve.

- Authors

The document currently lists 1 editor (Eran Hammer-Lahav) and 2 authors (Da=
vid Recordon, Dick Hardt). The three names were originally selected to refl=
ect the compromise edited by David, combining the two document (OAuth 1.0 R=
FC and WRAP I-D) edited by Dick and me. I am about to include a large chuck=
 of work written by Torsten Lodderstedt, Mark McGloin, and Phil Hunt.

This raises the question of who should receive top billing. These are the o=
ptions I came up with (listed without any preference):

- Leave the three names as in -13.
- Add the three additional names and obtain a special exception from the IE=
SG/AD (?) for listing more than 5 names (RFC rules).
- List only the editor (IETF norm).
- Some other criteria to show a different subset of names.

Any of the above can be combined with moving the Contributors section to th=
e front (before the introduction) to give higher visibility to the contribu=
tors. I honestly have no preference and given that my name is listed as edi=
tor in the 3 alternatives, I will refrain from expressing an opinion.


- Contributors

The following is the new Contributors appendix:

Appendix A.  Contributors

   This specification is the work of the OAuth Working Group which
   includes dozens of active and dedicated participants.  In particular,
   the following individuals contributed ideas, feedback, and wording
   which shaped and formed the final specification:

   Michael Adams, Andrew Arnott, Dirk Balfanz, Blaine Cook, Brian
   Campbell, Leah Culver, Bill de hOra, Brian Eaton, Brian Ellin, Igor
   Faynberg, George Fletcher, Tim Freeman, Evan Gilbert, Yaron Goland,
   Brent Goldman, Kristoffer Gronowski, Justin Hart, Craig Heath, Phil
   Hunt, Michael B. Jones, John Kemp, Mark Kent, Raffi Krikorian, Chasen
   Le Hara, Rasmus Lerdorf, Torsten Lodderstedt, Hui-Lan Lu, Paul
   Madsen, Alastair Mair, Eve Maler, James Manger, Laurence Miao, Chuck
   Mortimore, Justin Richer, Peter Saint-Andre, Nat Sakimura, Rob Sayre,
   Marius Scurtescu, Naitik Shah, Luke Shepard, Justin Smith, Jeremy
   Suriel, Christian Stuebner, Paul Tarjan, Allen Tom, Franklin Tse,
   Nick Walker, Skylar Woodward.

   The initial OAuth 2.0 protocol specification was edited by David
   Recordon, based on two previous publications: the OAuth 1.0 community
   specification [RFC5849], and OAuth WRAP (OAuth Web Resource
   Authorization Profiles) [I-D.draft-hardt-oauth-01].

   The OAuth 1.0 community specification was edited by Eran Hammer-Lahav
   and authored by Mark Atwood, Dirk Balfanz, Darren Bounds, Richard M.
   Conlan, Blaine Cook, Leah Culver, Breno de Medeiros, Brian Eaton,
   Kellan Elliott-McCrea, Larry Halff, Eran Hammer-Lahav, Ben Laurie,
   Chris Messina, John Panzer, Sam Quigley, David Recordon, Eran
   Sandler, Jonathan Sergent, Todd Sieling, Brian Slesinsky, and Andy
   Smith.

   The OAuth WRAP specification was edited by Dick Hardt and authored by
   Brian Eaton, Yaron Goland, Dick Hardt, and Allen Tom.

The list of names was directly derived from my issues list from the past ye=
ar. During every document edit I kept track of the person providing the fee=
dback which resulted in a change. This means that those participating in di=
scussions but who did not directly have any impact on the document are not =
named. This is the only reasonable criteria I was able to come up with.

An alternative is to list anyone who posted anything to the mailing list si=
nce the work began or to keep the list as-is and let the chairs hand-pick a=
ny additional names they believe are justified. I don't have strong views, =
as long as the list is fair.


- Acknowledgement

This section will start with 'The editor wishes to thank...' and is at my d=
iscretion.

EHL



--_000_90C41DD21FB7C64BB94121FBBC2E723446564300B3P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>The security con=
sideration section pending, this is the last open issue I have to close as =
editor before the document is ready to leave the working group. While this =
is silly business for many, it is very important to others, so bear with me=
. I want to make sure we give everyone the proper recognition they deserve.=
<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNorm=
al>- Authors<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p cla=
ss=3DMsoNormal>The document currently lists 1 editor (Eran Hammer-Lahav) an=
d 2 authors (David Recordon, Dick Hardt). The three names were originally s=
elected to reflect the compromise edited by David, combining the two docume=
nt (OAuth 1.0 RFC and WRAP I-D) edited by Dick and me. I am about to includ=
e a large chuck of work written by Torsten Lodderstedt, Mark McGloin, and P=
hil Hunt.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=
=3DMsoNormal>This raises the question of who should receive top billing. Th=
ese are the options I came up with (listed without any preference):<o:p></o=
:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>- Lea=
ve the three names as in -13.<o:p></o:p></p><p class=3DMsoNormal>- Add the =
three additional names and obtain a special exception from the IESG/AD (?) =
for listing more than 5 names (RFC rules).<o:p></o:p></p><p class=3DMsoNorm=
al>- List only the editor (IETF norm).<o:p></o:p></p><p class=3DMsoNormal>-=
 Some other criteria to show a different subset of names.<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Any of the abov=
e can be combined with moving the Contributors section to the front (before=
 the introduction) to give higher visibility to the contributors. I honestl=
y have no preference and given that my name is listed as editor in the 3 al=
ternatives, I will refrain from expressing an opinion.<o:p></o:p></p><p cla=
ss=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p><=
/p><p class=3DMsoNormal>- Contributors<o:p></o:p></p><p class=3DMsoNormal><=
o:p>&nbsp;</o:p></p><p class=3DMsoNormal>The following is the new Contribut=
ors appendix:<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p cl=
ass=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Courier New";c=
olor:black'>Appendix A.&nbsp; Contributors<o:p></o:p></span></p><p class=3D=
MsoNormal><span style=3D'font-size:10.0pt;font-family:"Courier New";color:b=
lack'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-=
size:10.0pt;font-family:"Courier New";color:black'>&nbsp;&nbsp; This specif=
ication is the work of the OAuth Working Group which<o:p></o:p></span></p><=
p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Courier Ne=
w";color:black'>&nbsp;&nbsp; includes dozens of active and dedicated partic=
ipants.&nbsp; In particular,<o:p></o:p></span></p><p class=3DMsoNormal><spa=
n style=3D'font-size:10.0pt;font-family:"Courier New";color:black'>&nbsp;&n=
bsp; the following individuals contributed ideas, feedback, and wording<o:p=
></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font=
-family:"Courier New";color:black'>&nbsp;&nbsp; which shaped and formed the=
 final specification:<o:p></o:p></span></p><p class=3DMsoNormal><span style=
=3D'font-size:10.0pt;font-family:"Courier New";color:black'><o:p>&nbsp;</o:=
p></span></p><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-fami=
ly:"Courier New";color:black'>&nbsp;&nbsp; Michael Adams, Andrew Arnott, Di=
rk Balfanz, Blaine Cook, Brian<o:p></o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'font-size:10.0pt;font-family:"Courier New";color:black'>&nbsp;=
&nbsp; Campbell, Leah Culver, Bill de hOra, Brian Eaton, Brian Ellin, Igor<=
o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:10.0pt;f=
ont-family:"Courier New";color:black'>&nbsp;&nbsp; Faynberg, George Fletche=
r, Tim Freeman, Evan Gilbert, Yaron Goland,<o:p></o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Courier New";colo=
r:black'>&nbsp;&nbsp; Brent Goldman, Kristoffer Gronowski, Justin Hart, Cra=
ig Heath, Phil<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'fon=
t-size:10.0pt;font-family:"Courier New";color:black'>&nbsp;&nbsp; Hunt, Mic=
hael B. Jones, John Kemp, Mark Kent, Raffi Krikorian, Chasen<o:p></o:p></sp=
an></p><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Co=
urier New";color:black'>&nbsp;&nbsp; Le Hara, Rasmus Lerdorf, Torsten Lodde=
rstedt, Hui-Lan Lu, Paul<o:p></o:p></span></p><p class=3DMsoNormal><span st=
yle=3D'font-size:10.0pt;font-family:"Courier New";color:black'>&nbsp;&nbsp;=
 Madsen, Alastair Mair, Eve Maler, James Manger, Laurence Miao, Chuck<o:p><=
/o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-f=
amily:"Courier New";color:black'>&nbsp;&nbsp; Mortimore, Justin Richer, Pet=
er Saint-Andre, Nat Sakimura, Rob Sayre,<o:p></o:p></span></p><p class=3DMs=
oNormal><span style=3D'font-size:10.0pt;font-family:"Courier New";color:bla=
ck'>&nbsp;&nbsp; Marius Scurtescu, Naitik Shah, Luke Shepard, Justin Smith,=
 Jeremy<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:=
10.0pt;font-family:"Courier New";color:black'>&nbsp;&nbsp; Suriel, Christia=
n Stuebner, Paul Tarjan, Allen Tom, Franklin Tse,<o:p></o:p></span></p><p c=
lass=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Courier New";=
color:black'>&nbsp;&nbsp; Nick Walker, Skylar Woodward.<o:p></o:p></span></=
p><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Courier=
 New";color:black'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span s=
tyle=3D'font-size:10.0pt;font-family:"Courier New";color:black'>&nbsp;&nbsp=
; The initial OAuth 2.0 protocol specification was edited by David<o:p></o:=
p></span></p><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-fami=
ly:"Courier New";color:black'>&nbsp;&nbsp; Recordon, based on two previous =
publications: the OAuth 1.0 community<o:p></o:p></span></p><p class=3DMsoNo=
rmal><span style=3D'font-size:10.0pt;font-family:"Courier New";color:black'=
>&nbsp;&nbsp; specification [RFC5849], and OAuth WRAP (OAuth Web Resource<o=
:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:10.0pt;fo=
nt-family:"Courier New";color:black'>&nbsp;&nbsp; Authorization Profiles) [=
I-D.draft-hardt-oauth-01].<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:10.0pt;font-family:"Courier New";color:black'><o:p>&nbsp=
;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font=
-family:"Courier New";color:black'>&nbsp;&nbsp; The OAuth 1.0 community spe=
cification was edited by Eran Hammer-Lahav<o:p></o:p></span></p><p class=3D=
MsoNormal><span style=3D'font-size:10.0pt;font-family:"Courier New";color:b=
lack'>&nbsp;&nbsp; and authored by Mark Atwood, Dirk Balfanz, Darren Bounds=
, Richard M.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-=
size:10.0pt;font-family:"Courier New";color:black'>&nbsp;&nbsp; Conlan, Bla=
ine Cook, Leah Culver, Breno de Medeiros, Brian Eaton,<o:p></o:p></span></p=
><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Courier =
New";color:black'>&nbsp;&nbsp; Kellan Elliott-McCrea, Larry Halff, Eran Ham=
mer-Lahav, Ben Laurie,<o:p></o:p></span></p><p class=3DMsoNormal><span styl=
e=3D'font-size:10.0pt;font-family:"Courier New";color:black'>&nbsp;&nbsp; C=
hris Messina, John Panzer, Sam Quigley, David Recordon, Eran<o:p></o:p></sp=
an></p><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Co=
urier New";color:black'>&nbsp;&nbsp; Sandler, Jonathan Sergent, Todd Sielin=
g, Brian Slesinsky, and Andy<o:p></o:p></span></p><p class=3DMsoNormal><spa=
n style=3D'font-size:10.0pt;font-family:"Courier New";color:black'>&nbsp;&n=
bsp; Smith.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-s=
ize:10.0pt;font-family:"Courier New";color:black'><o:p>&nbsp;</o:p></span><=
/p><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Courie=
r New";color:black'>&nbsp;&nbsp; The OAuth WRAP specification was edited by=
 Dick Hardt and authored by<o:p></o:p></span></p><p class=3DMsoNormal><span=
 style=3D'font-size:10.0pt;font-family:"Courier New";color:black'>&nbsp;&nb=
sp; Brian Eaton, Yaron Goland, Dick Hardt, and Allen Tom.<o:p></o:p></span>=
</p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>The list=
 of names was directly derived from my issues list from the past year. Duri=
ng every document edit I kept track of the person providing the feedback wh=
ich resulted in a change. This means that those participating in discussion=
s but who did not directly have any impact on the document are not named. T=
his is the only reasonable criteria I was able to come up with.<o:p></o:p><=
/p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>An altern=
ative is to list anyone who posted anything to the mailing list since the w=
ork began or to keep the list as-is and let the chairs hand-pick any additi=
onal names they believe are justified. I don&#8217;t have strong views, as =
long as the list is fair.<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o=
:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>- Ack=
nowledgement<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p cla=
ss=3DMsoNormal>This section will start with &#8216;The editor wishes to tha=
nk&#8230;&#8217; and is at my discretion.<o:p></o:p></p><p class=3DMsoNorma=
l><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>EHL<o:p></o:p></p><p class=3DMs=
oNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></di=
v></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E723446564300B3P3PW5EX1MB01E_--

From hannes.tschofenig@gmx.net  Sun Mar 27 00:56:45 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6B5E63A69B6 for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 00:56:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cOu+XfGHDXqw for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 00:56:44 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.23]) by core3.amsl.com (Postfix) with SMTP id F13FF3A6993 for <oauth@ietf.org>; Sun, 27 Mar 2011 00:56:43 -0700 (PDT)
Received: (qmail invoked by alias); 27 Mar 2011 07:58:18 -0000
Received: from dhcp-9039.meeting.ietf.org (EHLO dhcp-9039.meeting.ietf.org) [130.129.8.57] by mail.gmx.net (mp011) with SMTP; 27 Mar 2011 09:58:18 +0200
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1+frjxIQZiftjr2glTOlds/sIvJV7Gq0/ZqK0FEky D6eJ0Yd9UyXlcF
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=windows-1252
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Sun, 27 Mar 2011 09:58:16 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <BC117E99-F795-4895-AC9E-9460FA509421@gmx.net>
References: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Y-GMX-Trusted: 0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Mar 2011 07:56:45 -0000

On the security aspect: I will write a short text for the OAuth draft =
because the longer writeup by Torsten/Mar/Phil is targeting a different =
scope. So, you cannot just copy it.=20

On Mar 27, 2011, at 12:36 AM, Eran Hammer-Lahav wrote:

> The security consideration section pending, this is the last open =
issue I have to close as editor before the document is ready to leave =
the working group. While this is silly business for many, it is very =
important to others, so bear with me. I want to make sure we give =
everyone the proper recognition they deserve.
> =20
> - Authors
> =20
> The document currently lists 1 editor (Eran Hammer-Lahav) and 2 =
authors (David Recordon, Dick Hardt). The three names were originally =
selected to reflect the compromise edited by David, combining the two =
document (OAuth 1.0 RFC and WRAP I-D) edited by Dick and me. I am about =
to include a large chuck of work written by Torsten Lodderstedt, Mark =
McGloin, and Phil Hunt.
> =20
> This raises the question of who should receive top billing. These are =
the options I came up with (listed without any preference):
> =20
> - Leave the three names as in -13.
> - Add the three additional names and obtain a special exception from =
the IESG/AD (?) for listing more than 5 names (RFC rules).
> - List only the editor (IETF norm).
> - Some other criteria to show a different subset of names.
> =20
> Any of the above can be combined with moving the Contributors section =
to the front (before the introduction) to give higher visibility to the =
contributors. I honestly have no preference and given that my name is =
listed as editor in the 3 alternatives, I will refrain from expressing =
an opinion.
> =20
> =20
> - Contributors
> =20
> The following is the new Contributors appendix:
> =20
> Appendix A.  Contributors
> =20
>    This specification is the work of the OAuth Working Group which
>    includes dozens of active and dedicated participants.  In =
particular,
>    the following individuals contributed ideas, feedback, and wording
>    which shaped and formed the final specification:
> =20
>    Michael Adams, Andrew Arnott, Dirk Balfanz, Blaine Cook, Brian
>    Campbell, Leah Culver, Bill de hOra, Brian Eaton, Brian Ellin, Igor
>    Faynberg, George Fletcher, Tim Freeman, Evan Gilbert, Yaron Goland,
>    Brent Goldman, Kristoffer Gronowski, Justin Hart, Craig Heath, Phil
>    Hunt, Michael B. Jones, John Kemp, Mark Kent, Raffi Krikorian, =
Chasen
>    Le Hara, Rasmus Lerdorf, Torsten Lodderstedt, Hui-Lan Lu, Paul
>    Madsen, Alastair Mair, Eve Maler, James Manger, Laurence Miao, =
Chuck
>    Mortimore, Justin Richer, Peter Saint-Andre, Nat Sakimura, Rob =
Sayre,
>    Marius Scurtescu, Naitik Shah, Luke Shepard, Justin Smith, Jeremy
>    Suriel, Christian Stuebner, Paul Tarjan, Allen Tom, Franklin Tse,
>    Nick Walker, Skylar Woodward.
> =20
>    The initial OAuth 2.0 protocol specification was edited by David
>    Recordon, based on two previous publications: the OAuth 1.0 =
community
>    specification [RFC5849], and OAuth WRAP (OAuth Web Resource
>    Authorization Profiles) [I-D.draft-hardt-oauth-01].
> =20
>    The OAuth 1.0 community specification was edited by Eran =
Hammer-Lahav
>    and authored by Mark Atwood, Dirk Balfanz, Darren Bounds, Richard =
M.
>    Conlan, Blaine Cook, Leah Culver, Breno de Medeiros, Brian Eaton,
>    Kellan Elliott-McCrea, Larry Halff, Eran Hammer-Lahav, Ben Laurie,
>    Chris Messina, John Panzer, Sam Quigley, David Recordon, Eran
>    Sandler, Jonathan Sergent, Todd Sieling, Brian Slesinsky, and Andy
>    Smith.
> =20
>    The OAuth WRAP specification was edited by Dick Hardt and authored =
by
>    Brian Eaton, Yaron Goland, Dick Hardt, and Allen Tom.
> =20
> The list of names was directly derived from my issues list from the =
past year. During every document edit I kept track of the person =
providing the feedback which resulted in a change. This means that those =
participating in discussions but who did not directly have any impact on =
the document are not named. This is the only reasonable criteria I was =
able to come up with.
> =20
> An alternative is to list anyone who posted anything to the mailing =
list since the work began or to keep the list as-is and let the chairs =
hand-pick any additional names they believe are justified. I don=92t =
have strong views, as long as the list is fair.
> =20
> =20
> - Acknowledgement
> =20
> This section will start with =91The editor wishes to thank=85=92 and =
is at my discretion.
> =20
> EHL
> =20
> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From eran@hueniverse.com  Sun Mar 27 01:03:18 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C7AF03A699A for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:03:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.642
X-Spam-Level: 
X-Spam-Status: No, score=-2.642 tagged_above=-999 required=5 tests=[AWL=-0.043, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sLHz6q9wuaQR for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:03:17 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 8125C3A6993 for <oauth@ietf.org>; Sun, 27 Mar 2011 01:03:17 -0700 (PDT)
Received: (qmail 23634 invoked from network); 27 Mar 2011 08:04:53 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 27 Mar 2011 08:04:53 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Sun, 27 Mar 2011 01:03:27 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Date: Sun, 27 Mar 2011 01:03:25 -0700
Thread-Topic: [OAUTH-WG] Authors, Contributors, Acknowledgement
Thread-Index: AcvsVL28IZ8ZDysdTGe/E/6EUa0fcgAAKM5g
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564300C6@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BC117E99-F795-4895-AC9E-9460FA509421@gmx.net>
In-Reply-To: <BC117E99-F795-4895-AC9E-9460FA509421@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Mar 2011 08:03:18 -0000

So the new plan is for you to provide the text for the security section and=
 just publish their work as a separate RFC as the same time?

EHL

> -----Original Message-----
> From: Hannes Tschofenig [mailto:hannes.tschofenig@gmx.net]
> Sent: Sunday, March 27, 2011 12:58 AM
> To: Eran Hammer-Lahav
> Cc: Hannes Tschofenig; OAuth WG
> Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
>=20
> On the security aspect: I will write a short text for the OAuth draft bec=
ause
> the longer writeup by Torsten/Mar/Phil is targeting a different scope. So=
, you
> cannot just copy it.
>=20
> On Mar 27, 2011, at 12:36 AM, Eran Hammer-Lahav wrote:
>=20
> > The security consideration section pending, this is the last open issue=
 I have
> to close as editor before the document is ready to leave the working grou=
p.
> While this is silly business for many, it is very important to others, so=
 bear
> with me. I want to make sure we give everyone the proper recognition they
> deserve.
> >
> > - Authors
> >
> > The document currently lists 1 editor (Eran Hammer-Lahav) and 2 authors
> (David Recordon, Dick Hardt). The three names were originally selected to
> reflect the compromise edited by David, combining the two document
> (OAuth 1.0 RFC and WRAP I-D) edited by Dick and me. I am about to include=
 a
> large chuck of work written by Torsten Lodderstedt, Mark McGloin, and Phi=
l
> Hunt.
> >
> > This raises the question of who should receive top billing. These are t=
he
> options I came up with (listed without any preference):
> >
> > - Leave the three names as in -13.
> > - Add the three additional names and obtain a special exception from th=
e
> IESG/AD (?) for listing more than 5 names (RFC rules).
> > - List only the editor (IETF norm).
> > - Some other criteria to show a different subset of names.
> >
> > Any of the above can be combined with moving the Contributors section t=
o
> the front (before the introduction) to give higher visibility to the
> contributors. I honestly have no preference and given that my name is lis=
ted
> as editor in the 3 alternatives, I will refrain from expressing an opinio=
n.
> >
> >
> > - Contributors
> >
> > The following is the new Contributors appendix:
> >
> > Appendix A.  Contributors
> >
> >    This specification is the work of the OAuth Working Group which
> >    includes dozens of active and dedicated participants.  In particular=
,
> >    the following individuals contributed ideas, feedback, and wording
> >    which shaped and formed the final specification:
> >
> >    Michael Adams, Andrew Arnott, Dirk Balfanz, Blaine Cook, Brian
> >    Campbell, Leah Culver, Bill de hOra, Brian Eaton, Brian Ellin, Igor
> >    Faynberg, George Fletcher, Tim Freeman, Evan Gilbert, Yaron Goland,
> >    Brent Goldman, Kristoffer Gronowski, Justin Hart, Craig Heath, Phil
> >    Hunt, Michael B. Jones, John Kemp, Mark Kent, Raffi Krikorian, Chase=
n
> >    Le Hara, Rasmus Lerdorf, Torsten Lodderstedt, Hui-Lan Lu, Paul
> >    Madsen, Alastair Mair, Eve Maler, James Manger, Laurence Miao, Chuck
> >    Mortimore, Justin Richer, Peter Saint-Andre, Nat Sakimura, Rob Sayre=
,
> >    Marius Scurtescu, Naitik Shah, Luke Shepard, Justin Smith, Jeremy
> >    Suriel, Christian Stuebner, Paul Tarjan, Allen Tom, Franklin Tse,
> >    Nick Walker, Skylar Woodward.
> >
> >    The initial OAuth 2.0 protocol specification was edited by David
> >    Recordon, based on two previous publications: the OAuth 1.0 communit=
y
> >    specification [RFC5849], and OAuth WRAP (OAuth Web Resource
> >    Authorization Profiles) [I-D.draft-hardt-oauth-01].
> >
> >    The OAuth 1.0 community specification was edited by Eran Hammer-
> Lahav
> >    and authored by Mark Atwood, Dirk Balfanz, Darren Bounds, Richard M.
> >    Conlan, Blaine Cook, Leah Culver, Breno de Medeiros, Brian Eaton,
> >    Kellan Elliott-McCrea, Larry Halff, Eran Hammer-Lahav, Ben Laurie,
> >    Chris Messina, John Panzer, Sam Quigley, David Recordon, Eran
> >    Sandler, Jonathan Sergent, Todd Sieling, Brian Slesinsky, and Andy
> >    Smith.
> >
> >    The OAuth WRAP specification was edited by Dick Hardt and authored b=
y
> >    Brian Eaton, Yaron Goland, Dick Hardt, and Allen Tom.
> >
> > The list of names was directly derived from my issues list from the pas=
t
> year. During every document edit I kept track of the person providing the
> feedback which resulted in a change. This means that those participating =
in
> discussions but who did not directly have any impact on the document are
> not named. This is the only reasonable criteria I was able to come up wit=
h.
> >
> > An alternative is to list anyone who posted anything to the mailing lis=
t since
> the work began or to keep the list as-is and let the chairs hand-pick any
> additional names they believe are justified. I don't have strong views, a=
s long
> as the list is fair.
>=20
> >
> >
> > - Acknowledgement
> >
> > This section will start with 'The editor wishes to thank...' and is at =
my
> discretion.
> >
> > EHL
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth


From hannes.tschofenig@gmx.net  Sun Mar 27 01:08:55 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 84F3A3A68EE for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:08:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ll12hH1XnavC for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:08:54 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.22]) by core3.amsl.com (Postfix) with SMTP id 463DA3A68E9 for <oauth@ietf.org>; Sun, 27 Mar 2011 01:08:53 -0700 (PDT)
Received: (qmail invoked by alias); 27 Mar 2011 08:10:29 -0000
Received: from dhcp-9039.meeting.ietf.org (EHLO dhcp-9039.meeting.ietf.org) [130.129.8.57] by mail.gmx.net (mp006) with SMTP; 27 Mar 2011 10:10:29 +0200
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1+p6VVcGHGpnWawJBha0zm0YF0yrZZMANn1b+IvxK ZTyfcM3+2xMY6B
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564300C6@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Sun, 27 Mar 2011 10:10:28 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <828DF3C2-C65A-43F7-A414-20DC62F5D401@gmx.net>
References: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BC117E99-F795-4895-AC9E-9460FA509421@gmx.net> <90C41DD21FB7C64BB94121FBBC2E723446564300C6@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Y-GMX-Trusted: 0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Mar 2011 08:08:55 -0000

That's what I thought was the plan.=20
(Assuming the working group agrees to work on a separate document. I =
would support it.)
=20
On Mar 27, 2011, at 10:03 AM, Eran Hammer-Lahav wrote:

> So the new plan is for you to provide the text for the security =
section and just publish their work as a separate RFC as the same time?


From torsten@lodderstedt.net  Sun Mar 27 01:19:07 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DDDC13A68E9 for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:19:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.248
X-Spam-Level: 
X-Spam-Status: No, score=-2.248 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Z53eKbf+ktV for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:19:07 -0700 (PDT)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.31.39]) by core3.amsl.com (Postfix) with ESMTP id D75073A68E5 for <oauth@ietf.org>; Sun, 27 Mar 2011 01:19:06 -0700 (PDT)
Received: from [80.187.101.93] (helo=[10.174.108.141]) by smtprelay01.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Q3lDF-0004cG-JS; Sun, 27 Mar 2011 10:20:42 +0200
References: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BC117E99-F795-4895-AC9E-9460FA509421@gmx.net> <90C41DD21FB7C64BB94121FBBC2E723446564300C6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <828DF3C2-C65A-43F7-A414-20DC62F5D401@gmx.net>
User-Agent: K-9 Mail for Android
In-Reply-To: <828DF3C2-C65A-43F7-A414-20DC62F5D401@gmx.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----VYMLP3J9V94UCJ6WO0V0B09Y6KGSJ2"
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Sun, 27 Mar 2011 10:19:14 +0200
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, Eran Hammer-Lahav <eran@hueniverse.com>
Message-ID: <8817dfe5-8442-47ec-8737-86ee1b3113d5@email.android.com>
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Mar 2011 08:19:08 -0000

------VYMLP3J9V94UCJ6WO0V0B09Y6KGSJ2
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 8bit



Hannes Tschofenig <hannes.tschofenig@gmx.net> schrieb:

That's what I thought was the plan. (Assuming the working group agrees to work on a separate document. I would support it.) On Mar 27, 2011, at 10:03 AM, Eran Hammer-Lahav wrote: > So the new plan is for you to provide the text for the security section and just publish their work as a separate RFC as the same time?_____________________________________________
OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth 


we (Marc, Phil, me) are already working on a security considerations section. Our plan is to finalize it during or soon after the Meeting based on the WG's feedback to the security document.

regards,
Torsten.
Tschau,
Torsten
------VYMLP3J9V94UCJ6WO0V0B09Y6KGSJ2
Content-Type: text/html;
 charset=utf-8
Content-Transfer-Encoding: 8bit

<html><head></head><body><div class="gmail_quote"><br>
<br>
Hannes Tschofenig &lt;hannes.tschofenig@gmx.net&gt; schrieb:<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<div style="white-space: pre-wrap; word-wrap:break-word; ">That's what I thought was the plan. 
(Assuming the working group agrees to work on a separate document. I would support it.)
 
On Mar 27, 2011, at 10:03 AM, Eran Hammer-Lahav wrote:

&gt; So the new plan is for you to provide the text for the security section and just publish their work as a separate RFC as the same time?<hr />OAuth mailing list
OAuth@ietf.org
<a href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</div></blockquote></div><br clear="all">we (Marc, Phil, me) are already working on a security considerations section. Our plan is to finalize it during or soon after the Meeting based on the WG&#39;s feedback to the security document.<br>
<br>
regards,<br>
Torsten.<br>
Tschau,<br>
Torsten</body></html>
------VYMLP3J9V94UCJ6WO0V0B09Y6KGSJ2--


From eran@hueniverse.com  Sun Mar 27 01:20:36 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EEFAE3A697E for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:20:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.642
X-Spam-Level: 
X-Spam-Status: No, score=-2.642 tagged_above=-999 required=5 tests=[AWL=-0.043, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9bthQ4yDLTrh for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:20:33 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 166733A68E5 for <oauth@ietf.org>; Sun, 27 Mar 2011 01:20:33 -0700 (PDT)
Received: (qmail 20836 invoked from network); 27 Mar 2011 08:22:09 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 27 Mar 2011 08:22:09 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Sun, 27 Mar 2011 01:19:59 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Date: Sun, 27 Mar 2011 01:19:58 -0700
Thread-Topic: [OAUTH-WG] Authors, Contributors, Acknowledgement
Thread-Index: AcvsVsMbwz+0tUY/Sz6rI6S+KtjOgQAAJ7QA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564300C7@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BC117E99-F795-4895-AC9E-9460FA509421@gmx.net> <90C41DD21FB7C64BB94121FBBC2E723446564300C6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <828DF3C2-C65A-43F7-A414-20DC62F5D401@gmx.net>
In-Reply-To: <828DF3C2-C65A-43F7-A414-20DC62F5D401@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Mar 2011 08:20:36 -0000

I guess you can sort it out at the meeting. I thought the plan was to disti=
ll the security document into a shorter (but not insignificant) security co=
nsideration section (I was expecting something in the range of 10-20 pages)=
, and also publish the model document with added details.

EHL

> -----Original Message-----
> From: Hannes Tschofenig [mailto:hannes.tschofenig@gmx.net]
> Sent: Sunday, March 27, 2011 1:10 AM
> To: Eran Hammer-Lahav
> Cc: Hannes Tschofenig; OAuth WG
> Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
>=20
> That's what I thought was the plan.
> (Assuming the working group agrees to work on a separate document. I
> would support it.)
>=20
> On Mar 27, 2011, at 10:03 AM, Eran Hammer-Lahav wrote:
>=20
> > So the new plan is for you to provide the text for the security section=
 and
> just publish their work as a separate RFC as the same time?


From stpeter@stpeter.im  Sun Mar 27 01:42:14 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 79C4D28C103 for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:42:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.931
X-Spam-Level: 
X-Spam-Status: No, score=-101.931 tagged_above=-999 required=5 tests=[AWL=-0.668, BAYES_00=-2.599, EXCUSE_4=1.336, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7fARXX7WP5y1 for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:42:13 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 323543A688F for <oauth@ietf.org>; Sun, 27 Mar 2011 01:42:13 -0700 (PDT)
Received: from dhcp-12cb.meeting.ietf.org (64-103-25-233.cisco.com [64.103.25.233]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 2D27D40022; Sun, 27 Mar 2011 02:45:18 -0600 (MDT)
Message-ID: <4D8EF8C2.70502@stpeter.im>
Date: Sun, 27 Mar 2011 10:43:46 +0200
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: oauth@ietf.org
References: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms060803030805090406040800"
Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Mar 2011 08:42:14 -0000

This is a cryptographically signed message in MIME format.

--------------ms060803030805090406040800
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<hat type=3D'AD'/>

On 3/27/11 12:36 AM, Eran Hammer-Lahav wrote:
> The security consideration section pending, this is the last open issue=

> I have to close as editor before the document is ready to leave the
> working group. While this is silly business for many, it is very
> important to others, so bear with me. I want to make sure we give
> everyone the proper recognition they deserve.

I'm all in favor of recognition. For those who care, allow me explain a
bit about the various roles and responsibilities here.

Section 6.3 of RFC 2418 states:

   Most IETF working groups focus their efforts on a document, or set of
   documents, that capture the results of the group's work.  A working
   group generally designates a person or persons to serve as the Editor
   for a particular document.  The Document Editor is responsible for
   ensuring that the contents of the document accurately reflect the
   decisions that have been made by the working group.

In essence, the document editor is a special kind of author who is
appointed by the WG chairs and who is responsible for capturing the
consensus that emerges from WG discussions.

Anyone who is listed as an author has a number of responsibilities:

1. Authors are exposed to comments received during IETF Last Call and
IESG review. Usually at least one of authors needs to reply to major
comments, although often document shepherds (typically one of the WG
chairs) and sponsoring ADs do that as well. As I can report from my own
experience, this can be a lot of work and it is time-sensitive.

2. After the document is approved for publication by the IESG, it is
sent to the RFC Editor team for editing. At the end of this process the
document moves to a state called AUTH48:

http://www.rfc-editor.org/pubprocess.html#auth48

This is the last chance to fix some things in the document. During
AUTH48, all authors need to approve changes made by the RFC Editor and
other authors (often in consultation with the responsible Area Director,
the document shepherd, and the WG chairs). This is also time-sensitive.
Although the responsible Area Director can approve documents if some
authors are not responsive, all of the authors need to pay attention to
AUTH48 discussions and respond when asked. Any unresponsive author can
delay the document for a very long time (and in some cases even can
prevent publication).

3. Authors are notified when errata are posted on their RFCs, in
perpetuity. In many cases their opinions about submitted errata are
taken into consideration when the responsible Area Director decides what
to do with errata.

4. Authors might receive comments and questions on their documents,
again in perpetuity. In many cases, it might be inappropriate for
authors to provide substantive interpretations about standards-track
specifications without consulting mailing lists, Area Directors, etc.,
so this can become a burden with a very long tail.

The list of people mentioned in the Acknowledgements section is mostly
at the discretion of the authors. However, IETF IPR policies require
that anyone who makes significant contributions to a document be listed
in the Acknowledgments section. Although "significant" is something
about which the authors can make judgments, it is best to err on the
side of inclusion. In additional to textual contributions, such
contributions might be a careful review or ideas that had a major
influence on the results even if that person's particular suggestions
were not adopted. This kind of mention is not discretionary and cannot
be waived even if the contributor asks to be removed. If somebody
mentioned in the Acknowledgments contacts asks to be removed, please
talk to the WG chairs.

Sometimes it is appropriate to mention major contributions in a section
entitled Contributors. This is usually reserved for people who have
written significant pieces of the document, for former co-editors or
co-authors, etc.

The moral of the story is that having a small author list makes it
easier to handle IESG feedback and AUTH48 changes, and that if you want
to acknowledge people who made major contributions, create a section
called Contributors.

As an example, see a document that Jeff Hodges and I recently worked on:

http://tools.ietf.org/html/draft-saintandre-tls-server-id-check-14

HTH,

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms060803030805090406040800
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms060803030805090406040800--

From stpeter@stpeter.im  Sun Mar 27 01:56:37 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3188C3A68F3 for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:56:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.265
X-Spam-Level: 
X-Spam-Status: No, score=-102.265 tagged_above=-999 required=5 tests=[AWL=0.334, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OXm3vGYc5jWI for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 01:56:36 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 5A0F728C107 for <oauth@ietf.org>; Sun, 27 Mar 2011 01:56:36 -0700 (PDT)
Received: from dhcp-12cb.meeting.ietf.org (64-103-25-233.cisco.com [64.103.25.233]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 90ADB40022; Sun, 27 Mar 2011 02:59:41 -0600 (MDT)
Message-ID: <4D8EFC22.20508@stpeter.im>
Date: Sun, 27 Mar 2011 10:58:10 +0200
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<BC117E99-F795-4895-AC9E-9460FA509421@gmx.net>	<90C41DD21FB7C64BB94121FBBC2E723446564300C6@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<828DF3C2-C65A-43F7-A414-20DC62F5D401@gmx.net> <90C41DD21FB7C64BB94121FBBC2E723446564300C7@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564300C7@P3PW5EX1MB01.EX1.SECURESERVER.NET>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms000003010102010601020807"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Mar 2011 08:56:37 -0000

This is a cryptographically signed message in MIME format.

--------------ms000003010102010601020807
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Well, the IESG won't approve a document that doesn't include a Security
Considerations section. :)

I'll talk with Hannes about this in person here in Prague (he's sitting
next to me at the moment, but we're in a meeting so we can't chat).

On 3/27/11 10:19 AM, Eran Hammer-Lahav wrote:
> I guess you can sort it out at the meeting. I thought the plan was to
> distill the security document into a shorter (but not insignificant)
> security consideration section (I was expecting something in the
> range of 10-20 pages), and also publish the model document with added
> details.
>=20
> EHL
>=20
>> -----Original Message----- From: Hannes Tschofenig
>> [mailto:hannes.tschofenig@gmx.net] Sent: Sunday, March 27, 2011
>> 1:10 AM To: Eran Hammer-Lahav Cc: Hannes Tschofenig; OAuth WG=20
>> Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
>>=20
>> That's what I thought was the plan. (Assuming the working group
>> agrees to work on a separate document. I would support it.)
>>=20
>> On Mar 27, 2011, at 10:03 AM, Eran Hammer-Lahav wrote:
>>=20
>>> So the new plan is for you to provide the text for the security
>>> section and
>> just publish their work as a separate RFC as the same time?


--------------ms000003010102010601020807
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIITzjCC
BjQwggQcoAMCAQICASMwDQYJKoZIhvcNAQELBQAwfTELMAkGA1UEBhMCSUwxFjAUBgNVBAoT
DVN0YXJ0Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNp
Z25pbmcxKTAnBgNVBAMTIFN0YXJ0Q29tIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA3
MTAyNDIxMDMzM1oXDTE3MTAyNDIxMDMzM1owgYwxCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1T
dGFydENvbSBMdGQuMSswKQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWdu
aW5nMTgwNgYDVQQDEy9TdGFydENvbSBDbGFzcyAzIFByaW1hcnkgSW50ZXJtZWRpYXRlIENs
aWVudCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALmjSW4SPiDKlAinvVeL
ZOVfItiuP1aRHL530E7QUc9icCwL33+PH+Js1HAh8CgWFl34sOxx1FJyS/C4VLPRsqDfP72j
tzCVUAL0DAxZ7wgzQvFz7x61jGxfhYhqYb1+PPOLkYBbkRIrPMg3dLEdKmXIYJYXDH+mB/V/
jLo73/Kb7h/rNoNg/oHHSv5Jolyvp5IY2btfcTBfW/telEFj5rDTX2juTvZ3Qhf3XQX5ca3Q
7A10zrUV/cWJOJ7F5RltbEIaboZmX5JBUb3FhUiAdBotehAX6DbDOuYoJtVxmGof6GuVGcPo
98K4TJf8FHo+UA9EOVDp/W7fCqKT4sXk/XkCAwEAAaOCAa0wggGpMA8GA1UdEwEB/wQFMAMB
Af8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBR7iZySlyShhEcCy3T8LvSs3DLl8zAfBgNV
HSMEGDAWgBROC+8apEBbpRdphzDKNGhD0EGu8jBmBggrBgEFBQcBAQRaMFgwJwYIKwYBBQUH
MAGGG2h0dHA6Ly9vY3NwLnN0YXJ0c3NsLmNvbS9jYTAtBggrBgEFBQcwAoYhaHR0cDovL3d3
dy5zdGFydHNzbC5jb20vc2ZzY2EuY3J0MFsGA1UdHwRUMFIwJ6AloCOGIWh0dHA6Ly93d3cu
c3RhcnRzc2wuY29tL3Nmc2NhLmNybDAnoCWgI4YhaHR0cDovL2NybC5zdGFydHNzbC5jb20v
c2ZzY2EuY3JsMIGABgNVHSAEeTB3MHUGCysGAQQBgbU3AQIBMGYwLgYIKwYBBQUHAgEWImh0
dHA6Ly93d3cuc3RhcnRzc2wuY29tL3BvbGljeS5wZGYwNAYIKwYBBQUHAgEWKGh0dHA6Ly93
d3cuc3RhcnRzc2wuY29tL2ludGVybWVkaWF0ZS5wZGYwDQYJKoZIhvcNAQELBQADggIBAGpd
SbdLFMhirxK37V4gE00+uW74UdAXtDgQI3AsRZWtaRtKHgAxFBSteqz4kDkeAjH/1b+K8tQR
6cxSI2nho7qOaPW/UpzOfSS/MeKK/9vfM2lfs+uItXH7LWtvS9wD1erfH1a+BXHCrCp4LA1l
fADDhRIiGTSS3i0Zu5xV3INNRHrCCCl6patltQ8RZTqzDMri7ombgIxjN51Zo7xV77EZcThV
0GA8iIN+7T53uHhUJpjfLIztHs/69OclRvHux9hCflfOm7GY5Sc4nqjfES+5XPArGGWiQSEk
ez37QfXqsxO3oCHK4b3DFZysG4uyOuC/WL80ab3muQ3tgwjBhq0D3JZN5kvu5gSuNZPa1WrV
hEgXkd6C7s5stqB6/htVpshG08jRz9DEutGM9oKQ1ncTivbfPNx7pILoHWvvT7N5i/puVoNu
bPUmLXh/2wA6wzAzuuoONiIL14Xpw6jLSnqpaLWElo2yTIFZ/CU/nCvvpW1Dj1457P3Ci9bD
0RPkWSR+CuucpgxrEmaw4UOLxflzuYYaq1RJwygOO5K0s2bAWOcXpgteyUOnQ3d/EjJAWRri
2v0ubiq+4H3KUOMlbznlPAY/1T8YyyJPM88+Ueahe/AW1zoUwZayNcTnuM7cq6yBV8Wr3GOI
LFXhtT0UVuJLChPMJKVKVsa7qNorlLkMMIIGxzCCBa+gAwIBAgICAIswDQYJKoZIhvcNAQEF
BQAwgYwxCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQuMSswKQYDVQQLEyJT
ZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMTgwNgYDVQQDEy9TdGFydENvbSBD
bGFzcyAzIFByaW1hcnkgSW50ZXJtZWRpYXRlIENsaWVudCBDQTAeFw0xMDEwMTQwMTM2MzRa
Fw0xMjEwMTQxMjAxMDdaMIHAMSAwHgYDVQQNExcyNzQ1ODEtOU5YMDRxeExEYjBvNDY5VDEL
MAkGA1UEBhMCVVMxETAPBgNVBAgTCENvbG9yYWRvMQ8wDQYDVQQHEwZEZW52ZXIxLDAqBgNV
BAsTI1N0YXJ0Q29tIFRydXN0ZWQgQ2VydGlmaWNhdGUgTWVtYmVyMRowGAYDVQQDExFQZXRl
ciBTYWludC1BbmRyZTEhMB8GCSqGSIb3DQEJARYSc3RwZXRlckBzdHBldGVyLmltMIIBIjAN
BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuERvnrkpQTx9wbJfgxbNKEYvt0IilecZRUM6
wrbCzIUPCocuYhaAJcQoqIyHaKybPQ7f+DIGIAolAa3dHnNdlsXP2smTft/ZNpj10PIG5bil
NAqLUYwmLJaEaqY7BMW8423U3blW43/luLJk/Pq4OsWcw7AK3LeVh1U/HOgqhin26N3h72X1
nbLEpZFrgcp8egmWtXLCbLBDMqUK3j6wjLldni79muzYEVqU0A5GqSeb8Wc4kIx8VI5yL24J
KzinG2iVRP5ZDEbOZETzBXJabUsV56XSxqPG9DK6ke+ybCiL/wKV1HFqdtFB1y25lfvHgOP2
gyEApBKEDNjgLmKyyQIDAQABo4IC+zCCAvcwCQYDVR0TBAIwADALBgNVHQ8EBAMCBLAwHQYD
VR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMEMB0GA1UdDgQWBBS2EW2iNB+g0EibKJLBdv8I
eLovVDAfBgNVHSMEGDAWgBR7iZySlyShhEcCy3T8LvSs3DLl8zAdBgNVHREEFjAUgRJzdHBl
dGVyQHN0cGV0ZXIuaW0wggFCBgNVHSAEggE5MIIBNTCCATEGCysGAQQBgbU3AQICMIIBIDAu
BggrBgEFBQcCARYiaHR0cDovL3d3dy5zdGFydHNzbC5jb20vcG9saWN5LnBkZjA0BggrBgEF
BQcCARYoaHR0cDovL3d3dy5zdGFydHNzbC5jb20vaW50ZXJtZWRpYXRlLnBkZjCBtwYIKwYB
BQUHAgIwgaowFBYNU3RhcnRDb20gTHRkLjADAgEBGoGRTGltaXRlZCBMaWFiaWxpdHksIHNl
ZSBzZWN0aW9uICpMZWdhbCBMaW1pdGF0aW9ucyogb2YgdGhlIFN0YXJ0Q29tIENlcnRpZmlj
YXRpb24gQXV0aG9yaXR5IFBvbGljeSBhdmFpbGFibGUgYXQgaHR0cDovL3d3dy5zdGFydHNz
bC5jb20vcG9saWN5LnBkZjBjBgNVHR8EXDBaMCugKaAnhiVodHRwOi8vd3d3LnN0YXJ0c3Ns
LmNvbS9jcnR1My1jcmwuY3JsMCugKaAnhiVodHRwOi8vY3JsLnN0YXJ0c3NsLmNvbS9jcnR1
My1jcmwuY3JsMIGOBggrBgEFBQcBAQSBgTB/MDkGCCsGAQUFBzABhi1odHRwOi8vb2NzcC5z
dGFydHNzbC5jb20vc3ViL2NsYXNzMy9jbGllbnQvY2EwQgYIKwYBBQUHMAKGNmh0dHA6Ly93
d3cuc3RhcnRzc2wuY29tL2NlcnRzL3N1Yi5jbGFzczMuY2xpZW50LmNhLmNydDAjBgNVHRIE
HDAahhhodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS8wDQYJKoZIhvcNAQEFBQADggEBADVtbXJG
tKAr55xc/OUM546gXUybI72Bank0w739Mv+9BBNtq9rMEvCnLmSKhBi76c1mdXh6zXs8RQDo
6nR/aPabE3llF2T4z80smi9jfnl3y9dpu9TcgDoqDLZ7a2lBlW656XAAQzHjvLp2MC7/mxlg
PYH2axa+q40mAYM20GbNsAEGbWQT1IqIh0BcLLsgbaMJHbyG/57zd9JLyMX3Vry1L1fJRQr3
GeLxMV5RtxN+mBgxrwFz/cOc09COiFExlsHgekpB5O43gqsAU16MXypyoSt4MrSfKTMHIGx6
2RF/M6vqUlvhi28gk2ZUvQ/+OX5+gjcZyooEzAAn4RuOKNswggbHMIIFr6ADAgECAgIAizAN
BgkqhkiG9w0BAQUFADCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0ZC4x
KzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcxODA2BgNVBAMT
L1N0YXJ0Q29tIENsYXNzIDMgUHJpbWFyeSBJbnRlcm1lZGlhdGUgQ2xpZW50IENBMB4XDTEw
MTAxNDAxMzYzNFoXDTEyMTAxNDEyMDEwN1owgcAxIDAeBgNVBA0TFzI3NDU4MS05TlgwNHF4
TERiMG80NjlUMQswCQYDVQQGEwJVUzERMA8GA1UECBMIQ29sb3JhZG8xDzANBgNVBAcTBkRl
bnZlcjEsMCoGA1UECxMjU3RhcnRDb20gVHJ1c3RlZCBDZXJ0aWZpY2F0ZSBNZW1iZXIxGjAY
BgNVBAMTEVBldGVyIFNhaW50LUFuZHJlMSEwHwYJKoZIhvcNAQkBFhJzdHBldGVyQHN0cGV0
ZXIuaW0wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC4RG+euSlBPH3Bsl+DFs0o
Ri+3QiKV5xlFQzrCtsLMhQ8Khy5iFoAlxCiojIdorJs9Dt/4MgYgCiUBrd0ec12Wxc/ayZN+
39k2mPXQ8gbluKU0CotRjCYsloRqpjsExbzjbdTduVbjf+W4smT8+rg6xZzDsArct5WHVT8c
6CqGKfbo3eHvZfWdssSlkWuBynx6CZa1csJssEMypQrePrCMuV2eLv2a7NgRWpTQDkapJ5vx
ZziQjHxUjnIvbgkrOKcbaJVE/lkMRs5kRPMFclptSxXnpdLGo8b0MrqR77JsKIv/ApXUcWp2
0UHXLbmV+8eA4/aDIQCkEoQM2OAuYrLJAgMBAAGjggL7MIIC9zAJBgNVHRMEAjAAMAsGA1Ud
DwQEAwIEsDAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwHQYDVR0OBBYEFLYRbaI0
H6DQSJsoksF2/wh4ui9UMB8GA1UdIwQYMBaAFHuJnJKXJKGERwLLdPwu9KzcMuXzMB0GA1Ud
EQQWMBSBEnN0cGV0ZXJAc3RwZXRlci5pbTCCAUIGA1UdIASCATkwggE1MIIBMQYLKwYBBAGB
tTcBAgIwggEgMC4GCCsGAQUFBwIBFiJodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS9wb2xpY3ku
cGRmMDQGCCsGAQUFBwIBFihodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS9pbnRlcm1lZGlhdGUu
cGRmMIG3BggrBgEFBQcCAjCBqjAUFg1TdGFydENvbSBMdGQuMAMCAQEagZFMaW1pdGVkIExp
YWJpbGl0eSwgc2VlIHNlY3Rpb24gKkxlZ2FsIExpbWl0YXRpb25zKiBvZiB0aGUgU3RhcnRD
b20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUG9saWN5IGF2YWlsYWJsZSBhdCBodHRwOi8v
d3d3LnN0YXJ0c3NsLmNvbS9wb2xpY3kucGRmMGMGA1UdHwRcMFowK6ApoCeGJWh0dHA6Ly93
d3cuc3RhcnRzc2wuY29tL2NydHUzLWNybC5jcmwwK6ApoCeGJWh0dHA6Ly9jcmwuc3RhcnRz
c2wuY29tL2NydHUzLWNybC5jcmwwgY4GCCsGAQUFBwEBBIGBMH8wOQYIKwYBBQUHMAGGLWh0
dHA6Ly9vY3NwLnN0YXJ0c3NsLmNvbS9zdWIvY2xhc3MzL2NsaWVudC9jYTBCBggrBgEFBQcw
AoY2aHR0cDovL3d3dy5zdGFydHNzbC5jb20vY2VydHMvc3ViLmNsYXNzMy5jbGllbnQuY2Eu
Y3J0MCMGA1UdEgQcMBqGGGh0dHA6Ly93d3cuc3RhcnRzc2wuY29tLzANBgkqhkiG9w0BAQUF
AAOCAQEANW1tcka0oCvnnFz85QznjqBdTJsjvYFqeTTDvf0y/70EE22r2swS8KcuZIqEGLvp
zWZ1eHrNezxFAOjqdH9o9psTeWUXZPjPzSyaL2N+eXfL12m71NyAOioMtntraUGVbrnpcABD
MeO8unYwLv+bGWA9gfZrFr6rjSYBgzbQZs2wAQZtZBPUioiHQFwsuyBtowkdvIb/nvN30kvI
xfdWvLUvV8lFCvcZ4vExXlG3E36YGDGvAXP9w5zT0I6IUTGWweB6SkHk7jeCqwBTXoxfKnKh
K3gytJ8pMwcgbHrZEX8zq+pSW+GLbyCTZlS9D/45fn6CNxnKigTMACfhG44o2zGCA80wggPJ
AgEBMIGTMIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UE
CxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4MDYGA1UEAxMvU3RhcnRD
b20gQ2xhc3MgMyBQcmltYXJ5IEludGVybWVkaWF0ZSBDbGllbnQgQ0ECAgCLMAkGBSsOAwIa
BQCgggIOMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTExMDMy
NzA4NTgxMFowIwYJKoZIhvcNAQkEMRYEFNhd9Mpxdda37lDjqWz2r2gzECo4MF8GCSqGSIb3
DQEJDzFSMFAwCwYJYIZIAWUDBAECMAoGCCqGSIb3DQMHMA4GCCqGSIb3DQMCAgIAgDANBggq
hkiG9w0DAgIBQDAHBgUrDgMCBzANBggqhkiG9w0DAgIBKDCBpAYJKwYBBAGCNxAEMYGWMIGT
MIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2Vj
dXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4MDYGA1UEAxMvU3RhcnRDb20gQ2xh
c3MgMyBQcmltYXJ5IEludGVybWVkaWF0ZSBDbGllbnQgQ0ECAgCLMIGmBgsqhkiG9w0BCRAC
CzGBlqCBkzCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0ZC4xKzApBgNV
BAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcxODA2BgNVBAMTL1N0YXJ0
Q29tIENsYXNzIDMgUHJpbWFyeSBJbnRlcm1lZGlhdGUgQ2xpZW50IENBAgIAizANBgkqhkiG
9w0BAQEFAASCAQA6utTqybUQ26xfnFpTGm0UErKtkqBIU/exRF1jWgRRYIKoxGej/NvsLb1o
DvoC5ugqf5B/YFwKAF/kToxcNl9eqIIu3NfHojLiT7zRXMxjQ5gYhQiheMr+N4MFHIiQ4T+u
CmItmHVkHaUvKmfIUoDTASo0SUG+4JXDLJf6yk9U4ybtMMzyUwYWmmZZpVvhqOwgtpRZaLba
yBDJTKMFUKh/VGTU0lOuwbqQRACHUXCkmn94dspoTaKGzyi5KHApbRhaVd2B0dgQfuF8EMZx
09rKx+LvN9pZR82HBMEkl+aFPN3AM6U/I505mapSZ4moXeOg3ut7Kc/cMz2BrRzm17M+AAAA
AAAA
--------------ms000003010102010601020807--

From recordond@gmail.com  Sun Mar 27 03:17:30 2011
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 63F983A6911 for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 03:17:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.349
X-Spam-Level: 
X-Spam-Status: No, score=-3.349 tagged_above=-999 required=5 tests=[AWL=0.250,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x9pnr4+IAD5u for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 03:17:29 -0700 (PDT)
Received: from mail-vw0-f44.google.com (mail-vw0-f44.google.com [209.85.212.44]) by core3.amsl.com (Postfix) with ESMTP id 11A3028C12B for <oauth@ietf.org>; Sun, 27 Mar 2011 03:17:28 -0700 (PDT)
Received: by vws12 with SMTP id 12so1927210vws.31 for <oauth@ietf.org>; Sun, 27 Mar 2011 03:19:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=JWxtS69onUOMVfCSNFDEOwARYW5byr1A9CEzO5Kv7R0=; b=lHVqWVXAh5vHjcAsMkaX03qcbxV7nzjwenlNYn5o09yMOIpxVrmJGWqT55QHOjPVp1 WMiKQVmkO9VdUax0sETUPere/Z83Kev3rY7b8NuxuSmeW9VfY/uux+Da3ehm37XB+9uB DtmMzNye9UuVhzCgXVIGE/QJwyvL5EsasbJwU=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=D6Hjk9+mlDCpjxtQZAzGdgbKt9OQp9AvBSYTSBuSWsGkTZOhjpXiKT3GY+DvxeggAB 5y95NMmvlqOmnhQ4nL30S7ke69W6WPKRQkv2WJdm7h3nk9AqdroqOCzdEbe8TedB2zpU zUGMNRkV2U/3uEfbbxpzAL+i6BxkcGTs/g158=
MIME-Version: 1.0
Received: by 10.52.98.230 with SMTP id el6mr3836398vdb.149.1301221145547; Sun, 27 Mar 2011 03:19:05 -0700 (PDT)
Received: by 10.52.161.42 with HTTP; Sun, 27 Mar 2011 03:19:05 -0700 (PDT)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <AcvsDlla3PqGbxonRmi5NxtnawZEPQ==> <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Sun, 27 Mar 2011 03:19:05 -0700
Message-ID: <AANLkTi=unAo9aEhtwQMOAmG2fBW3RfvXg4qsY+H9Pku-@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Mar 2011 10:17:30 -0000

Any of #1-#3 are fine with me.


On Sat, Mar 26, 2011 at 4:36 PM, Eran Hammer-Lahav <eran@hueniverse.com> wr=
ote:
> The security consideration section pending, this is the last open issue I
> have to close as editor before the document is ready to leave the working
> group. While this is silly business for many, it is very important to
> others, so bear with me. I want to make sure we give everyone the proper
> recognition they deserve.
>
>
>
> - Authors
>
>
>
> The document currently lists 1 editor (Eran Hammer-Lahav) and 2 authors
> (David Recordon, Dick Hardt). The three names were originally selected to
> reflect the compromise edited by David, combining the two document (OAuth
> 1.0 RFC and WRAP I-D) edited by Dick and me. I am about to include a larg=
e
> chuck of work written by Torsten Lodderstedt, Mark McGloin, and Phil Hunt=
.
>
>
>
> This raises the question of who should receive top billing. These are the
> options I came up with (listed without any preference):
>
>
>
> - Leave the three names as in -13.
>
> - Add the three additional names and obtain a special exception from the
> IESG/AD (?) for listing more than 5 names (RFC rules).
>
> - List only the editor (IETF norm).
>
> - Some other criteria to show a different subset of names.
>
>
>
> Any of the above can be combined with moving the Contributors section to =
the
> front (before the introduction) to give higher visibility to the
> contributors. I honestly have no preference and given that my name is lis=
ted
> as editor in the 3 alternatives, I will refrain from expressing an opinio=
n.
>
>
>
>
>
> - Contributors
>
>
>
> The following is the new Contributors appendix:
>
>
>
> Appendix A.=A0 Contributors
>
>
>
> =A0=A0 This specification is the work of the OAuth Working Group which
>
> =A0=A0 includes dozens of active and dedicated participants.=A0 In partic=
ular,
>
> =A0=A0 the following individuals contributed ideas, feedback, and wording
>
> =A0=A0 which shaped and formed the final specification:
>
>
>
> =A0=A0 Michael Adams, Andrew Arnott, Dirk Balfanz, Blaine Cook, Brian
>
> =A0=A0 Campbell, Leah Culver, Bill de hOra, Brian Eaton, Brian Ellin, Igo=
r
>
> =A0=A0 Faynberg, George Fletcher, Tim Freeman, Evan Gilbert, Yaron Goland=
,
>
> =A0=A0 Brent Goldman, Kristoffer Gronowski, Justin Hart, Craig Heath, Phi=
l
>
> =A0=A0 Hunt, Michael B. Jones, John Kemp, Mark Kent, Raffi Krikorian, Cha=
sen
>
> =A0=A0 Le Hara, Rasmus Lerdorf, Torsten Lodderstedt, Hui-Lan Lu, Paul
>
> =A0=A0 Madsen, Alastair Mair, Eve Maler, James Manger, Laurence Miao, Chu=
ck
>
> =A0=A0 Mortimore, Justin Richer, Peter Saint-Andre, Nat Sakimura, Rob Say=
re,
>
> =A0=A0 Marius Scurtescu, Naitik Shah, Luke Shepard, Justin Smith, Jeremy
>
> =A0=A0 Suriel, Christian Stuebner, Paul Tarjan, Allen Tom, Franklin Tse,
>
> =A0=A0 Nick Walker, Skylar Woodward.
>
>
>
> =A0=A0 The initial OAuth 2.0 protocol specification was edited by David
>
> =A0=A0 Recordon, based on two previous publications: the OAuth 1.0 commun=
ity
>
> =A0=A0 specification [RFC5849], and OAuth WRAP (OAuth Web Resource
>
> =A0=A0 Authorization Profiles) [I-D.draft-hardt-oauth-01].
>
>
>
> =A0=A0 The OAuth 1.0 community specification was edited by Eran Hammer-La=
hav
>
> =A0=A0 and authored by Mark Atwood, Dirk Balfanz, Darren Bounds, Richard =
M.
>
> =A0=A0 Conlan, Blaine Cook, Leah Culver, Breno de Medeiros, Brian Eaton,
>
> =A0=A0 Kellan Elliott-McCrea, Larry Halff, Eran Hammer-Lahav, Ben Laurie,
>
> =A0=A0 Chris Messina, John Panzer, Sam Quigley, David Recordon, Eran
>
> =A0=A0 Sandler, Jonathan Sergent, Todd Sieling, Brian Slesinsky, and Andy
>
> =A0=A0 Smith.
>
>
>
> =A0=A0 The OAuth WRAP specification was edited by Dick Hardt and authored=
 by
>
> =A0=A0 Brian Eaton, Yaron Goland, Dick Hardt, and Allen Tom.
>
>
>
> The list of names was directly derived from my issues list from the past
> year. During every document edit I kept track of the person providing the
> feedback which resulted in a change. This means that those participating =
in
> discussions but who did not directly have any impact on the document are =
not
> named. This is the only reasonable criteria I was able to come up with.
>
>
>
> An alternative is to list anyone who posted anything to the mailing list
> since the work began or to keep the list as-is and let the chairs hand-pi=
ck
> any additional names they believe are justified. I don=92t have strong vi=
ews,
> as long as the list is fair.
>
>
>
>
>
> - Acknowledgement
>
>
>
> This section will start with =91The editor wishes to thank=85=92 and is a=
t my
> discretion.
>
>
>
> EHL
>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

From James.H.Manger@team.telstra.com  Sun Mar 27 19:40:26 2011
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D60CF3A67A4 for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 19:40:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.612
X-Spam-Level: 
X-Spam-Status: No, score=-0.612 tagged_above=-999 required=5 tests=[AWL=0.288,  BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, HTML_MESSAGE=0.001, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qauXXFva8AhC for <oauth@core3.amsl.com>; Sun, 27 Mar 2011 19:40:23 -0700 (PDT)
Received: from ipxcno.tcif.telstra.com.au (ipxcno.tcif.telstra.com.au [203.35.82.208]) by core3.amsl.com (Postfix) with ESMTP id CC1AF3A6783 for <oauth@ietf.org>; Sun, 27 Mar 2011 19:40:21 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.63,252,1299416400"; d="scan'208,217";a="28723587"
Received: from unknown (HELO ipcdni.tcif.telstra.com.au) ([10.97.216.212]) by ipocni.tcif.telstra.com.au with ESMTP; 28 Mar 2011 13:41:57 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6298"; a="22512143"
Received: from wsmsg3701.srv.dir.telstra.com ([172.49.40.169]) by ipcdni.tcif.telstra.com.au with ESMTP; 28 Mar 2011 13:41:57 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by WSMSG3701.srv.dir.telstra.com ([172.49.40.169]) with mapi; Mon, 28 Mar 2011 13:41:56 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, OAuth Mailing List <oauth@ietf.org>
Date: Mon, 28 Mar 2011 13:41:55 +1100
Thread-Topic: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF
Thread-Index: AcvUgCPYCfnEh2l8Tj+BafbhN2rcIQV7eaqQAJ3E7/A=
Message-ID: <255B9BB34FB7D647A506DC292726F6E11280EBEBC8@WSMSG3153V.srv.dir.telstra.com>
References: <255B9BB34FB7D647A506DC292726F6E1127DCD2142@WSMSG3153V.srv.dir.telstra.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE30@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FE30@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: multipart/alternative; boundary="_000_255B9BB34FB7D647A506DC292726F6E11280EBEBC8WSMSG3153Vsrv_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 02:40:27 -0000

--_000_255B9BB34FB7D647A506DC292726F6E11280EBEBC8WSMSG3153Vsrv_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

>> Q. Should an OAuth client app list the authorization server in the Origi=
n header of requests to resource servers?



> Was there any conclusion?



My conclusion is that the Origin request header is the right place to list =
the OAuth authorization server to combat login CSRF attacks against apps.



The other conclusion was that you probably need fairly sophisticated & gene=
ral (almost browser-like) apps for these attacks to work. OAuth is not frie=
ndly to such uses (client passwords; SHOULD pre-register redirect URI; no d=
iscovery...).



OAuth issues security tokens without indicating where they can be safely us=
ed. While that fatal flaw remains, it is pointless to specify the use of th=
e Origin header.



The good news is that apps, services, or future specs can use the Origin he=
ader (listing the authorization server) without breaking any other parts of=
 OAuth.



--

James Manger


--_000_255B9BB34FB7D647A506DC292726F6E11280EBEBC8WSMSG3153Vsrv_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
-->
</style><!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-AU" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">&gt;&gt; Q. Should an OAuth client app list the auth=
orization server in the Origin header of requests to resource servers?<span=
 style=3D"color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&gt; </span><span lang=
=3D"EN-US" style=3D"color:#1F497D">Was there any conclusion?<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">My conclusion is that =
the Origin request header is the right place to list the OAuth authorizatio=
n server to combat login CSRF attacks against apps.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The other conclusion w=
as that you probably need fairly sophisticated &amp; general (almost browse=
r-like) apps for these attacks to work. OAuth is not friendly to such uses =
(client passwords; SHOULD pre-register redirect
 URI; no discovery&#8230;).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">OAuth issues security =
tokens without indicating where they can be safely used. While that fatal f=
law remains, it is pointless to specify the use of the Origin header.<o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">The good news is that =
apps, services, or future specs can use the Origin header (listing the auth=
orization server) without breaking any other parts of OAuth.<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">--<o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">James Manger<o:p></o:p=
></span></p>
</div>
</div>
</body>
</html>

--_000_255B9BB34FB7D647A506DC292726F6E11280EBEBC8WSMSG3153Vsrv_--

From barryleiba.mailing.lists@gmail.com  Mon Mar 28 01:17:52 2011
Return-Path: <barryleiba.mailing.lists@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 32ECF3A6912 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 01:17:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZOV9NF1qqA1m for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 01:17:51 -0700 (PDT)
Received: from mail-ww0-f44.google.com (mail-ww0-f44.google.com [74.125.82.44]) by core3.amsl.com (Postfix) with ESMTP id D04A73A6939 for <oauth@ietf.org>; Mon, 28 Mar 2011 01:17:50 -0700 (PDT)
Received: by wwa36 with SMTP id 36so2512328wwa.13 for <oauth@ietf.org>; Mon, 28 Mar 2011 01:19:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:reply-to:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=1hQWGKJK/xgmMMM0MoUt+Tk2BpUCb4AKdLg5mo1Hvvs=; b=ZIGl9mS1Bqjy2+bYemsuoZA7tGyi30x9a4D1JeoUGkuTLJ4c43cQ8kRMqJ8/XmXfuX q8OxNQSHzkBKe8xmZgUrin2jLnR7K3LIEcp6QjloSiog7bnhTbUIbGVGQQXD3oD1fs1w qxK1vGEnkOtKAhmEE9WObNmH1WZVHoaYSPe+s=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:reply-to:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; b=S8SE7w2zr2mullTLIrXYLWKE9eqkyEecViNoomo3+NzN/IrSElNP2oZ2N7hSBkUeU/ 8GUu9KBy66Hbec3P8pKmVSyUlsUrmNiS0LmSlX5orkZPvYIVR18Pok8P/OgwX2clSyQN elSrsWDZe2JKOLXH+VJZere0g19sNVV8EMgPQ=
MIME-Version: 1.0
Received: by 10.227.197.148 with SMTP id ek20mr3643483wbb.203.1301300367144; Mon, 28 Mar 2011 01:19:27 -0700 (PDT)
Received: by 10.227.208.83 with HTTP; Mon, 28 Mar 2011 01:19:26 -0700 (PDT)
In-Reply-To: <4D8E540B.40009@stpeter.im>
References: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAD@P3PW5EX1MB01.EX1.SECURESERVER.NET> <59DD1BA8FD3C0F4C90771C18F2B5B53A654314923A@GVW0432EXB.americas.hpqcorp.net> <4D8E540B.40009@stpeter.im>
Date: Mon, 28 Mar 2011 04:19:26 -0400
Message-ID: <AANLkTi=VBFSBMv8TZfCWOn2Rk1X8XMky8cpLYMTW9GTv@mail.gmail.com>
From: Barry Leiba <barryleiba.mailing.lists@gmail.com>
To: Peter Saint-Andre <stpeter@stpeter.im>
Content-Type: text/plain; charset=ISO-8859-1
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] What's up with the secuity considerations? (was RE: Preview of -14)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: barryleiba@computer.org
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 08:17:52 -0000

I have also just submitted this draft:
http://tools.ietf.org/html/draft-leiba-oauth-additionalsecurityconsiderations

Hannes has asked me to talk about it for a few minutes in the OAuth
meeting on Friday, and I plan to.

Barry

From igor.faynberg@alcatel-lucent.com  Mon Mar 28 01:35:07 2011
Return-Path: <igor.faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 991D13A68B1 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 01:35:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8DaMPqnokugr for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 01:35:06 -0700 (PDT)
Received: from ihemail4.lucent.com (ihemail4.lucent.com [135.245.0.39]) by core3.amsl.com (Postfix) with ESMTP id 09F293A6893 for <oauth@ietf.org>; Mon, 28 Mar 2011 01:35:05 -0700 (PDT)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail4.lucent.com (8.13.8/IER-o) with ESMTP id p2S8aXYV010145 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 28 Mar 2011 03:36:33 -0500 (CDT)
Received: from [135.244.32.50] (faynberg.lra.lucent.com [135.244.32.50]) by umail.lucent.com (8.13.8/TPES) with ESMTP id p2S8aVfY024472; Mon, 28 Mar 2011 03:36:32 -0500 (CDT)
Message-ID: <4D90488F.5050806@alcatel-lucent.com>
Date: Mon, 28 Mar 2011 04:36:31 -0400
From: Igor Faynberg <igor.faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
References: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAD@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<59DD1BA8FD3C0F4C90771C18F2B5B53A654314923A@GVW0432EXB.americas.hpqcorp.net>	<4D8E540B.40009@stpeter.im> <AANLkTi=VBFSBMv8TZfCWOn2Rk1X8XMky8cpLYMTW9GTv@mail.gmail.com>
In-Reply-To: <AANLkTi=VBFSBMv8TZfCWOn2Rk1X8XMky8cpLYMTW9GTv@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.39
Cc: barryleiba@computer.org
Subject: Re: [OAUTH-WG] What's up with the secuity considerations? (was RE: Preview of -14)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: igor.faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 08:35:07 -0000

It appears to me that the first part of the draft is an OAuth tutorial, 
while the last part is written in "shoulds." While a discussion of the 
user interface issues  is interesting, I strongly believe that it is out 
of scope of OAuth.  Other than that, I don't see anything that stands 
out as new or has not been discussed in the past year. 

Specifically, I don't see any references to the work that Torsten and 
Co. have done in the past six months, nor to the discussions that we had 
had on the list.

Given a ridiculously short time we have for the OAuth meeting, I wish 
that we don't spend any of it reinventing the wheel. I would like to see 
any discussion on security SPECIFICALLY reference the existing document 
and address its perceived gaps.

Perhaps Barry could do that in the next three days?

Igor
.



Barry Leiba wrote:
> I have also just submitted this draft:
> http://tools.ietf.org/html/draft-leiba-oauth-additionalsecurityconsiderations
>
> Hannes has asked me to talk about it for a few minutes in the OAuth
> meeting on Friday, and I plan to.
>
> Barry
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>   

From hannes.tschofenig@gmx.net  Mon Mar 28 01:45:05 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3F2A03A692F for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 01:45:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EEc7qk1tWOCg for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 01:45:04 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.22]) by core3.amsl.com (Postfix) with SMTP id CEDA13A68EE for <oauth@ietf.org>; Mon, 28 Mar 2011 01:45:03 -0700 (PDT)
Received: (qmail invoked by alias); 28 Mar 2011 08:46:39 -0000
Received: from dhcp-9039.meeting.ietf.org (EHLO dhcp-9039.meeting.ietf.org) [130.129.8.57] by mail.gmx.net (mp072) with SMTP; 28 Mar 2011 10:46:39 +0200
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/Dc+kR2qbDi1N2R0+putBKLpI98qTbCHGfV53ff8 DbWikPQ+71vgLK
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <4D90488F.5050806@alcatel-lucent.com>
Date: Mon, 28 Mar 2011 10:46:37 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <A850AC73-4EDF-4250-B6A5-BBCAA54A04A8@gmx.net>
References: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAD@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<59DD1BA8FD3C0F4C90771C18F2B5B53A654314923A@GVW0432EXB.americas.hpqcorp.net>	<4D8E540B.40009@stpeter.im> <AANLkTi=VBFSBMv8TZfCWOn2Rk1X8XMky8cpLYMTW9GTv@mail.gmail.com> <4D90488F.5050806@alcatel-lucent.com>
To: igor.faynberg@alcatel-lucent.com
X-Mailer: Apple Mail (2.1084)
X-Y-GMX-Trusted: 0
Cc: OAuth WG <oauth@ietf.org>, barryleiba@computer.org
Subject: Re: [OAUTH-WG] What's up with the secuity considerations? (was RE: Preview of -14)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 08:45:05 -0000

Hi Igor,=20

the writeup that Barry provided is not meant to be part of the OAuth =
core draft. Instead, it explores the bigger OAuth security story.=20

We certainly do not have an endless amount of time at the face-to-face =
meeting.=20
So, Barry's presentation will be put at the end of the agenda and, if =
there is time, he could introduce us to the work.=20

Ciao
Hannes

On Mar 28, 2011, at 10:36 AM, Igor Faynberg wrote:

>=20
> It appears to me that the first part of the draft is an OAuth =
tutorial, while the last part is written in "shoulds." While a =
discussion of the user interface issues  is interesting, I strongly =
believe that it is out of scope of OAuth.  Other than that, I don't see =
anything that stands out as new or has not been discussed in the past =
year.=20
> Specifically, I don't see any references to the work that Torsten and =
Co. have done in the past six months, nor to the discussions that we had =
had on the list.
>=20
> Given a ridiculously short time we have for the OAuth meeting, I wish =
that we don't spend any of it reinventing the wheel. I would like to see =
any discussion on security SPECIFICALLY reference the existing document =
and address its perceived gaps.
>=20
> Perhaps Barry could do that in the next three days?
>=20
> Igor
> .
>=20
>=20
>=20
> Barry Leiba wrote:
>> I have also just submitted this draft:
>> =
http://tools.ietf.org/html/draft-leiba-oauth-additionalsecurityconsiderati=
ons
>>=20
>> Hannes has asked me to talk about it for a few minutes in the OAuth
>> meeting on Friday, and I plan to.
>>=20
>> Barry
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From Michael.Jones@microsoft.com  Mon Mar 28 02:27:17 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8CA943A686C; Mon, 28 Mar 2011 02:27:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RDZPU2VWpvLq; Mon, 28 Mar 2011 02:27:14 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id A51FD3A681B; Mon, 28 Mar 2011 02:27:14 -0700 (PDT)
Received: from TK5EX14HUBC101.redmond.corp.microsoft.com (157.54.7.153) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Mon, 28 Mar 2011 02:28:52 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14HUBC101.redmond.corp.microsoft.com ([157.54.7.153]) with mapi id 14.01.0270.002; Mon, 28 Mar 2011 02:28:52 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: "oauth@ietf.org" <oauth@ietf.org>, "woes@ietf.org" <woes@ietf.org>, "openid-specs-ab@lists.openid.net" <openid-specs-ab@lists.openid.net>
Thread-Topic: [OAUTH-WG] JSON Web Token (JWT) and JSON Web Signature (JWS) now in separate specs
Thread-Index: AcvrdjytBVRrDTgeReCPOh8gPYdaIgBs7JIw
Date: Mon, 28 Mar 2011 09:28:51 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252AA329@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A9198@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943252A9198@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943252AA329TK5EX14MBXC207r_"
MIME-Version: 1.0
Cc: "openid-specs@lists.openid.net" <openid-specs@lists.openid.net>
Subject: Re: [OAUTH-WG] JSON Web Token (JWT) and JSON Web Signature (JWS) now in separate specs
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 09:27:17 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943252AA329TK5EX14MBXC207r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

These are now published as IETF drafts.  The IETF .txt version links are:
               http://www.ietf.org/id/draft-jones-json-web-token-03.txt
               http://www.ietf.org/id/draft-jones-json-web-signature-01.txt

                                                            -- Mike

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of M=
ike Jones
Sent: Friday, March 25, 2011 10:26 PM
To: oauth@ietf.org; woes@ietf.org; openid-specs-ab@lists.openid.net
Cc: openid-specs@lists.openid.net
Subject: [OAUTH-WG] JSON Web Token (JWT) and JSON Web Signature (JWS) now i=
n separate specs

As promised, I have split the contents of the JWT spec draft-jones-json-web=
-token-01<http://self-issued.info/docs/draft-jones-json-web-token-01.html> =
into two simpler specs:
                draft-jones-json-web-token-02<http://self-issued.info/docs/=
draft-jones-json-web-token-02.html>
                draft-jones-json-web-signature-00<http://self-issued.info/d=
ocs/draft-jones-json-web-signature-00.html>
These should have introduced no semantic changes from the previous spec.

I then applied the feedback that I received since JWT -01 and created revis=
ed versions of the split specs:
                draft-jones-json-web-token-03<http://self-issued.info/docs/=
draft-jones-json-web-token-03.html>
                draft-jones-json-web-signature-01<http://self-issued.info/d=
ocs/draft-jones-json-web-signature-01.html>
The only breaking change introduced was that x5t (X.509 Certificate Thumbpr=
int) is now a SHA-1 hash of the DER-encoded certificate, rather than a SHA-=
256 has, as SHA-1 is the prevailing existing practice for certificate thumb=
print calculations.  See the Document History sections for details on each =
change made.

.txt and .xml versions are also available.  I plan to publish these as IETF=
 drafts once the submission window re-opens on Monday.  Feedback welcome!

                                                            -- Mike

P.S.  Yes, work on the companion encryption spec is now under way...


--_000_4E1F6AAD24975D4BA5B1680429673943252AA329TK5EX14MBXC207r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#002060;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">These are now publishe=
d as IETF drafts.&nbsp; The IETF .txt version links are:<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"h=
ttp://www.ietf.org/id/draft-jones-json-web-token-03.txt">
http://www.ietf.org/id/draft-jones-json-web-token-03.txt</a><o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"h=
ttp://www.ietf.org/id/draft-jones-json-web-signature-01.txt">
http://www.ietf.org/id/draft-jones-json-web-signature-01.txt</a><o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Mike Jones<br>
<b>Sent:</b> Friday, March 25, 2011 10:26 PM<br>
<b>To:</b> oauth@ietf.org; woes@ietf.org; openid-specs-ab@lists.openid.net<=
br>
<b>Cc:</b> openid-specs@lists.openid.net<br>
<b>Subject:</b> [OAUTH-WG] JSON Web Token (JWT) and JSON Web Signature (JWS=
) now in separate specs<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">As promised, I have split the contents of the JWT sp=
ec <a href=3D"http://self-issued.info/docs/draft-jones-json-web-token-01.ht=
ml">
draft-jones-json-web-token-01</a> into two simpler specs:<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"http://self-issued.info/d=
ocs/draft-jones-json-web-token-02.html">
draft-jones-json-web-token-02</a><o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"http://self-issued.info/d=
ocs/draft-jones-json-web-signature-00.html">
draft-jones-json-web-signature-00</a><o:p></o:p></p>
<p class=3D"MsoNormal">These should have introduced no semantic changes fro=
m the previous spec.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I then applied the feedback that I received since JW=
T -01 and created revised versions of the split specs:<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"http://self-issued.info/d=
ocs/draft-jones-json-web-token-03.html">
draft-jones-json-web-token-03</a><o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=3D"http://self-issued.info/d=
ocs/draft-jones-json-web-signature-01.html">
draft-jones-json-web-signature-01</a><o:p></o:p></p>
<p class=3D"MsoNormal">The only breaking change introduced was that x5t (X.=
509 Certificate Thumbprint) is now a SHA-1 hash of the DER-encoded certific=
ate, rather than a SHA-256 has, as SHA-1 is the prevailing existing practic=
e for certificate thumbprint calculations.&nbsp;
 See the Document History sections for details on each change made.<o:p></o=
:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">.txt and .xml versions are also available.&nbsp; I p=
lan to publish these as IETF drafts once the submission window re-opens on =
Monday.&nbsp; Feedback welcome!<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">P.S.&nbsp; Yes, work on the companion encryption spe=
c is now under way&#8230;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943252AA329TK5EX14MBXC207r_--

From Michael.Jones@microsoft.com  Mon Mar 28 02:31:48 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2155C3A6A31 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 02:31:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.598
X-Spam-Level: 
X-Spam-Status: No, score=-10.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8baktxFXMm6k for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 02:31:39 -0700 (PDT)
Received: from smtp.microsoft.com (mail2.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 040523A6A33 for <oauth@ietf.org>; Mon, 28 Mar 2011 02:31:37 -0700 (PDT)
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (157.54.80.48) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Mon, 28 Mar 2011 02:33:14 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14HUBC105.redmond.corp.microsoft.com ([157.54.80.48]) with mapi id 14.01.0270.002; Mon, 28 Mar 2011 02:33:14 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: OAuth JWT Bearer Token Profile
Thread-Index: AcvkA5gsAXiuOwryT8mBtO7U6YTn3gJJ075Q
Date: Mon, 28 Mar 2011 09:33:13 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252AA342@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B16804296739432529871C@TK5EX14MBXC207.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739432529871C@TK5EX14MBXC207.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943252AA342TK5EX14MBXC207r_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] OAuth JWT Bearer Token Profile
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 09:31:48 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943252AA342TK5EX14MBXC207r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

This is now published as an IETF draft.  The IETF .txt version link is:
              http://www.ietf.org/id/draft-jones-oauth-jwt-bearer-00.txt

                                                            -- Mike

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of M=
ike Jones
Sent: Wednesday, March 16, 2011 10:57 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] OAuth JWT Bearer Token Profile

I've just published an OAuth JWT Bearer Token Profile<http://self-issued.in=
fo/docs/draft-jones-oauth-jwt-bearer.html>.  It defines a means of using a =
JSON Web Token (JWT) bearer token to request an OAuth 2.0 access token.  Th=
is profile is intentionally strongly based upon the SAML 2.0 Bearer Asserti=
on Grant Type Profile for OAuth 2.0<http://www.ietf.org/id/draft-ietf-oauth=
-saml2-bearer-03.txt> by Brian Campbell and Chuck Mortimore; it borrows som=
e text from the SAML profile with their permission.  Thanks Brian and Chuck=
, for supporting the writing of this profile and for your reviews of prelim=
inary drafts.

The profile draft is available at these locations:

http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.html
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.txt
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer-00.xml
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.html (will point =
to new versions as they are posted)
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.txt (will point t=
o new versions as they are posted)
http://self-issued.info/docs/draft-jones-oauth-jwt-bearer.xml (will point t=
o new versions as they are posted)
http://svn.openid.net/repos/specifications/oauth/2.0/ (Subversion repositor=
y, with html, txt, and html versions available)

I will also submit this as a formal Internet draft after the IETF tool re-o=
pens for submissions (on March 28th).

                                                                -- Mike


--_000_4E1F6AAD24975D4BA5B1680429673943252AA342TK5EX14MBXC207r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#002060;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">This is now published =
as an IETF draft.&nbsp; The IETF .txt version link is:<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"color:#002060">&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a href=3D"ht=
tp://www.ietf.org/id/draft-jones-oauth-jwt-bearer-00.txt">http://www.ietf.o=
rg/id/draft-jones-oauth-jwt-bearer-00.txt</a><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Mike Jones<br>
<b>Sent:</b> Wednesday, March 16, 2011 10:57 AM<br>
<b>To:</b> oauth@ietf.org<br>
<b>Subject:</b> [OAUTH-WG] OAuth JWT Bearer Token Profile<o:p></o:p></span>=
</p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I&#8217;ve just published an <a href=3D"http://self-=
issued.info/docs/draft-jones-oauth-jwt-bearer.html">
OAuth JWT Bearer Token Profile</a>.&nbsp; It defines a means of using a JSO=
N Web Token (JWT) bearer token to request an OAuth 2.0 access token.&nbsp; =
This profile is intentionally strongly based upon the
<a href=3D"http://www.ietf.org/id/draft-ietf-oauth-saml2-bearer-03.txt">SAM=
L 2.0 Bearer Assertion Grant Type Profile for OAuth 2.0</a> by Brian Campbe=
ll and Chuck Mortimore; it borrows some text from the SAML profile with the=
ir permission.&nbsp; Thanks Brian and Chuck,
 for supporting the writing of this profile and for your reviews of prelimi=
nary drafts.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The profile draft is available at these locations:<o=
:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer-00.html">http://self-issued.info/docs/draft-jones-oauth-jw=
t-bearer-00.html</a><o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer-00.txt">http://self-issued.info/docs/draft-jones-oauth-jwt=
-bearer-00.txt</a><o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer-00.xml">http://self-issued.info/docs/draft-jones-oauth-jwt=
-bearer-00.xml</a><o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer.html">http://self-issued.info/docs/draft-jones-oauth-jwt-b=
earer.html</a> (will point to new versions as they are posted)<o:p></o:p></=
p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer.txt">http://self-issued.info/docs/draft-jones-oauth-jwt-be=
arer.txt</a> (will point to new versions as they are posted)<o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://self-issued.info/docs/draft-jones-=
oauth-jwt-bearer.xml">http://self-issued.info/docs/draft-jones-oauth-jwt-be=
arer.xml</a> (will point to new versions as they are posted)<o:p></o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://svn.openid.net/repos/specification=
s/oauth/2.0/">http://svn.openid.net/repos/specifications/oauth/2.0/</a> (Su=
bversion repository, with html, txt, and html versions available)<o:p></o:p=
></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I will also submit this as a formal Internet draft a=
fter the IETF tool re-opens for submissions (on March 28<sup>th</sup>).<o:p=
></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943252AA342TK5EX14MBXC207r_--

From jricher@mitre.org  Mon Mar 28 09:46:51 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0043C3A6842 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 09:46:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.444
X-Spam-Level: 
X-Spam-Status: No, score=-4.444 tagged_above=-999 required=5 tests=[AWL=1.900,  BAYES_00=-2.599, FU_ENDS_2_WRDS=0.255, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zFGDl30+22kS for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 09:46:49 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 8EE193A659C for <oauth@ietf.org>; Mon, 28 Mar 2011 09:46:49 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id D64FB21B062E; Mon, 28 Mar 2011 12:48:26 -0400 (EDT)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id D0AE721B0340; Mon, 28 Mar 2011 12:48:26 -0400 (EDT)
Received: from [129.83.50.23] (129.83.50.23) by imchub2.MITRE.ORG (129.83.29.74) with Microsoft SMTP Server id 8.2.254.0; Mon, 28 Mar 2011 12:48:26 -0400
From: Justin Richer <jricher@mitre.org>
To: "Manger, James H" <James.H.Manger@team.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E1127FF61216@WSMSG3153V.srv.dir.telstra.com>
References: <255B9BB34FB7D647A506DC292726F6E1127FF61216@WSMSG3153V.srv.dir.telstra.com>
Content-Type: text/plain; charset="UTF-8"
Date: Mon, 28 Mar 2011 12:51:27 -0400
Message-ID: <1301331087.1812.48.camel@ground>
MIME-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 8bit
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authorization grant abstraction
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 16:46:51 -0000

I like the organization of the spec with its grant types structure. In
my reading of it, the two endpoints are logical and may be presented
from different URLs and crunched on by several processing engines in the
background. The important thing is the logical distinction between
"place where the client goes" and "place where the client sends an end
user", and that those don't get folded into each other. As you say
below, there's nothing stopping a provider from defining several
concrete endpoints to handle different configuration sets. 

I think that in practice we'll see people writing a dispatch point to
process their different supported configurations.  I don't think further
abstraction at the specification level will help things.

 -- Justin

On Fri, 2011-03-25 at 03:12 -0400, Manger, James H wrote:
> OAuth2 now defines a single URI â€“ the token endpoint â€“ that has to be
> capable of processing:
> 
> Â·        State from a user approval interaction (encoded into a â€˜codeâ€™
> parameter);
> 
> Â·        User passwords;
> 
> Â·        Client app credentials;
> 
> Â·        SAML tokens;
> 
> Â·        JSON Web Tokens (JWT);
> 
> Â·        Whatever other mechanisms might emerge (perhaps Kerberos
> tokens).
> 
> A server might only support a subset of these modes â€“ but it always
> has to support that subset from the same URI.
> 
>  
> 
> This is not a useful constraint.
> 
>  
> 
> A better approach would be to specify the format of a token response
> as a standalone item (eg with its own application/credential media
> type). Any mode get use its own URI, but link to the standardised
> OAuth2 processing by using the standard response format.
> 
>  
> 
> Alternatively, if OAuth2 insists servers supported all modes at a
> single token endpoint URI, it may as well take the minor extra step
> fixing that URI. Perhaps /.well-known/oauth2.
> 
>  
> 
>  
> 
> --(more details notes on this issue)
> 
>  
> 
> A service might start supporting user-delegation with some
> off-the-shelf software. If it later wants to support, say, JWTs using
> some other software it has to graft some de-multiplexing layers in
> front. If a service want to experiment with a new mode it needs to
> integrate it closely with its existing production parts.
> 
>  
> 
> Another consequence is the confusing â€œauthorization grantâ€
> abstraction. The spec makes a valiant effort to describe an
> abstraction that covers an app orchestrating a user-to-server approval
> flow, plus an app swapping its secret for a temporary token, plus an
> app presenting say a SAML token, plus more.
> 
>  
> 
> Another consequence is the need for grant_types. Various hassles with
> these have come up in the last month â€“ most seem minor, but they do
> add confusion and complexity none the less: what the labels should be
> (eg â€œcodeâ€ vs â€œauthorization_codeâ€; â€œclient_credentialsâ€ comments);
> whether there should be a registry; if http://oauth.net/grant_type
> URIs are stable or need some process control.
> 
>  
> 
> Mike Jonesâ€™ recent draft â€œJSON Web Token (JWT) Bearer Profile for
> OAuth 2.0â€ [draft-jones-oauth-jwt-bearer] is illustrative. It defines
> how to swap a JSON Web Token for other credentials to access
> resources. It says to POST the JWT in a â€˜jwtâ€™ parameter, along with an
> optional â€˜scopeâ€™, to the server. It also has to specify the grant type
> http://oauth.net/grant_type/jwt/1.0/bearer. Any implementation needs
> to be configured with a serverâ€™s URI to POST the JWT to. It is hard to
> see how adding grant_type=http://oauth.net/grant_type/jwt/1.0/bearer
> to that URI is any simpler than the service just providing a
> JWT-specific URI (eg http://api.example.com/token/jwt).
> 
>  
> 
> Some services will be able to side-step the â€œone token endpointâ€ rule
> by acting as multiple authorization servers â€“ simply document
> different token endpoints (eg use http://example.com/token/delegate,
> http://idp.example.com/oauth2, and http://example.com/token/jwt as the
> token endpoint for â€œnormalâ€, SAML, and JWT flows). In such a scenario
> grant_types look superfluous. However, a server doing this risks
> clashing with some future discovery protocol that assumes the â€œone
> token endpointâ€ rule.
> 
>  
> 
> About the only potential benefit from the single token endpoint is
> that a client app (using some future discovery protocol) only needs to
> discover one URI. But that is not realistic. A client app will also
> need to discover whether or not a particular mode is supported (and
> probably more details about that mode) so it may as well discover a
> mode-specific URI.
> 
>  
> 
> --
> 
> James Manger
> 
>  
> 
> 



From jricher@mitre.org  Mon Mar 28 10:00:33 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0927428C0F6 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 10:00:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.654
X-Spam-Level: 
X-Spam-Status: No, score=-4.654 tagged_above=-999 required=5 tests=[AWL=1.944,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UFAyrpBd+LEG for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 10:00:31 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 926423A682A for <oauth@ietf.org>; Mon, 28 Mar 2011 10:00:31 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id D15CF21B12D8; Mon, 28 Mar 2011 13:02:08 -0400 (EDT)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id B1EF821B062E; Mon, 28 Mar 2011 13:02:08 -0400 (EDT)
Received: from [129.83.50.23] (129.83.50.23) by imchub2.MITRE.ORG (129.83.29.74) with Microsoft SMTP Server id 8.2.254.0; Mon, 28 Mar 2011 13:02:08 -0400
From: Justin Richer <jricher@mitre.org>
To: Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465642FFF1@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com> <A12B7D5A-F7B4-4DC8-A6D1-4C4ADB53B38C@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FFF1@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset="UTF-8"
Date: Mon, 28 Mar 2011 13:05:09 -0400
Message-ID: <1301331909.1812.50.camel@ground>
MIME-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 7bit
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 17:00:33 -0000

What about non-http return uri's, or client-localhost, such as 

  someapp://app/?code=foo

  http://localhost:87345/?code=foo

HTTPS makes sense when you're talking between two web servers, but it
seems to fall apart otherwise. I think SHOULD is appropriate here.

 -- Justin


On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
> Unless someone has an objection, I'll make the change from SHOULD to MUST.
> 
> EHL
> 
> > -----Original Message-----
> > From: Phil Hunt [mailto:phil.hunt@oracle.com]
> > Sent: Friday, March 25, 2011 12:42 PM
> > To: Eran Hammer-Lahav
> > Cc: OAuth WG; Chuck & Mara Mortimore
> > Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> > 
> > Regarding the message: http://www.ietf.org/mail-
> > archive/web/oauth/current/msg05762.html  (sorry I somehow lost the
> > message in my email).
> > 
> > This issue is theft of the authorization code during the redirect.
> > Authenticating the client is an important feature and goes a long way, but it is
> > not sufficient since in many cases, the client_id/client_secret will likely be
> > hard coded and relatively easy to deduce (e.g. mobile client apps).  Of course
> > a strong client authentication won't have this issue. This makes many
> > consumer situations very susceptible to an attack where the authorization
> > code is intercepted.
> > 
> > For more information look at the SAML Artifact issues in section 6.5
> > (specifically stolen artifact, replay, etc) of this document: http://docs.oasis-
> > open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
> > 
> > There are a number of remediations suggested (small lifetime, single use),
> > but the foundational one is confidentiality of the exchange (TLS). Hence the
> > recommendation that the return of an authorization code be kept secure
> > with a MUST for TLS.
> > 
> > Phil
> > phil.hunt@oracle.com
> > 
> > 
> > 
> > 
> > On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
> > 
> > >
> > > On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
> > <eran@hueniverse.com> wrote:
> > >
> > >>
> > >>> -----Original Message-----
> > >>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
> > >>> Behalf Of Chuck Mortimore
> > >>> Sent: Monday, March 14, 2011 6:10 PM
> > >>
> > >>> 1) I'd vote for dropping the following from 1.4.2.   In turn I'd discuss some
> > of
> > >>> the security considerations, such as difficulty of protecting a
> > >>> client_secret in almost all use-cases of this profile.
> > >>>
> > >>>    "Implicit grants improve the responsiveness and efficiency of some
> > >>>   clients (such as a client implemented as an in-browser application)
> > >>>   since it reduces the number of round trips required to obtain an
> > >>>   access token."
> > >>
> > >> Why drop it? What about it isn't accurate?
> > >
> > > It's accurate, but my opinion is it sends the wrong message.   It's clearly the
> > less secure of the response types.  By positioning it as the most performant
> > people may find that attractive and make the wrong security decision.
> > >
> > >
> > >>
> > >>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
> > >>
> > >> Why? What's the attack vector?
> > >
> > > See Phils comment on past experience with artifact bindings.  Spec should
> > default for security always on, and let deployments that don't want to use
> > HTTPs simply be non-conformant.
> > >
> > >>
> > >>> 3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED
> > >>> since in 4.1.1 it's "REQUIRED unless"
> > >>
> > >> The client should always confirm where the code was sent to. It can omit
> > the redirection is one was provided but should tell the server where it went
> > to. This is more consistent on the verification side, but if the original flow
> > designers want to chime in (Dick, Brian, etc.?), I'm open to change this.
> > >>
> > >>> 4) Section 4.2.2 - when did we drop refresh_token?     I assume this goes
> > >>> back to disagreement on how best to handle native clients. I'd
> > >>> prefer it to simply reference 5.1 and leave what is issued up to the
> > >>> security profile of the particular deployment as to what is issued.
> > >>
> > >> -08 June 2010.
> > >>
> > >> This has been decided for a long time. I'm not eager to change it.
> > >
> > > Thanks - I can live with it.  Unfortunately we still seem to be fragmenting on
> > the native client approach.   Good topic for IIW I suspect
> > >
> > > -cmort
> > >
> > >>
> > >> EHL
> > >>
> > >>
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From mark.mcgloin@ie.ibm.com  Mon Mar 28 10:45:31 2011
Return-Path: <mark.mcgloin@ie.ibm.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 756033A6948; Mon, 28 Mar 2011 10:45:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hd2cYVz4OL9a; Mon, 28 Mar 2011 10:45:26 -0700 (PDT)
Received: from mtagate5.uk.ibm.com (mtagate5.uk.ibm.com [194.196.100.165]) by core3.amsl.com (Postfix) with ESMTP id 91FC03A6828; Mon, 28 Mar 2011 10:45:26 -0700 (PDT)
Received: from d06nrmr1707.portsmouth.uk.ibm.com (d06nrmr1707.portsmouth.uk.ibm.com [9.149.39.225]) by mtagate5.uk.ibm.com (8.13.1/8.13.1) with ESMTP id p2SHl2b9010524; Mon, 28 Mar 2011 17:47:02 GMT
Received: from d06av02.portsmouth.uk.ibm.com (d06av02.portsmouth.uk.ibm.com [9.149.37.228]) by d06nrmr1707.portsmouth.uk.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p2SHlRTs1519762; Mon, 28 Mar 2011 18:47:35 +0100
Received: from d06av02.portsmouth.uk.ibm.com (loopback [127.0.0.1]) by d06av02.portsmouth.uk.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p2SHkseM024226; Mon, 28 Mar 2011 11:46:54 -0600
Received: from d06ml093.portsmouth.uk.ibm.com (d06ml093.portsmouth.uk.ibm.com [9.149.104.171]) by d06av02.portsmouth.uk.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p2SHksk1024220; Mon, 28 Mar 2011 11:46:54 -0600
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564300C7@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BC117E99-F795-4895-AC9E-9460FA509421@gmx.net>	<90C41DD21FB7C64BB94121FBBC2E723446564300C6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <828DF3C2-C65A-43F7-A414-20DC62F5D401@gmx.net> <90C41DD21FB7C64BB94121FBBC2E723446564300C7@P3PW5EX1MB01.EX1.SECURESERVER.NET>
X-KeepSent: 174DA146:D840DA50-80257861:00615FE0; type=4; name=$KeepSent
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Lotus Notes Release 8.5.1FP5 SHF29 November 12, 2010
Message-ID: <OF174DA146.D840DA50-ON80257861.00615FE0-80257861.0061AC76@ie.ibm.com>
From: Mark Mcgloin <mark.mcgloin@ie.ibm.com>
Date: Mon, 28 Mar 2011 18:46:17 +0100
X-MIMETrack: Serialize by Router on D06ML093/06/M/IBM(Release 8.0.2FP6|July 15, 2010) at 28/03/2011 18:46:19
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Cc: OAuth WG <oauth@ietf.org>, oauth-bounces@ietf.org
Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 17:45:31 -0000

Eran, you are right about the plan. We have already had a couple of
iterations of distilling the separate document down into a security
considerations section for inclusion in the spec and will complete if based
on feedback Torsten received this week at IETF-80. I am unable to attend


Mark


oauth-bounces@ietf.org wrote on 27/03/2011 09:19:58:

> Eran Hammer-Lahav <eran@hueniverse.com>
> Sent by: oauth-bounces@ietf.org
>
>
> Subject
>
> Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
>
> I guess you can sort it out at the meeting. I thought the plan was
> to distill the security document into a shorter (but not
> insignificant) security consideration section (I was expecting
> something in the range of 10-20 pages), and also publish the model
> document with added details.
>
> EHL
>
> > -----Original Message-----
> > From: Hannes Tschofenig [mailto:hannes.tschofenig@gmx.net]
> > Sent: Sunday, March 27, 2011 1:10 AM
> > To: Eran Hammer-Lahav
> > Cc: Hannes Tschofenig; OAuth WG
> > Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
> >
> > That's what I thought was the plan.
> > (Assuming the working group agrees to work on a separate document. I
> > would support it.)
> >
> > On Mar 27, 2011, at 10:03 AM, Eran Hammer-Lahav wrote:
> >
> > > So the new plan is for you to provide the text for the security
> section and
> > just publish their work as a separate RFC as the same time?
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From tim.freeman@hp.com  Mon Mar 28 11:24:37 2011
Return-Path: <tim.freeman@hp.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 84BF03A688B for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 11:24:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -107.271
X-Spam-Level: 
X-Spam-Status: No, score=-107.271 tagged_above=-999 required=5 tests=[AWL=-0.672, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a0OSZH4dhgn6 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 11:24:36 -0700 (PDT)
Received: from g1t0029.austin.hp.com (g1t0029.austin.hp.com [15.216.28.36]) by core3.amsl.com (Postfix) with ESMTP id A41593A67D1 for <oauth@ietf.org>; Mon, 28 Mar 2011 11:24:36 -0700 (PDT)
Received: from G4W3009.americas.hpqcorp.net (g4w3009.houston.hp.com [16.234.35.43]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g1t0029.austin.hp.com (Postfix) with ESMTPS id BC0803845E; Mon, 28 Mar 2011 18:26:13 +0000 (UTC)
Received: from G3W0629.americas.hpqcorp.net (16.233.58.78) by G4W3009.americas.hpqcorp.net (16.234.35.43) with Microsoft SMTP Server (TLS) id 14.1.270.1; Mon, 28 Mar 2011 18:24:23 +0000
Received: from GVW0432EXB.americas.hpqcorp.net ([16.234.32.146]) by G3W0629.americas.hpqcorp.net ([16.233.58.78]) with mapi; Mon, 28 Mar 2011 18:24:22 +0000
From: "Freeman, Tim" <tim.freeman@hp.com>
To: "barryleiba@computer.org" <barryleiba@computer.org>, Peter Saint-Andre <stpeter@stpeter.im>
Date: Mon, 28 Mar 2011 18:24:21 +0000
Thread-Topic: Is an unguessable client state a security consideration? (was RE: [OAUTH-WG] What's up with the secuity considerations? (was RE: Preview of -14))
Thread-Index: AcvtINwE7FYG5alHQ+KP/Wl5RTb3ywATjoLw
Message-ID: <59DD1BA8FD3C0F4C90771C18F2B5B53A65439CEF73@GVW0432EXB.americas.hpqcorp.net>
References: <90C41DD21FB7C64BB94121FBBC2E7234465642FEAD@P3PW5EX1MB01.EX1.SECURESERVER.NET> <59DD1BA8FD3C0F4C90771C18F2B5B53A654314923A@GVW0432EXB.americas.hpqcorp.net> <4D8E540B.40009@stpeter.im> <AANLkTi=VBFSBMv8TZfCWOn2Rk1X8XMky8cpLYMTW9GTv@mail.gmail.com>
In-Reply-To: <AANLkTi=VBFSBMv8TZfCWOn2Rk1X8XMky8cpLYMTW9GTv@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: [OAUTH-WG] Is an unguessable client state a security consideration? (was RE: What's up with the secuity considerations? (was RE: Preview of -14))
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 18:24:37 -0000

It is apparently essential for the security of the protocol that the client=
 state is not guessable by an attacker, as described at:

   http://www.ietf.org/mail-archive/web/oauth/current/msg05733.html

(That link might fail if the mail archive is reindexed.  It's a 23 Mar 2011=
 email with subject "Protocol breaks if states are guessable".)

Does that belong in the security considerations?

It seems to me it belongs somewhere, unless someone can provide a reasonabl=
e argument that it's not true.

Tim Freeman
Email: tim.freeman@hp.com
Desk in Palo Alto: (650) 857-2581
Home: (408) 774-1298
Cell: (408) 348-7536


-----Original Message-----
From: Barry Leiba [mailto:barryleiba.mailing.lists@gmail.com]=20
Sent: Monday, March 28, 2011 1:19 AM
To: Peter Saint-Andre
Cc: Freeman, Tim; OAuth WG
Subject: Re: [OAUTH-WG] What's up with the secuity considerations? (was RE:=
 Preview of -14)

I have also just submitted this draft:
http://tools.ietf.org/html/draft-leiba-oauth-additionalsecurityconsideratio=
ns

Hannes has asked me to talk about it for a few minutes in the OAuth
meeting on Friday, and I plan to.

Barry

From gffletch@aol.com  Mon Mar 28 11:53:10 2011
Return-Path: <gffletch@aol.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 85C003A68ED for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 11:53:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.994
X-Spam-Level: 
X-Spam-Status: No, score=-1.994 tagged_above=-999 required=5 tests=[AWL=0.603,  BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2VFgAAiuZTFs for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 11:53:09 -0700 (PDT)
Received: from imr-ma05.mx.aol.com (imr-ma05.mx.aol.com [64.12.100.31]) by core3.amsl.com (Postfix) with ESMTP id BBAAD3A68E8 for <oauth@ietf.org>; Mon, 28 Mar 2011 11:53:08 -0700 (PDT)
Received: from mtaout-mb02.r1000.mx.aol.com (mtaout-mb02.r1000.mx.aol.com [172.29.41.66]) by imr-ma05.mx.aol.com (8.14.1/8.14.1) with ESMTP id p2SIsVI8028188; Mon, 28 Mar 2011 14:54:31 -0400
Received: from palantir.local (unknown [10.181.183.161]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mtaout-mb02.r1000.mx.aol.com (MUA/Third Party Client Interface) with ESMTPSA id D74FCE000123; Mon, 28 Mar 2011 14:54:30 -0400 (EDT)
Message-ID: <4D90D966.9050603@aol.com>
Date: Mon, 28 Mar 2011 14:54:30 -0400
From: George Fletcher <gffletch@aol.com>
Organization: AOL LLC
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net>	<C9A40A87.1603D%cmortimore@salesforce.com>	<90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com>	<A12B7D5A-F7B4-4DC8-A6D1-4C4ADB53B38C@oracle.com>	<90C41DD21FB7C64BB94121FBBC2E7234465642FFF1@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1301331909.1812.50.camel@ground>
In-Reply-To: <1301331909.1812.50.camel@ground>
Content-Type: multipart/alternative; boundary="------------030002080704060408070805"
x-aol-global-disposition: G
X-AOL-SCOLL-SCORE: 1:2:471418656:93952408  
X-AOL-SCOLL-URL_COUNT: 1  
x-aol-sid: 3039ac1d29424d90d9664aa2
X-AOL-IP: 10.181.183.161
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 18:53:10 -0000

This is a multi-part message in MIME format.
--------------030002080704060408070805
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

+1 for SHOULD

... with a reference to the Security Considerations section that 
addresses the issues. The one we're facing right now with this, is that 
for easy development it's nice to allow the redirect_uri to be 
http://localhost :) For production deployments, I agree that TLS is the 
best option.

Thanks,
George

On 3/28/11 1:05 PM, Justin Richer wrote:
> What about non-http return uri's, or client-localhost, such as
>
>    someapp://app/?code=foo
>
>    http://localhost:87345/?code=foo
>
> HTTPS makes sense when you're talking between two web servers, but it
> seems to fall apart otherwise. I think SHOULD is appropriate here.
>
>   -- Justin
>
>
> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
>> Unless someone has an objection, I'll make the change from SHOULD to MUST.
>>
>> EHL
>>
>>> -----Original Message-----
>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
>>> Sent: Friday, March 25, 2011 12:42 PM
>>> To: Eran Hammer-Lahav
>>> Cc: OAuth WG; Chuck&  Mara Mortimore
>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>
>>> Regarding the message: http://www.ietf.org/mail-
>>> archive/web/oauth/current/msg05762.html  (sorry I somehow lost the
>>> message in my email).
>>>
>>> This issue is theft of the authorization code during the redirect.
>>> Authenticating the client is an important feature and goes a long way, but it is
>>> not sufficient since in many cases, the client_id/client_secret will likely be
>>> hard coded and relatively easy to deduce (e.g. mobile client apps).  Of course
>>> a strong client authentication won't have this issue. This makes many
>>> consumer situations very susceptible to an attack where the authorization
>>> code is intercepted.
>>>
>>> For more information look at the SAML Artifact issues in section 6.5
>>> (specifically stolen artifact, replay, etc) of this document: http://docs.oasis-
>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
>>>
>>> There are a number of remediations suggested (small lifetime, single use),
>>> but the foundational one is confidentiality of the exchange (TLS). Hence the
>>> recommendation that the return of an authorization code be kept secure
>>> with a MUST for TLS.
>>>
>>> Phil
>>> phil.hunt@oracle.com
>>>
>>>
>>>
>>>
>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
>>>
>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
>>> <eran@hueniverse.com>  wrote:
>>>>>> -----Original Message-----
>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
>>>>>> Behalf Of Chuck Mortimore
>>>>>> Sent: Monday, March 14, 2011 6:10 PM
>>>>>> 1) I'd vote for dropping the following from 1.4.2.   In turn I'd discuss some
>>> of
>>>>>> the security considerations, such as difficulty of protecting a
>>>>>> client_secret in almost all use-cases of this profile.
>>>>>>
>>>>>>     "Implicit grants improve the responsiveness and efficiency of some
>>>>>>    clients (such as a client implemented as an in-browser application)
>>>>>>    since it reduces the number of round trips required to obtain an
>>>>>>    access token."
>>>>> Why drop it? What about it isn't accurate?
>>>> It's accurate, but my opinion is it sends the wrong message.   It's clearly the
>>> less secure of the response types.  By positioning it as the most performant
>>> people may find that attractive and make the wrong security decision.
>>>>
>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
>>>>> Why? What's the attack vector?
>>>> See Phils comment on past experience with artifact bindings.  Spec should
>>> default for security always on, and let deployments that don't want to use
>>> HTTPs simply be non-conformant.
>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED
>>>>>> since in 4.1.1 it's "REQUIRED unless"
>>>>> The client should always confirm where the code was sent to. It can omit
>>> the redirection is one was provided but should tell the server where it went
>>> to. This is more consistent on the verification side, but if the original flow
>>> designers want to chime in (Dick, Brian, etc.?), I'm open to change this.
>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?     I assume this goes
>>>>>> back to disagreement on how best to handle native clients. I'd
>>>>>> prefer it to simply reference 5.1 and leave what is issued up to the
>>>>>> security profile of the particular deployment as to what is issued.
>>>>> -08 June 2010.
>>>>>
>>>>> This has been decided for a long time. I'm not eager to change it.
>>>> Thanks - I can live with it.  Unfortunately we still seem to be fragmenting on
>>> the native client approach.   Good topic for IIW I suspect
>>>> -cmort
>>>>
>>>>> EHL
>>>>>
>>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>


--------------030002080704060408070805
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#ffffff" text="#000000">
    <font face="Helvetica, Arial, sans-serif">+1 for SHOULD <br>
      <br>
      ... with a reference to the Security Considerations section that
      addresses the issues. The one we're facing right now with this, is
      that for easy development it's nice to allow the redirect_uri to
      be <a class="moz-txt-link-freetext" href="http://localhost">http://localhost</a> :) For production deployments, I agree that
      TLS is the best option.<br>
      <br>
      Thanks,<br>
      George<br>
    </font><br>
    On 3/28/11 1:05 PM, Justin Richer wrote:
    <blockquote cite="mid:1301331909.1812.50.camel@ground" type="cite">
      <pre wrap="">What about non-http return uri's, or client-localhost, such as 

  someapp://app/?code=foo

  <a class="moz-txt-link-freetext" href="http://localhost:87345/?code=foo">http://localhost:87345/?code=foo</a>

HTTPS makes sense when you're talking between two web servers, but it
seems to fall apart otherwise. I think SHOULD is appropriate here.

 -- Justin


On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
</pre>
      <blockquote type="cite">
        <pre wrap="">Unless someone has an objection, I'll make the change from SHOULD to MUST.

EHL

</pre>
        <blockquote type="cite">
          <pre wrap="">-----Original Message-----
From: Phil Hunt [<a class="moz-txt-link-freetext" href="mailto:phil.hunt@oracle.com">mailto:phil.hunt@oracle.com</a>]
Sent: Friday, March 25, 2011 12:42 PM
To: Eran Hammer-Lahav
Cc: OAuth WG; Chuck &amp; Mara Mortimore
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt

Regarding the message: <a class="moz-txt-link-freetext" href="http://www.ietf.org/mail">http://www.ietf.org/mail</a>-
archive/web/oauth/current/msg05762.html  (sorry I somehow lost the
message in my email).

This issue is theft of the authorization code during the redirect.
Authenticating the client is an important feature and goes a long way, but it is
not sufficient since in many cases, the client_id/client_secret will likely be
hard coded and relatively easy to deduce (e.g. mobile client apps).  Of course
a strong client authentication won't have this issue. This makes many
consumer situations very susceptible to an attack where the authorization
code is intercepted.

For more information look at the SAML Artifact issues in section 6.5
(specifically stolen artifact, replay, etc) of this document: <a class="moz-txt-link-freetext" href="http://docs.oasis">http://docs.oasis</a>-
open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf

There are a number of remediations suggested (small lifetime, single use),
but the foundational one is confidentiality of the exchange (TLS). Hence the
recommendation that the return of an authorization code be kept secure
with a MUST for TLS.

Phil
<a class="moz-txt-link-abbreviated" href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>




On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:

</pre>
          <blockquote type="cite">
            <pre wrap="">
On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
</pre>
          </blockquote>
          <pre wrap=""><a class="moz-txt-link-rfc2396E" href="mailto:eran@hueniverse.com">&lt;eran@hueniverse.com&gt;</a> wrote:
</pre>
          <blockquote type="cite">
            <pre wrap="">
</pre>
            <blockquote type="cite">
              <pre wrap="">
</pre>
              <blockquote type="cite">
                <pre wrap="">-----Original Message-----
From: <a class="moz-txt-link-abbreviated" href="mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<a class="moz-txt-link-freetext" href="mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>] On
Behalf Of Chuck Mortimore
Sent: Monday, March 14, 2011 6:10 PM
</pre>
              </blockquote>
              <pre wrap="">
</pre>
              <blockquote type="cite">
                <pre wrap="">1) I'd vote for dropping the following from 1.4.2.   In turn I'd discuss some
</pre>
              </blockquote>
            </blockquote>
          </blockquote>
          <pre wrap="">of
</pre>
          <blockquote type="cite">
            <blockquote type="cite">
              <blockquote type="cite">
                <pre wrap="">the security considerations, such as difficulty of protecting a
client_secret in almost all use-cases of this profile.

   "Implicit grants improve the responsiveness and efficiency of some
  clients (such as a client implemented as an in-browser application)
  since it reduces the number of round trips required to obtain an
  access token."
</pre>
              </blockquote>
              <pre wrap="">
Why drop it? What about it isn't accurate?
</pre>
            </blockquote>
            <pre wrap="">
It's accurate, but my opinion is it sends the wrong message.   It's clearly the
</pre>
          </blockquote>
          <pre wrap="">less secure of the response types.  By positioning it as the most performant
people may find that attractive and make the wrong security decision.
</pre>
          <blockquote type="cite">
            <pre wrap="">

</pre>
            <blockquote type="cite">
              <pre wrap="">
</pre>
              <blockquote type="cite">
                <pre wrap="">2) Section 2.1, we should MUST TLS even for Authorization Code.
</pre>
              </blockquote>
              <pre wrap="">
Why? What's the attack vector?
</pre>
            </blockquote>
            <pre wrap="">
See Phils comment on past experience with artifact bindings.  Spec should
</pre>
          </blockquote>
          <pre wrap="">default for security always on, and let deployments that don't want to use
HTTPs simply be non-conformant.
</pre>
          <blockquote type="cite">
            <pre wrap="">
</pre>
            <blockquote type="cite">
              <pre wrap="">
</pre>
              <blockquote type="cite">
                <pre wrap="">3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED
since in 4.1.1 it's "REQUIRED unless"
</pre>
              </blockquote>
              <pre wrap="">
The client should always confirm where the code was sent to. It can omit
</pre>
            </blockquote>
          </blockquote>
          <pre wrap="">the redirection is one was provided but should tell the server where it went
to. This is more consistent on the verification side, but if the original flow
designers want to chime in (Dick, Brian, etc.?), I'm open to change this.
</pre>
          <blockquote type="cite">
            <blockquote type="cite">
              <pre wrap="">
</pre>
              <blockquote type="cite">
                <pre wrap="">4) Section 4.2.2 - when did we drop refresh_token?     I assume this goes
back to disagreement on how best to handle native clients. I'd
prefer it to simply reference 5.1 and leave what is issued up to the
security profile of the particular deployment as to what is issued.
</pre>
              </blockquote>
              <pre wrap="">
-08 June 2010.

This has been decided for a long time. I'm not eager to change it.
</pre>
            </blockquote>
            <pre wrap="">
Thanks - I can live with it.  Unfortunately we still seem to be fragmenting on
</pre>
          </blockquote>
          <pre wrap="">the native client approach.   Good topic for IIW I suspect
</pre>
          <blockquote type="cite">
            <pre wrap="">
-cmort

</pre>
            <blockquote type="cite">
              <pre wrap="">
EHL


</pre>
            </blockquote>
            <pre wrap="">_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
          </blockquote>
        </blockquote>
        <pre wrap="">
_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
      </blockquote>
      <pre wrap="">

_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>

</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------030002080704060408070805--

From eran@hueniverse.com  Mon Mar 28 12:51:47 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 92B043A68FA for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 12:51:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.641
X-Spam-Level: 
X-Spam-Status: No, score=-2.641 tagged_above=-999 required=5 tests=[AWL=-0.043, BAYES_00=-2.599, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IqsP+PFNg6P0 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 12:51:46 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 547FC3A68F2 for <oauth@ietf.org>; Mon, 28 Mar 2011 12:51:46 -0700 (PDT)
Received: (qmail 17320 invoked from network); 28 Mar 2011 19:53:23 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 28 Mar 2011 19:53:22 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Mon, 28 Mar 2011 12:53:01 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Justin Richer <jricher@mitre.org>
Date: Mon, 28 Mar 2011 12:52:57 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvtaeKEZc/a3yUzSTGOa9BTJsXA3gAF8oUw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564302A3@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com> <A12B7D5A-F7B4-4DC8-A6D1-4C4ADB53B38C@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FFF1@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1301331909.1812.50.camel@ground>
In-Reply-To: <1301331909.1812.50.camel@ground>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 19:51:47 -0000

Tm8gY2hhbmdlIHRoZW4uIEJ1dCB0aGUgc2VjdXJpdHkgY29uc2lkZXJhdGlvbnMgc2VjdGlvbiBt
dXN0IHJlZmxlY3QgdGhpcy4NCg0KRUhMDQoNCj4gLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0N
Cj4gRnJvbTogSnVzdGluIFJpY2hlciBbbWFpbHRvOmpyaWNoZXJAbWl0cmUub3JnXQ0KPiBTZW50
OiBNb25kYXksIE1hcmNoIDI4LCAyMDExIDEwOjA1IEFNDQo+IFRvOiBFcmFuIEhhbW1lci1MYWhh
dg0KPiBDYzogUGhpbCBIdW50OyBPQXV0aCBXRw0KPiBTdWJqZWN0OiBSZTogW09BVVRILVdHXSBX
R0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgtdjItMTMudHh0DQo+IA0KPiBXaGF0IGFib3V0IG5vbi1o
dHRwIHJldHVybiB1cmkncywgb3IgY2xpZW50LWxvY2FsaG9zdCwgc3VjaCBhcw0KPiANCj4gICBz
b21lYXBwOi8vYXBwLz9jb2RlPWZvbw0KPiANCj4gICBodHRwOi8vbG9jYWxob3N0Ojg3MzQ1Lz9j
b2RlPWZvbw0KPiANCj4gSFRUUFMgbWFrZXMgc2Vuc2Ugd2hlbiB5b3UncmUgdGFsa2luZyBiZXR3
ZWVuIHR3byB3ZWIgc2VydmVycywgYnV0IGl0DQo+IHNlZW1zIHRvIGZhbGwgYXBhcnQgb3RoZXJ3
aXNlLiBJIHRoaW5rIFNIT1VMRCBpcyBhcHByb3ByaWF0ZSBoZXJlLg0KPiANCj4gIC0tIEp1c3Rp
bg0KPiANCj4gDQo+IE9uIEZyaSwgMjAxMS0wMy0yNSBhdCAxNjowMyAtMDQwMCwgRXJhbiBIYW1t
ZXItTGFoYXYgd3JvdGU6DQo+ID4gVW5sZXNzIHNvbWVvbmUgaGFzIGFuIG9iamVjdGlvbiwgSSds
bCBtYWtlIHRoZSBjaGFuZ2UgZnJvbSBTSE9VTEQgdG8NCj4gTVVTVC4NCj4gPg0KPiA+IEVITA0K
PiA+DQo+ID4gPiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPiA+ID4gRnJvbTogUGhpbCBI
dW50IFttYWlsdG86cGhpbC5odW50QG9yYWNsZS5jb21dDQo+ID4gPiBTZW50OiBGcmlkYXksIE1h
cmNoIDI1LCAyMDExIDEyOjQyIFBNDQo+ID4gPiBUbzogRXJhbiBIYW1tZXItTGFoYXYNCj4gPiA+
IENjOiBPQXV0aCBXRzsgQ2h1Y2sgJiBNYXJhIE1vcnRpbW9yZQ0KPiA+ID4gU3ViamVjdDogUmU6
IFtPQVVUSC1XR10gV0dMQyBvbiBkcmFmdC1pZXRmLW9hdXRoLXYyLTEzLnR4dA0KPiA+ID4NCj4g
PiA+IFJlZ2FyZGluZyB0aGUgbWVzc2FnZTogaHR0cDovL3d3dy5pZXRmLm9yZy9tYWlsLQ0KPiA+
ID4gYXJjaGl2ZS93ZWIvb2F1dGgvY3VycmVudC9tc2cwNTc2Mi5odG1sICAoc29ycnkgSSBzb21l
aG93IGxvc3QgdGhlDQo+ID4gPiBtZXNzYWdlIGluIG15IGVtYWlsKS4NCj4gPiA+DQo+ID4gPiBU
aGlzIGlzc3VlIGlzIHRoZWZ0IG9mIHRoZSBhdXRob3JpemF0aW9uIGNvZGUgZHVyaW5nIHRoZSBy
ZWRpcmVjdC4NCj4gPiA+IEF1dGhlbnRpY2F0aW5nIHRoZSBjbGllbnQgaXMgYW4gaW1wb3J0YW50
IGZlYXR1cmUgYW5kIGdvZXMgYSBsb25nDQo+ID4gPiB3YXksIGJ1dCBpdCBpcyBub3Qgc3VmZmlj
aWVudCBzaW5jZSBpbiBtYW55IGNhc2VzLCB0aGUNCj4gPiA+IGNsaWVudF9pZC9jbGllbnRfc2Vj
cmV0IHdpbGwgbGlrZWx5IGJlIGhhcmQgY29kZWQgYW5kIHJlbGF0aXZlbHkNCj4gPiA+IGVhc3kg
dG8gZGVkdWNlIChlLmcuIG1vYmlsZSBjbGllbnQgYXBwcykuICBPZiBjb3Vyc2UgYSBzdHJvbmcg
Y2xpZW50DQo+ID4gPiBhdXRoZW50aWNhdGlvbiB3b24ndCBoYXZlIHRoaXMgaXNzdWUuIFRoaXMg
bWFrZXMgbWFueSBjb25zdW1lcg0KPiA+ID4gc2l0dWF0aW9ucyB2ZXJ5IHN1c2NlcHRpYmxlIHRv
IGFuIGF0dGFjayB3aGVyZSB0aGUgYXV0aG9yaXphdGlvbiBjb2RlIGlzDQo+IGludGVyY2VwdGVk
Lg0KPiA+ID4NCj4gPiA+IEZvciBtb3JlIGluZm9ybWF0aW9uIGxvb2sgYXQgdGhlIFNBTUwgQXJ0
aWZhY3QgaXNzdWVzIGluIHNlY3Rpb24gNi41DQo+ID4gPiAoc3BlY2lmaWNhbGx5IHN0b2xlbiBh
cnRpZmFjdCwgcmVwbGF5LCBldGMpIG9mIHRoaXMgZG9jdW1lbnQ6DQo+ID4gPiBodHRwOi8vZG9j
cy5vYXNpcy0NCj4gPiA+IG9wZW4ub3JnL3NlY3VyaXR5L3NhbWwvdjIuMC9zYW1sLXNlYy1jb25z
aWRlci0yLjAtb3MucGRmDQo+ID4gPg0KPiA+ID4gVGhlcmUgYXJlIGEgbnVtYmVyIG9mIHJlbWVk
aWF0aW9ucyBzdWdnZXN0ZWQgKHNtYWxsIGxpZmV0aW1lLCBzaW5nbGUNCj4gPiA+IHVzZSksIGJ1
dCB0aGUgZm91bmRhdGlvbmFsIG9uZSBpcyBjb25maWRlbnRpYWxpdHkgb2YgdGhlIGV4Y2hhbmdl
DQo+ID4gPiAoVExTKS4gSGVuY2UgdGhlIHJlY29tbWVuZGF0aW9uIHRoYXQgdGhlIHJldHVybiBv
ZiBhbiBhdXRob3JpemF0aW9uDQo+ID4gPiBjb2RlIGJlIGtlcHQgc2VjdXJlIHdpdGggYSBNVVNU
IGZvciBUTFMuDQo+ID4gPg0KPiA+ID4gUGhpbA0KPiA+ID4gcGhpbC5odW50QG9yYWNsZS5jb20N
Cj4gPiA+DQo+ID4gPg0KPiA+ID4NCj4gPiA+DQo+ID4gPiBPbiAyMDExLTAzLTI0LCBhdCA3OjIy
IFBNLCBDaHVjayBNb3J0aW1vcmUgd3JvdGU6DQo+ID4gPg0KPiA+ID4gPg0KPiA+ID4gPiBPbiBN
YXIgMjQsIDIwMTEsIGF0IDY6MzYgUE0sICJFcmFuIEhhbW1lci1MYWhhdiINCj4gPiA+IDxlcmFu
QGh1ZW5pdmVyc2UuY29tPiB3cm90ZToNCj4gPiA+ID4NCj4gPiA+ID4+DQo+ID4gPiA+Pj4gLS0t
LS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCj4gPiA+ID4+PiBGcm9tOiBvYXV0aC1ib3VuY2VzQGll
dGYub3JnIFttYWlsdG86b2F1dGgtYm91bmNlc0BpZXRmLm9yZ10gT24NCj4gPiA+ID4+PiBCZWhh
bGYgT2YgQ2h1Y2sgTW9ydGltb3JlDQo+ID4gPiA+Pj4gU2VudDogTW9uZGF5LCBNYXJjaCAxNCwg
MjAxMSA2OjEwIFBNDQo+ID4gPiA+Pg0KPiA+ID4gPj4+IDEpIEknZCB2b3RlIGZvciBkcm9wcGlu
ZyB0aGUgZm9sbG93aW5nIGZyb20gMS40LjIuICAgSW4gdHVybiBJJ2QgZGlzY3Vzcw0KPiBzb21l
DQo+ID4gPiBvZg0KPiA+ID4gPj4+IHRoZSBzZWN1cml0eSBjb25zaWRlcmF0aW9ucywgc3VjaCBh
cyBkaWZmaWN1bHR5IG9mIHByb3RlY3RpbmcgYQ0KPiA+ID4gPj4+IGNsaWVudF9zZWNyZXQgaW4g
YWxtb3N0IGFsbCB1c2UtY2FzZXMgb2YgdGhpcyBwcm9maWxlLg0KPiA+ID4gPj4+DQo+ID4gPiA+
Pj4gICAgIkltcGxpY2l0IGdyYW50cyBpbXByb3ZlIHRoZSByZXNwb25zaXZlbmVzcyBhbmQgZWZm
aWNpZW5jeSBvZiBzb21lDQo+ID4gPiA+Pj4gICBjbGllbnRzIChzdWNoIGFzIGEgY2xpZW50IGlt
cGxlbWVudGVkIGFzIGFuIGluLWJyb3dzZXIgYXBwbGljYXRpb24pDQo+ID4gPiA+Pj4gICBzaW5j
ZSBpdCByZWR1Y2VzIHRoZSBudW1iZXIgb2Ygcm91bmQgdHJpcHMgcmVxdWlyZWQgdG8gb2J0YWlu
IGFuDQo+ID4gPiA+Pj4gICBhY2Nlc3MgdG9rZW4uIg0KPiA+ID4gPj4NCj4gPiA+ID4+IFdoeSBk
cm9wIGl0PyBXaGF0IGFib3V0IGl0IGlzbid0IGFjY3VyYXRlPw0KPiA+ID4gPg0KPiA+ID4gPiBJ
dCdzIGFjY3VyYXRlLCBidXQgbXkgb3BpbmlvbiBpcyBpdCBzZW5kcyB0aGUgd3JvbmcgbWVzc2Fn
ZS4gICBJdCdzIGNsZWFybHkNCj4gdGhlDQo+ID4gPiBsZXNzIHNlY3VyZSBvZiB0aGUgcmVzcG9u
c2UgdHlwZXMuICBCeSBwb3NpdGlvbmluZyBpdCBhcyB0aGUgbW9zdA0KPiA+ID4gcGVyZm9ybWFu
dCBwZW9wbGUgbWF5IGZpbmQgdGhhdCBhdHRyYWN0aXZlIGFuZCBtYWtlIHRoZSB3cm9uZyBzZWN1
cml0eQ0KPiBkZWNpc2lvbi4NCj4gPiA+ID4NCj4gPiA+ID4NCj4gPiA+ID4+DQo+ID4gPiA+Pj4g
MikgU2VjdGlvbiAyLjEsIHdlIHNob3VsZCBNVVNUIFRMUyBldmVuIGZvciBBdXRob3JpemF0aW9u
IENvZGUuDQo+ID4gPiA+Pg0KPiA+ID4gPj4gV2h5PyBXaGF0J3MgdGhlIGF0dGFjayB2ZWN0b3I/
DQo+ID4gPiA+DQo+ID4gPiA+IFNlZSBQaGlscyBjb21tZW50IG9uIHBhc3QgZXhwZXJpZW5jZSB3
aXRoIGFydGlmYWN0IGJpbmRpbmdzLiAgU3BlYw0KPiA+ID4gPiBzaG91bGQNCj4gPiA+IGRlZmF1
bHQgZm9yIHNlY3VyaXR5IGFsd2F5cyBvbiwgYW5kIGxldCBkZXBsb3ltZW50cyB0aGF0IGRvbid0
IHdhbnQNCj4gPiA+IHRvIHVzZSBIVFRQcyBzaW1wbHkgYmUgbm9uLWNvbmZvcm1hbnQuDQo+ID4g
PiA+DQo+ID4gPiA+Pg0KPiA+ID4gPj4+IDMpIFNlY3Rpb24gNC4xLjMgLSBub3QgY2xlYXIgdG8g
bWUgd2h5IHJlZGlyZWN0X3VyaSBpcyBSRVFVSVJFRA0KPiA+ID4gPj4+IHNpbmNlIGluIDQuMS4x
IGl0J3MgIlJFUVVJUkVEIHVubGVzcyINCj4gPiA+ID4+DQo+ID4gPiA+PiBUaGUgY2xpZW50IHNo
b3VsZCBhbHdheXMgY29uZmlybSB3aGVyZSB0aGUgY29kZSB3YXMgc2VudCB0by4gSXQNCj4gPiA+
ID4+IGNhbiBvbWl0DQo+ID4gPiB0aGUgcmVkaXJlY3Rpb24gaXMgb25lIHdhcyBwcm92aWRlZCBi
dXQgc2hvdWxkIHRlbGwgdGhlIHNlcnZlciB3aGVyZQ0KPiA+ID4gaXQgd2VudCB0by4gVGhpcyBp
cyBtb3JlIGNvbnNpc3RlbnQgb24gdGhlIHZlcmlmaWNhdGlvbiBzaWRlLCBidXQgaWYNCj4gPiA+
IHRoZSBvcmlnaW5hbCBmbG93IGRlc2lnbmVycyB3YW50IHRvIGNoaW1lIGluIChEaWNrLCBCcmlh
biwgZXRjLj8pLCBJJ20gb3Blbg0KPiB0byBjaGFuZ2UgdGhpcy4NCj4gPiA+ID4+DQo+ID4gPiA+
Pj4gNCkgU2VjdGlvbiA0LjIuMiAtIHdoZW4gZGlkIHdlIGRyb3AgcmVmcmVzaF90b2tlbj8gICAg
IEkgYXNzdW1lIHRoaXMNCj4gZ29lcw0KPiA+ID4gPj4+IGJhY2sgdG8gZGlzYWdyZWVtZW50IG9u
IGhvdyBiZXN0IHRvIGhhbmRsZSBuYXRpdmUgY2xpZW50cy4gSSdkDQo+ID4gPiA+Pj4gcHJlZmVy
IGl0IHRvIHNpbXBseSByZWZlcmVuY2UgNS4xIGFuZCBsZWF2ZSB3aGF0IGlzIGlzc3VlZCB1cCB0
bw0KPiA+ID4gPj4+IHRoZSBzZWN1cml0eSBwcm9maWxlIG9mIHRoZSBwYXJ0aWN1bGFyIGRlcGxv
eW1lbnQgYXMgdG8gd2hhdCBpcyBpc3N1ZWQuDQo+ID4gPiA+Pg0KPiA+ID4gPj4gLTA4IEp1bmUg
MjAxMC4NCj4gPiA+ID4+DQo+ID4gPiA+PiBUaGlzIGhhcyBiZWVuIGRlY2lkZWQgZm9yIGEgbG9u
ZyB0aW1lLiBJJ20gbm90IGVhZ2VyIHRvIGNoYW5nZSBpdC4NCj4gPiA+ID4NCj4gPiA+ID4gVGhh
bmtzIC0gSSBjYW4gbGl2ZSB3aXRoIGl0LiAgVW5mb3J0dW5hdGVseSB3ZSBzdGlsbCBzZWVtIHRv
IGJlDQo+ID4gPiA+IGZyYWdtZW50aW5nIG9uDQo+ID4gPiB0aGUgbmF0aXZlIGNsaWVudCBhcHBy
b2FjaC4gICBHb29kIHRvcGljIGZvciBJSVcgSSBzdXNwZWN0DQo+ID4gPiA+DQo+ID4gPiA+IC1j
bW9ydA0KPiA+ID4gPg0KPiA+ID4gPj4NCj4gPiA+ID4+IEVITA0KPiA+ID4gPj4NCj4gPiA+ID4+
DQo+ID4gPiA+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
DQo+ID4gPiA+IE9BdXRoIG1haWxpbmcgbGlzdA0KPiA+ID4gPiBPQXV0aEBpZXRmLm9yZw0KPiA+
ID4gPiBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoDQo+ID4NCj4g
PiBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiA+IE9B
dXRoIG1haWxpbmcgbGlzdA0KPiA+IE9BdXRoQGlldGYub3JnDQo+ID4gaHR0cHM6Ly93d3cuaWV0
Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9vYXV0aA0KPiANCg0K

From phil.hunt@oracle.com  Mon Mar 28 13:23:34 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B58473A6935 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 13:23:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.564
X-Spam-Level: 
X-Spam-Status: No, score=-6.564 tagged_above=-999 required=5 tests=[AWL=0.034,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id woPKbrGGlhk2 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 13:23:32 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 9B22B3A6902 for <oauth@ietf.org>; Mon, 28 Mar 2011 13:23:32 -0700 (PDT)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2SKP7b5004394 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 28 Mar 2011 20:25:09 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by rcsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2SKP6wx025579 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 28 Mar 2011 20:25:07 GMT
Received: from abhmt015.oracle.com (abhmt015.oracle.com [141.146.116.24]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2SKP6VT027449; Mon, 28 Mar 2011 15:25:06 -0500
Received: from [192.168.1.8] (/24.87.204.3) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 28 Mar 2011 13:25:06 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564302A3@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Mon, 28 Mar 2011 13:25:04 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <5FD66B56-C6F2-435A-B5AA-FF7D6DE36005@oracle.com>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com> <A12B7D5A-F7B4-4DC8-A6D1-4C4ADB53B38C@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FFF1@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1301331909.1812.50.camel@ground> <90C41DD21FB7C64BB94121FBBC2E723446564302A3@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090206.4D90EEA3.00CF,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 20:23:34 -0000

Justin, How is that so? Remember firesheep?  I wouldn't want the =
authorization code being exchanged without TLS in a cafe. Intercept is =
just too easy. And as I mentioned earlier, client credentials are =
already very weak in many cases. In contrast, two web servers are hard =
to sniff unless you are able to gain access to their network =
communications path.

As for testing, it seems more reasonable to put servers in temporary =
non-compliance while testing rather then allow non-secure servers in =
production because of the SHOULD loophole.=20

Also, while it does seem convenient for the developer not to have to use =
TLS for authz codes, note that the developer still has to have TLS =
enabled when exchanging the code for an access token. So I'm not sure =
how relaxing TLS for obtaining authorization actually simplifies the =
developer lifecycle since they still have to set it up to test the other =
parts.  In my view, it would be ok for a developer to temporarily =
disable TLS everywhere during development -- which places operation =
outside RFC compliance while developing -- but forces compliance once =
they go into production.

It seems like I had to give a pretty substantial justification and we =
backed off because TLS is seen as inconvenient. I think we need more =
evidence that there are safe cases that don't need TLS.

Sorry for pushing hard on this one, but TLS is the backbone of OAuth =
security at present.

Phil
phil.hunt@oracle.com




On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:

> No change then. But the security considerations section must reflect =
this.
>=20
> EHL
>=20
>> -----Original Message-----
>> From: Justin Richer [mailto:jricher@mitre.org]
>> Sent: Monday, March 28, 2011 10:05 AM
>> To: Eran Hammer-Lahav
>> Cc: Phil Hunt; OAuth WG
>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>=20
>> What about non-http return uri's, or client-localhost, such as
>>=20
>>  someapp://app/?code=3Dfoo
>>=20
>>  http://localhost:87345/?code=3Dfoo
>>=20
>> HTTPS makes sense when you're talking between two web servers, but it
>> seems to fall apart otherwise. I think SHOULD is appropriate here.
>>=20
>> -- Justin
>>=20
>>=20
>> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
>>> Unless someone has an objection, I'll make the change from SHOULD to
>> MUST.
>>>=20
>>> EHL
>>>=20
>>>> -----Original Message-----
>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
>>>> Sent: Friday, March 25, 2011 12:42 PM
>>>> To: Eran Hammer-Lahav
>>>> Cc: OAuth WG; Chuck & Mara Mortimore
>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>>=20
>>>> Regarding the message: http://www.ietf.org/mail-
>>>> archive/web/oauth/current/msg05762.html  (sorry I somehow lost the
>>>> message in my email).
>>>>=20
>>>> This issue is theft of the authorization code during the redirect.
>>>> Authenticating the client is an important feature and goes a long
>>>> way, but it is not sufficient since in many cases, the
>>>> client_id/client_secret will likely be hard coded and relatively
>>>> easy to deduce (e.g. mobile client apps).  Of course a strong =
client
>>>> authentication won't have this issue. This makes many consumer
>>>> situations very susceptible to an attack where the authorization =
code is
>> intercepted.
>>>>=20
>>>> For more information look at the SAML Artifact issues in section =
6.5
>>>> (specifically stolen artifact, replay, etc) of this document:
>>>> http://docs.oasis-
>>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
>>>>=20
>>>> There are a number of remediations suggested (small lifetime, =
single
>>>> use), but the foundational one is confidentiality of the exchange
>>>> (TLS). Hence the recommendation that the return of an authorization
>>>> code be kept secure with a MUST for TLS.
>>>>=20
>>>> Phil
>>>> phil.hunt@oracle.com
>>>>=20
>>>>=20
>>>>=20
>>>>=20
>>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
>>>>=20
>>>>>=20
>>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
>>>> <eran@hueniverse.com> wrote:
>>>>>=20
>>>>>>=20
>>>>>>> -----Original Message-----
>>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
>>>>>>> Behalf Of Chuck Mortimore
>>>>>>> Sent: Monday, March 14, 2011 6:10 PM
>>>>>>=20
>>>>>>> 1) I'd vote for dropping the following from 1.4.2.   In turn I'd =
discuss
>> some
>>>> of
>>>>>>> the security considerations, such as difficulty of protecting a
>>>>>>> client_secret in almost all use-cases of this profile.
>>>>>>>=20
>>>>>>>   "Implicit grants improve the responsiveness and efficiency of =
some
>>>>>>>  clients (such as a client implemented as an in-browser =
application)
>>>>>>>  since it reduces the number of round trips required to obtain =
an
>>>>>>>  access token."
>>>>>>=20
>>>>>> Why drop it? What about it isn't accurate?
>>>>>=20
>>>>> It's accurate, but my opinion is it sends the wrong message.   =
It's clearly
>> the
>>>> less secure of the response types.  By positioning it as the most
>>>> performant people may find that attractive and make the wrong =
security
>> decision.
>>>>>=20
>>>>>=20
>>>>>>=20
>>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
>>>>>>=20
>>>>>> Why? What's the attack vector?
>>>>>=20
>>>>> See Phils comment on past experience with artifact bindings.  Spec
>>>>> should
>>>> default for security always on, and let deployments that don't want
>>>> to use HTTPs simply be non-conformant.
>>>>>=20
>>>>>>=20
>>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED
>>>>>>> since in 4.1.1 it's "REQUIRED unless"
>>>>>>=20
>>>>>> The client should always confirm where the code was sent to. It
>>>>>> can omit
>>>> the redirection is one was provided but should tell the server =
where
>>>> it went to. This is more consistent on the verification side, but =
if
>>>> the original flow designers want to chime in (Dick, Brian, etc.?), =
I'm open
>> to change this.
>>>>>>=20
>>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?     I assume =
this
>> goes
>>>>>>> back to disagreement on how best to handle native clients. I'd
>>>>>>> prefer it to simply reference 5.1 and leave what is issued up to
>>>>>>> the security profile of the particular deployment as to what is =
issued.
>>>>>>=20
>>>>>> -08 June 2010.
>>>>>>=20
>>>>>> This has been decided for a long time. I'm not eager to change =
it.
>>>>>=20
>>>>> Thanks - I can live with it.  Unfortunately we still seem to be
>>>>> fragmenting on
>>>> the native client approach.   Good topic for IIW I suspect
>>>>>=20
>>>>> -cmort
>>>>>=20
>>>>>>=20
>>>>>> EHL
>>>>>>=20
>>>>>>=20
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20


From jricher@mitre.org  Mon Mar 28 13:32:27 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5C2103A6A4B for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 13:32:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.735
X-Spam-Level: 
X-Spam-Status: No, score=-4.735 tagged_above=-999 required=5 tests=[AWL=1.863,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iIwMZBCFMYA2 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 13:32:25 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 8F2B63A6902 for <oauth@ietf.org>; Mon, 28 Mar 2011 13:32:25 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 028CF21B0A85; Mon, 28 Mar 2011 16:34:03 -0400 (EDT)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id F00E221B069B; Mon, 28 Mar 2011 16:34:02 -0400 (EDT)
Received: from [129.83.50.23] (129.83.50.23) by imchub2.MITRE.ORG (129.83.29.74) with Microsoft SMTP Server id 8.2.254.0; Mon, 28 Mar 2011 16:34:02 -0400
From: Justin Richer <jricher@mitre.org>
To: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <5FD66B56-C6F2-435A-B5AA-FF7D6DE36005@oracle.com>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com> <A12B7D5A-F7B4-4DC8-A6D1-4C4ADB53B38C@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FFF1@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1301331909.1812.50.camel@ground> <90C41DD21FB7C64BB94121FBBC2E723446564302A3@P3PW5EX1MB01.EX1.SECURESERVER.NET> <5FD66B56-C6F2-435A-B5AA-FF7D6DE36005@oracle.com>
Content-Type: text/plain; charset="UTF-8"
Date: Mon, 28 Mar 2011 16:37:06 -0400
Message-ID: <1301344626.1812.75.camel@ground>
MIME-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 7bit
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 20:32:27 -0000

Phil,

The main difference is that it's a requirement on the *client* instead
of the *provider* side of the equation, and clients aren't always even
speaking HTTP. I agree that all client web servers SHOULD do it. A
particular provider can even REQUIRE it for their registered clients, a
step that is outside the scope of OAuth. But there are real, in-use
patterns that don't require the client to make an HTTP request to an
external service. 

I don't see how Firesheep is relevant to this discussion -- if your
browser is making a call to localhost to get the token, who outside of
your machine is going to do it? I'm not talking about convenience for
developers here (which I would argue should NOT be discounted, but
that's another argument), I'm talking about cases where the browser
isn't going outside of a trusted security boundary. There are also
instances where there may not even be an HTTP transaction involved, let
alone one that could support TLS.

 -- Justin

On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:
> Justin, How is that so? Remember firesheep?  I wouldn't want the authorization code being exchanged without TLS in a cafe. Intercept is just too easy. And as I mentioned earlier, client credentials are already very weak in many cases. In contrast, two web servers are hard to sniff unless you are able to gain access to their network communications path.
> 
> As for testing, it seems more reasonable to put servers in temporary non-compliance while testing rather then allow non-secure servers in production because of the SHOULD loophole. 
> 
> Also, while it does seem convenient for the developer not to have to use TLS for authz codes, note that the developer still has to have TLS enabled when exchanging the code for an access token. So I'm not sure how relaxing TLS for obtaining authorization actually simplifies the developer lifecycle since they still have to set it up to test the other parts.  In my view, it would be ok for a developer to temporarily disable TLS everywhere during development -- which places operation outside RFC compliance while developing -- but forces compliance once they go into production.
> 
> It seems like I had to give a pretty substantial justification and we backed off because TLS is seen as inconvenient. I think we need more evidence that there are safe cases that don't need TLS.
> 
> Sorry for pushing hard on this one, but TLS is the backbone of OAuth security at present.
> 
> Phil
> phil.hunt@oracle.com
> 
> 
> 
> 
> On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:
> 
> > No change then. But the security considerations section must reflect this.
> > 
> > EHL
> > 
> >> -----Original Message-----
> >> From: Justin Richer [mailto:jricher@mitre.org]
> >> Sent: Monday, March 28, 2011 10:05 AM
> >> To: Eran Hammer-Lahav
> >> Cc: Phil Hunt; OAuth WG
> >> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >> 
> >> What about non-http return uri's, or client-localhost, such as
> >> 
> >>  someapp://app/?code=foo
> >> 
> >>  http://localhost:87345/?code=foo
> >> 
> >> HTTPS makes sense when you're talking between two web servers, but it
> >> seems to fall apart otherwise. I think SHOULD is appropriate here.
> >> 
> >> -- Justin
> >> 
> >> 
> >> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
> >>> Unless someone has an objection, I'll make the change from SHOULD to
> >> MUST.
> >>> 
> >>> EHL
> >>> 
> >>>> -----Original Message-----
> >>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
> >>>> Sent: Friday, March 25, 2011 12:42 PM
> >>>> To: Eran Hammer-Lahav
> >>>> Cc: OAuth WG; Chuck & Mara Mortimore
> >>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>> 
> >>>> Regarding the message: http://www.ietf.org/mail-
> >>>> archive/web/oauth/current/msg05762.html  (sorry I somehow lost the
> >>>> message in my email).
> >>>> 
> >>>> This issue is theft of the authorization code during the redirect.
> >>>> Authenticating the client is an important feature and goes a long
> >>>> way, but it is not sufficient since in many cases, the
> >>>> client_id/client_secret will likely be hard coded and relatively
> >>>> easy to deduce (e.g. mobile client apps).  Of course a strong client
> >>>> authentication won't have this issue. This makes many consumer
> >>>> situations very susceptible to an attack where the authorization code is
> >> intercepted.
> >>>> 
> >>>> For more information look at the SAML Artifact issues in section 6.5
> >>>> (specifically stolen artifact, replay, etc) of this document:
> >>>> http://docs.oasis-
> >>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
> >>>> 
> >>>> There are a number of remediations suggested (small lifetime, single
> >>>> use), but the foundational one is confidentiality of the exchange
> >>>> (TLS). Hence the recommendation that the return of an authorization
> >>>> code be kept secure with a MUST for TLS.
> >>>> 
> >>>> Phil
> >>>> phil.hunt@oracle.com
> >>>> 
> >>>> 
> >>>> 
> >>>> 
> >>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
> >>>> 
> >>>>> 
> >>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
> >>>> <eran@hueniverse.com> wrote:
> >>>>> 
> >>>>>> 
> >>>>>>> -----Original Message-----
> >>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
> >>>>>>> Behalf Of Chuck Mortimore
> >>>>>>> Sent: Monday, March 14, 2011 6:10 PM
> >>>>>> 
> >>>>>>> 1) I'd vote for dropping the following from 1.4.2.   In turn I'd discuss
> >> some
> >>>> of
> >>>>>>> the security considerations, such as difficulty of protecting a
> >>>>>>> client_secret in almost all use-cases of this profile.
> >>>>>>> 
> >>>>>>>   "Implicit grants improve the responsiveness and efficiency of some
> >>>>>>>  clients (such as a client implemented as an in-browser application)
> >>>>>>>  since it reduces the number of round trips required to obtain an
> >>>>>>>  access token."
> >>>>>> 
> >>>>>> Why drop it? What about it isn't accurate?
> >>>>> 
> >>>>> It's accurate, but my opinion is it sends the wrong message.   It's clearly
> >> the
> >>>> less secure of the response types.  By positioning it as the most
> >>>> performant people may find that attractive and make the wrong security
> >> decision.
> >>>>> 
> >>>>> 
> >>>>>> 
> >>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
> >>>>>> 
> >>>>>> Why? What's the attack vector?
> >>>>> 
> >>>>> See Phils comment on past experience with artifact bindings.  Spec
> >>>>> should
> >>>> default for security always on, and let deployments that don't want
> >>>> to use HTTPs simply be non-conformant.
> >>>>> 
> >>>>>> 
> >>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED
> >>>>>>> since in 4.1.1 it's "REQUIRED unless"
> >>>>>> 
> >>>>>> The client should always confirm where the code was sent to. It
> >>>>>> can omit
> >>>> the redirection is one was provided but should tell the server where
> >>>> it went to. This is more consistent on the verification side, but if
> >>>> the original flow designers want to chime in (Dick, Brian, etc.?), I'm open
> >> to change this.
> >>>>>> 
> >>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?     I assume this
> >> goes
> >>>>>>> back to disagreement on how best to handle native clients. I'd
> >>>>>>> prefer it to simply reference 5.1 and leave what is issued up to
> >>>>>>> the security profile of the particular deployment as to what is issued.
> >>>>>> 
> >>>>>> -08 June 2010.
> >>>>>> 
> >>>>>> This has been decided for a long time. I'm not eager to change it.
> >>>>> 
> >>>>> Thanks - I can live with it.  Unfortunately we still seem to be
> >>>>> fragmenting on
> >>>> the native client approach.   Good topic for IIW I suspect
> >>>>> 
> >>>>> -cmort
> >>>>> 
> >>>>>> 
> >>>>>> EHL
> >>>>>> 
> >>>>>> 
> >>>>> _______________________________________________
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>> 
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >> 
> > 
> 



From dick.hardt@gmail.com  Mon Mar 28 13:55:02 2011
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 061EC28C11B for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 13:55:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.931
X-Spam-Level: 
X-Spam-Status: No, score=-2.931 tagged_above=-999 required=5 tests=[AWL=-0.668, BAYES_00=-2.599, EXCUSE_4=1.336, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oeAfW3cTXOdW for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 13:55:00 -0700 (PDT)
Received: from mail-gy0-f172.google.com (mail-gy0-f172.google.com [209.85.160.172]) by core3.amsl.com (Postfix) with ESMTP id 3829628C107 for <oauth@ietf.org>; Mon, 28 Mar 2011 13:55:00 -0700 (PDT)
Received: by gyf3 with SMTP id 3so1519953gyf.31 for <oauth@ietf.org>; Mon, 28 Mar 2011 13:56:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to:x-mailer; bh=X8hAUUZ3Dv/LFbUKZsS9gQFJ89NMKjQJK1MutUFH550=; b=DuGzWKv/92fw6SqFtx7+yRD5KBk4B798yRFNsJYABk5RAzH4puWkEcq2eWwzQ7rd0b xfnLMpJiZilzA7qxNrhcMBaaxRRH91EinAAzmgXdq+SbYhguUzY6Y/2vV2K+EIn0GeJw 9Km3131GxvXS7ggx3kvPwCjhT76Ki/Bxl+MfU=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; b=TjySEXyR28l1NKhMK2XB/HGVe7E6+oaxmbqk5POBccIX1D4/O4sVIZKFeWmxkbuJZh prWmmzH5zbAUGHqaPWsEQmyGP5/fxxC67ho7iIBfX6n44ERangvfQkg4ovtppSoZ6eqP ezfwO6bf9pAEUkig78Msnczhs3t1i5nzyjJyk=
Received: by 10.42.141.10 with SMTP id m10mr4850820icu.236.1301345797192; Mon, 28 Mar 2011 13:56:37 -0700 (PDT)
Received: from [192.168.1.16] (c-69-181-71-149.hsd1.ca.comcast.net [69.181.71.149]) by mx.google.com with ESMTPS id wo15sm3006455icb.16.2011.03.28.13.56.33 (version=TLSv1/SSLv3 cipher=OTHER); Mon, 28 Mar 2011 13:56:35 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Dick Hardt <dick.hardt@gmail.com>
In-Reply-To: <4D8EF8C2.70502@stpeter.im>
Date: Mon, 28 Mar 2011 13:56:32 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <7A3E0877-D814-4011-A0AC-A18205DB314C@gmail.com>
References: <90C41DD21FB7C64BB94121FBBC2E723446564300B3@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4D8EF8C2.70502@stpeter.im>
To: Peter Saint-Andre <stpeter@stpeter.im>
X-Mailer: Apple Mail (2.1084)
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Authors, Contributors, Acknowledgement
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 20:55:02 -0000

I'm fine with any of the options Eran proposed.

The document has become much more Eran's than anyone else's which leads =
me to lean towards just listing Eran as the editor.

-- Dick

On 2011-03-27, at 1:43 AM, Peter Saint-Andre wrote:

> <hat type=3D'AD'/>
>=20
> On 3/27/11 12:36 AM, Eran Hammer-Lahav wrote:
>> The security consideration section pending, this is the last open =
issue
>> I have to close as editor before the document is ready to leave the
>> working group. While this is silly business for many, it is very
>> important to others, so bear with me. I want to make sure we give
>> everyone the proper recognition they deserve.
>=20
> I'm all in favor of recognition. For those who care, allow me explain =
a
> bit about the various roles and responsibilities here.
>=20
> Section 6.3 of RFC 2418 states:
>=20
>   Most IETF working groups focus their efforts on a document, or set =
of
>   documents, that capture the results of the group's work.  A working
>   group generally designates a person or persons to serve as the =
Editor
>   for a particular document.  The Document Editor is responsible for
>   ensuring that the contents of the document accurately reflect the
>   decisions that have been made by the working group.
>=20
> In essence, the document editor is a special kind of author who is
> appointed by the WG chairs and who is responsible for capturing the
> consensus that emerges from WG discussions.
>=20
> Anyone who is listed as an author has a number of responsibilities:
>=20
> 1. Authors are exposed to comments received during IETF Last Call and
> IESG review. Usually at least one of authors needs to reply to major
> comments, although often document shepherds (typically one of the WG
> chairs) and sponsoring ADs do that as well. As I can report from my =
own
> experience, this can be a lot of work and it is time-sensitive.
>=20
> 2. After the document is approved for publication by the IESG, it is
> sent to the RFC Editor team for editing. At the end of this process =
the
> document moves to a state called AUTH48:
>=20
> http://www.rfc-editor.org/pubprocess.html#auth48
>=20
> This is the last chance to fix some things in the document. During
> AUTH48, all authors need to approve changes made by the RFC Editor and
> other authors (often in consultation with the responsible Area =
Director,
> the document shepherd, and the WG chairs). This is also =
time-sensitive.
> Although the responsible Area Director can approve documents if some
> authors are not responsive, all of the authors need to pay attention =
to
> AUTH48 discussions and respond when asked. Any unresponsive author can
> delay the document for a very long time (and in some cases even can
> prevent publication).
>=20
> 3. Authors are notified when errata are posted on their RFCs, in
> perpetuity. In many cases their opinions about submitted errata are
> taken into consideration when the responsible Area Director decides =
what
> to do with errata.
>=20
> 4. Authors might receive comments and questions on their documents,
> again in perpetuity. In many cases, it might be inappropriate for
> authors to provide substantive interpretations about standards-track
> specifications without consulting mailing lists, Area Directors, etc.,
> so this can become a burden with a very long tail.
>=20
> The list of people mentioned in the Acknowledgements section is mostly
> at the discretion of the authors. However, IETF IPR policies require
> that anyone who makes significant contributions to a document be =
listed
> in the Acknowledgments section. Although "significant" is something
> about which the authors can make judgments, it is best to err on the
> side of inclusion. In additional to textual contributions, such
> contributions might be a careful review or ideas that had a major
> influence on the results even if that person's particular suggestions
> were not adopted. This kind of mention is not discretionary and cannot
> be waived even if the contributor asks to be removed. If somebody
> mentioned in the Acknowledgments contacts asks to be removed, please
> talk to the WG chairs.
>=20
> Sometimes it is appropriate to mention major contributions in a =
section
> entitled Contributors. This is usually reserved for people who have
> written significant pieces of the document, for former co-editors or
> co-authors, etc.
>=20
> The moral of the story is that having a small author list makes it
> easier to handle IESG feedback and AUTH48 changes, and that if you =
want
> to acknowledge people who made major contributions, create a section
> called Contributors.
>=20
> As an example, see a document that Jeff Hodges and I recently worked =
on:
>=20
> http://tools.ietf.org/html/draft-saintandre-tls-server-id-check-14
>=20
> HTH,
>=20
> Peter
>=20
> --=20
> Peter Saint-Andre
> https://stpeter.im/
>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From phil.hunt@oracle.com  Mon Mar 28 14:26:26 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8A1723A6935 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 14:26:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.564
X-Spam-Level: 
X-Spam-Status: No, score=-6.564 tagged_above=-999 required=5 tests=[AWL=0.034,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y26u+i9lM-gg for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 14:26:24 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id B6B4A3A688B for <oauth@ietf.org>; Mon, 28 Mar 2011 14:26:24 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2SLRwPs021884 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 28 Mar 2011 21:27:59 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2SLRv2j009010 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 28 Mar 2011 21:27:57 GMT
Received: from abhmt020.oracle.com (abhmt020.oracle.com [141.146.116.29]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2SLRvSa027708; Mon, 28 Mar 2011 16:27:57 -0500
Received: from [192.168.1.8] (/24.87.204.3) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 28 Mar 2011 14:27:57 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <1301344626.1812.75.camel@ground>
Date: Mon, 28 Mar 2011 14:27:55 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <8DB4FA9F-A6A3-4941-87D0-DF2775408F26@oracle.com>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com> <A12B7D5A-F7B4-4DC8-A6D1-4C4ADB53B38C@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FFF1@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1301331909.1812.50.camel@ground> <90C41DD21FB7C64BB94121FBBC2E723446564302A3@P3PW5EX1MB01.EX1.SECURESERVER.NET> <5FD66B56-C6F2-435A-B5AA-FF7D6DE36005@oracle.com> <1301344626.1812.75.camel@ground>
To: Justin Richer <jricher@mitre.org>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt356.oracle.com [141.146.40.156]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090201.4D90FD5E.0066,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 21:26:26 -0000

This was referring to section 2.1 that the authorization server must use =
TLS when returning an authorization code.

If it doesn't use TLS then the code being returned to the client can be =
intercepted.

Or did I miss something?

Phil
phil.hunt@oracle.com




On 2011-03-28, at 1:37 PM, Justin Richer wrote:

> Phil,
>=20
> The main difference is that it's a requirement on the *client* instead
> of the *provider* side of the equation, and clients aren't always even
> speaking HTTP. I agree that all client web servers SHOULD do it. A
> particular provider can even REQUIRE it for their registered clients, =
a
> step that is outside the scope of OAuth. But there are real, in-use
> patterns that don't require the client to make an HTTP request to an
> external service.=20
>=20
> I don't see how Firesheep is relevant to this discussion -- if your
> browser is making a call to localhost to get the token, who outside of
> your machine is going to do it? I'm not talking about convenience for
> developers here (which I would argue should NOT be discounted, but
> that's another argument), I'm talking about cases where the browser
> isn't going outside of a trusted security boundary. There are also
> instances where there may not even be an HTTP transaction involved, =
let
> alone one that could support TLS.
>=20
> -- Justin
>=20
> On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:
>> Justin, How is that so? Remember firesheep?  I wouldn't want the =
authorization code being exchanged without TLS in a cafe. Intercept is =
just too easy. And as I mentioned earlier, client credentials are =
already very weak in many cases. In contrast, two web servers are hard =
to sniff unless you are able to gain access to their network =
communications path.
>>=20
>> As for testing, it seems more reasonable to put servers in temporary =
non-compliance while testing rather then allow non-secure servers in =
production because of the SHOULD loophole.=20
>>=20
>> Also, while it does seem convenient for the developer not to have to =
use TLS for authz codes, note that the developer still has to have TLS =
enabled when exchanging the code for an access token. So I'm not sure =
how relaxing TLS for obtaining authorization actually simplifies the =
developer lifecycle since they still have to set it up to test the other =
parts.  In my view, it would be ok for a developer to temporarily =
disable TLS everywhere during development -- which places operation =
outside RFC compliance while developing -- but forces compliance once =
they go into production.
>>=20
>> It seems like I had to give a pretty substantial justification and we =
backed off because TLS is seen as inconvenient. I think we need more =
evidence that there are safe cases that don't need TLS.
>>=20
>> Sorry for pushing hard on this one, but TLS is the backbone of OAuth =
security at present.
>>=20
>> Phil
>> phil.hunt@oracle.com
>>=20
>>=20
>>=20
>>=20
>> On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:
>>=20
>>> No change then. But the security considerations section must reflect =
this.
>>>=20
>>> EHL
>>>=20
>>>> -----Original Message-----
>>>> From: Justin Richer [mailto:jricher@mitre.org]
>>>> Sent: Monday, March 28, 2011 10:05 AM
>>>> To: Eran Hammer-Lahav
>>>> Cc: Phil Hunt; OAuth WG
>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>>=20
>>>> What about non-http return uri's, or client-localhost, such as
>>>>=20
>>>> someapp://app/?code=3Dfoo
>>>>=20
>>>> http://localhost:87345/?code=3Dfoo
>>>>=20
>>>> HTTPS makes sense when you're talking between two web servers, but =
it
>>>> seems to fall apart otherwise. I think SHOULD is appropriate here.
>>>>=20
>>>> -- Justin
>>>>=20
>>>>=20
>>>> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
>>>>> Unless someone has an objection, I'll make the change from SHOULD =
to
>>>> MUST.
>>>>>=20
>>>>> EHL
>>>>>=20
>>>>>> -----Original Message-----
>>>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
>>>>>> Sent: Friday, March 25, 2011 12:42 PM
>>>>>> To: Eran Hammer-Lahav
>>>>>> Cc: OAuth WG; Chuck & Mara Mortimore
>>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>>>>=20
>>>>>> Regarding the message: http://www.ietf.org/mail-
>>>>>> archive/web/oauth/current/msg05762.html  (sorry I somehow lost =
the
>>>>>> message in my email).
>>>>>>=20
>>>>>> This issue is theft of the authorization code during the =
redirect.
>>>>>> Authenticating the client is an important feature and goes a long
>>>>>> way, but it is not sufficient since in many cases, the
>>>>>> client_id/client_secret will likely be hard coded and relatively
>>>>>> easy to deduce (e.g. mobile client apps).  Of course a strong =
client
>>>>>> authentication won't have this issue. This makes many consumer
>>>>>> situations very susceptible to an attack where the authorization =
code is
>>>> intercepted.
>>>>>>=20
>>>>>> For more information look at the SAML Artifact issues in section =
6.5
>>>>>> (specifically stolen artifact, replay, etc) of this document:
>>>>>> http://docs.oasis-
>>>>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
>>>>>>=20
>>>>>> There are a number of remediations suggested (small lifetime, =
single
>>>>>> use), but the foundational one is confidentiality of the exchange
>>>>>> (TLS). Hence the recommendation that the return of an =
authorization
>>>>>> code be kept secure with a MUST for TLS.
>>>>>>=20
>>>>>> Phil
>>>>>> phil.hunt@oracle.com
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
>>>>>>=20
>>>>>>>=20
>>>>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
>>>>>> <eran@hueniverse.com> wrote:
>>>>>>>=20
>>>>>>>>=20
>>>>>>>>> -----Original Message-----
>>>>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] =
On
>>>>>>>>> Behalf Of Chuck Mortimore
>>>>>>>>> Sent: Monday, March 14, 2011 6:10 PM
>>>>>>>>=20
>>>>>>>>> 1) I'd vote for dropping the following from 1.4.2.   In turn =
I'd discuss
>>>> some
>>>>>> of
>>>>>>>>> the security considerations, such as difficulty of protecting =
a
>>>>>>>>> client_secret in almost all use-cases of this profile.
>>>>>>>>>=20
>>>>>>>>>  "Implicit grants improve the responsiveness and efficiency of =
some
>>>>>>>>> clients (such as a client implemented as an in-browser =
application)
>>>>>>>>> since it reduces the number of round trips required to obtain =
an
>>>>>>>>> access token."
>>>>>>>>=20
>>>>>>>> Why drop it? What about it isn't accurate?
>>>>>>>=20
>>>>>>> It's accurate, but my opinion is it sends the wrong message.   =
It's clearly
>>>> the
>>>>>> less secure of the response types.  By positioning it as the most
>>>>>> performant people may find that attractive and make the wrong =
security
>>>> decision.
>>>>>>>=20
>>>>>>>=20
>>>>>>>>=20
>>>>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization =
Code.
>>>>>>>>=20
>>>>>>>> Why? What's the attack vector?
>>>>>>>=20
>>>>>>> See Phils comment on past experience with artifact bindings.  =
Spec
>>>>>>> should
>>>>>> default for security always on, and let deployments that don't =
want
>>>>>> to use HTTPs simply be non-conformant.
>>>>>>>=20
>>>>>>>>=20
>>>>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is =
REQUIRED
>>>>>>>>> since in 4.1.1 it's "REQUIRED unless"
>>>>>>>>=20
>>>>>>>> The client should always confirm where the code was sent to. It
>>>>>>>> can omit
>>>>>> the redirection is one was provided but should tell the server =
where
>>>>>> it went to. This is more consistent on the verification side, but =
if
>>>>>> the original flow designers want to chime in (Dick, Brian, =
etc.?), I'm open
>>>> to change this.
>>>>>>>>=20
>>>>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?     I =
assume this
>>>> goes
>>>>>>>>> back to disagreement on how best to handle native clients. I'd
>>>>>>>>> prefer it to simply reference 5.1 and leave what is issued up =
to
>>>>>>>>> the security profile of the particular deployment as to what =
is issued.
>>>>>>>>=20
>>>>>>>> -08 June 2010.
>>>>>>>>=20
>>>>>>>> This has been decided for a long time. I'm not eager to change =
it.
>>>>>>>=20
>>>>>>> Thanks - I can live with it.  Unfortunately we still seem to be
>>>>>>> fragmenting on
>>>>>> the native client approach.   Good topic for IIW I suspect
>>>>>>>=20
>>>>>>> -cmort
>>>>>>>=20
>>>>>>>>=20
>>>>>>>> EHL
>>>>>>>>=20
>>>>>>>>=20
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>=20
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>=20
>>=20
>=20
>=20


From ve7jtb@ve7jtb.com  Mon Mar 28 14:58:05 2011
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 896903A67B1; Mon, 28 Mar 2011 14:58:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.202
X-Spam-Level: 
X-Spam-Status: No, score=-2.202 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, WEIRD_QUOTING=1.396]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W2bBGO2aqm9s; Mon, 28 Mar 2011 14:58:03 -0700 (PDT)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by core3.amsl.com (Postfix) with ESMTP id 363CC3A695B; Mon, 28 Mar 2011 14:58:02 -0700 (PDT)
Received: by yxk30 with SMTP id 30so1557800yxk.31 for <multiple recipients>; Mon, 28 Mar 2011 14:59:40 -0700 (PDT)
Received: by 10.101.59.16 with SMTP id m16mr245200ank.150.1301349580563; Mon, 28 Mar 2011 14:59:40 -0700 (PDT)
Received: from [192.168.1.4] ([190.22.48.168]) by mx.google.com with ESMTPS id r8sm1678028anf.29.2011.03.28.14.59.35 (version=TLSv1/SSLv3 cipher=OTHER); Mon, 28 Mar 2011 14:59:37 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/signed; boundary=Apple-Mail-102-919825435; protocol="application/pkcs7-signature"; micalg=sha1
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943252AA329@TK5EX14MBXC207.redmond.corp.microsoft.com>
Date: Mon, 28 Mar 2011 17:59:32 -0400
Message-Id: <1C42267D-9BE0-45E7-8007-A05B6937082D@ve7jtb.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A9198@TK5EX14MBXC207.redmond.corp.microsoft.com> <4E1F6AAD24975D4BA5B1680429673943252AA329@TK5EX14MBXC207.redmond.corp.microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.1084)
Cc: "openid-specs-ab@lists.openid.net" <openid-specs-ab@lists.openid.net>, "woes@ietf.org" <woes@ietf.org>, "oauth@ietf.org" <oauth@ietf.org>, "openid-specs@lists.openid.net" <openid-specs@lists.openid.net>
Subject: Re: [OAUTH-WG] [Openid-specs-ab] JSON Web Token (JWT) and JSON Web Signature (JWS) now in separate specs
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 21:58:05 -0000

--Apple-Mail-102-919825435
Content-Type: multipart/alternative;
	boundary=Apple-Mail-101-919825316


--Apple-Mail-101-919825316
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Mike in JWT 6.7 if the alg is none.

Otherwise, if the "alg" value
       is ""none"", the JWT Claim Segment is the empty string.
I may be missing something.  If the Alg is none then the Claim segment =
is still the claim segment.   It is the Crypto segment that would just =
be padding to maintain the format.

In 8 10 the decoding has it correct.

So in the event the signature alg is none do we make the cripto segment =
a pad character?

So normally it would be=20
xxxxxxx.xxxxxxxx.xxxxx

Dropping the cripto segment looks like
xxxxxxx.xxxxxxxx.

Or with a pad char to be ignored=20
xxxxxxx.xxxxxxxxx.0

Or something like that.

John B.
On 2011-03-28, at 5:28 AM, Mike Jones wrote:

> These are now published as IETF drafts.  The IETF .txt version links =
are:
>                =
http://www.ietf.org/id/draft-jones-json-web-token-03.txt
>                =
http://www.ietf.org/id/draft-jones-json-web-signature-01.txt
> =20
>                                                             -- Mike
> =20
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Mike Jones
> Sent: Friday, March 25, 2011 10:26 PM
> To: oauth@ietf.org; woes@ietf.org; openid-specs-ab@lists.openid.net
> Cc: openid-specs@lists.openid.net
> Subject: [OAUTH-WG] JSON Web Token (JWT) and JSON Web Signature (JWS) =
now in separate specs
> =20
> As promised, I have split the contents of the JWT spec =
draft-jones-json-web-token-01 into two simpler specs:
>                 draft-jones-json-web-token-02
>                 draft-jones-json-web-signature-00
> These should have introduced no semantic changes from the previous =
spec.
> =20
> I then applied the feedback that I received since JWT -01 and created =
revised versions of the split specs:
>                 draft-jones-json-web-token-03
>                 draft-jones-json-web-signature-01
> The only breaking change introduced was that x5t (X.509 Certificate =
Thumbprint) is now a SHA-1 hash of the DER-encoded certificate, rather =
than a SHA-256 has, as SHA-1 is the prevailing existing practice for =
certificate thumbprint calculations.  See the Document History sections =
for details on each change made.
> =20
> .txt and .xml versions are also available.  I plan to publish these as =
IETF drafts once the submission window re-opens on Monday.  Feedback =
welcome!
> =20
>                                                             -- Mike
> =20
> P.S.  Yes, work on the companion encryption spec is now under way=85
> =20
> _______________________________________________
> Openid-specs-ab mailing list
> Openid-specs-ab@lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-specs-ab


--Apple-Mail-101-919825316
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><base href=3D"x-msg://270/"></head><body style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; ">Mike in JWT 6.7 if the alg is =
none.<div><br></div><div><span class=3D"Apple-style-span" =
style=3D"font-family: Times; "><pre style=3D"word-wrap: break-word; =
white-space: pre-wrap; ">Otherwise, if the "alg" value
       is ""none"", the JWT Claim Segment is the empty string.
</pre><div>I may be missing something. &nbsp;If the Alg is none then the =
Claim segment is still the claim segment. &nbsp; It is the Crypto =
segment that would just be padding to maintain the =
format.</div><div><br></div><div>In 8 10 the decoding has it =
correct.</div><div><br></div><div>So in the event the signature alg is =
none do we make the cripto segment a pad =
character?</div><div><br></div><div>So normally it would =
be&nbsp;</div><div>xxxxxxx.xxxxxxxx.xxxxx</div><div><br></div><div>Droppin=
g the cripto segment looks =
like</div><div>xxxxxxx.xxxxxxxx.</div><div><br></div><div>Or with a pad =
char to be =
ignored&nbsp;</div><div>xxxxxxx.xxxxxxxxx.0</div><div><br></div><div>Or =
something like that.</div><div><br></div><div>John =
B.</div></span><div><div>On 2011-03-28, at 5:28 AM, Mike Jones =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; font-family: Helvetica; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: =
normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><span style=3D"color: rgb(0, =
32, 96); ">These are now published as IETF drafts.&nbsp; The IETF .txt =
version links are:<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><span style=3D"color: rgb(0, =
32, 96); =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-jones-json-web-token-03.txt" =
style=3D"color: blue; text-decoration: underline; =
">http://www.ietf.org/id/draft-jones-json-web-token-03.txt</a><o:p></o:p><=
/span></div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: =
Calibri, sans-serif; "><span style=3D"color: rgb(0, 32, 96); =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-jones-json-web-signature-01.txt" =
style=3D"color: blue; text-decoration: underline; =
">http://www.ietf.org/id/draft-jones-json-web-signature-01.txt</a><o:p></o=
:p></span></div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: =
Calibri, sans-serif; "><span style=3D"color: rgb(0, 32, 96); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><span style=3D"color: rgb(0, =
32, 96); =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- =
Mike<o:p></o:p></span></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; =
font-family: Calibri, sans-serif; "><span style=3D"color: rgb(0, 32, =
96); "><o:p>&nbsp;</o:p></span></div><div><div =
style=3D"border-right-style: none; border-bottom-style: none; =
border-left-style: none; border-width: initial; border-color: initial; =
border-top-style: solid; border-top-color: rgb(181, 196, 223); =
border-top-width: 1pt; padding-top: 3pt; padding-right: 0in; =
padding-bottom: 0in; padding-left: 0in; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><b><span style=3D"font-size: =
10pt; font-family: Tahoma, sans-serif; ">From:</span></b><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; "><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth-bounces@ietf.org" style=3D"color: blue; =
text-decoration: underline; ">oauth-bounces@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>[mailto:oauth-bounces@ietf.or=
g]<span class=3D"Apple-converted-space">&nbsp;</span><b>On Behalf =
Of<span class=3D"Apple-converted-space">&nbsp;</span></b>Mike =
Jones<br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Friday, March 25, 2011 =
10:26 PM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth@ietf.org" style=3D"color: blue; text-decoration: =
underline; ">oauth@ietf.org</a>;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:woes@ietf.org" style=3D"color: blue; text-decoration: =
underline; ">woes@ietf.org</a>;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:openid-specs-ab@lists.openid.net" style=3D"color: blue; =
text-decoration: underline; =
">openid-specs-ab@lists.openid.net</a><br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:openid-specs@lists.openid.net" style=3D"color: blue; =
text-decoration: underline; =
">openid-specs@lists.openid.net</a><br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>[OAUTH-WG] JSON Web Token =
(JWT) and JSON Web Signature (JWS) now in separate =
specs<o:p></o:p></span></div></div></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">As promised, I have split the contents of the JWT spec<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://self-issued.info/docs/draft-jones-json-web-token-01.html" =
style=3D"color: blue; text-decoration: underline; =
">draft-jones-json-web-token-01</a><span =
class=3D"Apple-converted-space">&nbsp;</span>into two simpler =
specs:<o:p></o:p></div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: =
Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://self-issued.info/docs/draft-jones-json-web-token-02.html" =
style=3D"color: blue; text-decoration: underline; =
">draft-jones-json-web-token-02</a><o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://self-issued.info/docs/draft-jones-json-web-signature-00.htm=
l" style=3D"color: blue; text-decoration: underline; =
">draft-jones-json-web-signature-00</a><o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">These should have introduced no semantic changes from the previous =
spec.<o:p></o:p></div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: =
Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 11pt; font-family: Calibri, sans-serif; ">I then applied the =
feedback that I received since JWT -01 and created revised versions of =
the split specs:<o:p></o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://self-issued.info/docs/draft-jones-json-web-token-03.html" =
style=3D"color: blue; text-decoration: underline; =
">draft-jones-json-web-token-03</a><o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"http://self-issued.info/docs/draft-jones-json-web-signature-01.htm=
l" style=3D"color: blue; text-decoration: underline; =
">draft-jones-json-web-signature-01</a><o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">The only breaking change introduced was that x5t (X.509 Certificate =
Thumbprint) is now a SHA-1 hash of the DER-encoded certificate, rather =
than a SHA-256 has, as SHA-1 is the prevailing existing practice for =
certificate thumbprint calculations.&nbsp; See the Document History =
sections for details on each change made.<o:p></o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
"><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; =
font-family: Calibri, sans-serif; ">.txt and .xml versions are also =
available.&nbsp; I plan to publish these as IETF drafts once the =
submission window re-opens on Monday.&nbsp; Feedback =
welcome!<o:p></o:p></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; =
font-family: Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- =
Mike<o:p></o:p></div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: =
Calibri, sans-serif; "><o:p>&nbsp;</o:p></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 11pt; font-family: Calibri, sans-serif; ">P.S.&nbsp; Yes, =
work on the companion encryption spec is now under =
way=85<o:p></o:p></div><div style=3D"margin-top: 0in; margin-right: 0in; =
margin-bottom: 0.0001pt; margin-left: 0in; font-size: 11pt; font-family: =
Calibri, sans-serif; =
"><o:p>&nbsp;</o:p></div></div>___________________________________________=
____<br>Openid-specs-ab mailing list<br><a =
href=3D"mailto:Openid-specs-ab@lists.openid.net" style=3D"color: blue; =
text-decoration: underline; ">Openid-specs-ab@lists.openid.net</a><br><a =
href=3D"http://lists.openid.net/mailman/listinfo/openid-specs-ab" =
style=3D"color: blue; text-decoration: underline; =
">http://lists.openid.net/mailman/listinfo/openid-specs-ab</a><br></div></=
span></blockquote></div><br></div></body></html>=

--Apple-Mail-101-919825316--

--Apple-Mail-102-919825435
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIO9TCCBwsw
ggXzoAMCAQICAgZDMA0GCSqGSIb3DQEBBQUAMIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3Rh
cnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4
MDYGA1UEAxMvU3RhcnRDb20gQ2xhc3MgMiBQcmltYXJ5IEludGVybWVkaWF0ZSBDbGllbnQgQ0Ew
HhcNMTAwMzE3MTM0NDQ1WhcNMTIwMzE4MTE1NTExWjCBzTEgMB4GA1UEDRMXMTY1NTU1LTJHU3FU
T1ZUbkk4OHhOSW4xCzAJBgNVBAYTAkNMMSIwIAYDVQQIExlNZXRyb3BvbGl0YW5hIGRlIFNhbnRp
YWdvMREwDwYDVQQHEwhWaXRhY3VyYTEtMCsGA1UECxMkU3RhcnRDb20gVmVyaWZpZWQgQ2VydGlm
aWNhdGUgTWVtYmVyMRUwEwYDVQQDEwxKb2huIEJyYWRsZXkxHzAdBgkqhkiG9w0BCQEWEGpicmFk
bGV5QG1hYy5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDB7DXf6x80dsJiB9B9
Ds4cBQdA+9bNuZMBeXkUAHrvYH2taw6y8fcadbhgk92FyPiCbsHtB1VTaJThaMqtXuTkS4r5Sfb8
k5kboz3OQVPMmrOJIUpaoDP2heKEhMUSL6ev9CvsuYs+XXe7f9vY3w/A8cVg/NoOXbdqKXbWOMMd
NSdg7uJWSsmpqILFzQsumwqVH24tYX0sqvpJy/r+pc84j6QM+Ew0B9bz3OkEMafjcCeGRfdsQnLB
+rIR8BPDeeKRP6a5e8Lf6slUQ3s/rh33otnkNaz6DMLTJrj0qoAD7FxB7LlLalIjrg08BNZDJUQK
7zTlNxkPqVHVTg3H0OG/AgMBAAGjggMyMIIDLjAJBgNVHRMEAjAAMAsGA1UdDwQEAwIEsDAdBgNV
HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwQwHQYDVR0OBBYEFMjJGKHWsNb6VU54Wkktqcu2on3B
MB8GA1UdIwQYMBaAFK5Vg2/sMcq59x36r2sx88gd46y7MFQGA1UdEQRNMEuBEGpicmFkbGV5QG1h
Yy5jb22BEXZlN2p0YkB2ZTdqdGIuY29tgRNqYnJhZGxleUB3aW5nYWEuY29tgQ9qYnJhZGxleUBt
ZS5jb20wggFCBgNVHSAEggE5MIIBNTCCATEGCysGAQQBgbU3AQIBMIIBIDAuBggrBgEFBQcCARYi
aHR0cDovL3d3dy5zdGFydHNzbC5jb20vcG9saWN5LnBkZjA0BggrBgEFBQcCARYoaHR0cDovL3d3
dy5zdGFydHNzbC5jb20vaW50ZXJtZWRpYXRlLnBkZjCBtwYIKwYBBQUHAgIwgaowFBYNU3RhcnRD
b20gTHRkLjADAgEBGoGRTGltaXRlZCBMaWFiaWxpdHksIHNlZSBzZWN0aW9uICpMZWdhbCBMaW1p
dGF0aW9ucyogb2YgdGhlIFN0YXJ0Q29tIENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFBvbGljeSBh
dmFpbGFibGUgYXQgaHR0cDovL3d3dy5zdGFydHNzbC5jb20vcG9saWN5LnBkZjBjBgNVHR8EXDBa
MCugKaAnhiVodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS9jcnR1Mi1jcmwuY3JsMCugKaAnhiVodHRw
Oi8vY3JsLnN0YXJ0c3NsLmNvbS9jcnR1Mi1jcmwuY3JsMIGOBggrBgEFBQcBAQSBgTB/MDkGCCsG
AQUFBzABhi1odHRwOi8vb2NzcC5zdGFydHNzbC5jb20vc3ViL2NsYXNzMi9jbGllbnQvY2EwQgYI
KwYBBQUHMAKGNmh0dHA6Ly93d3cuc3RhcnRzc2wuY29tL2NlcnRzL3N1Yi5jbGFzczIuY2xpZW50
LmNhLmNydDAjBgNVHRIEHDAahhhodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS8wDQYJKoZIhvcNAQEF
BQADggEBAHu8WZHdSu+I5GMzGDrkxFVUzZ2JAcwzgSscYNFX2CFJlU8ncC+/E5Y18oiGcIR9o7J3
Hh4fGrjJmxTsq2O3E9/qg0yWSEzlCBhAXl/D+GTyUJA/KfIuCbdsuS5opprSrBZztqMYcGSCQJFz
lE+esdbCXazdyEww5XfiGVgKiRyV2ycXyxNjekowbcDffSsOYplGBjJwPRYpESgfCYDXm+yyDQhy
Xk0pxNEA7ob5fAMellN8FcgLfQtwSRcg8cYl/m8/BeVl6+eZuzCb061PdUN+mDf6erS55tXqgWJ3
toTp3GGaaOwwGs/bA1UnLqYm93RfTyL3kU1OWG8syPFMLoIwggfiMIIFyqADAgECAgEOMA0GCSqG
SIb3DQEBBQUAMH0xCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQuMSswKQYDVQQL
EyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMSkwJwYDVQQDEyBTdGFydENvbSBD
ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNzEwMjQyMTAyNTRaFw0xMjEwMjIyMTAyNTRaMIGM
MQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERp
Z2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4MDYGA1UEAxMvU3RhcnRDb20gQ2xhc3MgMiBQcmlt
YXJ5IEludGVybWVkaWF0ZSBDbGllbnQgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
AQDLKIVFnAEs+xnyq6UzjCqgDcvQVe1dIoFnRsQPCFO+y92k8RK0Pn3MbQ2Gd+mehh9GBZ+36uUQ
A7Xj9AGM6wgPhEE34vKtfpAN5tJ8LcFxveDObCKrL7O5UT9WsnAZHv7OYPYSR68mdmnEnJ83M4wQ
gKO19b+Rt8sPDAz9ptkQsntCn4GeJzg3q2SVc4QJTg/WHo7wF2ah5LMOeh8xJVSKGEmd6uPkSbj1
13yKMm8vmNptRPmM1+YgmVwcdOYJOjCgFtb2sOP79jji8uhWR91xx7TpM1K3hv/wrBZwffrmmEpU
euXHRs07JqCCvFh9coKF4UQZvfEg+x3/69xRCzb1AgMBAAGjggNbMIIDVzAMBgNVHRMEBTADAQH/
MAsGA1UdDwQEAwIBpjAdBgNVHQ4EFgQUrlWDb+wxyrn3HfqvazHzyB3jrLswgagGA1UdIwSBoDCB
nYAUTgvvGqRAW6UXaYcwyjRoQ9BBrvKhgYGkfzB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3Rh
cnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEp
MCcGA1UEAxMgU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHmCAQEwCQYDVR0SBAIwADA9
BggrBgEFBQcBAQQxMC8wLQYIKwYBBQUHMAKGIWh0dHA6Ly93d3cuc3RhcnRzc2wuY29tL3Nmc2Nh
LmNydDBgBgNVHR8EWTBXMCygKqAohiZodHRwOi8vY2VydC5zdGFydGNvbS5vcmcvc2ZzY2EtY3Js
LmNybDAnoCWgI4YhaHR0cDovL2NybC5zdGFydHNzbC5jb20vc2ZzY2EuY3JsMIIBXQYDVR0gBIIB
VDCCAVAwggFMBgsrBgEEAYG1NwEBBDCCATswLwYIKwYBBQUHAgEWI2h0dHA6Ly9jZXJ0LnN0YXJ0
Y29tLm9yZy9wb2xpY3kucGRmMDUGCCsGAQUFBwIBFilodHRwOi8vY2VydC5zdGFydGNvbS5vcmcv
aW50ZXJtZWRpYXRlLnBkZjCB0AYIKwYBBQUHAgIwgcMwJxYgU3RhcnQgQ29tbWVyY2lhbCAoU3Rh
cnRDb20pIEx0ZC4wAwIBARqBl0xpbWl0ZWQgTGlhYmlsaXR5LCByZWFkIHRoZSBzZWN0aW9uICpM
ZWdhbCBMaW1pdGF0aW9ucyogb2YgdGhlIFN0YXJ0Q29tIENlcnRpZmljYXRpb24gQXV0aG9yaXR5
IFBvbGljeSBhdmFpbGFibGUgYXQgaHR0cDovL2NlcnQuc3RhcnRjb20ub3JnL3BvbGljeS5wZGYw
EQYJYIZIAYb4QgEBBAQDAgAHMFAGCWCGSAGG+EIBDQRDFkFTdGFydENvbSBDbGFzcyAyIFByaW1h
cnkgSW50ZXJtZWRpYXRlIEZyZWUgU1NMIEVtYWlsIENlcnRpZmljYXRlczANBgkqhkiG9w0BAQUF
AAOCAgEAHvcQF/726YR5L5A3Ta7JV1nTu3w9yWqp00945pg7uea+1KVtR/7/yeNFAV7MPQylPE8p
ROEcGU+RwwDFuNn9cePfAMzOBTpy/6VE076+gYkZa4n8uWaL5A2FVo8tRmEyfoT4gRL9B5h5w8Y4
ZySCJBLyfp4jByyxHaTTIWZ8TIkxUQLSBeFnmHKYFwYwMbBA0Sgb8ONCvq9zeJcpMkkDadhJSCfB
9c9gZocbaaVHVqTlSeENRr5/Y31dapzIRQg2Pl9V/A65Cq03KQxMXBpXn8HkLO/g2FCt7KYkJCaT
e6qT2JX8thmB3nb+5RmtWQIITCP+PPNkFQCts6ujOtJx6TlDLWA+tV7QLN2Q+S98p/SwnXito+GW
0N7kXcL8QDBVsF8lCvwCz+JQrvUIcW5xEzpAVk9xSbpePxVIMzNEUQhBobkFojhUqGt+VyU3GH/+
BP2brzl4StOJ1KXuw2EzFs0ai9OMsqCUFRyhykm6MrbnsnSrqhWSnSQPYIu+zpzwWC/8sZFxoJCw
vbbIu+6E+AIGa8tP+pYF+empPn/7pkIoTT4LSkkEIxGKvUvDJTh86VDNL8bIIQE2LHVDwcOq+mcQ
x416FAA9Nw1DBGyrFr6hQe5yTVXrJ4G7vJosNRGCwPnx302gonaFdwi++YyqjPyhPO6q4fRarYvW
yqp5L6UxggNsMIIDaAIBATCBkzCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0
ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcxODA2BgNVBAMT
L1N0YXJ0Q29tIENsYXNzIDIgUHJpbWFyeSBJbnRlcm1lZGlhdGUgQ2xpZW50IENBAgIGQzAJBgUr
DgMCGgUAoIIBrTAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0xMTAz
MjgyMTU5MzJaMCMGCSqGSIb3DQEJBDEWBBQTkHCCkLGzPCZIDuLv2gRmK+4WoDCBpAYJKwYBBAGC
NxAEMYGWMIGTMIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UE
CxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4MDYGA1UEAxMvU3RhcnRDb20g
Q2xhc3MgMiBQcmltYXJ5IEludGVybWVkaWF0ZSBDbGllbnQgQ0ECAgZDMIGmBgsqhkiG9w0BCRAC
CzGBlqCBkzCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0ZC4xKzApBgNVBAsT
IlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcxODA2BgNVBAMTL1N0YXJ0Q29tIENs
YXNzIDIgUHJpbWFyeSBJbnRlcm1lZGlhdGUgQ2xpZW50IENBAgIGQzANBgkqhkiG9w0BAQEFAASC
AQCxKwlKOcethVXbbiOu9BFnQTsvK4lq7k3+gGWT5gmC/alNSZvV0naisfnsnH0vHUqwNvPtUiPG
tFjVHQZqjuwY5/QkOaCDYp3AbvCY6ooLHZPy3BlUml6064UhdHr7j4Fvzgx0Nd9wxh9fuo4IIBLC
rauGNk31sJ+8g+Hf+VW+wN9WPF+JYabWIcfmGpGK2mu7xXZIabDZTPkycfdfet/1ye+tEBDtCq14
S73u82pOU2sBAM1/9M4JDG8qDIhku/oq4XhYbvVSsWl79M9pzS2WJm0rGdu91cB8zdOmCGj1MZX2
40PfblIaffto6MUIXs2B7lWnQn3ShljvDU4IE/neAAAAAAAA

--Apple-Mail-102-919825435--

From Michael.Jones@microsoft.com  Mon Mar 28 15:01:01 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BE1543A6A7B; Mon, 28 Mar 2011 15:01:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.9
X-Spam-Level: 
X-Spam-Status: No, score=-9.9 tagged_above=-999 required=5 tests=[AWL=-0.698,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8, WEIRD_QUOTING=1.396]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AHsNC8cvb+bB; Mon, 28 Mar 2011 15:00:52 -0700 (PDT)
Received: from smtp.microsoft.com (mailb.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id DFC903A695B; Mon, 28 Mar 2011 15:00:51 -0700 (PDT)
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (157.54.79.174) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Mon, 28 Mar 2011 15:02:27 -0700
Received: from TK5EX14MBXC207.redmond.corp.microsoft.com ([169.254.7.102]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.01.0270.002; Mon, 28 Mar 2011 15:02:27 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Thread-Topic: [Openid-specs-ab] [OAUTH-WG] JSON Web Token (JWT) and JSON Web Signature (JWS) now in separate specs
Thread-Index: AcvrdjytBVRrDTgeReCPOh8gPYdaIgBs7JIwACkKFQAADqBAgA==
Date: Mon, 28 Mar 2011 22:02:26 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252AAB0D@TK5EX14MBXC207.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A9198@TK5EX14MBXC207.redmond.corp.microsoft.com> <4E1F6AAD24975D4BA5B1680429673943252AA329@TK5EX14MBXC207.redmond.corp.microsoft.com> <1C42267D-9BE0-45E7-8007-A05B6937082D@ve7jtb.com>
In-Reply-To: <1C42267D-9BE0-45E7-8007-A05B6937082D@ve7jtb.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943252AAB0DTK5EX14MBXC207r_"
MIME-Version: 1.0
Cc: "openid-specs-ab@lists.openid.net" <openid-specs-ab@lists.openid.net>, "woes@ietf.org" <woes@ietf.org>, "oauth@ietf.org" <oauth@ietf.org>, "openid-specs@lists.openid.net" <openid-specs@lists.openid.net>
Subject: Re: [OAUTH-WG] [Openid-specs-ab] JSON Web Token (JWT) and JSON Web Signature (JWS) now in separate specs
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 22:01:02 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943252AAB0DTK5EX14MBXC207r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Correct - good catch.  I'll update the draft.  The intent was for there to =
be no pad character in that case.

                                                                           =
-- Mike

From: John Bradley [mailto:ve7jtb@ve7jtb.com]
Sent: Monday, March 28, 2011 3:00 PM
To: Mike Jones
Cc: oauth@ietf.org; woes@ietf.org; openid-specs-ab@lists.openid.net; openid=
-specs@lists.openid.net
Subject: Re: [Openid-specs-ab] [OAUTH-WG] JSON Web Token (JWT) and JSON Web=
 Signature (JWS) now in separate specs

Mike in JWT 6.7 if the alg is none.


Otherwise, if the "alg" value

       is ""none"", the JWT Claim Segment is the empty string.
I may be missing something.  If the Alg is none then the Claim segment is s=
till the claim segment.   It is the Crypto segment that would just be paddi=
ng to maintain the format.

In 8 10 the decoding has it correct.

So in the event the signature alg is none do we make the cripto segment a p=
ad character?

So normally it would be
xxxxxxx.xxxxxxxx.xxxxx

Dropping the cripto segment looks like
xxxxxxx.xxxxxxxx.

Or with a pad char to be ignored
xxxxxxx.xxxxxxxxx.0

Or something like that.

John B.
On 2011-03-28, at 5:28 AM, Mike Jones wrote:


These are now published as IETF drafts.  The IETF .txt version links are:
               http://www.ietf.org/id/draft-jones-json-web-token-03.txt
               http://www.ietf.org/id/draft-jones-json-web-signature-01.txt

                                                            -- Mike

From: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org] On Behalf Of Mike Jones
Sent: Friday, March 25, 2011 10:26 PM
To: oauth@ietf.org<mailto:oauth@ietf.org>; woes@ietf.org<mailto:woes@ietf.o=
rg>; openid-specs-ab@lists.openid.net<mailto:openid-specs-ab@lists.openid.n=
et>
Cc: openid-specs@lists.openid.net<mailto:openid-specs@lists.openid.net>
Subject: [OAUTH-WG] JSON Web Token (JWT) and JSON Web Signature (JWS) now i=
n separate specs

As promised, I have split the contents of the JWT spec draft-jones-json-web=
-token-01<http://self-issued.info/docs/draft-jones-json-web-token-01.html> =
into two simpler specs:
                draft-jones-json-web-token-02<http://self-issued.info/docs/=
draft-jones-json-web-token-02.html>
                draft-jones-json-web-signature-00<http://self-issued.info/d=
ocs/draft-jones-json-web-signature-00.html>
These should have introduced no semantic changes from the previous spec.

I then applied the feedback that I received since JWT -01 and created revis=
ed versions of the split specs:
                draft-jones-json-web-token-03<http://self-issued.info/docs/=
draft-jones-json-web-token-03.html>
                draft-jones-json-web-signature-01<http://self-issued.info/d=
ocs/draft-jones-json-web-signature-01.html>
The only breaking change introduced was that x5t (X.509 Certificate Thumbpr=
int) is now a SHA-1 hash of the DER-encoded certificate, rather than a SHA-=
256 has, as SHA-1 is the prevailing existing practice for certificate thumb=
print calculations.  See the Document History sections for details on each =
change made.

.txt and .xml versions are also available.  I plan to publish these as IETF=
 drafts once the submission window re-opens on Monday.  Feedback welcome!

                                                            -- Mike

P.S.  Yes, work on the companion encryption spec is now under way...

_______________________________________________
Openid-specs-ab mailing list
Openid-specs-ab@lists.openid.net<mailto:Openid-specs-ab@lists.openid.net>
http://lists.openid.net/mailman/listinfo/openid-specs-ab


--_000_4E1F6AAD24975D4BA5B1680429673943252AAB0DTK5EX14MBXC207r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<base href=3D"x-msg://270/"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
	{font-family:Times;
	panose-1:2 2 6 3 5 4 5 2 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#002060;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">Correct &#8211; good catc=
h.&nbsp; I&#8217;ll update the draft.&nbsp; The intent was for there to be =
no pad character in that case.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> John Bra=
dley [mailto:ve7jtb@ve7jtb.com]
<br>
<b>Sent:</b> Monday, March 28, 2011 3:00 PM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> oauth@ietf.org; woes@ietf.org; openid-specs-ab@lists.openid.net;=
 openid-specs@lists.openid.net<br>
<b>Subject:</b> Re: [Openid-specs-ab] [OAUTH-WG] JSON Web Token (JWT) and J=
SON Web Signature (JWS) now in separate specs<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Mike in JWT 6.7 if the alg is none.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<pre style=3D"word-wrap: break-word;white-space:pre-wrap">Otherwise, if the=
 &quot;alg&quot; value<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; is &quot;&quot;none&quot;&quot;, =
the JWT Claim Segment is the empty string.<o:p></o:p></pre>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;">I may be missing something. &nbsp;If the Alg is none then the C=
laim segment is still the claim segment. &nbsp; It is the Crypto segment th=
at would just be padding to maintain the format.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;">In 8 10 the decoding has it correct.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;">So in the event the signature alg is none do we make the cripto=
 segment a pad character?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;">So normally it would be&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;">xxxxxxx.xxxxxxxx.xxxxx<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;">Dropping the cripto segment looks like<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;">xxxxxxx.xxxxxxxx.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;">Or with a pad char to be ignored&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;">xxxxxxx.xxxxxxxxx.0<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;">Or something like that.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Times&quot;,&quot;s=
erif&quot;">John B.<o:p></o:p></span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">On 2011-03-28, at 5:28 AM, Mike Jones wrote:<o:p></o=
:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">These are now published a=
s IETF drafts.&nbsp; The IETF .txt version links are:</span><span style=3D"=
font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><o=
:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"a=
pple-converted-space">&nbsp;</span><a href=3D"http://www.ietf.org/id/draft-=
jones-json-web-token-03.txt">http://www.ietf.org/id/draft-jones-json-web-to=
ken-03.txt</a></span><span style=3D"font-size:11.0pt;font-family:&quot;Cali=
bri&quot;,&quot;sans-serif&quot;"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"a=
pple-converted-space">&nbsp;</span><a href=3D"http://www.ietf.org/id/draft-=
jones-json-web-signature-01.txt">http://www.ietf.org/id/draft-jones-json-we=
b-signature-01.txt</a></span><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;</span><span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike</span><span style=3D"font-size:11.0pt=
;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><o:p></o:p></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;</span><span style=
=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;=
"><o:p></o:p></span></p>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in;border-width:initial;border-color:initial">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"><a href=3D"mai=
lto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a><span class=3D"apple-=
converted-space">&nbsp;</span>[mailto:oauth-bounces@ietf.org]<span class=3D=
"apple-converted-space">&nbsp;</span><b>On
 Behalf Of<span class=3D"apple-converted-space">&nbsp;</span></b>Mike Jones=
<br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Friday, Marc=
h 25, 2011 10:26 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:oauth@ietf.org">oauth@ietf.org</a>;<span class=3D"apple-converted-space=
">&nbsp;</span><a href=3D"mailto:woes@ietf.org">woes@ietf.org</a>;<span cla=
ss=3D"apple-converted-space">&nbsp;</span><a href=3D"mailto:openid-specs-ab=
@lists.openid.net">openid-specs-ab@lists.openid.net</a><br>
<b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:openid-specs@lists.openid.net">openid-specs@lists.openid.net</a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>[OAUTH-WG=
] JSON Web Token (JWT) and JSON Web Signature (JWS) now in separate specs</=
span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;=
sans-serif&quot;"><o:p></o:p></span></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">As promised, I have split the contents =
of the JWT spec<span class=3D"apple-converted-space">&nbsp;</span><a href=
=3D"http://self-issued.info/docs/draft-jones-json-web-token-01.html">draft-=
jones-json-web-token-01</a><span class=3D"apple-converted-space">&nbsp;</sp=
an>into
 two simpler specs:<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-con=
verted-space">&nbsp;</span><a href=3D"http://self-issued.info/docs/draft-jo=
nes-json-web-token-02.html">draft-jones-json-web-token-02</a><o:p></o:p></s=
pan></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-con=
verted-space">&nbsp;</span><a href=3D"http://self-issued.info/docs/draft-jo=
nes-json-web-signature-00.html">draft-jones-json-web-signature-00</a><o:p><=
/o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">These should have introduced no semanti=
c changes from the previous spec.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I then applied the feedback that I rece=
ived since JWT -01 and created revised versions of the split specs:<o:p></o=
:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-con=
verted-space">&nbsp;</span><a href=3D"http://self-issued.info/docs/draft-jo=
nes-json-web-token-03.html">draft-jones-json-web-token-03</a><o:p></o:p></s=
pan></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-con=
verted-space">&nbsp;</span><a href=3D"http://self-issued.info/docs/draft-jo=
nes-json-web-signature-01.html">draft-jones-json-web-signature-01</a><o:p><=
/o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">The only breaking change introduced was=
 that x5t (X.509 Certificate Thumbprint) is now a SHA-1 hash of the DER-enc=
oded certificate, rather than a SHA-256 has, as SHA-1 is
 the prevailing existing practice for certificate thumbprint calculations.&=
nbsp; See the Document History sections for details on each change made.<o:=
p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">.txt and .xml versions are also availab=
le.&nbsp; I plan to publish these as IETF drafts once the submission window=
 re-opens on Monday.&nbsp; Feedback welcome!<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">P.S.&nbsp; Yes, work on the companion e=
ncryption spec is now under way&#8230;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;">_____________________________________=
__________<br>
Openid-specs-ab mailing list<br>
<a href=3D"mailto:Openid-specs-ab@lists.openid.net">Openid-specs-ab@lists.o=
penid.net</a><br>
<a href=3D"http://lists.openid.net/mailman/listinfo/openid-specs-ab">http:/=
/lists.openid.net/mailman/listinfo/openid-specs-ab</a><o:p></o:p></span></p=
>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943252AAB0DTK5EX14MBXC207r_--

From ve7jtb@ve7jtb.com  Mon Mar 28 15:03:20 2011
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3DA3B3A6A7F; Mon, 28 Mar 2011 15:03:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.202
X-Spam-Level: 
X-Spam-Status: No, score=-2.202 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, WEIRD_QUOTING=1.396]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PEq6Xrld-mQp; Mon, 28 Mar 2011 15:03:19 -0700 (PDT)
Received: from mail-gy0-f172.google.com (mail-gy0-f172.google.com [209.85.160.172]) by core3.amsl.com (Postfix) with ESMTP id 7668C3A6A6B; Mon, 28 Mar 2011 15:03:18 -0700 (PDT)
Received: by gyf3 with SMTP id 3so1544965gyf.31 for <multiple recipients>; Mon, 28 Mar 2011 15:04:55 -0700 (PDT)
Received: by 10.150.67.5 with SMTP id p5mr92326yba.428.1301349895693; Mon, 28 Mar 2011 15:04:55 -0700 (PDT)
Received: from [192.168.1.4] ([190.22.48.168]) by mx.google.com with ESMTPS id f5sm1554028ybh.13.2011.03.28.15.04.52 (version=TLSv1/SSLv3 cipher=OTHER); Mon, 28 Mar 2011 15:04:54 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/signed; boundary=Apple-Mail-104-920142689; protocol="application/pkcs7-signature"; micalg=sha1
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943252AAB0D@TK5EX14MBXC207.redmond.corp.microsoft.com>
Date: Mon, 28 Mar 2011 18:04:49 -0400
Message-Id: <54DB0AB3-EB0E-4BDD-94E1-A220148FBF29@ve7jtb.com>
References: <4E1F6AAD24975D4BA5B1680429673943252A9198@TK5EX14MBXC207.redmond.corp.microsoft.com> <4E1F6AAD24975D4BA5B1680429673943252AA329@TK5EX14MBXC207.redmond.corp.microsoft.com> <1C42267D-9BE0-45E7-8007-A05B6937082D@ve7jtb.com> <4E1F6AAD24975D4BA5B1680429673943252AAB0D@TK5EX14MBXC207.redmond.corp.microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.1084)
Cc: "openid-specs-ab@lists.openid.net" <openid-specs-ab@lists.openid.net>, "woes@ietf.org" <woes@ietf.org>, "oauth@ietf.org" <oauth@ietf.org>, "openid-specs@lists.openid.net" <openid-specs@lists.openid.net>
Subject: Re: [OAUTH-WG] [Openid-specs-ab] JSON Web Token (JWT) and JSON Web Signature (JWS) now in separate specs
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 22:03:20 -0000

--Apple-Mail-104-920142689
Content-Type: multipart/alternative;
	boundary=Apple-Mail-103-920142598


--Apple-Mail-103-920142598
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

I just spotted that further down.

I am OK with no pad character as long as that isn't going to mess up =
string parsing in some situations. =20

The empty string is arguably more compact.

John B.
On 2011-03-28, at 6:02 PM, Mike Jones wrote:

> Correct =96 good catch.  I=92ll update the draft.  The intent was for =
there to be no pad character in that case.
> =20
>                                                                        =
    -- Mike
> =20
> From: John Bradley [mailto:ve7jtb@ve7jtb.com]=20
> Sent: Monday, March 28, 2011 3:00 PM
> To: Mike Jones
> Cc: oauth@ietf.org; woes@ietf.org; openid-specs-ab@lists.openid.net; =
openid-specs@lists.openid.net
> Subject: Re: [Openid-specs-ab] [OAUTH-WG] JSON Web Token (JWT) and =
JSON Web Signature (JWS) now in separate specs
> =20
> Mike in JWT 6.7 if the alg is none.
> =20
> Otherwise, if the "alg" value
>        is ""none"", the JWT Claim Segment is the empty string.
> I may be missing something.  If the Alg is none then the Claim segment =
is still the claim segment.   It is the Crypto segment that would just =
be padding to maintain the format.
> =20
> In 8 10 the decoding has it correct.
> =20
> So in the event the signature alg is none do we make the cripto =
segment a pad character?
> =20
> So normally it would be=20
> xxxxxxx.xxxxxxxx.xxxxx
> =20
> Dropping the cripto segment looks like
> xxxxxxx.xxxxxxxx.
> =20
> Or with a pad char to be ignored=20
> xxxxxxx.xxxxxxxxx.0
> =20
> Or something like that.
> =20
> John B.
> On 2011-03-28, at 5:28 AM, Mike Jones wrote:
>=20
>=20
> These are now published as IETF drafts.  The IETF .txt version links =
are:
>                =
http://www.ietf.org/id/draft-jones-json-web-token-03.txt
>                =
http://www.ietf.org/id/draft-jones-json-web-signature-01.txt
> =20
>                                                             -- Mike
> =20
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf =
Of Mike Jones
> Sent: Friday, March 25, 2011 10:26 PM
> To: oauth@ietf.org; woes@ietf.org; openid-specs-ab@lists.openid.net
> Cc: openid-specs@lists.openid.net
> Subject: [OAUTH-WG] JSON Web Token (JWT) and JSON Web Signature (JWS) =
now in separate specs
> =20
> As promised, I have split the contents of the JWT spec =
draft-jones-json-web-token-01 into two simpler specs:
>                 draft-jones-json-web-token-02
>                 draft-jones-json-web-signature-00
> These should have introduced no semantic changes from the previous =
spec.
> =20
> I then applied the feedback that I received since JWT -01 and created =
revised versions of the split specs:
>                 draft-jones-json-web-token-03
>                 draft-jones-json-web-signature-01
> The only breaking change introduced was that x5t (X.509 Certificate =
Thumbprint) is now a SHA-1 hash of the DER-encoded certificate, rather =
than a SHA-256 has, as SHA-1 is the prevailing existing practice for =
certificate thumbprint calculations.  See the Document History sections =
for details on each change made.
> =20
> .txt and .xml versions are also available.  I plan to publish these as =
IETF drafts once the submission window re-opens on Monday.  Feedback =
welcome!
> =20
>                                                             -- Mike
> =20
> P.S.  Yes, work on the companion encryption spec is now under way=85
> =20
> _______________________________________________
> Openid-specs-ab mailing list
> Openid-specs-ab@lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-specs-ab
> =20


--Apple-Mail-103-920142598
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><base href=3D"x-msg://270/"></head><body style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; ">I just spotted that further =
down.<div><br></div><div>I am OK with no pad character as long as that =
isn't going to mess up string parsing in some situations. =
&nbsp;</div><div><br></div><div>The empty string is arguably more =
compact.</div><div><br></div><div>John B.<br><div><div>On 2011-03-28, at =
6:02 PM, Mike Jones wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(0, 32, 96); ">Correct =
=96 good catch.&nbsp; I=92ll update the draft.&nbsp; The intent was for =
there to be no pad character in that case.<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(0, 32, 96); "><o:p>&nbsp;</o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(0, 32, 96); =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; -- Mike<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(0, 32, 96); =
"><o:p>&nbsp;</o:p></span></div><div><div style=3D"border-right-style: =
none; border-bottom-style: none; border-left-style: none; border-width: =
initial; border-color: initial; border-top-style: solid; =
border-top-color: rgb(181, 196, 223); border-top-width: 1pt; =
padding-top: 3pt; padding-right: 0in; padding-bottom: 0in; padding-left: =
0in; "><div style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: =
0.0001pt; margin-left: 0in; font-size: 12pt; font-family: 'Times New =
Roman', serif; "><b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif; ">From:</span></b><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif; "><span =
class=3D"Apple-converted-space">&nbsp;</span>John Bradley =
[mailto:ve7jtb@ve7jtb.com]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Monday, March 28, 2011 3:00 =
PM<br><b>To:</b><span class=3D"Apple-converted-space">&nbsp;</span>Mike =
Jones<br><b>Cc:</b><span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth@ietf.org" style=3D"color: blue; text-decoration: =
underline; ">oauth@ietf.org</a>;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:woes@ietf.org" style=3D"color: blue; text-decoration: =
underline; ">woes@ietf.org</a>;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:openid-specs-ab@lists.openid.net" style=3D"color: blue; =
text-decoration: underline; ">openid-specs-ab@lists.openid.net</a>;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:openid-specs@lists.openid.net" style=3D"color: blue; =
text-decoration: underline; =
">openid-specs@lists.openid.net</a><br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [Openid-specs-ab] =
[OAUTH-WG] JSON Web Token (JWT) and JSON Web Signature (JWS) now in =
separate specs<o:p></o:p></span></div></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">Mike in JWT 6.7 if the =
alg is none.<o:p></o:p></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><pre style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
10pt; font-family: 'Courier New'; word-wrap: break-word; white-space: =
pre-wrap; ">Otherwise, if the "alg" value<o:p></o:p></pre><pre =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 10pt; font-family: 'Courier New'; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; is ""none"", the JWT Claim =
Segment is the empty string.<o:p></o:p></pre><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-family: Times, serif; ">I may be missing =
something. &nbsp;If the Alg is none then the Claim segment is still the =
claim segment. &nbsp; It is the Crypto segment that would just be =
padding to maintain the format.<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-family: Times, serif; =
"><o:p>&nbsp;</o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: Times, serif; ">In 8 10 the decoding has it =
correct.<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: Times, serif; =
"><o:p>&nbsp;</o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: Times, serif; ">So in the event the signature alg =
is none do we make the cripto segment a pad =
character?<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: Times, serif; =
"><o:p>&nbsp;</o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: Times, serif; ">So normally it would =
be&nbsp;<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: Times, serif; =
">xxxxxxx.xxxxxxxx.xxxxx<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-family: Times, serif; =
"><o:p>&nbsp;</o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: Times, serif; ">Dropping the cripto segment looks =
like<o:p></o:p></span></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-family:=
 Times, serif; =
">xxxxxxx.xxxxxxxx.<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-family: Times, serif; =
"><o:p>&nbsp;</o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: Times, serif; ">Or with a pad char to be =
ignored&nbsp;<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: Times, serif; =
">xxxxxxx.xxxxxxxxx.0<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-family: Times, serif; =
"><o:p>&nbsp;</o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-family: Times, serif; ">Or something like =
that.<o:p></o:p></span></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-family:=
 Times, serif; "><o:p>&nbsp;</o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-family: Times, serif; ">John =
B.<o:p></o:p></span></div></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">On 2011-03-28, at 5:28 =
AM, Mike Jones wrote:<o:p></o:p></div></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(0, 32, 96); ">These =
are now published as IETF drafts.&nbsp; The IETF .txt version links =
are:</span><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; "><o:p></o:p></span></div></div><div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(0, 32, 96); =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-jones-json-web-token-03.txt" =
style=3D"color: blue; text-decoration: underline; =
">http://www.ietf.org/id/draft-jones-json-web-token-03.txt</a></span><span=
 style=3D"font-size: 11pt; font-family: Calibri, sans-serif; =
"><o:p></o:p></span></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(0, 32, 96); =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-jones-json-web-signature-01.txt" =
style=3D"color: blue; text-decoration: underline; =
">http://www.ietf.org/id/draft-jones-json-web-signature-01.txt</a></span><=
span style=3D"font-size: 11pt; font-family: Calibri, sans-serif; =
"><o:p></o:p></span></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(0, 32, 96); =
">&nbsp;</span><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; "><o:p></o:p></span></div></div><div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(0, 32, 96); =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- =
Mike</span><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; "><o:p></o:p></span></div></div><div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(0, 32, 96); ">&nbsp;</span><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; =
"><o:p></o:p></span></div></div><div><div style=3D"border-right-style: =
none; border-bottom-style: none; border-left-style: none; border-width: =
initial; border-color: initial; border-top-style: solid; padding-top: =
3pt; padding-right: 0in; padding-bottom: 0in; padding-left: 0in; =
border-width: initial; border-color: initial; "><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif; ">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; =
">&nbsp;</span></span><span style=3D"font-size: 10pt; font-family: =
Tahoma, sans-serif; "><a href=3D"mailto:oauth-bounces@ietf.org" =
style=3D"color: blue; text-decoration: underline; =
">oauth-bounces@ietf.org</a><span =
class=3D"apple-converted-space">&nbsp;</span>[mailto:oauth-bounces@ietf.or=
g]<span class=3D"apple-converted-space">&nbsp;</span><b>On Behalf =
Of<span class=3D"apple-converted-space">&nbsp;</span></b>Mike =
Jones<br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Friday, March 25, 2011 =
10:26 PM<br><b>To:</b><span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:oauth@ietf.org" style=3D"color: blue; text-decoration: =
underline; ">oauth@ietf.org</a>;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:woes@ietf.org" style=3D"color: blue; text-decoration: =
underline; ">woes@ietf.org</a>;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:openid-specs-ab@lists.openid.net" style=3D"color: blue; =
text-decoration: underline; =
">openid-specs-ab@lists.openid.net</a><br><b>Cc:</b><span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:openid-specs@lists.openid.net" style=3D"color: blue; =
text-decoration: underline; =
">openid-specs@lists.openid.net</a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>[OAUTH-WG] JSON Web Token =
(JWT) and JSON Web Signature (JWS) now in separate specs</span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; =
"><o:p></o:p></span></div></div></div></div><div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; ">As =
promised, I have split the contents of the JWT spec<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://self-issued.info/docs/draft-jones-json-web-token-01.html" =
style=3D"color: blue; text-decoration: underline; =
">draft-jones-json-web-token-01</a><span =
class=3D"apple-converted-space">&nbsp;</span>into two simpler =
specs:<o:p></o:p></span></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://self-issued.info/docs/draft-jones-json-web-token-02.html" =
style=3D"color: blue; text-decoration: underline; =
">draft-jones-json-web-token-02</a><o:p></o:p></span></div></div><div><div=
 style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://self-issued.info/docs/draft-jones-json-web-signature-00.htm=
l" style=3D"color: blue; text-decoration: underline; =
">draft-jones-json-web-signature-00</a><o:p></o:p></span></div></div><div>=
<div style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: =
0.0001pt; margin-left: 0in; font-size: 12pt; font-family: 'Times New =
Roman', serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; ">These should have introduced no semantic changes from the =
previous spec.<o:p></o:p></span></div></div><div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; ">I then =
applied the feedback that I received since JWT -01 and created revised =
versions of the split specs:<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://self-issued.info/docs/draft-jones-json-web-token-03.html" =
style=3D"color: blue; text-decoration: underline; =
">draft-jones-json-web-token-03</a><o:p></o:p></span></div></div><div><div=
 style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://self-issued.info/docs/draft-jones-json-web-signature-01.htm=
l" style=3D"color: blue; text-decoration: underline; =
">draft-jones-json-web-signature-01</a><o:p></o:p></span></div></div><div>=
<div style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: =
0.0001pt; margin-left: 0in; font-size: 12pt; font-family: 'Times New =
Roman', serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; ">The only breaking change introduced was that x5t (X.509 =
Certificate Thumbprint) is now a SHA-1 hash of the DER-encoded =
certificate, rather than a SHA-256 has, as SHA-1 is the prevailing =
existing practice for certificate thumbprint calculations.&nbsp; See the =
Document History sections for details on each change =
made.<o:p></o:p></span></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; =
">&nbsp;<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; ">.txt and =
.xml versions are also available.&nbsp; I plan to publish these as IETF =
drafts once the submission window re-opens on Monday.&nbsp; Feedback =
welcome!<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; =
">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- =
Mike<o:p></o:p></span></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; =
">&nbsp;<o:p></o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; ">P.S.&nbsp; =
Yes, work on the companion encryption spec is now under =
way=85<o:p></o:p></span></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; =
">&nbsp;<o:p></o:p></span></div></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
13.5pt; font-family: Helvetica, sans-serif; =
">_______________________________________________<br>Openid-specs-ab =
mailing list<br><a href=3D"mailto:Openid-specs-ab@lists.openid.net" =
style=3D"color: blue; text-decoration: underline; =
">Openid-specs-ab@lists.openid.net</a><br><a =
href=3D"http://lists.openid.net/mailman/listinfo/openid-specs-ab" =
style=3D"color: blue; text-decoration: underline; =
">http://lists.openid.net/mailman/listinfo/openid-specs-ab</a><o:p></o:p><=
/span></div></div></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div></div></div></span></blockquote></div><br><=
/div></body></html>=

--Apple-Mail-103-920142598--

--Apple-Mail-104-920142689
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail-104-920142689--

From eran@hueniverse.com  Mon Mar 28 15:26:58 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5839F3A6A83 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 15:26:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.64
X-Spam-Level: 
X-Spam-Status: No, score=-2.64 tagged_above=-999 required=5 tests=[AWL=-0.042,  BAYES_00=-2.599, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fMQ3dP+Qrnjb for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 15:26:56 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id B79763A679F for <oauth@ietf.org>; Mon, 28 Mar 2011 15:26:56 -0700 (PDT)
Received: (qmail 15523 invoked from network); 28 Mar 2011 22:28:34 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 28 Mar 2011 22:28:33 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Mon, 28 Mar 2011 15:28:24 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phil Hunt <phil.hunt@oracle.com>, Justin Richer <jricher@mitre.org>
Date: Mon, 28 Mar 2011 15:28:20 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvtjwnBOivM74XjSiCDC3GlMnA4dgAB8pwg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465643031F@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com> <A12B7D5A-F7B4-4DC8-A6D1-4C4ADB53B38C@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FFF1@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1301331909.1812.50.camel@ground> <90C41DD21FB7C64BB94121FBBC2E723446564302A3@P3PW5EX1MB01.EX1.SECURESERVER.NET> <5FD66B56-C6F2-435A-B5AA-FF7D6DE36005@oracle.com> <1301344626.1812.75.camel@ground> <8DB4FA9F-A6A3-4941-87D0-DF2775408F26@oracle.com>
In-Reply-To: <8DB4FA9F-A6A3-4941-87D0-DF2775408F26@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 22:26:58 -0000

The code is returned in two steps:

1. The authorization server replies to the user-agent request (providing au=
thorization) with a redirection instruction typically using the Location re=
sponse header field.
2. The user-agent makes an HTTP GET request to the provided location (which=
 may be something other than an HTTP URI, or an HTTP URI to localhost).

#1 is an HTTP response to a user-agent request to the authorization endpoin=
t (or a subsequent one if the server implementation has multiple authorizat=
ion steps).

#2 is an HTTP request made by the user-agent.

In order for the code to be secure end-to-end, both steps must use TLS. The=
 arguments made against making TLS required are based on use cases for #2. =
We can make #1 (the authorization endpoint require TLS since it already has=
 to support it for the 'token' response type. We should make callbacks a SH=
OULD for TLS.

Does this sound like a reasonable compromise?

EHL

> -----Original Message-----
> From: Phil Hunt [mailto:phil.hunt@oracle.com]
> Sent: Monday, March 28, 2011 2:28 PM
> To: Justin Richer
> Cc: Eran Hammer-Lahav; OAuth WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> This was referring to section 2.1 that the authorization server must use =
TLS
> when returning an authorization code.
>=20
> If it doesn't use TLS then the code being returned to the client can be
> intercepted.
>=20
> Or did I miss something?
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> On 2011-03-28, at 1:37 PM, Justin Richer wrote:
>=20
> > Phil,
> >
> > The main difference is that it's a requirement on the *client* instead
> > of the *provider* side of the equation, and clients aren't always even
> > speaking HTTP. I agree that all client web servers SHOULD do it. A
> > particular provider can even REQUIRE it for their registered clients,
> > a step that is outside the scope of OAuth. But there are real, in-use
> > patterns that don't require the client to make an HTTP request to an
> > external service.
> >
> > I don't see how Firesheep is relevant to this discussion -- if your
> > browser is making a call to localhost to get the token, who outside of
> > your machine is going to do it? I'm not talking about convenience for
> > developers here (which I would argue should NOT be discounted, but
> > that's another argument), I'm talking about cases where the browser
> > isn't going outside of a trusted security boundary. There are also
> > instances where there may not even be an HTTP transaction involved,
> > let alone one that could support TLS.
> >
> > -- Justin
> >
> > On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:
> >> Justin, How is that so? Remember firesheep?  I wouldn't want the
> authorization code being exchanged without TLS in a cafe. Intercept is ju=
st
> too easy. And as I mentioned earlier, client credentials are already very=
 weak
> in many cases. In contrast, two web servers are hard to sniff unless you =
are
> able to gain access to their network communications path.
> >>
> >> As for testing, it seems more reasonable to put servers in temporary n=
on-
> compliance while testing rather then allow non-secure servers in producti=
on
> because of the SHOULD loophole.
> >>
> >> Also, while it does seem convenient for the developer not to have to u=
se
> TLS for authz codes, note that the developer still has to have TLS enable=
d
> when exchanging the code for an access token. So I'm not sure how relaxin=
g
> TLS for obtaining authorization actually simplifies the developer lifecyc=
le since
> they still have to set it up to test the other parts.  In my view, it wou=
ld be ok
> for a developer to temporarily disable TLS everywhere during development =
-
> - which places operation outside RFC compliance while developing -- but
> forces compliance once they go into production.
> >>
> >> It seems like I had to give a pretty substantial justification and we =
backed
> off because TLS is seen as inconvenient. I think we need more evidence th=
at
> there are safe cases that don't need TLS.
> >>
> >> Sorry for pushing hard on this one, but TLS is the backbone of OAuth
> security at present.
> >>
> >> Phil
> >> phil.hunt@oracle.com
> >>
> >>
> >>
> >>
> >> On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:
> >>
> >>> No change then. But the security considerations section must reflect
> this.
> >>>
> >>> EHL
> >>>
> >>>> -----Original Message-----
> >>>> From: Justin Richer [mailto:jricher@mitre.org]
> >>>> Sent: Monday, March 28, 2011 10:05 AM
> >>>> To: Eran Hammer-Lahav
> >>>> Cc: Phil Hunt; OAuth WG
> >>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>>
> >>>> What about non-http return uri's, or client-localhost, such as
> >>>>
> >>>> someapp://app/?code=3Dfoo
> >>>>
> >>>> http://localhost:87345/?code=3Dfoo
> >>>>
> >>>> HTTPS makes sense when you're talking between two web servers, but
> >>>> it seems to fall apart otherwise. I think SHOULD is appropriate here=
.
> >>>>
> >>>> -- Justin
> >>>>
> >>>>
> >>>> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
> >>>>> Unless someone has an objection, I'll make the change from SHOULD
> >>>>> to
> >>>> MUST.
> >>>>>
> >>>>> EHL
> >>>>>
> >>>>>> -----Original Message-----
> >>>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
> >>>>>> Sent: Friday, March 25, 2011 12:42 PM
> >>>>>> To: Eran Hammer-Lahav
> >>>>>> Cc: OAuth WG; Chuck & Mara Mortimore
> >>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>>>>
> >>>>>> Regarding the message: http://www.ietf.org/mail-
> >>>>>> archive/web/oauth/current/msg05762.html  (sorry I somehow lost
> >>>>>> the message in my email).
> >>>>>>
> >>>>>> This issue is theft of the authorization code during the redirect.
> >>>>>> Authenticating the client is an important feature and goes a long
> >>>>>> way, but it is not sufficient since in many cases, the
> >>>>>> client_id/client_secret will likely be hard coded and relatively
> >>>>>> easy to deduce (e.g. mobile client apps).  Of course a strong
> >>>>>> client authentication won't have this issue. This makes many
> >>>>>> consumer situations very susceptible to an attack where the
> >>>>>> authorization code is
> >>>> intercepted.
> >>>>>>
> >>>>>> For more information look at the SAML Artifact issues in section
> >>>>>> 6.5 (specifically stolen artifact, replay, etc) of this document:
> >>>>>> http://docs.oasis-
> >>>>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
> >>>>>>
> >>>>>> There are a number of remediations suggested (small lifetime,
> >>>>>> single use), but the foundational one is confidentiality of the
> >>>>>> exchange (TLS). Hence the recommendation that the return of an
> >>>>>> authorization code be kept secure with a MUST for TLS.
> >>>>>>
> >>>>>> Phil
> >>>>>> phil.hunt@oracle.com
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
> >>>>>>
> >>>>>>>
> >>>>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
> >>>>>> <eran@hueniverse.com> wrote:
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> -----Original Message-----
> >>>>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-
> bounces@ietf.org]
> >>>>>>>>> On Behalf Of Chuck Mortimore
> >>>>>>>>> Sent: Monday, March 14, 2011 6:10 PM
> >>>>>>>>
> >>>>>>>>> 1) I'd vote for dropping the following from 1.4.2.   In turn I'=
d
> discuss
> >>>> some
> >>>>>> of
> >>>>>>>>> the security considerations, such as difficulty of protecting
> >>>>>>>>> a client_secret in almost all use-cases of this profile.
> >>>>>>>>>
> >>>>>>>>>  "Implicit grants improve the responsiveness and efficiency of
> >>>>>>>>> some clients (such as a client implemented as an in-browser
> >>>>>>>>> application) since it reduces the number of round trips
> >>>>>>>>> required to obtain an access token."
> >>>>>>>>
> >>>>>>>> Why drop it? What about it isn't accurate?
> >>>>>>>
> >>>>>>> It's accurate, but my opinion is it sends the wrong message.   It=
's
> clearly
> >>>> the
> >>>>>> less secure of the response types.  By positioning it as the most
> >>>>>> performant people may find that attractive and make the wrong
> >>>>>> security
> >>>> decision.
> >>>>>>>
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
> >>>>>>>>
> >>>>>>>> Why? What's the attack vector?
> >>>>>>>
> >>>>>>> See Phils comment on past experience with artifact bindings.
> >>>>>>> Spec should
> >>>>>> default for security always on, and let deployments that don't
> >>>>>> want to use HTTPs simply be non-conformant.
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is
> >>>>>>>>> REQUIRED since in 4.1.1 it's "REQUIRED unless"
> >>>>>>>>
> >>>>>>>> The client should always confirm where the code was sent to. It
> >>>>>>>> can omit
> >>>>>> the redirection is one was provided but should tell the server
> >>>>>> where it went to. This is more consistent on the verification
> >>>>>> side, but if the original flow designers want to chime in (Dick,
> >>>>>> Brian, etc.?), I'm open
> >>>> to change this.
> >>>>>>>>
> >>>>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?     I assume
> this
> >>>> goes
> >>>>>>>>> back to disagreement on how best to handle native clients. I'd
> >>>>>>>>> prefer it to simply reference 5.1 and leave what is issued up
> >>>>>>>>> to the security profile of the particular deployment as to what=
 is
> issued.
> >>>>>>>>
> >>>>>>>> -08 June 2010.
> >>>>>>>>
> >>>>>>>> This has been decided for a long time. I'm not eager to change i=
t.
> >>>>>>>
> >>>>>>> Thanks - I can live with it.  Unfortunately we still seem to be
> >>>>>>> fragmenting on
> >>>>>> the native client approach.   Good topic for IIW I suspect
> >>>>>>>
> >>>>>>> -cmort
> >>>>>>>
> >>>>>>>>
> >>>>>>>> EHL
> >>>>>>>>
> >>>>>>>>
> >>>>>>> _______________________________________________
> >>>>>>> OAuth mailing list
> >>>>>>> OAuth@ietf.org
> >>>>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>>
> >>>>> _______________________________________________
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>
> >>>
> >>
> >
> >


From phil.hunt@oracle.com  Mon Mar 28 15:30:22 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 085933A6A7F for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 15:30:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.565
X-Spam-Level: 
X-Spam-Status: No, score=-6.565 tagged_above=-999 required=5 tests=[AWL=0.033,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KUMtjYVs7DHO for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 15:30:20 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 36CDE3A65A5 for <oauth@ietf.org>; Mon, 28 Mar 2011 15:30:20 -0700 (PDT)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2SMVtJu007912 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 28 Mar 2011 22:31:57 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by rcsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2SMVsEs022737 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 28 Mar 2011 22:31:55 GMT
Received: from abhmt007.oracle.com (abhmt007.oracle.com [141.146.116.16]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2SMVs5X010529; Mon, 28 Mar 2011 17:31:54 -0500
Received: from [192.168.1.8] (/24.87.204.3) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 28 Mar 2011 15:31:53 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465643031F@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Mon, 28 Mar 2011 15:31:51 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <DCCA29B3-E541-4A0C-8473-587A758B71F1@oracle.com>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <C9A40A87.1603D%cmortimore@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE87@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F3A0FBB5-A817-40BF-8A65-83FB335E93B6@salesforce.com> <A12B7D5A-F7B4-4DC8-A6D1-4C4ADB53B38C@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FFF1@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1301331909.1812.50.camel@ground> <90C41DD21FB7C64BB94121FBBC2E723446564302A3@P3PW5EX1MB01.EX1.SECURESERVER.NET> <5FD66B56-C6F2-435A-B5AA-FF7D6DE36005@oracle.com> <1301344626.1812.75.camel@ground> <8DB4FA9F-A6A3-4941-87D0-DF2775408F26@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234465643031F@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt358.oracle.com [141.146.40.158]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090203.4D910C5B.0074,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 22:30:22 -0000

Thanks for the clarification.  Yes, the compromise makes sense.

Phil
phil.hunt@oracle.com




On 2011-03-28, at 3:28 PM, Eran Hammer-Lahav wrote:

> The code is returned in two steps:
>=20
> 1. The authorization server replies to the user-agent request =
(providing authorization) with a redirection instruction typically using =
the Location response header field.
> 2. The user-agent makes an HTTP GET request to the provided location =
(which may be something other than an HTTP URI, or an HTTP URI to =
localhost).
>=20
> #1 is an HTTP response to a user-agent request to the authorization =
endpoint (or a subsequent one if the server implementation has multiple =
authorization steps).
>=20
> #2 is an HTTP request made by the user-agent.
>=20
> In order for the code to be secure end-to-end, both steps must use =
TLS. The arguments made against making TLS required are based on use =
cases for #2. We can make #1 (the authorization endpoint require TLS =
since it already has to support it for the 'token' response type. We =
should make callbacks a SHOULD for TLS.
>=20
> Does this sound like a reasonable compromise?
>=20
> EHL
>=20
>> -----Original Message-----
>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
>> Sent: Monday, March 28, 2011 2:28 PM
>> To: Justin Richer
>> Cc: Eran Hammer-Lahav; OAuth WG
>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>=20
>> This was referring to section 2.1 that the authorization server must =
use TLS
>> when returning an authorization code.
>>=20
>> If it doesn't use TLS then the code being returned to the client can =
be
>> intercepted.
>>=20
>> Or did I miss something?
>>=20
>> Phil
>> phil.hunt@oracle.com
>>=20
>>=20
>>=20
>>=20
>> On 2011-03-28, at 1:37 PM, Justin Richer wrote:
>>=20
>>> Phil,
>>>=20
>>> The main difference is that it's a requirement on the *client* =
instead
>>> of the *provider* side of the equation, and clients aren't always =
even
>>> speaking HTTP. I agree that all client web servers SHOULD do it. A
>>> particular provider can even REQUIRE it for their registered =
clients,
>>> a step that is outside the scope of OAuth. But there are real, =
in-use
>>> patterns that don't require the client to make an HTTP request to an
>>> external service.
>>>=20
>>> I don't see how Firesheep is relevant to this discussion -- if your
>>> browser is making a call to localhost to get the token, who outside =
of
>>> your machine is going to do it? I'm not talking about convenience =
for
>>> developers here (which I would argue should NOT be discounted, but
>>> that's another argument), I'm talking about cases where the browser
>>> isn't going outside of a trusted security boundary. There are also
>>> instances where there may not even be an HTTP transaction involved,
>>> let alone one that could support TLS.
>>>=20
>>> -- Justin
>>>=20
>>> On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:
>>>> Justin, How is that so? Remember firesheep?  I wouldn't want the
>> authorization code being exchanged without TLS in a cafe. Intercept =
is just
>> too easy. And as I mentioned earlier, client credentials are already =
very weak
>> in many cases. In contrast, two web servers are hard to sniff unless =
you are
>> able to gain access to their network communications path.
>>>>=20
>>>> As for testing, it seems more reasonable to put servers in =
temporary non-
>> compliance while testing rather then allow non-secure servers in =
production
>> because of the SHOULD loophole.
>>>>=20
>>>> Also, while it does seem convenient for the developer not to have =
to use
>> TLS for authz codes, note that the developer still has to have TLS =
enabled
>> when exchanging the code for an access token. So I'm not sure how =
relaxing
>> TLS for obtaining authorization actually simplifies the developer =
lifecycle since
>> they still have to set it up to test the other parts.  In my view, it =
would be ok
>> for a developer to temporarily disable TLS everywhere during =
development -
>> - which places operation outside RFC compliance while developing -- =
but
>> forces compliance once they go into production.
>>>>=20
>>>> It seems like I had to give a pretty substantial justification and =
we backed
>> off because TLS is seen as inconvenient. I think we need more =
evidence that
>> there are safe cases that don't need TLS.
>>>>=20
>>>> Sorry for pushing hard on this one, but TLS is the backbone of =
OAuth
>> security at present.
>>>>=20
>>>> Phil
>>>> phil.hunt@oracle.com
>>>>=20
>>>>=20
>>>>=20
>>>>=20
>>>> On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:
>>>>=20
>>>>> No change then. But the security considerations section must =
reflect
>> this.
>>>>>=20
>>>>> EHL
>>>>>=20
>>>>>> -----Original Message-----
>>>>>> From: Justin Richer [mailto:jricher@mitre.org]
>>>>>> Sent: Monday, March 28, 2011 10:05 AM
>>>>>> To: Eran Hammer-Lahav
>>>>>> Cc: Phil Hunt; OAuth WG
>>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>>>>=20
>>>>>> What about non-http return uri's, or client-localhost, such as
>>>>>>=20
>>>>>> someapp://app/?code=3Dfoo
>>>>>>=20
>>>>>> http://localhost:87345/?code=3Dfoo
>>>>>>=20
>>>>>> HTTPS makes sense when you're talking between two web servers, =
but
>>>>>> it seems to fall apart otherwise. I think SHOULD is appropriate =
here.
>>>>>>=20
>>>>>> -- Justin
>>>>>>=20
>>>>>>=20
>>>>>> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
>>>>>>> Unless someone has an objection, I'll make the change from =
SHOULD
>>>>>>> to
>>>>>> MUST.
>>>>>>>=20
>>>>>>> EHL
>>>>>>>=20
>>>>>>>> -----Original Message-----
>>>>>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
>>>>>>>> Sent: Friday, March 25, 2011 12:42 PM
>>>>>>>> To: Eran Hammer-Lahav
>>>>>>>> Cc: OAuth WG; Chuck & Mara Mortimore
>>>>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>>>>>>=20
>>>>>>>> Regarding the message: http://www.ietf.org/mail-
>>>>>>>> archive/web/oauth/current/msg05762.html  (sorry I somehow lost
>>>>>>>> the message in my email).
>>>>>>>>=20
>>>>>>>> This issue is theft of the authorization code during the =
redirect.
>>>>>>>> Authenticating the client is an important feature and goes a =
long
>>>>>>>> way, but it is not sufficient since in many cases, the
>>>>>>>> client_id/client_secret will likely be hard coded and =
relatively
>>>>>>>> easy to deduce (e.g. mobile client apps).  Of course a strong
>>>>>>>> client authentication won't have this issue. This makes many
>>>>>>>> consumer situations very susceptible to an attack where the
>>>>>>>> authorization code is
>>>>>> intercepted.
>>>>>>>>=20
>>>>>>>> For more information look at the SAML Artifact issues in =
section
>>>>>>>> 6.5 (specifically stolen artifact, replay, etc) of this =
document:
>>>>>>>> http://docs.oasis-
>>>>>>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
>>>>>>>>=20
>>>>>>>> There are a number of remediations suggested (small lifetime,
>>>>>>>> single use), but the foundational one is confidentiality of the
>>>>>>>> exchange (TLS). Hence the recommendation that the return of an
>>>>>>>> authorization code be kept secure with a MUST for TLS.
>>>>>>>>=20
>>>>>>>> Phil
>>>>>>>> phil.hunt@oracle.com
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>>=20
>>>>>>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
>>>>>>>>=20
>>>>>>>>>=20
>>>>>>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
>>>>>>>> <eran@hueniverse.com> wrote:
>>>>>>>>>=20
>>>>>>>>>>=20
>>>>>>>>>>> -----Original Message-----
>>>>>>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-
>> bounces@ietf.org]
>>>>>>>>>>> On Behalf Of Chuck Mortimore
>>>>>>>>>>> Sent: Monday, March 14, 2011 6:10 PM
>>>>>>>>>>=20
>>>>>>>>>>> 1) I'd vote for dropping the following from 1.4.2.   In turn =
I'd
>> discuss
>>>>>> some
>>>>>>>> of
>>>>>>>>>>> the security considerations, such as difficulty of =
protecting
>>>>>>>>>>> a client_secret in almost all use-cases of this profile.
>>>>>>>>>>>=20
>>>>>>>>>>> "Implicit grants improve the responsiveness and efficiency =
of
>>>>>>>>>>> some clients (such as a client implemented as an in-browser
>>>>>>>>>>> application) since it reduces the number of round trips
>>>>>>>>>>> required to obtain an access token."
>>>>>>>>>>=20
>>>>>>>>>> Why drop it? What about it isn't accurate?
>>>>>>>>>=20
>>>>>>>>> It's accurate, but my opinion is it sends the wrong message.   =
It's
>> clearly
>>>>>> the
>>>>>>>> less secure of the response types.  By positioning it as the =
most
>>>>>>>> performant people may find that attractive and make the wrong
>>>>>>>> security
>>>>>> decision.
>>>>>>>>>=20
>>>>>>>>>=20
>>>>>>>>>>=20
>>>>>>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization =
Code.
>>>>>>>>>>=20
>>>>>>>>>> Why? What's the attack vector?
>>>>>>>>>=20
>>>>>>>>> See Phils comment on past experience with artifact bindings.
>>>>>>>>> Spec should
>>>>>>>> default for security always on, and let deployments that don't
>>>>>>>> want to use HTTPs simply be non-conformant.
>>>>>>>>>=20
>>>>>>>>>>=20
>>>>>>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is
>>>>>>>>>>> REQUIRED since in 4.1.1 it's "REQUIRED unless"
>>>>>>>>>>=20
>>>>>>>>>> The client should always confirm where the code was sent to. =
It
>>>>>>>>>> can omit
>>>>>>>> the redirection is one was provided but should tell the server
>>>>>>>> where it went to. This is more consistent on the verification
>>>>>>>> side, but if the original flow designers want to chime in =
(Dick,
>>>>>>>> Brian, etc.?), I'm open
>>>>>> to change this.
>>>>>>>>>>=20
>>>>>>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?     I =
assume
>> this
>>>>>> goes
>>>>>>>>>>> back to disagreement on how best to handle native clients. =
I'd
>>>>>>>>>>> prefer it to simply reference 5.1 and leave what is issued =
up
>>>>>>>>>>> to the security profile of the particular deployment as to =
what is
>> issued.
>>>>>>>>>>=20
>>>>>>>>>> -08 June 2010.
>>>>>>>>>>=20
>>>>>>>>>> This has been decided for a long time. I'm not eager to =
change it.
>>>>>>>>>=20
>>>>>>>>> Thanks - I can live with it.  Unfortunately we still seem to =
be
>>>>>>>>> fragmenting on
>>>>>>>> the native client approach.   Good topic for IIW I suspect
>>>>>>>>>=20
>>>>>>>>> -cmort
>>>>>>>>>=20
>>>>>>>>>>=20
>>>>>>>>>> EHL
>>>>>>>>>>=20
>>>>>>>>>>=20
>>>>>>>>> _______________________________________________
>>>>>>>>> OAuth mailing list
>>>>>>>>> OAuth@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>=20
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>=20
>>>>>=20
>>>>=20
>>>=20
>>>=20
>=20


From James.H.Manger@team.telstra.com  Mon Mar 28 16:38:22 2011
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1D0793A6A8B for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 16:38:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.625
X-Spam-Level: 
X-Spam-Status: No, score=-0.625 tagged_above=-999 required=5 tests=[AWL=0.276,  BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 70RSZlKebTWY for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 16:38:21 -0700 (PDT)
Received: from ipxbvo.tcif.telstra.com.au (ipxbvo.tcif.telstra.com.au [203.35.135.204]) by core3.amsl.com (Postfix) with ESMTP id A5DE23A6A74 for <oauth@ietf.org>; Mon, 28 Mar 2011 16:38:19 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.63,258,1299416400"; d="scan'208";a="29185881"
Received: from unknown (HELO ipcavi.tcif.telstra.com.au) ([10.97.217.200]) by ipobvi.tcif.telstra.com.au with ESMTP; 29 Mar 2011 10:39:55 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6299"; a="22468045"
Received: from wsmsg3701.srv.dir.telstra.com ([172.49.40.169]) by ipcavi.tcif.telstra.com.au with ESMTP; 29 Mar 2011 10:39:55 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by WSMSG3701.srv.dir.telstra.com ([172.49.40.169]) with mapi; Tue, 29 Mar 2011 10:39:54 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: Justin Richer <jricher@mitre.org>, "oauth@ietf.org" <oauth@ietf.org>
Date: Tue, 29 Mar 2011 10:39:52 +1100
Thread-Topic: [OAUTH-WG] Authorization grant abstraction
Thread-Index: AcvtZ/xbg6YGDTZSRkynji4XiNlGtAAM3Rkw
Message-ID: <255B9BB34FB7D647A506DC292726F6E112815DBF60@WSMSG3153V.srv.dir.telstra.com>
References: <255B9BB34FB7D647A506DC292726F6E1127FF61216@WSMSG3153V.srv.dir.telstra.com> <1301331087.1812.48.camel@ground>
In-Reply-To: <1301331087.1812.48.camel@ground>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Authorization grant abstraction
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2011 23:38:22 -0000
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From James.H.Manger@team.telstra.com  Mon Mar 28 22:55:42 2011
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DF9313A6812 for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 22:55:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.635
X-Spam-Level: 
X-Spam-Status: No, score=-0.635 tagged_above=-999 required=5 tests=[AWL=0.265,  BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, HTML_MESSAGE=0.001, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kYiaVzdRN2Ne for <oauth@core3.amsl.com>; Mon, 28 Mar 2011 22:55:36 -0700 (PDT)
Received: from ipxano.tcif.telstra.com.au (ipxano.tcif.telstra.com.au [203.35.82.200]) by core3.amsl.com (Postfix) with ESMTP id 3FE613A67EF for <oauth@ietf.org>; Mon, 28 Mar 2011 22:55:34 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.63,259,1299416400"; d="scan'208,217";a="32706968"
Received: from unknown (HELO ipcbni.tcif.telstra.com.au) ([10.97.216.204]) by ipoani.tcif.telstra.com.au with ESMTP; 29 Mar 2011 16:57:11 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6299"; a="22565317"
Received: from wsmsg3701.srv.dir.telstra.com ([172.49.40.169]) by ipcbni.tcif.telstra.com.au with ESMTP; 29 Mar 2011 16:57:11 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by WSMSG3701.srv.dir.telstra.com ([172.49.40.169]) with mapi; Tue, 29 Mar 2011 16:57:10 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Tue, 29 Mar 2011 16:57:09 +1100
Thread-Topic: Comments on draft-lodderstedt-oauth-security
Thread-Index: Acvt1iQ9THhtgqwhT5uef/qRzxHmhQ==
Message-ID: <255B9BB34FB7D647A506DC292726F6E112815DCA7B@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: multipart/alternative; boundary="_000_255B9BB34FB7D647A506DC292726F6E112815DCA7BWSMSG3153Vsrv_"
MIME-Version: 1.0
Subject: [OAUTH-WG] Comments on draft-lodderstedt-oauth-security
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 05:55:43 -0000

--_000_255B9BB34FB7D647A506DC292726F6E112815DCA7BWSMSG3153Vsrv_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

A few comments on parts of the OAuth 2.0 Threat Model and Security Consider=
ations:



*         [2.1. Scope] "Resource server URLs are static and well-known at d=
evelopment time" is a very strong assumption. It eliminates much of the val=
ue of having an OAuth standard (reducing it to aiding some shared code betw=
een service-provider libraries). Does a "static and well-known" resource th=
at redirects elsewhere, or includes links to other resources still meet thi=
s assumption?

*         [3.1. Tokens] An "authorization code" doesn't have to be a "handl=
e token". It could be an "assertion".

*         [3.1. Tokens] A token is called "opaque" when the client app (not=
 the resource server) doesn't need to know anything about its internal stru=
cture.

*         [3.1. Tokens] "MAC" stands for "Message Authentication Code", not=
 "Mutual Authentication". In fact, there is no mutual authentication in the=
 MAC HTTP authentication scheme.

*         [3.5. Redirect-URI] A client's redirect URI does not have to be p=
re-registered - that is just a policy choice by some services. I don't thin=
k pre-registration helps much when using a web server flow as the redirect-=
URI is repeated in the client-authenticated request for an access token.

*         [3.6. Access Token] Using POST cannot "ensure no logging". A best=
, it minimizes the risk of sensitive values appearing in the authz server's=
 logs. A cache-control header can avoid caching regardless of the HTTP meth=
od.

*         [3.6. Access Token] A short lifetime for a token doesn't "enable =
the possibility of revocation". It almost does the opposite. It can reduce =
the need to have any revocation mechanism - you can just wait for the token=
's to expire instead.

*         [3.8. Client Authentication] The "client id" is not used to colla=
te a user-authz request and a client request for an access token - the auth=
orization code links those. Similarly, it is the "refresh token", not the "=
client id", that links an initial token request to subsequent renewals.

*         [3.8 Client Authentication] The "client id" cannot be used to dif=
ferentiate user access and client-on-behalf-of-a-user access since it is no=
t sent in either case. Only the access token is sent in the latter case.



There are quite a few "tokens" in OAuth2 (access token, refresh token, code=
, state...) that have two purposes: to bind flows together; and to transfer=
 state via another party. More prominent advice about the required security=
 properties of these tokens would help.

When a service chooses to use a handle as a token 5.1.5.11 does say it need=
s high entropy, but then gives maximum allowed probabilities of two authori=
zation codes colliding (<=3D 2^-128 or <=3D 2^-160). It might be more helpf=
ul to say "22 randomly-chosen characters from the base64url alphabet (or th=
e base64url-encoding of 16 randomly-chosen bytes) would be a suitable choic=
e for a handle".

I don't think there is any advice for tokens that are assertions, not handl=
es. These need a MAC, but also various other fields such as: a key id (so y=
ou can smoothly change keys); date; audience; etc. It is definitely would s=
tating that encryption without a MAC is NOT sufficient. Perhaps the best ad=
vice is to suggest services adopt a standard assertion format (such as SAML=
 or JWT) if they want to use assertions.





Typos:

*         [2.3.2. Resource Server] Change "on the authorization server" to =
"on the resource server" in the 1st sentence.

*         [2.3.3. Client] Change "on the authorization server" to "on the c=
lient" in the 1st sentence.



--

James Manger




--_000_255B9BB34FB7D647A506DC292726F6E112815DCA7BWSMSG3153Vsrv_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle18
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
 /* List Definitions */
 @list l0
	{mso-list-id:1194422316;
	mso-list-type:hybrid;
	mso-list-template-ids:-994548994 457998154 201916419 201916421 201916417 2=
01916419 201916421 201916417 201916419 201916421;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-tab-stop:72.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level3
	{mso-level-tab-stop:108.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level4
	{mso-level-tab-stop:144.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level5
	{mso-level-tab-stop:180.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level6
	{mso-level-tab-stop:216.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level7
	{mso-level-tab-stop:252.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level8
	{mso-level-tab-stop:288.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level9
	{mso-level-tab-stop:324.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l1
	{mso-list-id:1831749355;
	mso-list-type:hybrid;
	mso-list-template-ids:-696073774 201916417 201916419 201916421 201916417 2=
01916419 201916421 201916417 201916419 201916421;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
-->
</style><!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-AU" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">A few comments on parts of the OAuth 2.0 Threat Mode=
l and Security Considerations:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>[2.1. Scope] &#8220;Resource server URLs are=
 static and well-known at development time&#8221; is a very strong assumpti=
on. It eliminates much of the value of having an OAuth standard (reducing i=
t to aiding some shared code between service-provider
 libraries). Does a &#8220;static and well-known&#8221; resource that redir=
ects elsewhere, or includes links to other resources still meet this assump=
tion?<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>[3.1. Tokens] An &#8220;authorization code&#=
8221; doesn&#8217;t have to be a &#8220;handle token&#8221;. It could be an=
 &#8220;assertion&#8221;.<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>[3.1. Tokens] A token is called &#8220;opaqu=
e&#8221; when the client app (not the resource server) doesn&#8217;t need t=
o know anything about its internal structure.<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>[3.1. Tokens] &#8220;MAC&#8221; stands for &=
#8220;Message Authentication Code&#8221;, not &#8220;Mutual Authentication&=
#8221;. In fact, there is no mutual authentication in the MAC HTTP authenti=
cation scheme.<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>[3.5. Redirect-URI] A client&#8217;s redirec=
t URI does not have to be pre-registered &#8211; that is just a policy choi=
ce by some services. I don&#8217;t think pre-registration helps much when u=
sing a web server flow as the redirect-URI is repeated
 in the client-authenticated request for an access token.<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>[3.6. Access Token] Using POST cannot &#8220=
;ensure no logging&#8221;. A best, it minimizes the risk of sensitive value=
s appearing in the authz server&#8217;s logs. A cache-control header can av=
oid caching regardless of the HTTP method.<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>[3.6. Access Token] A short lifetime for a t=
oken doesn&#8217;t &#8220;enable the possibility of revocation&#8221;. It a=
lmost does the opposite. It can reduce the need to have any revocation mech=
anism &#8211; you can just wait for the token&#8217;s to expire
 instead.<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>[3.8. Client Authentication] The &#8220;clie=
nt id&#8221; is not used to collate a user-authz request and a client reque=
st for an access token &#8211; the authorization code links those. Similarl=
y, it is the &#8220;refresh token&#8221;, not the &#8220;client id&#8221;,
 that links an initial token request to subsequent renewals.<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo2"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>[3.8 Client Authentication] The &#8220;clien=
t id&#8221; cannot be used to differentiate user access and client-on-behal=
f-of-a-user access since it is not sent in either case. Only the access tok=
en is sent in the latter case.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">There are quite a few &#8220;tokens&#8221; in OAuth2=
 (access token, refresh token, code, state&#8230;) that have two purposes: =
to bind flows together; and to transfer state via another party. More promi=
nent advice about the required security properties of
 these tokens would help.<o:p></o:p></p>
<p class=3D"MsoNormal">When a service chooses to use a handle as a token 5.=
1.5.11 does say it needs high entropy, but then gives maximum allowed proba=
bilities of two authorization codes colliding (&lt;=3D 2^-128 or &lt;=3D 2^=
-160). It might be more helpful to say &#8220;22 randomly-chosen
 characters from the base64url alphabet (or the base64url-encoding of 16 ra=
ndomly-chosen bytes) would be a suitable choice for a handle&#8221;.<o:p></=
o:p></p>
<p class=3D"MsoNormal">I don&#8217;t think there is any advice for tokens t=
hat are assertions, not handles. These need a MAC, but also various other f=
ields such as: a key id (so you can smoothly change keys); date; audience; =
etc. It is definitely would stating that
 encryption without a MAC is NOT sufficient. Perhaps the best advice is to =
suggest services adopt a standard assertion format (such as SAML or JWT) if=
 they want to use assertions.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Typos:<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l1 leve=
l1 lfo3"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>[2.3.2. Resource Server] Change &#8220;on th=
e authorization server&#8221; to &#8220;on the resource server&#8221; in th=
e 1<sup>st</sup> sentence.<o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l1 leve=
l1 lfo3"><![if !supportLists]><span style=3D"font-family:Symbol"><span styl=
e=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Rom=
an&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]>[2.3.3. Client] Change &#8220;on the authori=
zation server&#8221; to &#8220;on the client&#8221; in the 1<sup>st</sup> s=
entence.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">--<o:p></o:p></p>
<p class=3D"MsoNormal">James Manger<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_255B9BB34FB7D647A506DC292726F6E112815DCA7BWSMSG3153Vsrv_--

From tonynad@microsoft.com  Tue Mar 29 03:59:13 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AD35B3A693E for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 03:59:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.386
X-Spam-Level: 
X-Spam-Status: No, score=-7.386 tagged_above=-999 required=5 tests=[AWL=0.080,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VRBxtOQWmtDd for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 03:59:09 -0700 (PDT)
Received: from smtp.microsoft.com (mailb.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id DD3303A68D4 for <oauth@ietf.org>; Tue, 29 Mar 2011 03:59:08 -0700 (PDT)
Received: from TK5EX14HUBC101.redmond.corp.microsoft.com (157.54.7.153) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Tue, 29 Mar 2011 04:00:45 -0700
Received: from VA3EHSOBE007.bigfish.com (157.54.51.80) by mail.microsoft.com (157.54.7.153) with Microsoft SMTP Server (TLS) id 14.1.270.2; Tue, 29 Mar 2011 04:00:45 -0700
Received: from mail154-va3-R.bigfish.com (10.7.14.235) by VA3EHSOBE007.bigfish.com (10.7.40.11) with Microsoft SMTP Server id 14.1.225.8; Tue, 29 Mar 2011 11:00:44 +0000
Received: from mail154-va3 (localhost.localdomain [127.0.0.1])	by mail154-va3-R.bigfish.com (Postfix) with ESMTP id B8EC31238286	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Tue, 29 Mar 2011 11:00:44 +0000 (UTC)
X-SpamScore: -44
X-BigFish: PS-44(zb3fPz1432N9371PzzdafM1202h1082kzz1033IL8275bh8275dhz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT002.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail154-va3 (localhost.localdomain [127.0.0.1]) by mail154-va3 (MessageSwitch) id 1301396444380485_4391; Tue, 29 Mar 2011 11:00:44 +0000 (UTC)
Received: from VA3EHSMHS029.bigfish.com (unknown [10.7.14.242])	by mail154-va3.bigfish.com (Postfix) with ESMTP id 569D471004E; Tue, 29 Mar 2011 11:00:44 +0000 (UTC)
Received: from SN1PRD0302HT002.namprd03.prod.outlook.com (65.55.94.9) by VA3EHSMHS029.bigfish.com (10.7.99.39) with Microsoft SMTP Server (TLS) id 14.1.225.8; Tue, 29 Mar 2011 11:00:38 +0000
Received: from SN1PRD0302MB097.namprd03.prod.outlook.com ([169.254.8.181]) by SN1PRD0302HT002.namprd03.prod.outlook.com ([10.14.149.46]) with mapi id 14.01.0225.027; Tue, 29 Mar 2011 11:00:36 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>, Eran Hammer-Lahav <eran@hueniverse.com>, OAuth Mailing List <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF
Thread-Index: AQHL7PG+zA1yVvIVsUGXmm0sw6AyUJREJj2A
Date: Tue, 29 Mar 2011 11:00:36 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E71095FCDF@SN1PRD0302MB097.namprd03.prod.outlook.com>
References: <255B9BB34FB7D647A506DC292726F6E1127DCD2142@WSMSG3153V.srv.dir.telstra.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE30@P3PW5EX1MB01.EX1.SECURESERVER.NET> <255B9BB34FB7D647A506DC292726F6E11280EBEBC8@WSMSG3153V.srv.dir.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E11280EBEBC8@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [130.129.20.209]
Content-Type: multipart/alternative; boundary="_000_B26C1EF377CB694EAB6BDDC8E624B6E71095FCDFSN1PRD0302MB097_"
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT002.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%TEAM.TELSTRA.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%HUENIVERSE.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14HUBC101.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC101.redmond.corp.microsoft.com
Subject: Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 10:59:13 -0000

--_000_B26C1EF377CB694EAB6BDDC8E624B6E71095FCDFSN1PRD0302MB097_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

> OAuth issues security tokens without indicating where they can be safely =
used. While that fatal flaw remains, it is pointless to specify the use of =
the Origin header.

I don't think anything should be in the base as the different token profile=
s can stipulate the audience.

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of M=
anger, James H
Sent: Sunday, March 27, 2011 7:42 PM
To: Eran Hammer-Lahav; OAuth Mailing List
Subject: Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat lo=
gin CSRF

>> Q. Should an OAuth client app list the authorization server in the Origi=
n header of requests to resource servers?

> Was there any conclusion?

My conclusion is that the Origin request header is the right place to list =
the OAuth authorization server to combat login CSRF attacks against apps.

The other conclusion was that you probably need fairly sophisticated & gene=
ral (almost browser-like) apps for these attacks to work. OAuth is not frie=
ndly to such uses (client passwords; SHOULD pre-register redirect URI; no d=
iscovery...).

OAuth issues security tokens without indicating where they can be safely us=
ed. While that fatal flaw remains, it is pointless to specify the use of th=
e Origin header.

The good news is that apps, services, or future specs can use the Origin he=
ader (listing the authorization server) without breaking any other parts of=
 OAuth.

--
James Manger

--_000_B26C1EF377CB694EAB6BDDC8E624B6E71095FCDFSN1PRD0302MB097_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&gt;</span><span style=
=3D"color:#1F497D">
<span lang=3D"EN-AU">OAuth issues security tokens without indicating where =
they can be safely used. While that fatal flaw remains, it is pointless to =
specify the use of the Origin header.<o:p></o:p></span></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D">I don&#=
8217;t think anything should be in the base as the different token profiles=
 can stipulate the audience.</span><span style=3D"color:#1F497D"><o:p></o:p=
></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Manger, James H<br>
<b>Sent:</b> Sunday, March 27, 2011 7:42 PM<br>
<b>To:</b> Eran Hammer-Lahav; OAuth Mailing List<br>
<b>Subject:</b> Re: [OAUTH-WG] Indicating origin of OAuth credentials to co=
mbat login CSRF<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU">&gt;&gt; Q. Should an OAuth cli=
ent app list the authorization server in the Origin header of requests to r=
esource servers?<span style=3D"color:#1F497D"><o:p></o:p></span></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D">&gt; </=
span><span style=3D"color:#1F497D">Was there any conclusion?<o:p></o:p></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D">My conc=
lusion is that the Origin request header is the right place to list the OAu=
th authorization server to combat login CSRF attacks against apps.<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D">The oth=
er conclusion was that you probably need fairly sophisticated &amp; general=
 (almost browser-like) apps for these attacks to work. OAuth is not friendl=
y to such uses (client passwords; SHOULD pre-register
 redirect URI; no discovery&#8230;).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D">OAuth i=
ssues security tokens without indicating where they can be safely used. Whi=
le that fatal flaw remains, it is pointless to specify the use of the Origi=
n header.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D">The goo=
d news is that apps, services, or future specs can use the Origin header (l=
isting the authorization server) without breaking any other parts of OAuth.=
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D">--<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#1F497D">James M=
anger<o:p></o:p></span></p>
</div>
</div>
</body>
</html>

--_000_B26C1EF377CB694EAB6BDDC8E624B6E71095FCDFSN1PRD0302MB097_--

From stpeter@stpeter.im  Tue Mar 29 04:56:36 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 568313A67D4 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 04:56:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.437
X-Spam-Level: 
X-Spam-Status: No, score=-102.437 tagged_above=-999 required=5 tests=[AWL=0.162, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h-Xc7a3a0Vwo for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 04:56:35 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 26DD23A67C3 for <oauth@ietf.org>; Tue, 29 Mar 2011 04:56:35 -0700 (PDT)
Received: from dhcp-12cb.meeting.ietf.org (unknown [130.129.18.203]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 69F5240022 for <oauth@ietf.org>; Tue, 29 Mar 2011 05:59:53 -0600 (MDT)
Message-ID: <4D91C94E.2030407@stpeter.im>
Date: Tue, 29 Mar 2011 13:58:06 +0200
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms080207070704020704050308"
Subject: [OAUTH-WG] side meeting on security considerations
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 11:56:36 -0000

This is a cryptographically signed message in MIME format.

--------------ms080207070704020704050308
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

If you are in Prague for IETF 80 and would like to discuss the security
considerations, please know that I have reserved the "Athens" room
tomorrow from 09:00 to 11:30. This room fits only 14 people so please
show up only if you want to actively participate in a working session,
not if you just want to listen.

Thanks!

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms080207070704020704050308
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms080207070704020704050308--

From fcorella@pomcor.com  Tue Mar 29 10:03:50 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AB6813A6A68 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 10:03:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.462
X-Spam-Level: 
X-Spam-Status: No, score=-2.462 tagged_above=-999 required=5 tests=[AWL=0.135,  BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0mTHl37TbC2U for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 10:03:48 -0700 (PDT)
Received: from web55808.mail.re3.yahoo.com (web55808.mail.re3.yahoo.com [216.252.110.54]) by core3.amsl.com (Postfix) with SMTP id 40FBC3A6A60 for <oauth@ietf.org>; Tue, 29 Mar 2011 10:03:48 -0700 (PDT)
Received: (qmail 54942 invoked by uid 60001); 29 Mar 2011 17:05:24 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1301418324; bh=7+roy8qs4FGoxeBSMXyzmmDo/s6AMXTBQcGkez8VEao=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=LTFZyiTmGV85kheJQnxHRxGsKAl6DSm5dznCsMwZg0jn217yodixuC4KF7WFdUfupOGre5y3yde1oHM0I9B/2jHEYuN8i/GlcLoMhOep1H31SufkPqKbFsHkf5ZgUzdzrhc63QNSxvGHIMduU6l2T3xxd5WifGrEp/NTZJIMM5s=
Message-ID: <835237.54303.qm@web55808.mail.re3.yahoo.com>
X-YMail-OSG: 6A.Xpt4VM1kdnOkLUWm2QgDyLcQOkkzMaR0F18F5tx3R0xH C6N6mSDDKBs5nMrZFJBzwDGQx4JVIKwHUHXhLo2_oeDOKFN1AvkkzHtgrhg_ 6MFJuUg_NLxzDvfI0K0HIuXyc1qMz8CYbpxcCfix5QX8Nf0F19LgDnEAMvwB lB6tuSWKg2TcS48NQw3nC1b45_5Uxa7_MUxYM30se51ukI_Z22Wmcx_f6Lz9 ApLhZMVSWQrtE4BZ2qfLc6LFwvfNMG_HFL.pb568bcktmq995Me810GOYzm1 gjIh528KTfkJdN0_FArZbvsFd8UkaT..gLCr7aY1GbriYac6VtcI5iN.9MSf _urL.p96V0CUKrC_VSK3md1RexMg2PjJ9tAuZM2S6wRLslSEFQrm4n8HCPn2 Bvu4zymlKrRh4
Received: from [67.91.91.101] by web55808.mail.re3.yahoo.com via HTTP; Tue, 29 Mar 2011 10:05:24 PDT
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/12.0.2 YahooMailWebService/0.8.109.295617
Date: Tue, 29 Mar 2011 10:05:24 -0700 (PDT)
From: Francisco Corella <fcorella@pomcor.com>
To: Phil Hunt <phil.hunt@oracle.com>, Justin Richer <jricher@mitre.org>, Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465643031F@P3PW5EX1MB01.EX1.SECURESERVER.NET>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1834169112-1301418324=:54303"
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 17:03:50 -0000

--0-1834169112-1301418324=:54303
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Eran,

It's not a reasonable compromise.=A0 #2 MUST use tls UNLESS of course it ta=
rgets localhost.=A0 If #2 is sent without TLS to a Web server, the authoriz=
ation code can be easily intercepted by an attacker.=A0 The attacker can th=
en use it to obtain protected resources by submitting the authorization cod=
e to the client.=A0 (This is independent of whether the client authenticate=
s itself when exchanging the authorization code for an access token or not.=
) In the Facebook use case, the attacker can use the authorization code to =
log in to the client using the user's Facebook identity.=A0 I believe this =
vulnerability exists in many implementations of the Facebook login button t=
oday.

Btw, I've pointed this out before three or four times on this mailing list,=
 including in a response to the WGLC that you never replied to.

Francisco

--- On Mon, 3/28/11, Eran Hammer-Lahav <eran@hueniverse.com> wrote:

From: Eran Hammer-Lahav <eran@hueniverse.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: "Phil Hunt" <phil.hunt@oracle.com>, "Justin Richer" <jricher@mitre.org>
Cc: "OAuth WG" <oauth@ietf.org>
Date: Monday, March 28, 2011, 10:28 PM

The code is returned in two steps:

1. The authorization server replies to the user-agent request (providing au=
thorization) with a redirection instruction typically using the Location re=
sponse header field.
2. The user-agent makes an HTTP GET request to the provided location (which=
 may be something other than an HTTP URI, or an HTTP URI to localhost).

#1 is an HTTP response to a user-agent request to the authorization endpoin=
t (or a subsequent one if the server implementation has multiple authorizat=
ion steps).

#2 is an HTTP request made by the user-agent.

In order for the code to be secure end-to-end, both steps must use TLS. The=
 arguments made against making TLS required are based on use cases for #2. =
We can make #1 (the authorization endpoint require TLS since it already has=
 to support it for the 'token' response type. We should make callbacks a SH=
OULD for TLS.

Does this sound like a reasonable compromise?

EHL

> -----Original Message-----
> From: Phil Hunt [mailto:phil.hunt@oracle.com]
> Sent: Monday, March 28, 2011 2:28 PM
> To: Justin Richer
> Cc: Eran Hammer-Lahav; OAuth WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> This was referring to section 2.1 that the authorization server must use =
TLS
> when returning an authorization code.
>=20
> If it doesn't use TLS then the code being returned to the client can be
> intercepted.
>=20
> Or did I miss something?
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> On 2011-03-28, at 1:37 PM, Justin Richer wrote:
>=20
> > Phil,
> >
> > The main difference is that it's a requirement on the *client* instead
> > of the *provider* side of the equation, and clients aren't always even
> > speaking HTTP. I agree that all client web servers SHOULD do it. A
> > particular provider can even REQUIRE it for their registered clients,
> > a step that is outside the scope of OAuth. But there are real, in-use
> > patterns that don't require the client to make an HTTP request to an
> > external service.
> >
> > I don't see how Firesheep is relevant to this discussion -- if your
> > browser is making a call to localhost to get the token, who outside of
> > your machine is going to do it? I'm not talking about convenience for
> > developers here (which I would argue should NOT be discounted, but
> > that's another argument), I'm talking about cases where the browser
> > isn't going outside of a trusted security boundary. There are also
> > instances where there may not even be an HTTP transaction involved,
> > let alone one that could support TLS.
> >
> > -- Justin
> >
> > On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:
> >> Justin, How is that so? Remember firesheep?=A0 I wouldn't want the
> authorization code being exchanged without TLS in a cafe. Intercept is ju=
st
> too easy. And as I mentioned earlier, client credentials are already very=
 weak
> in many cases. In contrast, two web servers are hard to sniff unless you =
are
> able to gain access to their network communications path.
> >>
> >> As for testing, it seems more reasonable to put servers in temporary n=
on-
> compliance while testing rather then allow non-secure servers in producti=
on
> because of the SHOULD loophole.
> >>
> >> Also, while it does seem convenient for the developer not to have to u=
se
> TLS for authz codes, note that the developer still has to have TLS enable=
d
> when exchanging the code for an access token. So I'm not sure how relaxin=
g
> TLS for obtaining authorization actually simplifies the developer lifecyc=
le since
> they still have to set it up to test the other parts.=A0 In my view, it w=
ould be ok
> for a developer to temporarily disable TLS everywhere during development =
-
> - which places operation outside RFC compliance while developing -- but
> forces compliance once they go into production.
> >>
> >> It seems like I had to give a pretty substantial justification and we =
backed
> off because TLS is seen as inconvenient. I think we need more evidence th=
at
> there are safe cases that don't need TLS.
> >>
> >> Sorry for pushing hard on this one, but TLS is the backbone of OAuth
> security at present.
> >>
> >> Phil
> >> phil.hunt@oracle.com
> >>
> >>
> >>
> >>
> >> On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:
> >>
> >>> No change then. But the security considerations section must reflect
> this.
> >>>
> >>> EHL
> >>>
> >>>> -----Original Message-----
> >>>> From: Justin Richer [mailto:jricher@mitre.org]
> >>>> Sent: Monday, March 28, 2011 10:05 AM
> >>>> To: Eran Hammer-Lahav
> >>>> Cc: Phil Hunt; OAuth WG
> >>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>>
> >>>> What about non-http return uri's, or client-localhost, such as
> >>>>
> >>>> someapp://app/?code=3Dfoo
> >>>>
> >>>> http://localhost:87345/?code=3Dfoo
> >>>>
> >>>> HTTPS makes sense when you're talking between two web servers, but
> >>>> it seems to fall apart otherwise. I think SHOULD is appropriate here=
.
> >>>>
> >>>> -- Justin
> >>>>
> >>>>
> >>>> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
> >>>>> Unless someone has an objection, I'll make the change from SHOULD
> >>>>> to
> >>>> MUST.
> >>>>>
> >>>>> EHL
> >>>>>
> >>>>>> -----Original Message-----
> >>>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
> >>>>>> Sent: Friday, March 25, 2011 12:42 PM
> >>>>>> To: Eran Hammer-Lahav
> >>>>>> Cc: OAuth WG; Chuck & Mara Mortimore
> >>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>>>>
> >>>>>> Regarding the message: http://www.ietf.org/mail-
> >>>>>> archive/web/oauth/current/msg05762.html=A0 (sorry I somehow lost
> >>>>>> the message in my email).
> >>>>>>
> >>>>>> This issue is theft of the authorization code during the redirect.
> >>>>>> Authenticating the client is an important feature and goes a long
> >>>>>> way, but it is not sufficient since in many cases, the
> >>>>>> client_id/client_secret will likely be hard coded and relatively
> >>>>>> easy to deduce (e.g. mobile client apps).=A0 Of course a strong
> >>>>>> client authentication won't have this issue. This makes many
> >>>>>> consumer situations very susceptible to an attack where the
> >>>>>> authorization code is
> >>>> intercepted.
> >>>>>>
> >>>>>> For more information look at the SAML Artifact issues in section
> >>>>>> 6.5 (specifically stolen artifact, replay, etc) of this document:
> >>>>>> http://docs.oasis-
> >>>>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
> >>>>>>
> >>>>>> There are a number of remediations suggested (small lifetime,
> >>>>>> single use), but the foundational one is confidentiality of the
> >>>>>> exchange (TLS). Hence the recommendation that the return of an
> >>>>>> authorization code be kept secure with a MUST for TLS.
> >>>>>>
> >>>>>> Phil
> >>>>>> phil.hunt@oracle.com
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
> >>>>>>
> >>>>>>>
> >>>>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
> >>>>>> <eran@hueniverse.com> wrote:
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> -----Original Message-----
> >>>>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-
> bounces@ietf.org]
> >>>>>>>>> On Behalf Of Chuck Mortimore
> >>>>>>>>> Sent: Monday, March 14, 2011 6:10 PM
> >>>>>>>>
> >>>>>>>>> 1) I'd vote for dropping the following from 1.4.2.=A0=A0=A0In t=
urn I'd
> discuss
> >>>> some
> >>>>>> of
> >>>>>>>>> the security considerations, such as difficulty of protecting
> >>>>>>>>> a client_secret in almost all use-cases of this profile.
> >>>>>>>>>
> >>>>>>>>>=A0 "Implicit grants improve the responsiveness and efficiency o=
f
> >>>>>>>>> some clients (such as a client implemented as an in-browser
> >>>>>>>>> application) since it reduces the number of round trips
> >>>>>>>>> required to obtain an access token."
> >>>>>>>>
> >>>>>>>> Why drop it? What about it isn't accurate?
> >>>>>>>
> >>>>>>> It's accurate, but my opinion is it sends the wrong message.=A0=
=A0=A0It's
> clearly
> >>>> the
> >>>>>> less secure of the response types.=A0 By positioning it as the mos=
t
> >>>>>> performant people may find that attractive and make the wrong
> >>>>>> security
> >>>> decision.
> >>>>>>>
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
> >>>>>>>>
> >>>>>>>> Why? What's the attack vector?
> >>>>>>>
> >>>>>>> See Phils comment on past experience with artifact bindings.
> >>>>>>> Spec should
> >>>>>> default for security always on, and let deployments that don't
> >>>>>> want to use HTTPs simply be non-conformant.
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is
> >>>>>>>>> REQUIRED since in 4.1.1 it's "REQUIRED unless"
> >>>>>>>>
> >>>>>>>> The client should always confirm where the code was sent to. It
> >>>>>>>> can omit
> >>>>>> the redirection is one was provided but should tell the server
> >>>>>> where it went to. This is more consistent on the verification
> >>>>>> side, but if the original flow designers want to chime in (Dick,
> >>>>>> Brian, etc.?), I'm open
> >>>> to change this.
> >>>>>>>>
> >>>>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?=A0 =A0=A0=A0=
I assume
> this
> >>>> goes
> >>>>>>>>> back to disagreement on how best to handle native clients. I'd
> >>>>>>>>> prefer it to simply reference 5.1 and leave what is issued up
> >>>>>>>>> to the security profile of the particular deployment as to what=
 is
> issued.
> >>>>>>>>
> >>>>>>>> -08 June 2010.
> >>>>>>>>
> >>>>>>>> This has been decided for a long time. I'm not eager to change i=
t.
> >>>>>>>
> >>>>>>> Thanks - I can live with it.=A0 Unfortunately we still seem to be
> >>>>>>> fragmenting on
> >>>>>> the native client approach.=A0=A0=A0Good topic for IIW I suspect
> >>>>>>>
> >>>>>>> -cmort
> >>>>>>>
> >>>>>>>>
> >>>>>>>> EHL
> >>>>>>>>
> >>>>>>>>
> >>>>>>> _______________________________________________
> >>>>>>> OAuth mailing list
> >>>>>>> OAuth@ietf.org
> >>>>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>>
> >>>>> _______________________________________________
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>
> >>>
> >>
> >
> >

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

--0-1834169112-1301418324=:54303
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">Eran,<br><br>It's not a reasonable compromise=
.&nbsp; #2 MUST use tls UNLESS of course it targets localhost.&nbsp; If #2 =
is sent without TLS to a Web server, the authorization code can be easily i=
ntercepted by an attacker.&nbsp; The attacker can then use it to obtain pro=
tected resources by submitting the authorization code to the client.&nbsp; =
(This is independent of whether the client authenticates itself when exchan=
ging the authorization code for an access token or not.) In the Facebook us=
e case, the attacker can use the authorization code to log in to the client=
 using the user's Facebook identity.&nbsp; I believe this vulnerability exi=
sts in many implementations of the Facebook login button today.<br><br>Btw,=
 I've pointed this out before three or four times on this mailing list, inc=
luding in a response to the WGLC that you never replied
 to.<br><br>Francisco<br><br>--- On <b>Mon, 3/28/11, Eran Hammer-Lahav <i>&=
lt;eran@hueniverse.com&gt;</i></b> wrote:<br><blockquote style=3D"border-le=
ft: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"><br>F=
rom: Eran Hammer-Lahav &lt;eran@hueniverse.com&gt;<br>Subject: Re: [OAUTH-W=
G] WGLC on draft-ietf-oauth-v2-13.txt<br>To: "Phil Hunt" &lt;phil.hunt@orac=
le.com&gt;, "Justin Richer" &lt;jricher@mitre.org&gt;<br>Cc: "OAuth WG" &lt=
;oauth@ietf.org&gt;<br>Date: Monday, March 28, 2011, 10:28 PM<br><br><div c=
lass=3D"plainMail">The code is returned in two steps:<br><br>1. The authori=
zation server replies to the user-agent request (providing authorization) w=
ith a redirection instruction typically using the Location response header =
field.<br>2. The user-agent makes an HTTP GET request to the provided locat=
ion (which may be something other than an HTTP URI, or an HTTP URI to local=
host).<br><br>#1 is an HTTP response to a user-agent request to the
 authorization endpoint (or a subsequent one if the server implementation h=
as multiple authorization steps).<br><br>#2 is an HTTP request made by the =
user-agent.<br><br>In order for the code to be secure end-to-end, both step=
s must use TLS. The arguments made against making TLS required are based on=
 use cases for #2. We can make #1 (the authorization endpoint require TLS s=
ince it already has to support it for the 'token' response type. We should =
make callbacks a SHOULD for TLS.<br><br>Does this sound like a reasonable c=
ompromise?<br><br>EHL<br><br>&gt; -----Original Message-----<br>&gt; From: =
Phil Hunt [mailto:<a ymailto=3D"mailto:phil.hunt@oracle.com" href=3D"/mc/co=
mpose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.com</a>]<br>&gt; Sent: Mo=
nday, March 28, 2011 2:28 PM<br>&gt; To: Justin Richer<br>&gt; Cc: Eran Ham=
mer-Lahav; OAuth WG<br>&gt; Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oaut=
h-v2-13.txt<br>&gt; <br>&gt; This was referring to section 2.1 that the
 authorization server must use TLS<br>&gt; when returning an authorization =
code.<br>&gt; <br>&gt; If it doesn't use TLS then the code being returned t=
o the client can be<br>&gt; intercepted.<br>&gt; <br>&gt; Or did I miss som=
ething?<br>&gt; <br>&gt; Phil<br>&gt; <a ymailto=3D"mailto:phil.hunt@oracle=
.com" href=3D"/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.com</=
a><br>&gt; <br>&gt; <br>&gt; <br>&gt; <br>&gt; On 2011-03-28, at 1:37 PM, J=
ustin Richer wrote:<br>&gt; <br>&gt; &gt; Phil,<br>&gt; &gt;<br>&gt; &gt; T=
he main difference is that it's a requirement on the *client* instead<br>&g=
t; &gt; of the *provider* side of the equation, and clients aren't always e=
ven<br>&gt; &gt; speaking HTTP. I agree that all client web servers SHOULD =
do it. A<br>&gt; &gt; particular provider can even REQUIRE it for their reg=
istered clients,<br>&gt; &gt; a step that is outside the scope of OAuth. Bu=
t there are real, in-use<br>&gt; &gt; patterns that don't require the
 client to make an HTTP request to an<br>&gt; &gt; external service.<br>&gt=
; &gt;<br>&gt; &gt; I don't see how Firesheep is relevant to this discussio=
n -- if your<br>&gt; &gt; browser is making a call to localhost to get the =
token, who outside of<br>&gt; &gt; your machine is going to do it? I'm not =
talking about convenience for<br>&gt; &gt; developers here (which I would a=
rgue should NOT be discounted, but<br>&gt; &gt; that's another argument), I=
'm talking about cases where the browser<br>&gt; &gt; isn't going outside o=
f a trusted security boundary. There are also<br>&gt; &gt; instances where =
there may not even be an HTTP transaction involved,<br>&gt; &gt; let alone =
one that could support TLS.<br>&gt; &gt;<br>&gt; &gt; -- Justin<br>&gt; &gt=
;<br>&gt; &gt; On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:<br>&gt; =
&gt;&gt; Justin, How is that so? Remember firesheep?&nbsp; I wouldn't want =
the<br>&gt; authorization code being exchanged without TLS in a
 cafe. Intercept is just<br>&gt; too easy. And as I mentioned earlier, clie=
nt credentials are already very weak<br>&gt; in many cases. In contrast, tw=
o web servers are hard to sniff unless you are<br>&gt; able to gain access =
to their network communications path.<br>&gt; &gt;&gt;<br>&gt; &gt;&gt; As =
for testing, it seems more reasonable to put servers in temporary non-<br>&=
gt; compliance while testing rather then allow non-secure servers in produc=
tion<br>&gt; because of the SHOULD loophole.<br>&gt; &gt;&gt;<br>&gt; &gt;&=
gt; Also, while it does seem convenient for the developer not to have to us=
e<br>&gt; TLS for authz codes, note that the developer still has to have TL=
S enabled<br>&gt; when exchanging the code for an access token. So I'm not =
sure how relaxing<br>&gt; TLS for obtaining authorization actually simplifi=
es the developer lifecycle since<br>&gt; they still have to set it up to te=
st the other parts.&nbsp; In my view, it would be ok<br>&gt; for a
 developer to temporarily disable TLS everywhere during development -<br>&g=
t; - which places operation outside RFC compliance while developing -- but<=
br>&gt; forces compliance once they go into production.<br>&gt; &gt;&gt;<br=
>&gt; &gt;&gt; It seems like I had to give a pretty substantial justificati=
on and we backed<br>&gt; off because TLS is seen as inconvenient. I think w=
e need more evidence that<br>&gt; there are safe cases that don't need TLS.=
<br>&gt; &gt;&gt;<br>&gt; &gt;&gt; Sorry for pushing hard on this one, but =
TLS is the backbone of OAuth<br>&gt; security at present.<br>&gt; &gt;&gt;<=
br>&gt; &gt;&gt; Phil<br>&gt; &gt;&gt; <a ymailto=3D"mailto:phil.hunt@oracl=
e.com" href=3D"/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.com<=
/a><br>&gt; &gt;&gt;<br>&gt; &gt;&gt;<br>&gt; &gt;&gt;<br>&gt; &gt;&gt;<br>=
&gt; &gt;&gt; On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:<br>&gt; =
&gt;&gt;<br>&gt; &gt;&gt;&gt; No change then. But the security
 considerations section must reflect<br>&gt; this.<br>&gt; &gt;&gt;&gt;<br>=
&gt; &gt;&gt;&gt; EHL<br>&gt; &gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; -----Or=
iginal Message-----<br>&gt; &gt;&gt;&gt;&gt; From: Justin Richer [mailto:<a=
 ymailto=3D"mailto:jricher@mitre.org" href=3D"/mc/compose?to=3Djricher@mitr=
e.org">jricher@mitre.org</a>]<br>&gt; &gt;&gt;&gt;&gt; Sent: Monday, March =
28, 2011 10:05 AM<br>&gt; &gt;&gt;&gt;&gt; To: Eran Hammer-Lahav<br>&gt; &g=
t;&gt;&gt;&gt; Cc: Phil Hunt; OAuth WG<br>&gt; &gt;&gt;&gt;&gt; Subject: Re=
: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<br>&gt; &gt;&gt;&gt;&gt;<br=
>&gt; &gt;&gt;&gt;&gt; What about non-http return uri's, or client-localhos=
t, such as<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; someapp://app/=
?code=3Dfoo<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; <a href=3D"ht=
tp://localhost:87345/?code=3Dfoo" target=3D"_blank">http://localhost:87345/=
?code=3Dfoo</a><br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; HTTPS mak=
es sense
 when you're talking between two web servers, but<br>&gt; &gt;&gt;&gt;&gt; =
it seems to fall apart otherwise. I think SHOULD is appropriate here.<br>&g=
t; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; -- Justin<br>&gt; &gt;&gt;&gt;=
&gt;<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; On Fri, 2011-03-25 a=
t 16:03 -0400, Eran Hammer-Lahav wrote:<br>&gt; &gt;&gt;&gt;&gt;&gt; Unless=
 someone has an objection, I'll make the change from SHOULD<br>&gt; &gt;&gt=
;&gt;&gt;&gt; to<br>&gt; &gt;&gt;&gt;&gt; MUST.<br>&gt; &gt;&gt;&gt;&gt;&gt=
;<br>&gt; &gt;&gt;&gt;&gt;&gt; EHL<br>&gt; &gt;&gt;&gt;&gt;&gt;<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt; -----Original Message-----<br>&gt; &gt;&gt;&gt;&gt;&g=
t;&gt; From: Phil Hunt [mailto:<a ymailto=3D"mailto:phil.hunt@oracle.com" h=
ref=3D"/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.com</a>]<br>=
&gt; &gt;&gt;&gt;&gt;&gt;&gt; Sent: Friday, March 25, 2011 12:42 PM<br>&gt;=
 &gt;&gt;&gt;&gt;&gt;&gt; To: Eran Hammer-Lahav<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt; Cc: OAuth WG; Chuck &amp; Mara Mortimore<br>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v=
2-13.txt<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; =
Regarding the message: <a href=3D"http://www.ietf.org/mail-" target=3D"_bla=
nk">http://www.ietf.org/mail-</a><br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; archive/=
web/oauth/current/msg05762.html&nbsp; (sorry I somehow lost<br>&gt; &gt;&gt=
;&gt;&gt;&gt;&gt; the message in my email).<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt=
;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; This issue is theft of the authorization=
 code during the redirect.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Authenticating =
the client is an important feature and goes a long<br>&gt; &gt;&gt;&gt;&gt;=
&gt;&gt; way, but it is not sufficient since in many cases, the<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt; client_id/client_secret will likely be hard coded and=
 relatively<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; easy to deduce (e.g. mobile
 client apps).&nbsp; Of course a strong<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; cl=
ient authentication won't have this issue. This makes many<br>&gt; &gt;&gt;=
&gt;&gt;&gt;&gt; consumer situations very susceptible to an attack where th=
e<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code is<br>&gt; &gt;&gt;&g=
t;&gt; intercepted.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&g=
t;&gt;&gt; For more information look at the SAML Artifact issues in section=
<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; 6.5 (specifically stolen artifact, replay=
, etc) of this document:<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"http:/=
/docs.oasis-" target=3D"_blank">http://docs.oasis-</a><br>&gt; &gt;&gt;&gt;=
&gt;&gt;&gt; open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf<br>&g=
t; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; There are a nu=
mber of remediations suggested (small lifetime,<br>&gt; &gt;&gt;&gt;&gt;&gt=
;&gt; single use), but the foundational one is confidentiality of
 the<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; exchange (TLS). Hence the recommendat=
ion that the return of an<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization co=
de be kept secure with a MUST for TLS.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>=
&gt; &gt;&gt;&gt;&gt;&gt;&gt; Phil<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; <a ymai=
lto=3D"mailto:phil.hunt@oracle.com" href=3D"/mc/compose?to=3Dphil.hunt@orac=
le.com">phil.hunt@oracle.com</a><br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &=
gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&g=
t;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; On 2011-03-24, at 7:22 PM, =
Chuck Mortimore wrote:<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt=
;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; On Mar 24, 2011, at =
6:36 PM, "Eran Hammer-Lahav"<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; &lt;<a ymailt=
o=3D"mailto:eran@hueniverse.com" href=3D"/mc/compose?to=3Deran@hueniverse.c=
om">eran@hueniverse.com</a>&gt; wrote:<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&=
gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; -----Original Message-----<br>&gt;=
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; From: <a ymailto=3D"mailto:oauth-boun=
ces@ietf.org" href=3D"/mc/compose?to=3Doauth-bounces@ietf.org">oauth-bounce=
s@ietf.org</a> [mailto:oauth-<br>&gt; <a ymailto=3D"mailto:bounces@ietf.org=
" href=3D"/mc/compose?to=3Dbounces@ietf.org">bounces@ietf.org</a>]<br>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; On Behalf Of Chuck Mortimore<br>&gt; &=
gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Sent: Monday, March 14, 2011 6:10 PM<br=
>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;=
&gt;&gt; 1) I'd vote for dropping the following from 1.4.2.&nbsp;&nbsp;&nbs=
p;In turn I'd<br>&gt; discuss<br>&gt; &gt;&gt;&gt;&gt; some<br>&gt; &gt;&gt=
;&gt;&gt;&gt;&gt; of<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; the secur=
ity considerations, such as difficulty of protecting<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; a client_secret in almost all use-cas=
es of this profile.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &g=
t;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&nbsp; "Implicit grants improve the respo=
nsiveness and efficiency of<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; so=
me clients (such as a client implemented as an in-browser<br>&gt; &gt;&gt;&=
gt;&gt;&gt;&gt;&gt;&gt;&gt; application) since it reduces the number of rou=
nd trips<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; required to obtain an=
 access token."<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&g=
t;&gt;&gt;&gt;&gt;&gt; Why drop it? What about it isn't accurate?<br>&gt; &=
gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; It's accur=
ate, but my opinion is it sends the wrong message.&nbsp;&nbsp;&nbsp;It's<br=
>&gt; clearly<br>&gt; &gt;&gt;&gt;&gt; the<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;=
 less secure of the response types.&nbsp; By positioning it as the
 most<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; performant people may find that attr=
active and make the wrong<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; security<br>&gt;=
 &gt;&gt;&gt;&gt; decision.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &g=
t;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt;=
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 2) Section 2.1, we should MUST TLS ev=
en for Authorization Code.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt;=
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why? What's the attack vector?<br>&gt; &g=
t;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; See Phils c=
omment on past experience with artifact bindings.<br>&gt; &gt;&gt;&gt;&gt;&=
gt;&gt;&gt; Spec should<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; default for securi=
ty always on, and let deployments that don't<br>&gt; &gt;&gt;&gt;&gt;&gt;&g=
t; want to use HTTPs simply be non-conformant.<br>&gt; &gt;&gt;&gt;&gt;&gt;=
&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 3) Section 4.1.3 - not clear to me wh=
y redirect_uri is<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; REQUIRED sin=
ce in 4.1.1 it's "REQUIRED unless"<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=
<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; The client should always confirm =
where the code was sent to. It<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; can=
 omit<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; the redirection is one was provided =
but should tell the server<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; where it went t=
o. This is more consistent on the verification<br>&gt; &gt;&gt;&gt;&gt;&gt;=
&gt; side, but if the original flow designers want to chime in (Dick,<br>&g=
t; &gt;&gt;&gt;&gt;&gt;&gt; Brian, etc.?), I'm open<br>&gt; &gt;&gt;&gt;&gt=
; to change this.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;=
&gt;&gt;&gt;&gt;&gt;&gt;&gt; 4) Section 4.2.2 - when did we drop refresh_to=
ken?&nbsp; &nbsp;&nbsp;&nbsp;I assume<br>&gt; this<br>&gt;
 &gt;&gt;&gt;&gt; goes<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; back to=
 disagreement on how best to handle native clients. I'd<br>&gt; &gt;&gt;&gt=
;&gt;&gt;&gt;&gt;&gt;&gt; prefer it to simply reference 5.1 and leave what =
is issued up<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; to the security p=
rofile of the particular deployment as to what is<br>&gt; issued.<br>&gt; &=
gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; -0=
8 June 2010.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&=
gt;&gt;&gt;&gt;&gt; This has been decided for a long time. I'm not eager to=
 change it.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&g=
t;&gt;&gt; Thanks - I can live with it.&nbsp; Unfortunately we still seem t=
o be<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; fragmenting on<br>&gt; &gt;&gt;&g=
t;&gt;&gt;&gt; the native client approach.&nbsp;&nbsp;&nbsp;Good topic for =
IIW I suspect<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt;&gt; -cmort<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<b=
r>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt=
;&gt; EHL<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;=
&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; _____________________=
__________________________<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; OAuth maili=
ng list<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a ymailto=3D"mailto:OAuth@iet=
f.org" href=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listin=
fo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a>=
<br>&gt; &gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt; ________________=
_______________________________<br>&gt; &gt;&gt;&gt;&gt;&gt; OAuth mailing =
list<br>&gt; &gt;&gt;&gt;&gt;&gt; <a ymailto=3D"mailto:OAuth@ietf.org" href=
=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br>&gt; &gt;&gt;&gt=
;&gt;&gt;
 <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">=
https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; &gt;&gt;&gt;&gt;<br=
>&gt; &gt;&gt;&gt;<br>&gt; &gt;&gt;<br>&gt; &gt;<br>&gt; &gt;<br><br>______=
_________________________________________<br>OAuth mailing list<br><a ymail=
to=3D"mailto:OAuth@ietf.org" href=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth=
@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br></div></=
blockquote></td></tr></table>
--0-1834169112-1301418324=:54303--

From eran@hueniverse.com  Tue Mar 29 10:41:50 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AA7FD3A6989 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 10:41:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.64
X-Spam-Level: 
X-Spam-Status: No, score=-2.64 tagged_above=-999 required=5 tests=[AWL=-0.043,  BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id erid1ID8VkdF for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 10:41:42 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 22FBD3A6943 for <oauth@ietf.org>; Tue, 29 Mar 2011 10:41:41 -0700 (PDT)
Received: (qmail 11621 invoked from network); 29 Mar 2011 17:43:19 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Mar 2011 17:43:16 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Tue, 29 Mar 2011 10:43:02 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "fcorella@pomcor.com" <fcorella@pomcor.com>, Phil Hunt <phil.hunt@oracle.com>, Justin Richer <jricher@mitre.org>
Date: Tue, 29 Mar 2011 10:42:57 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvuM4CcIvL0kod2RjmjH3tHATmspQABIpnQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564304B9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643031F@P3PW5EX1MB01.EX1.SECURESERVER.NET> <835237.54303.qm@web55808.mail.re3.yahoo.com>
In-Reply-To: <835237.54303.qm@web55808.mail.re3.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E723446564304B9P3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 17:41:50 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E723446564304B9P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Can you explain how intercepting the authorization code without having acce=
ss to the client credentials is a problem? For the sake of discussion, assu=
me that the client has valid and secure credentials that an attacker cannot=
 access. Also assume that the client has implemented some form of cross-sit=
e protection.

I don't know much about FB's implementation but if they allow the authoriza=
tion code to be used for anything other than exchanged for an access token =
using secure client credentials, then they are not implementing the protoco=
l as specified.

EHL

From: Francisco Corella [mailto:fcorella@pomcor.com]
Sent: Tuesday, March 29, 2011 10:05 AM
To: Phil Hunt; Justin Richer; Eran Hammer-Lahav
Cc: OAuth WG; Karen P. Lewison
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt

Eran,

It's not a reasonable compromise.  #2 MUST use tls UNLESS of course it targ=
ets localhost.  If #2 is sent without TLS to a Web server, the authorizatio=
n code can be easily intercepted by an attacker.  The attacker can then use=
 it to obtain protected resources by submitting the authorization code to t=
he client.  (This is independent of whether the client authenticates itself=
 when exchanging the authorization code for an access token or not.) In the=
 Facebook use case, the attacker can use the authorization code to log in t=
o the client using the user's Facebook identity.  I believe this vulnerabil=
ity exists in many implementations of the Facebook login button today.

Btw, I've pointed this out before three or four times on this mailing list,=
 including in a response to the WGLC that you never replied to.

Francisco

--- On Mon, 3/28/11, Eran Hammer-Lahav <eran@hueniverse.com<mailto:eran@hue=
niverse.com>> wrote:

From: Eran Hammer-Lahav <eran@hueniverse.com<mailto:eran@hueniverse.com>>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: "Phil Hunt" <phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>>, "Justi=
n Richer" <jricher@mitre.org<mailto:jricher@mitre.org>>
Cc: "OAuth WG" <oauth@ietf.org<mailto:oauth@ietf.org>>
Date: Monday, March 28, 2011, 10:28 PM
The code is returned in two steps:

1. The authorization server replies to the user-agent request (providing au=
thorization) with a redirection instruction typically using the Location re=
sponse header field.
2. The user-agent makes an HTTP GET request to the provided location (which=
 may be something other than an HTTP URI, or an HTTP URI to localhost).

#1 is an HTTP response to a user-agent request to the authorization endpoin=
t (or a subsequent one if the server implementation has multiple authorizat=
ion steps).

#2 is an HTTP request made by the user-agent.

In order for the code to be secure end-to-end, both steps must use TLS. The=
 arguments made against making TLS required are based on use cases for #2. =
We can make #1 (the authorization endpoint require TLS since it already has=
 to support it for the 'token' response type. We should make callbacks a SH=
OULD for TLS.

Does this sound like a reasonable compromise?

EHL

> -----Original Message-----
> From: Phil Hunt [mailto:phil.hunt@oracle.com</mc/compose?to=3Dphil.hunt@o=
racle.com>]
> Sent: Monday, March 28, 2011 2:28 PM
> To: Justin Richer
> Cc: Eran Hammer-Lahav; OAuth WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
> This was referring to section 2.1 that the authorization server must use =
TLS
> when returning an authorization code.
>
> If it doesn't use TLS then the code being returned to the client can be
> intercepted.
>
> Or did I miss something?
>
> Phil
> phil.hunt@oracle.com</mc/compose?to=3Dphil.hunt@oracle.com>
>
>
>
>
> On 2011-03-28, at 1:37 PM, Justin Richer wrote:
>
> > Phil,
> >
> > The main difference is that it's a requirement on the *client* instead
> > of the *provider* side of the equation, and clients aren't always even
> > speaking HTTP. I agree that all client web servers SHOULD do it. A
> > particular provider can even REQUIRE it for their registered clients,
> > a step that is outside the scope of OAuth. But there are real, in-use
> > patterns that don't require the client to make an HTTP request to an
> > external service.
> >
> > I don't see how Firesheep is relevant to this discussion -- if your
> > browser is making a call to localhost to get the token, who outside of
> > your machine is going to do it? I'm not talking about convenience for
> > developers here (which I would argue should NOT be discounted, but
> > that's another argument), I'm talking about cases where the browser
> > isn't going outside of a trusted security boundary. There are also
> > instances where there may not even be an HTTP transaction involved,
> > let alone one that could support TLS.
> >
> > -- Justin
> >
> > On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:
> >> Justin, How is that so? Remember firesheep?  I wouldn't want the
> authorization code being exchanged without TLS in a cafe. Intercept is ju=
st
> too easy. And as I mentioned earlier, client credentials are already very=
 weak
> in many cases. In contrast, two web servers are hard to sniff unless you =
are
> able to gain access to their network communications path.
> >>
> >> As for testing, it seems more reasonable to put servers in temporary n=
on-
> compliance while testing rather then allow non-secure servers in producti=
on
> because of the SHOULD loophole.
> >>
> >> Also, while it does seem convenient for the developer not to have to u=
se
> TLS for authz codes, note that the developer still has to have TLS enable=
d
> when exchanging the code for an access token. So I'm not sure how relaxin=
g
> TLS for obtaining authorization actually simplifies the developer lifecyc=
le since
> they still have to set it up to test the other parts.  In my view, it wou=
ld be ok
> for a developer to temporarily disable TLS everywhere during development =
-
> - which places operation outside RFC compliance while developing -- but
> forces compliance once they go into production.
> >>
> >> It seems like I had to give a pretty substantial justification and we =
backed
> off because TLS is seen as inconvenient. I think we need more evidence th=
at
> there are safe cases that don't need TLS.
> >>
> >> Sorry for pushing hard on this one, but TLS is the backbone of OAuth
> security at present.
> >>
> >> Phil
> >> phil.hunt@oracle.com</mc/compose?to=3Dphil.hunt@oracle.com>
> >>
> >>
> >>
> >>
> >> On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:
> >>
> >>> No change then. But the security considerations section must reflect
> this.
> >>>
> >>> EHL
> >>>
> >>>> -----Original Message-----
> >>>> From: Justin Richer [mailto:jricher@mitre.org</mc/compose?to=3Djrich=
er@mitre.org>]
> >>>> Sent: Monday, March 28, 2011 10:05 AM
> >>>> To: Eran Hammer-Lahav
> >>>> Cc: Phil Hunt; OAuth WG
> >>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>>
> >>>> What about non-http return uri's, or client-localhost, such as
> >>>>
> >>>> someapp://app/?code=3Dfoo
> >>>>
> >>>> http://localhost:87345/?code=3Dfoo
> >>>>
> >>>> HTTPS makes sense when you're talking between two web servers, but
> >>>> it seems to fall apart otherwise. I think SHOULD is appropriate here=
.
> >>>>
> >>>> -- Justin
> >>>>
> >>>>
> >>>> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
> >>>>> Unless someone has an objection, I'll make the change from SHOULD
> >>>>> to
> >>>> MUST.
> >>>>>
> >>>>> EHL
> >>>>>
> >>>>>> -----Original Message-----
> >>>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com</mc/compose?to=3Dphil=
.hunt@oracle.com>]
> >>>>>> Sent: Friday, March 25, 2011 12:42 PM
> >>>>>> To: Eran Hammer-Lahav
> >>>>>> Cc: OAuth WG; Chuck & Mara Mortimore
> >>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>>>>
> >>>>>> Regarding the message: http://www.ietf.org/mail-
> >>>>>> archive/web/oauth/current/msg05762.html  (sorry I somehow lost
> >>>>>> the message in my email).
> >>>>>>
> >>>>>> This issue is theft of the authorization code during the redirect.
> >>>>>> Authenticating the client is an important feature and goes a long
> >>>>>> way, but it is not sufficient since in many cases, the
> >>>>>> client_id/client_secret will likely be hard coded and relatively
> >>>>>> easy to deduce (e.g. mobile client apps).  Of course a strong
> >>>>>> client authentication won't have this issue. This makes many
> >>>>>> consumer situations very susceptible to an attack where the
> >>>>>> authorization code is
> >>>> intercepted.
> >>>>>>
> >>>>>> For more information look at the SAML Artifact issues in section
> >>>>>> 6.5 (specifically stolen artifact, replay, etc) of this document:
> >>>>>> http://docs.oasis-
> >>>>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
> >>>>>>
> >>>>>> There are a number of remediations suggested (small lifetime,
> >>>>>> single use), but the foundational one is confidentiality of the
> >>>>>> exchange (TLS). Hence the recommendation that the return of an
> >>>>>> authorization code be kept secure with a MUST for TLS.
> >>>>>>
> >>>>>> Phil
> >>>>>> phil.hunt@oracle.com</mc/compose?to=3Dphil.hunt@oracle.com>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
> >>>>>>
> >>>>>>>
> >>>>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
> >>>>>> <eran@hueniverse.com</mc/compose?to=3Deran@hueniverse.com>> wrote:
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> -----Original Message-----
> >>>>>>>>> From: oauth-bounces@ietf.org</mc/compose?to=3Doauth-bounces@iet=
f.org> [mailto:oauth-
> bounces@ietf.org</mc/compose?to=3Dbounces@ietf.org>]
> >>>>>>>>> On Behalf Of Chuck Mortimore
> >>>>>>>>> Sent: Monday, March 14, 2011 6:10 PM
> >>>>>>>>
> >>>>>>>>> 1) I'd vote for dropping the following from 1.4.2.   In turn I'=
d
> discuss
> >>>> some
> >>>>>> of
> >>>>>>>>> the security considerations, such as difficulty of protecting
> >>>>>>>>> a client_secret in almost all use-cases of this profile.
> >>>>>>>>>
> >>>>>>>>>  "Implicit grants improve the responsiveness and efficiency of
> >>>>>>>>> some clients (such as a client implemented as an in-browser
> >>>>>>>>> application) since it reduces the number of round trips
> >>>>>>>>> required to obtain an access token."
> >>>>>>>>
> >>>>>>>> Why drop it? What about it isn't accurate?
> >>>>>>>
> >>>>>>> It's accurate, but my opinion is it sends the wrong message.   It=
's
> clearly
> >>>> the
> >>>>>> less secure of the response types.  By positioning it as the most
> >>>>>> performant people may find that attractive and make the wrong
> >>>>>> security
> >>>> decision.
> >>>>>>>
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
> >>>>>>>>
> >>>>>>>> Why? What's the attack vector?
> >>>>>>>
> >>>>>>> See Phils comment on past experience with artifact bindings.
> >>>>>>> Spec should
> >>>>>> default for security always on, and let deployments that don't
> >>>>>> want to use HTTPs simply be non-conformant.
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is
> >>>>>>>>> REQUIRED since in 4.1.1 it's "REQUIRED unless"
> >>>>>>>>
> >>>>>>>> The client should always confirm where the code was sent to. It
> >>>>>>>> can omit
> >>>>>> the redirection is one was provided but should tell the server
> >>>>>> where it went to. This is more consistent on the verification
> >>>>>> side, but if the original flow designers want to chime in (Dick,
> >>>>>> Brian, etc.?), I'm open
> >>>> to change this.
> >>>>>>>>
> >>>>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?     I assume
> this
> >>>> goes
> >>>>>>>>> back to disagreement on how best to handle native clients. I'd
> >>>>>>>>> prefer it to simply reference 5.1 and leave what is issued up
> >>>>>>>>> to the security profile of the particular deployment as to what=
 is
> issued.
> >>>>>>>>
> >>>>>>>> -08 June 2010.
> >>>>>>>>
> >>>>>>>> This has been decided for a long time. I'm not eager to change i=
t.
> >>>>>>>
> >>>>>>> Thanks - I can live with it.  Unfortunately we still seem to be
> >>>>>>> fragmenting on
> >>>>>> the native client approach.   Good topic for IIW I suspect
> >>>>>>>
> >>>>>>> -cmort
> >>>>>>>
> >>>>>>>>
> >>>>>>>> EHL
> >>>>>>>>
> >>>>>>>>
> >>>>>>> _______________________________________________
> >>>>>>> OAuth mailing list
> >>>>>>> OAuth@ietf.org</mc/compose?to=3DOAuth@ietf.org>
> >>>>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>>
> >>>>> _______________________________________________
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org</mc/compose?to=3DOAuth@ietf.org>
> >>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>
> >>>
> >>
> >
> >

_______________________________________________
OAuth mailing list
OAuth@ietf.org</mc/compose?to=3DOAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth



--_000_90C41DD21FB7C64BB94121FBBC2E723446564304B9P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Can you e=
xplain how intercepting the authorization code without having access to the=
 client credentials is a problem? For the sake of discussion, assume that t=
he client has valid and secure credentials that an attacker cannot access. =
Also assume that the client has implemented some form of cross-site protect=
ion.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.=
0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></sp=
an></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Ca=
libri","sans-serif";color:#1F497D'>I don&#8217;t know much about FB&#8217;s=
 implementation but if they allow the authorization code to be used for any=
thing other than exchanged for an access token using secure client credenti=
als, then they are not implementing the protocol as specified.<o:p></o:p></=
span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"=
Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>EHL<o:p></o:p></span></p><p class=3DMsoNormal><span sty=
le=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o=
:p>&nbsp;</o:p></span></p><div style=3D'border:none;border-left:solid blue =
1.5pt;padding:0in 0in 0in 4.0pt'><div><div style=3D'border:none;border-top:=
solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><spa=
n style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> Fra=
ncisco Corella [mailto:fcorella@pomcor.com] <br><b>Sent:</b> Tuesday, March=
 29, 2011 10:05 AM<br><b>To:</b> Phil Hunt; Justin Richer; Eran Hammer-Laha=
v<br><b>Cc:</b> OAuth WG; Karen P. Lewison<br><b>Subject:</b> Re: [OAUTH-WG=
] WGLC on draft-ietf-oauth-v2-13.txt<o:p></o:p></span></p></div></div><p cl=
ass=3DMsoNormal><o:p>&nbsp;</o:p></p><table class=3DMsoNormalTable border=
=3D0 cellspacing=3D0 cellpadding=3D0><tr><td valign=3Dtop style=3D'padding:=
0in 0in 0in 0in'><p class=3DMsoNormal>Eran,<br><br>It's not a reasonable co=
mpromise.&nbsp; #2 MUST use tls UNLESS of course it targets localhost.&nbsp=
; If #2 is sent without TLS to a Web server, the authorization code can be =
easily intercepted by an attacker.&nbsp; The attacker can then use it to ob=
tain protected resources by submitting the authorization code to the client=
.&nbsp; (This is independent of whether the client authenticates itself whe=
n exchanging the authorization code for an access token or not.) In the Fac=
ebook use case, the attacker can use the authorization code to log in to th=
e client using the user's Facebook identity.&nbsp; I believe this vulnerabi=
lity exists in many implementations of the Facebook login button today.<br>=
<br>Btw, I've pointed this out before three or four times on this mailing l=
ist, including in a response to the WGLC that you never replied to.<br><br>=
Francisco<br><br>--- On <b>Mon, 3/28/11, Eran Hammer-Lahav <i>&lt;<a href=
=3D"mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;</i></b> wrote:<=
o:p></o:p></p><p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><br>From:=
 Eran Hammer-Lahav &lt;<a href=3D"mailto:eran@hueniverse.com">eran@hueniver=
se.com</a>&gt;<br>Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.tx=
t<br>To: &quot;Phil Hunt&quot; &lt;<a href=3D"mailto:phil.hunt@oracle.com">=
phil.hunt@oracle.com</a>&gt;, &quot;Justin Richer&quot; &lt;<a href=3D"mail=
to:jricher@mitre.org">jricher@mitre.org</a>&gt;<br>Cc: &quot;OAuth WG&quot;=
 &lt;<a href=3D"mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<br>Date: Mond=
ay, March 28, 2011, 10:28 PM<o:p></o:p></p><div><p class=3DMsoNormal>The co=
de is returned in two steps:<br><br>1. The authorization server replies to =
the user-agent request (providing authorization) with a redirection instruc=
tion typically using the Location response header field.<br>2. The user-age=
nt makes an HTTP GET request to the provided location (which may be somethi=
ng other than an HTTP URI, or an HTTP URI to localhost).<br><br>#1 is an HT=
TP response to a user-agent request to the authorization endpoint (or a sub=
sequent one if the server implementation has multiple authorization steps).=
<br><br>#2 is an HTTP request made by the user-agent.<br><br>In order for t=
he code to be secure end-to-end, both steps must use TLS. The arguments mad=
e against making TLS required are based on use cases for #2. We can make #1=
 (the authorization endpoint require TLS since it already has to support it=
 for the 'token' response type. We should make callbacks a SHOULD for TLS.<=
br><br>Does this sound like a reasonable compromise?<br><br>EHL<br><br>&gt;=
 -----Original Message-----<br>&gt; From: Phil Hunt [mailto:<a href=3D"/mc/=
compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.com</a>]<br>&gt; Sent: =
Monday, March 28, 2011 2:28 PM<br>&gt; To: Justin Richer<br>&gt; Cc: Eran H=
ammer-Lahav; OAuth WG<br>&gt; Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oa=
uth-v2-13.txt<br>&gt; <br>&gt; This was referring to section 2.1 that the a=
uthorization server must use TLS<br>&gt; when returning an authorization co=
de.<br>&gt; <br>&gt; If it doesn't use TLS then the code being returned to =
the client can be<br>&gt; intercepted.<br>&gt; <br>&gt; Or did I miss somet=
hing?<br>&gt; <br>&gt; Phil<br>&gt; <a href=3D"/mc/compose?to=3Dphil.hunt@o=
racle.com">phil.hunt@oracle.com</a><br>&gt; <br>&gt; <br>&gt; <br>&gt; <br>=
&gt; On 2011-03-28, at 1:37 PM, Justin Richer wrote:<br>&gt; <br>&gt; &gt; =
Phil,<br>&gt; &gt;<br>&gt; &gt; The main difference is that it's a requirem=
ent on the *client* instead<br>&gt; &gt; of the *provider* side of the equa=
tion, and clients aren't always even<br>&gt; &gt; speaking HTTP. I agree th=
at all client web servers SHOULD do it. A<br>&gt; &gt; particular provider =
can even REQUIRE it for their registered clients,<br>&gt; &gt; a step that =
is outside the scope of OAuth. But there are real, in-use<br>&gt; &gt; patt=
erns that don't require the client to make an HTTP request to an<br>&gt; &g=
t; external service.<br>&gt; &gt;<br>&gt; &gt; I don't see how Firesheep is=
 relevant to this discussion -- if your<br>&gt; &gt; browser is making a ca=
ll to localhost to get the token, who outside of<br>&gt; &gt; your machine =
is going to do it? I'm not talking about convenience for<br>&gt; &gt; devel=
opers here (which I would argue should NOT be discounted, but<br>&gt; &gt; =
that's another argument), I'm talking about cases where the browser<br>&gt;=
 &gt; isn't going outside of a trusted security boundary. There are also<br=
>&gt; &gt; instances where there may not even be an HTTP transaction involv=
ed,<br>&gt; &gt; let alone one that could support TLS.<br>&gt; &gt;<br>&gt;=
 &gt; -- Justin<br>&gt; &gt;<br>&gt; &gt; On Mon, 2011-03-28 at 16:25 -0400=
, Phil Hunt wrote:<br>&gt; &gt;&gt; Justin, How is that so? Remember firesh=
eep?&nbsp; I wouldn't want the<br>&gt; authorization code being exchanged w=
ithout TLS in a cafe. Intercept is just<br>&gt; too easy. And as I mentione=
d earlier, client credentials are already very weak<br>&gt; in many cases. =
In contrast, two web servers are hard to sniff unless you are<br>&gt; able =
to gain access to their network communications path.<br>&gt; &gt;&gt;<br>&g=
t; &gt;&gt; As for testing, it seems more reasonable to put servers in temp=
orary non-<br>&gt; compliance while testing rather then allow non-secure se=
rvers in production<br>&gt; because of the SHOULD loophole.<br>&gt; &gt;&gt=
;<br>&gt; &gt;&gt; Also, while it does seem convenient for the developer no=
t to have to use<br>&gt; TLS for authz codes, note that the developer still=
 has to have TLS enabled<br>&gt; when exchanging the code for an access tok=
en. So I'm not sure how relaxing<br>&gt; TLS for obtaining authorization ac=
tually simplifies the developer lifecycle since<br>&gt; they still have to =
set it up to test the other parts.&nbsp; In my view, it would be ok<br>&gt;=
 for a developer to temporarily disable TLS everywhere during development -=
<br>&gt; - which places operation outside RFC compliance while developing -=
- but<br>&gt; forces compliance once they go into production.<br>&gt; &gt;&=
gt;<br>&gt; &gt;&gt; It seems like I had to give a pretty substantial justi=
fication and we backed<br>&gt; off because TLS is seen as inconvenient. I t=
hink we need more evidence that<br>&gt; there are safe cases that don't nee=
d TLS.<br>&gt; &gt;&gt;<br>&gt; &gt;&gt; Sorry for pushing hard on this one=
, but TLS is the backbone of OAuth<br>&gt; security at present.<br>&gt; &gt=
;&gt;<br>&gt; &gt;&gt; Phil<br>&gt; &gt;&gt; <a href=3D"/mc/compose?to=3Dph=
il.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt; &gt;&gt;<br>&gt; &gt;&=
gt;<br>&gt; &gt;&gt;<br>&gt; &gt;&gt;<br>&gt; &gt;&gt; On 2011-03-28, at 12=
:52 PM, Eran Hammer-Lahav wrote:<br>&gt; &gt;&gt;<br>&gt; &gt;&gt;&gt; No c=
hange then. But the security considerations section must reflect<br>&gt; th=
is.<br>&gt; &gt;&gt;&gt;<br>&gt; &gt;&gt;&gt; EHL<br>&gt; &gt;&gt;&gt;<br>&=
gt; &gt;&gt;&gt;&gt; -----Original Message-----<br>&gt; &gt;&gt;&gt;&gt; Fr=
om: Justin Richer [mailto:<a href=3D"/mc/compose?to=3Djricher@mitre.org">jr=
icher@mitre.org</a>]<br>&gt; &gt;&gt;&gt;&gt; Sent: Monday, March 28, 2011 =
10:05 AM<br>&gt; &gt;&gt;&gt;&gt; To: Eran Hammer-Lahav<br>&gt; &gt;&gt;&gt=
;&gt; Cc: Phil Hunt; OAuth WG<br>&gt; &gt;&gt;&gt;&gt; Subject: Re: [OAUTH-=
WG] WGLC on draft-ietf-oauth-v2-13.txt<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt=
;&gt;&gt;&gt; What about non-http return uri's, or client-localhost, such a=
s<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; someapp://app/?code=3Df=
oo<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; <a href=3D"http://loca=
lhost:87345/?code=3Dfoo" target=3D"_blank">http://localhost:87345/?code=3Df=
oo</a><br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; HTTPS makes sense =
when you're talking between two web servers, but<br>&gt; &gt;&gt;&gt;&gt; i=
t seems to fall apart otherwise. I think SHOULD is appropriate here.<br>&gt=
; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; -- Justin<br>&gt; &gt;&gt;&gt;&=
gt;<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; On Fri, 2011-03-25 at=
 16:03 -0400, Eran Hammer-Lahav wrote:<br>&gt; &gt;&gt;&gt;&gt;&gt; Unless =
someone has an objection, I'll make the change from SHOULD<br>&gt; &gt;&gt;=
&gt;&gt;&gt; to<br>&gt; &gt;&gt;&gt;&gt; MUST.<br>&gt; &gt;&gt;&gt;&gt;&gt;=
<br>&gt; &gt;&gt;&gt;&gt;&gt; EHL<br>&gt; &gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;=
&gt;&gt;&gt;&gt;&gt; -----Original Message-----<br>&gt; &gt;&gt;&gt;&gt;&gt=
;&gt; From: Phil Hunt [mailto:<a href=3D"/mc/compose?to=3Dphil.hunt@oracle.=
com">phil.hunt@oracle.com</a>]<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Sent: Frida=
y, March 25, 2011 12:42 PM<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; To: Eran Hammer=
-Lahav<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Cc: OAuth WG; Chuck &amp; Mara Mort=
imore<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Subject: Re: [OAUTH-WG] WGLC on draf=
t-ietf-oauth-v2-13.txt<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt=
;&gt;&gt;&gt; Regarding the message: <a href=3D"http://www.ietf.org/mail-" =
target=3D"_blank">http://www.ietf.org/mail-</a><br>&gt; &gt;&gt;&gt;&gt;&gt=
;&gt; archive/web/oauth/current/msg05762.html&nbsp; (sorry I somehow lost<b=
r>&gt; &gt;&gt;&gt;&gt;&gt;&gt; the message in my email).<br>&gt; &gt;&gt;&=
gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; This issue is theft of the=
 authorization code during the redirect.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; A=
uthenticating the client is an important feature and goes a long<br>&gt; &g=
t;&gt;&gt;&gt;&gt;&gt; way, but it is not sufficient since in many cases, t=
he<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; client_id/client_secret will likely be =
hard coded and relatively<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; easy to deduce (=
e.g. mobile client apps).&nbsp; Of course a strong<br>&gt; &gt;&gt;&gt;&gt;=
&gt;&gt; client authentication won't have this issue. This makes many<br>&g=
t; &gt;&gt;&gt;&gt;&gt;&gt; consumer situations very susceptible to an atta=
ck where the<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code is<br>&gt;=
 &gt;&gt;&gt;&gt; intercepted.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt; For more information look at the SAML Artifact issues=
 in section<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; 6.5 (specifically stolen artif=
act, replay, etc) of this document:<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; <a hre=
f=3D"http://docs.oasis-" target=3D"_blank">http://docs.oasis-</a><br>&gt; &=
gt;&gt;&gt;&gt;&gt;&gt; open.org/security/saml/v2.0/saml-sec-consider-2.0-o=
s.pdf<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; The=
re are a number of remediations suggested (small lifetime,<br>&gt; &gt;&gt;=
&gt;&gt;&gt;&gt; single use), but the foundational one is confidentiality o=
f the<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; exchange (TLS). Hence the recommenda=
tion that the return of an<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization c=
ode be kept secure with a MUST for TLS.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br=
>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Phil<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; <a hre=
f=3D"/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt=
; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt=
;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;=
&gt;&gt; On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:<br>&gt; &gt;&gt;=
&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&=
gt;&gt;&gt;&gt; On Mar 24, 2011, at 6:36 PM, &quot;Eran Hammer-Lahav&quot;<=
br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; &lt;<a href=3D"/mc/compose?to=3Deran@hueni=
verse.com">eran@hueniverse.com</a>&gt; wrote:<br>&gt; &gt;&gt;&gt;&gt;&gt;&=
gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&g=
t;&gt;&gt;&gt;&gt; -----Original Message-----<br>&gt; &gt;&gt;&gt;&gt;&gt;&=
gt;&gt;&gt;&gt; From: <a href=3D"/mc/compose?to=3Doauth-bounces@ietf.org">o=
auth-bounces@ietf.org</a> [mailto:oauth-<br>&gt; <a href=3D"/mc/compose?to=
=3Dbounces@ietf.org">bounces@ietf.org</a>]<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;=
&gt;&gt;&gt; On Behalf Of Chuck Mortimore<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&=
gt;&gt;&gt; Sent: Monday, March 14, 2011 6:10 PM<br>&gt; &gt;&gt;&gt;&gt;&g=
t;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 1) I'd vote for=
 dropping the following from 1.4.2.&nbsp;&nbsp;&nbsp;In turn I'd<br>&gt; di=
scuss<br>&gt; &gt;&gt;&gt;&gt; some<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; of<br>=
&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; the security considerations, such=
 as difficulty of protecting<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; a=
 client_secret in almost all use-cases of this profile.<br>&gt; &gt;&gt;&gt=
;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&nbsp=
; &quot;Implicit grants improve the responsiveness and efficiency of<br>&gt=
; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; some clients (such as a client imple=
mented as an in-browser<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; applic=
ation) since it reduces the number of round trips<br>&gt; &gt;&gt;&gt;&gt;&=
gt;&gt;&gt;&gt;&gt; required to obtain an access token.&quot;<br>&gt; &gt;&=
gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why dr=
op it? What about it isn't accurate?<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<b=
r>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; It's accurate, but my opinion is it sen=
ds the wrong message.&nbsp;&nbsp;&nbsp;It's<br>&gt; clearly<br>&gt; &gt;&gt=
;&gt;&gt; the<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; less secure of the response =
types.&nbsp; By positioning it as the most<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;=
 performant people may find that attractive and make the wrong<br>&gt; &gt;=
&gt;&gt;&gt;&gt;&gt; security<br>&gt; &gt;&gt;&gt;&gt; decision.<br>&gt; &g=
t;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; =
2) Section 2.1, we should MUST TLS even for Authorization Code.<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why?=
 What's the attack vector?<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt;&gt; See Phils comment on past experience with artifac=
t bindings.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Spec should<br>&gt; &gt;&g=
t;&gt;&gt;&gt;&gt; default for security always on, and let deployments that=
 don't<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; want to use HTTPs simply be non-con=
formant.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&=
gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 3) Section 4.1.3 -=
 not clear to me why redirect_uri is<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&g=
t;&gt; REQUIRED since in 4.1.1 it's &quot;REQUIRED unless&quot;<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; The =
client should always confirm where the code was sent to. It<br>&gt; &gt;&gt=
;&gt;&gt;&gt;&gt;&gt;&gt; can omit<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; the red=
irection is one was provided but should tell the server<br>&gt; &gt;&gt;&gt=
;&gt;&gt;&gt; where it went to. This is more consistent on the verification=
<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; side, but if the original flow designers =
want to chime in (Dick,<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Brian, etc.?), I'm=
 open<br>&gt; &gt;&gt;&gt;&gt; to change this.<br>&gt; &gt;&gt;&gt;&gt;&gt;=
&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 4) Section 4.2.2 =
- when did we drop refresh_token?&nbsp; &nbsp;&nbsp;&nbsp;I assume<br>&gt; =
this<br>&gt; &gt;&gt;&gt;&gt; goes<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=
&gt; back to disagreement on how best to handle native clients. I'd<br>&gt;=
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; prefer it to simply reference 5.1 and=
 leave what is issued up<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; to th=
e security profile of the particular deployment as to what is<br>&gt; issue=
d.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt=
;&gt;&gt; -08 June 2010.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &=
gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; This has been decided for a long time. I'm =
not eager to change it.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&g=
t;&gt;&gt;&gt;&gt;&gt; Thanks - I can live with it.&nbsp; Unfortunately we =
still seem to be<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; fragmenting on<br>&gt=
; &gt;&gt;&gt;&gt;&gt;&gt; the native client approach.&nbsp;&nbsp;&nbsp;Goo=
d topic for IIW I suspect<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;=
&gt;&gt;&gt;&gt;&gt;&gt; -cmort<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt=
; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=
 EHL<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&=
gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; __________________________=
_____________________<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; OAuth mailing li=
st<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D"/mc/compose?to=3DOAuth@i=
etf.org">OAuth@ietf.org</a><br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a href=3D=
"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https://www=
.ietf.org/mailman/listinfo/oauth</a><br>&gt; &gt;&gt;&gt;&gt;&gt;<br>&gt; &=
gt;&gt;&gt;&gt;&gt; _______________________________________________<br>&gt;=
 &gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>&gt; &gt;&gt;&gt;&gt;&gt; <a hr=
ef=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br>&gt; &gt;&gt;&=
gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=
=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>&gt; &gt;&gt=
;&gt;&gt;<br>&gt; &gt;&gt;&gt;<br>&gt; &gt;&gt;<br>&gt; &gt;<br>&gt; &gt;<b=
r><br>_______________________________________________<br>OAuth mailing list=
<br><a href=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br><a hr=
ef=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">https:=
//www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p></div></td></tr></t=
able><p class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Cali=
bri","sans-serif"'><o:p>&nbsp;</o:p></span></p></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E723446564304B9P3PW5EX1MB01E_--

From gffletch@aol.com  Tue Mar 29 10:52:12 2011
Return-Path: <gffletch@aol.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 862433A6943 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 10:52:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.597
X-Spam-Level: 
X-Spam-Status: No, score=-2.597 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v9X0aG81YQci for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 10:52:09 -0700 (PDT)
Received: from imr-da05.mx.aol.com (imr-da05.mx.aol.com [205.188.105.147]) by core3.amsl.com (Postfix) with ESMTP id 833153A68E4 for <oauth@ietf.org>; Tue, 29 Mar 2011 10:52:09 -0700 (PDT)
Received: from mtaout-db05.r1000.mx.aol.com (mtaout-db05.r1000.mx.aol.com [172.29.51.197]) by imr-da05.mx.aol.com (8.14.1/8.14.1) with ESMTP id p2THrDSL017192; Tue, 29 Mar 2011 13:53:14 -0400
Received: from palantir.local (unknown [10.181.183.161]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mtaout-db05.r1000.mx.aol.com (MUA/Third Party Client Interface) with ESMTPSA id 69625E0000B2; Tue, 29 Mar 2011 13:53:12 -0400 (EDT)
Message-ID: <4D921C87.1080006@aol.com>
Date: Tue, 29 Mar 2011 13:53:12 -0400
From: George Fletcher <gffletch@aol.com>
Organization: AOL LLC
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: "fcorella@pomcor.com" <fcorella@pomcor.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643031F@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<835237.54303.qm@web55808.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564304B9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564304B9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: multipart/alternative; boundary="------------000307010205000402070802"
x-aol-global-disposition: G
X-AOL-SCOLL-SCORE: 0:2:511864192:93952408  
X-AOL-SCOLL-URL_COUNT: 0  
x-aol-sid: 3039ac1d33c54d921c884c0c
X-AOL-IP: 10.181.183.161
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 17:52:12 -0000

This is a multi-part message in MIME format.
--------------000307010205000402070802
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Along this same line...

To make sure I understand, the attacker must execute a MITM attack 
against the redirect_uri so that it receives the code value and ensures 
the code value is never exchanged at the authorization service by the 
original requester. Then the attacker takes the code and presents it to 
the same service but under a different controlling party. This ensures 
that the correct client authentication takes place and associates the 
delegated authorization with a different user at the "client" service.

Basically, Alice goes to example.com and authenticates with her 
example.com credentials. She then tries to associate resources 
socialsite.example.com. The MITM attacker captures the code when 
socialsite.example.com redirects the browser to example.com. The MITM 
attacker returns an error to Alice.

The Attacker then logs into example.com with a different set of 
credentials. When the attacker tries to associate resources from 
socialsite.example.com, the MITM attack returns Alice's code to 
example.com. Example.com then retrieves the access_token and associates 
Alice's resources to the attackers identity at example.com.

So I see this as an exposure where the client has it's own idea of who 
the user is and is then using OAuth to associate resources with the that 
user.

Thanks,
George

On 3/29/11 1:42 PM, Eran Hammer-Lahav wrote:
>
> Can you explain how intercepting the authorization code without having 
> access to the client credentials is a problem? For the sake of 
> discussion, assume that the client has valid and secure credentials 
> that an attacker cannot access. Also assume that the client has 
> implemented some form of cross-site protection.
>
> I donâ€™t know much about FBâ€™s implementation but if they allow the 
> authorization code to be used for anything other than exchanged for an 
> access token using secure client credentials, then they are not 
> implementing the protocol as specified.
>
> EHL
>
> *From:*Francisco Corella [mailto:fcorella@pomcor.com]
> *Sent:* Tuesday, March 29, 2011 10:05 AM
> *To:* Phil Hunt; Justin Richer; Eran Hammer-Lahav
> *Cc:* OAuth WG; Karen P. Lewison
> *Subject:* Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
> Eran,
>
> It's not a reasonable compromise.  #2 MUST use tls UNLESS of course it 
> targets localhost.  If #2 is sent without TLS to a Web server, the 
> authorization code can be easily intercepted by an attacker.  The 
> attacker can then use it to obtain protected resources by submitting 
> the authorization code to the client.  (This is independent of whether 
> the client authenticates itself when exchanging the authorization code 
> for an access token or not.) In the Facebook use case, the attacker 
> can use the authorization code to log in to the client using the 
> user's Facebook identity.  I believe this vulnerability exists in many 
> implementations of the Facebook login button today.
>
> Btw, I've pointed this out before three or four times on this mailing 
> list, including in a response to the WGLC that you never replied to.
>
> Francisco
>
> --- On *Mon, 3/28/11, Eran Hammer-Lahav /<eran@hueniverse.com 
> <mailto:eran@hueniverse.com>>/* wrote:
>
>
> From: Eran Hammer-Lahav <eran@hueniverse.com <mailto:eran@hueniverse.com>>
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> To: "Phil Hunt" <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>, 
> "Justin Richer" <jricher@mitre.org <mailto:jricher@mitre.org>>
> Cc: "OAuth WG" <oauth@ietf.org <mailto:oauth@ietf.org>>
> Date: Monday, March 28, 2011, 10:28 PM
>
> The code is returned in two steps:
>
> 1. The authorization server replies to the user-agent request 
> (providing authorization) with a redirection instruction typically 
> using the Location response header field.
> 2. The user-agent makes an HTTP GET request to the provided location 
> (which may be something other than an HTTP URI, or an HTTP URI to 
> localhost).
>
> #1 is an HTTP response to a user-agent request to the authorization 
> endpoint (or a subsequent one if the server implementation has 
> multiple authorization steps).
>
> #2 is an HTTP request made by the user-agent.
>
> In order for the code to be secure end-to-end, both steps must use 
> TLS. The arguments made against making TLS required are based on use 
> cases for #2. We can make #1 (the authorization endpoint require TLS 
> since it already has to support it for the 'token' response type. We 
> should make callbacks a SHOULD for TLS.
>
> Does this sound like a reasonable compromise?
>
> EHL
>
> > -----Original Message-----
> > From: Phil Hunt [mailto:phil.hunt@oracle.com 
> </mc/compose?to=phil.hunt@oracle.com>]
> > Sent: Monday, March 28, 2011 2:28 PM
> > To: Justin Richer
> > Cc: Eran Hammer-Lahav; OAuth WG
> > Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >
> > This was referring to section 2.1 that the authorization server must 
> use TLS
> > when returning an authorization code.
> >
> > If it doesn't use TLS then the code being returned to the client can be
> > intercepted.
> >
> > Or did I miss something?
> >
> > Phil
> > phil.hunt@oracle.com </mc/compose?to=phil.hunt@oracle.com>
> >
> >
> >
> >
> > On 2011-03-28, at 1:37 PM, Justin Richer wrote:
> >
> > > Phil,
> > >
> > > The main difference is that it's a requirement on the *client* instead
> > > of the *provider* side of the equation, and clients aren't always even
> > > speaking HTTP. I agree that all client web servers SHOULD do it. A
> > > particular provider can even REQUIRE it for their registered clients,
> > > a step that is outside the scope of OAuth. But there are real, in-use
> > > patterns that don't require the client to make an HTTP request to an
> > > external service.
> > >
> > > I don't see how Firesheep is relevant to this discussion -- if your
> > > browser is making a call to localhost to get the token, who outside of
> > > your machine is going to do it? I'm not talking about convenience for
> > > developers here (which I would argue should NOT be discounted, but
> > > that's another argument), I'm talking about cases where the browser
> > > isn't going outside of a trusted security boundary. There are also
> > > instances where there may not even be an HTTP transaction involved,
> > > let alone one that could support TLS.
> > >
> > > -- Justin
> > >
> > > On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:
> > >> Justin, How is that so? Remember firesheep?  I wouldn't want the
> > authorization code being exchanged without TLS in a cafe. Intercept 
> is just
> > too easy. And as I mentioned earlier, client credentials are already 
> very weak
> > in many cases. In contrast, two web servers are hard to sniff unless 
> you are
> > able to gain access to their network communications path.
> > >>
> > >> As for testing, it seems more reasonable to put servers in 
> temporary non-
> > compliance while testing rather then allow non-secure servers in 
> production
> > because of the SHOULD loophole.
> > >>
> > >> Also, while it does seem convenient for the developer not to have 
> to use
> > TLS for authz codes, note that the developer still has to have TLS 
> enabled
> > when exchanging the code for an access token. So I'm not sure how 
> relaxing
> > TLS for obtaining authorization actually simplifies the developer 
> lifecycle since
> > they still have to set it up to test the other parts.  In my view, 
> it would be ok
> > for a developer to temporarily disable TLS everywhere during 
> development -
> > - which places operation outside RFC compliance while developing -- but
> > forces compliance once they go into production.
> > >>
> > >> It seems like I had to give a pretty substantial justification 
> and we backed
> > off because TLS is seen as inconvenient. I think we need more 
> evidence that
> > there are safe cases that don't need TLS.
> > >>
> > >> Sorry for pushing hard on this one, but TLS is the backbone of OAuth
> > security at present.
> > >>
> > >> Phil
> > >> phil.hunt@oracle.com </mc/compose?to=phil.hunt@oracle.com>
> > >>
> > >>
> > >>
> > >>
> > >> On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:
> > >>
> > >>> No change then. But the security considerations section must reflect
> > this.
> > >>>
> > >>> EHL
> > >>>
> > >>>> -----Original Message-----
> > >>>> From: Justin Richer [mailto:jricher@mitre.org 
> </mc/compose?to=jricher@mitre.org>]
> > >>>> Sent: Monday, March 28, 2011 10:05 AM
> > >>>> To: Eran Hammer-Lahav
> > >>>> Cc: Phil Hunt; OAuth WG
> > >>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> > >>>>
> > >>>> What about non-http return uri's, or client-localhost, such as
> > >>>>
> > >>>> someapp://app/?code=foo
> > >>>>
> > >>>> http://localhost:87345/?code=foo
> > >>>>
> > >>>> HTTPS makes sense when you're talking between two web servers, but
> > >>>> it seems to fall apart otherwise. I think SHOULD is appropriate 
> here.
> > >>>>
> > >>>> -- Justin
> > >>>>
> > >>>>
> > >>>> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
> > >>>>> Unless someone has an objection, I'll make the change from SHOULD
> > >>>>> to
> > >>>> MUST.
> > >>>>>
> > >>>>> EHL
> > >>>>>
> > >>>>>> -----Original Message-----
> > >>>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com 
> </mc/compose?to=phil.hunt@oracle.com>]
> > >>>>>> Sent: Friday, March 25, 2011 12:42 PM
> > >>>>>> To: Eran Hammer-Lahav
> > >>>>>> Cc: OAuth WG; Chuck & Mara Mortimore
> > >>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> > >>>>>>
> > >>>>>> Regarding the message: http://www.ietf.org/mail-
> > >>>>>> archive/web/oauth/current/msg05762.html  (sorry I somehow lost
> > >>>>>> the message in my email).
> > >>>>>>
> > >>>>>> This issue is theft of the authorization code during the 
> redirect.
> > >>>>>> Authenticating the client is an important feature and goes a long
> > >>>>>> way, but it is not sufficient since in many cases, the
> > >>>>>> client_id/client_secret will likely be hard coded and relatively
> > >>>>>> easy to deduce (e.g. mobile client apps).  Of course a strong
> > >>>>>> client authentication won't have this issue. This makes many
> > >>>>>> consumer situations very susceptible to an attack where the
> > >>>>>> authorization code is
> > >>>> intercepted.
> > >>>>>>
> > >>>>>> For more information look at the SAML Artifact issues in section
> > >>>>>> 6.5 (specifically stolen artifact, replay, etc) of this document:
> > >>>>>> http://docs.oasis-
> > >>>>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
> > >>>>>>
> > >>>>>> There are a number of remediations suggested (small lifetime,
> > >>>>>> single use), but the foundational one is confidentiality of the
> > >>>>>> exchange (TLS). Hence the recommendation that the return of an
> > >>>>>> authorization code be kept secure with a MUST for TLS.
> > >>>>>>
> > >>>>>> Phil
> > >>>>>> phil.hunt@oracle.com </mc/compose?to=phil.hunt@oracle.com>
> > >>>>>>
> > >>>>>>
> > >>>>>>
> > >>>>>>
> > >>>>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
> > >>>>>>
> > >>>>>>>
> > >>>>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
> > >>>>>> <eran@hueniverse.com </mc/compose?to=eran@hueniverse.com>> wrote:
> > >>>>>>>
> > >>>>>>>>
> > >>>>>>>>> -----Original Message-----
> > >>>>>>>>> From: oauth-bounces@ietf.org 
> </mc/compose?to=oauth-bounces@ietf.org> [mailto:oauth-
> > bounces@ietf.org </mc/compose?to=bounces@ietf.org>]
> > >>>>>>>>> On Behalf Of Chuck Mortimore
> > >>>>>>>>> Sent: Monday, March 14, 2011 6:10 PM
> > >>>>>>>>
> > >>>>>>>>> 1) I'd vote for dropping the following from 1.4.2.   In 
> turn I'd
> > discuss
> > >>>> some
> > >>>>>> of
> > >>>>>>>>> the security considerations, such as difficulty of protecting
> > >>>>>>>>> a client_secret in almost all use-cases of this profile.
> > >>>>>>>>>
> > >>>>>>>>>  "Implicit grants improve the responsiveness and efficiency of
> > >>>>>>>>> some clients (such as a client implemented as an in-browser
> > >>>>>>>>> application) since it reduces the number of round trips
> > >>>>>>>>> required to obtain an access token."
> > >>>>>>>>
> > >>>>>>>> Why drop it? What about it isn't accurate?
> > >>>>>>>
> > >>>>>>> It's accurate, but my opinion is it sends the wrong 
> message.   It's
> > clearly
> > >>>> the
> > >>>>>> less secure of the response types.  By positioning it as the most
> > >>>>>> performant people may find that attractive and make the wrong
> > >>>>>> security
> > >>>> decision.
> > >>>>>>>
> > >>>>>>>
> > >>>>>>>>
> > >>>>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization 
> Code.
> > >>>>>>>>
> > >>>>>>>> Why? What's the attack vector?
> > >>>>>>>
> > >>>>>>> See Phils comment on past experience with artifact bindings.
> > >>>>>>> Spec should
> > >>>>>> default for security always on, and let deployments that don't
> > >>>>>> want to use HTTPs simply be non-conformant.
> > >>>>>>>
> > >>>>>>>>
> > >>>>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is
> > >>>>>>>>> REQUIRED since in 4.1.1 it's "REQUIRED unless"
> > >>>>>>>>
> > >>>>>>>> The client should always confirm where the code was sent to. It
> > >>>>>>>> can omit
> > >>>>>> the redirection is one was provided but should tell the server
> > >>>>>> where it went to. This is more consistent on the verification
> > >>>>>> side, but if the original flow designers want to chime in (Dick,
> > >>>>>> Brian, etc.?), I'm open
> > >>>> to change this.
> > >>>>>>>>
> > >>>>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?     I 
> assume
> > this
> > >>>> goes
> > >>>>>>>>> back to disagreement on how best to handle native clients. I'd
> > >>>>>>>>> prefer it to simply reference 5.1 and leave what is issued up
> > >>>>>>>>> to the security profile of the particular deployment as to 
> what is
> > issued.
> > >>>>>>>>
> > >>>>>>>> -08 June 2010.
> > >>>>>>>>
> > >>>>>>>> This has been decided for a long time. I'm not eager to 
> change it.
> > >>>>>>>
> > >>>>>>> Thanks - I can live with it.  Unfortunately we still seem to be
> > >>>>>>> fragmenting on
> > >>>>>> the native client approach.   Good topic for IIW I suspect
> > >>>>>>>
> > >>>>>>> -cmort
> > >>>>>>>
> > >>>>>>>>
> > >>>>>>>> EHL
> > >>>>>>>>
> > >>>>>>>>
> > >>>>>>> _______________________________________________
> > >>>>>>> OAuth mailing list
> > >>>>>>> OAuth@ietf.org </mc/compose?to=OAuth@ietf.org>
> > >>>>>>> https://www.ietf.org/mailman/listinfo/oauth
> > >>>>>
> > >>>>> _______________________________________________
> > >>>>> OAuth mailing list
> > >>>>> OAuth@ietf.org </mc/compose?to=OAuth@ietf.org>
> > >>>>> https://www.ietf.org/mailman/listinfo/oauth
> > >>>>
> > >>>
> > >>
> > >
> > >
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org </mc/compose?to=OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
> =
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------000307010205000402070802
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 8bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
    <title></title>
  </head>
  <body text="#000000" bgcolor="#ffffff">
    <font face="Helvetica, Arial, sans-serif">Along this same line...<br>
      <br>
    </font><font face="Helvetica, Arial, sans-serif">To make sure I
      understand, the attacker must execute a MITM attack against the
      redirect_uri so that it receives the code value and ensures the
      code value is never exchanged at the authorization service by the
      original requester. Then the attacker takes the code and presents
      it to the same service but under a different controlling party.
      This ensures that the correct client authentication takes place
      and associates the delegated authorization with a different user
      at the "client" service.<br>
      <br>
      Basically, Alice goes to example.com and authenticates with her
      example.com credentials. She then tries to associate resources
      socialsite.example.com. The MITM attacker captures the code when
      socialsite.example.com redirects the browser to example.com. The
      MITM attacker returns an error to Alice.<br>
      <br>
      The Attacker then logs into example.com with a different set of
      credentials. When the attacker tries to associate resources from
      socialsite.example.com, the MITM attack returns Alice's code to
      example.com. Example.com then retrieves the access_token and
      associates Alice's resources to the attackers identity at
      example.com.<br>
      <br>
      So I see this as an exposure where the client has it's own idea of
      who the user is and is then using OAuth to associate resources
      with the that user. <br>
      <br>
      Thanks,<br>
      George<br>
    </font><br>
    On 3/29/11 1:42 PM, Eran Hammer-Lahav wrote:
    <blockquote
cite="mid:90C41DD21FB7C64BB94121FBBC2E723446564304B9@P3PW5EX1MB01.EX1.SECURESERVER.NET"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">Can you explain how intercepting the
            authorization code without having access to the client
            credentials is a problem? For the sake of discussion, assume
            that the client has valid and secure credentials that an
            attacker cannot access. Also assume that the client has
            implemented some form of cross-site protection.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">I donâ€™t know much about FBâ€™s implementation but
            if they allow the authorization code to be used for anything
            other than exchanged for an access token using secure client
            credentials, then they are not implementing the protocol as
            specified.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">EHL<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <div style="border-width: medium medium medium 1.5pt;
          border-style: none none none solid; border-color:
          -moz-use-text-color -moz-use-text-color -moz-use-text-color
          blue; padding: 0in 0in 0in 4pt;">
          <div>
            <div style="border-right: medium none; border-width: 1pt
              medium medium; border-style: solid none none;
              border-color: rgb(181, 196, 223) -moz-use-text-color
              -moz-use-text-color; padding: 3pt 0in 0in;">
              <p class="MsoNormal"><b><span style="font-size: 10pt;
                    font-family:
                    &quot;Tahoma&quot;,&quot;sans-serif&quot;;">From:</span></b><span
                  style="font-size: 10pt; font-family:
                  &quot;Tahoma&quot;,&quot;sans-serif&quot;;"> Francisco
                  Corella [<a class="moz-txt-link-freetext" href="mailto:fcorella@pomcor.com">mailto:fcorella@pomcor.com</a>] <br>
                  <b>Sent:</b> Tuesday, March 29, 2011 10:05 AM<br>
                  <b>To:</b> Phil Hunt; Justin Richer; Eran Hammer-Lahav<br>
                  <b>Cc:</b> OAuth WG; Karen P. Lewison<br>
                  <b>Subject:</b> Re: [OAUTH-WG] WGLC on
                  draft-ietf-oauth-v2-13.txt<o:p></o:p></span></p>
            </div>
          </div>
          <p class="MsoNormal"><o:p>Â </o:p></p>
          <table class="MsoNormalTable" border="0" cellpadding="0"
            cellspacing="0">
            <tbody>
              <tr>
                <td style="padding: 0in;" valign="top">
                  <p class="MsoNormal">Eran,<br>
                    <br>
                    It's not a reasonable compromise.Â  #2 MUST use tls
                    UNLESS of course it targets localhost.Â  If #2 is
                    sent without TLS to a Web server, the authorization
                    code can be easily intercepted by an attacker.Â  The
                    attacker can then use it to obtain protected
                    resources by submitting the authorization code to
                    the client.Â  (This is independent of whether the
                    client authenticates itself when exchanging the
                    authorization code for an access token or not.) In
                    the Facebook use case, the attacker can use the
                    authorization code to log in to the client using the
                    user's Facebook identity.Â  I believe this
                    vulnerability exists in many implementations of the
                    Facebook login button today.<br>
                    <br>
                    Btw, I've pointed this out before three or four
                    times on this mailing list, including in a response
                    to the WGLC that you never replied to.<br>
                    <br>
                    Francisco<br>
                    <br>
                    --- On <b>Mon, 3/28/11, Eran Hammer-Lahav <i>&lt;<a
                          moz-do-not-send="true"
                          href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;</i></b>
                    wrote:<o:p></o:p></p>
                  <p class="MsoNormal" style="margin-bottom: 12pt;"><br>
                    From: Eran Hammer-Lahav &lt;<a
                      moz-do-not-send="true"
                      href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;<br>
                    Subject: Re: [OAUTH-WG] WGLC on
                    draft-ietf-oauth-v2-13.txt<br>
                    To: "Phil Hunt" &lt;<a moz-do-not-send="true"
                      href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;,
                    "Justin Richer" &lt;<a moz-do-not-send="true"
                      href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br>
                    Cc: "OAuth WG" &lt;<a moz-do-not-send="true"
                      href="mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;<br>
                    Date: Monday, March 28, 2011, 10:28 PM<o:p></o:p></p>
                  <div>
                    <p class="MsoNormal">The code is returned in two
                      steps:<br>
                      <br>
                      1. The authorization server replies to the
                      user-agent request (providing authorization) with
                      a redirection instruction typically using the
                      Location response header field.<br>
                      2. The user-agent makes an HTTP GET request to the
                      provided location (which may be something other
                      than an HTTP URI, or an HTTP URI to localhost).<br>
                      <br>
                      #1 is an HTTP response to a user-agent request to
                      the authorization endpoint (or a subsequent one if
                      the server implementation has multiple
                      authorization steps).<br>
                      <br>
                      #2 is an HTTP request made by the user-agent.<br>
                      <br>
                      In order for the code to be secure end-to-end,
                      both steps must use TLS. The arguments made
                      against making TLS required are based on use cases
                      for #2. We can make #1 (the authorization endpoint
                      require TLS since it already has to support it for
                      the 'token' response type. We should make
                      callbacks a SHOULD for TLS.<br>
                      <br>
                      Does this sound like a reasonable compromise?<br>
                      <br>
                      EHL<br>
                      <br>
                      &gt; -----Original Message-----<br>
                      &gt; From: Phil Hunt [mailto:<a
                        moz-do-not-send="true"
                        href="/mc/compose?to=phil.hunt@oracle.com">phil.hunt@oracle.com</a>]<br>
                      &gt; Sent: Monday, March 28, 2011 2:28 PM<br>
                      &gt; To: Justin Richer<br>
                      &gt; Cc: Eran Hammer-Lahav; OAuth WG<br>
                      &gt; Subject: Re: [OAUTH-WG] WGLC on
                      draft-ietf-oauth-v2-13.txt<br>
                      &gt; <br>
                      &gt; This was referring to section 2.1 that the
                      authorization server must use TLS<br>
                      &gt; when returning an authorization code.<br>
                      &gt; <br>
                      &gt; If it doesn't use TLS then the code being
                      returned to the client can be<br>
                      &gt; intercepted.<br>
                      &gt; <br>
                      &gt; Or did I miss something?<br>
                      &gt; <br>
                      &gt; Phil<br>
                      &gt; <a moz-do-not-send="true"
                        href="/mc/compose?to=phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>
                      &gt; <br>
                      &gt; <br>
                      &gt; <br>
                      &gt; <br>
                      &gt; On 2011-03-28, at 1:37 PM, Justin Richer
                      wrote:<br>
                      &gt; <br>
                      &gt; &gt; Phil,<br>
                      &gt; &gt;<br>
                      &gt; &gt; The main difference is that it's a
                      requirement on the *client* instead<br>
                      &gt; &gt; of the *provider* side of the equation,
                      and clients aren't always even<br>
                      &gt; &gt; speaking HTTP. I agree that all client
                      web servers SHOULD do it. A<br>
                      &gt; &gt; particular provider can even REQUIRE it
                      for their registered clients,<br>
                      &gt; &gt; a step that is outside the scope of
                      OAuth. But there are real, in-use<br>
                      &gt; &gt; patterns that don't require the client
                      to make an HTTP request to an<br>
                      &gt; &gt; external service.<br>
                      &gt; &gt;<br>
                      &gt; &gt; I don't see how Firesheep is relevant to
                      this discussion -- if your<br>
                      &gt; &gt; browser is making a call to localhost to
                      get the token, who outside of<br>
                      &gt; &gt; your machine is going to do it? I'm not
                      talking about convenience for<br>
                      &gt; &gt; developers here (which I would argue
                      should NOT be discounted, but<br>
                      &gt; &gt; that's another argument), I'm talking
                      about cases where the browser<br>
                      &gt; &gt; isn't going outside of a trusted
                      security boundary. There are also<br>
                      &gt; &gt; instances where there may not even be an
                      HTTP transaction involved,<br>
                      &gt; &gt; let alone one that could support TLS.<br>
                      &gt; &gt;<br>
                      &gt; &gt; -- Justin<br>
                      &gt; &gt;<br>
                      &gt; &gt; On Mon, 2011-03-28 at 16:25 -0400, Phil
                      Hunt wrote:<br>
                      &gt; &gt;&gt; Justin, How is that so? Remember
                      firesheep?Â  I wouldn't want the<br>
                      &gt; authorization code being exchanged without
                      TLS in a cafe. Intercept is just<br>
                      &gt; too easy. And as I mentioned earlier, client
                      credentials are already very weak<br>
                      &gt; in many cases. In contrast, two web servers
                      are hard to sniff unless you are<br>
                      &gt; able to gain access to their network
                      communications path.<br>
                      &gt; &gt;&gt;<br>
                      &gt; &gt;&gt; As for testing, it seems more
                      reasonable to put servers in temporary non-<br>
                      &gt; compliance while testing rather then allow
                      non-secure servers in production<br>
                      &gt; because of the SHOULD loophole.<br>
                      &gt; &gt;&gt;<br>
                      &gt; &gt;&gt; Also, while it does seem convenient
                      for the developer not to have to use<br>
                      &gt; TLS for authz codes, note that the developer
                      still has to have TLS enabled<br>
                      &gt; when exchanging the code for an access token.
                      So I'm not sure how relaxing<br>
                      &gt; TLS for obtaining authorization actually
                      simplifies the developer lifecycle since<br>
                      &gt; they still have to set it up to test the
                      other parts.Â  In my view, it would be ok<br>
                      &gt; for a developer to temporarily disable TLS
                      everywhere during development -<br>
                      &gt; - which places operation outside RFC
                      compliance while developing -- but<br>
                      &gt; forces compliance once they go into
                      production.<br>
                      &gt; &gt;&gt;<br>
                      &gt; &gt;&gt; It seems like I had to give a pretty
                      substantial justification and we backed<br>
                      &gt; off because TLS is seen as inconvenient. I
                      think we need more evidence that<br>
                      &gt; there are safe cases that don't need TLS.<br>
                      &gt; &gt;&gt;<br>
                      &gt; &gt;&gt; Sorry for pushing hard on this one,
                      but TLS is the backbone of OAuth<br>
                      &gt; security at present.<br>
                      &gt; &gt;&gt;<br>
                      &gt; &gt;&gt; Phil<br>
                      &gt; &gt;&gt; <a moz-do-not-send="true"
                        href="/mc/compose?to=phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>
                      &gt; &gt;&gt;<br>
                      &gt; &gt;&gt;<br>
                      &gt; &gt;&gt;<br>
                      &gt; &gt;&gt;<br>
                      &gt; &gt;&gt; On 2011-03-28, at 12:52 PM, Eran
                      Hammer-Lahav wrote:<br>
                      &gt; &gt;&gt;<br>
                      &gt; &gt;&gt;&gt; No change then. But the security
                      considerations section must reflect<br>
                      &gt; this.<br>
                      &gt; &gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt; EHL<br>
                      &gt; &gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt; -----Original Message-----<br>
                      &gt; &gt;&gt;&gt;&gt; From: Justin Richer [mailto:<a
                        moz-do-not-send="true"
                        href="/mc/compose?to=jricher@mitre.org">jricher@mitre.org</a>]<br>
                      &gt; &gt;&gt;&gt;&gt; Sent: Monday, March 28, 2011
                      10:05 AM<br>
                      &gt; &gt;&gt;&gt;&gt; To: Eran Hammer-Lahav<br>
                      &gt; &gt;&gt;&gt;&gt; Cc: Phil Hunt; OAuth WG<br>
                      &gt; &gt;&gt;&gt;&gt; Subject: Re: [OAUTH-WG] WGLC
                      on draft-ietf-oauth-v2-13.txt<br>
                      &gt; &gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt; What about non-http return
                      uri's, or client-localhost, such as<br>
                      &gt; &gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt; someapp://app/?code=foo<br>
                      &gt; &gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt; <a moz-do-not-send="true"
                        href="http://localhost:87345/?code=foo"
                        target="_blank">http://localhost:87345/?code=foo</a><br>
                      &gt; &gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt; HTTPS makes sense when
                      you're talking between two web servers, but<br>
                      &gt; &gt;&gt;&gt;&gt; it seems to fall apart
                      otherwise. I think SHOULD is appropriate here.<br>
                      &gt; &gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt; -- Justin<br>
                      &gt; &gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt; On Fri, 2011-03-25 at 16:03
                      -0400, Eran Hammer-Lahav wrote:<br>
                      &gt; &gt;&gt;&gt;&gt;&gt; Unless someone has an
                      objection, I'll make the change from SHOULD<br>
                      &gt; &gt;&gt;&gt;&gt;&gt; to<br>
                      &gt; &gt;&gt;&gt;&gt; MUST.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt; EHL<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; -----Original
                      Message-----<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; From: Phil Hunt
                      [mailto:<a moz-do-not-send="true"
                        href="/mc/compose?to=phil.hunt@oracle.com">phil.hunt@oracle.com</a>]<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; Sent: Friday, March
                      25, 2011 12:42 PM<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; To: Eran
                      Hammer-Lahav<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; Cc: OAuth WG; Chuck
                      &amp; Mara Mortimore<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; Subject: Re:
                      [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; Regarding the
                      message: <a moz-do-not-send="true"
                        href="http://www.ietf.org/mail-" target="_blank">http://www.ietf.org/mail-</a><br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;
                      archive/web/oauth/current/msg05762.htmlÂ  (sorry I
                      somehow lost<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; the message in my
                      email).<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; This issue is theft
                      of the authorization code during the redirect.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; Authenticating the
                      client is an important feature and goes a long<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; way, but it is not
                      sufficient since in many cases, the<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;
                      client_id/client_secret will likely be hard coded
                      and relatively<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; easy to deduce (e.g.
                      mobile client apps).Â  Of course a strong<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; client
                      authentication won't have this issue. This makes
                      many<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; consumer situations
                      very susceptible to an attack where the<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code
                      is<br>
                      &gt; &gt;&gt;&gt;&gt; intercepted.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; For more information
                      look at the SAML Artifact issues in section<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; 6.5 (specifically
                      stolen artifact, replay, etc) of this document:<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; <a
                        moz-do-not-send="true" href="http://docs.oasis-"
                        target="_blank">http://docs.oasis-</a><br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;
                      open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; There are a number
                      of remediations suggested (small lifetime,<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; single use), but the
                      foundational one is confidentiality of the<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; exchange (TLS).
                      Hence the recommendation that the return of an<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code
                      be kept secure with a MUST for TLS.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; Phil<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; <a
                        moz-do-not-send="true"
                        href="/mc/compose?to=phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; On 2011-03-24, at
                      7:22 PM, Chuck Mortimore wrote:<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; On Mar 24, 2011,
                      at 6:36 PM, "Eran Hammer-Lahav"<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; &lt;<a
                        moz-do-not-send="true"
                        href="/mc/compose?to=eran@hueniverse.com">eran@hueniverse.com</a>&gt;
                      wrote:<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;
                      -----Original Message-----<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; From: <a
                        moz-do-not-send="true"
                        href="/mc/compose?to=oauth-bounces@ietf.org">oauth-bounces@ietf.org</a>
                      [<a class="moz-txt-link-freetext" href="mailto:oauth">mailto:oauth</a>-<br>
                      &gt; <a moz-do-not-send="true"
                        href="/mc/compose?to=bounces@ietf.org">bounces@ietf.org</a>]<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; On
                      Behalf Of Chuck Mortimore<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Sent:
                      Monday, March 14, 2011 6:10 PM<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 1) I'd
                      vote for dropping the following from 1.4.2.Â Â Â In
                      turn I'd<br>
                      &gt; discuss<br>
                      &gt; &gt;&gt;&gt;&gt; some<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; of<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; the
                      security considerations, such as difficulty of
                      protecting<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; a
                      client_secret in almost all use-cases of this
                      profile.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;Â 
                      "Implicit grants improve the responsiveness and
                      efficiency of<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; some
                      clients (such as a client implemented as an
                      in-browser<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;
                      application) since it reduces the number of round
                      trips<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; required
                      to obtain an access token."<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why drop it?
                      What about it isn't accurate?<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; It's accurate,
                      but my opinion is it sends the wrong
                      message.Â Â Â It's<br>
                      &gt; clearly<br>
                      &gt; &gt;&gt;&gt;&gt; the<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; less secure of the
                      response types.Â  By positioning it as the most<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; performant people
                      may find that attractive and make the wrong<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; security<br>
                      &gt; &gt;&gt;&gt;&gt; decision.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 2)
                      Section 2.1, we should MUST TLS even for
                      Authorization Code.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why? What's
                      the attack vector?<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; See Phils
                      comment on past experience with artifact bindings.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Spec should<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; default for security
                      always on, and let deployments that don't<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; want to use HTTPs
                      simply be non-conformant.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 3)
                      Section 4.1.3 - not clear to me why redirect_uri
                      is<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; REQUIRED
                      since in 4.1.1 it's "REQUIRED unless"<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; The client
                      should always confirm where the code was sent to.
                      It<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; can omit<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; the redirection is
                      one was provided but should tell the server<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; where it went to.
                      This is more consistent on the verification<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; side, but if the
                      original flow designers want to chime in (Dick,<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; Brian, etc.?), I'm
                      open<br>
                      &gt; &gt;&gt;&gt;&gt; to change this.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 4)
                      Section 4.2.2 - when did we drop refresh_token?Â 
                      Â Â Â I assume<br>
                      &gt; this<br>
                      &gt; &gt;&gt;&gt;&gt; goes<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; back to
                      disagreement on how best to handle native clients.
                      I'd<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; prefer
                      it to simply reference 5.1 and leave what is
                      issued up<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; to the
                      security profile of the particular deployment as
                      to what is<br>
                      &gt; issued.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; -08 June
                      2010.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; This has
                      been decided for a long time. I'm not eager to
                      change it.<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Thanks - I can
                      live with it.Â  Unfortunately we still seem to be<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; fragmenting on<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; the native client
                      approach.Â Â Â Good topic for IIW I suspect<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; -cmort<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; EHL<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;
                      _______________________________________________<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; OAuth mailing
                      list<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a
                        moz-do-not-send="true"
                        href="/mc/compose?to=OAuth@ietf.org">OAuth@ietf.org</a><br>
                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a
                        moz-do-not-send="true"
                        href="https://www.ietf.org/mailman/listinfo/oauth"
                        target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                      &gt; &gt;&gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;&gt;&gt;
                      _______________________________________________<br>
                      &gt; &gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>
                      &gt; &gt;&gt;&gt;&gt;&gt; <a
                        moz-do-not-send="true"
                        href="/mc/compose?to=OAuth@ietf.org">OAuth@ietf.org</a><br>
                      &gt; &gt;&gt;&gt;&gt;&gt; <a
                        moz-do-not-send="true"
                        href="https://www.ietf.org/mailman/listinfo/oauth"
                        target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                      &gt; &gt;&gt;&gt;&gt;<br>
                      &gt; &gt;&gt;&gt;<br>
                      &gt; &gt;&gt;<br>
                      &gt; &gt;<br>
                      &gt; &gt;<br>
                      <br>
                      _______________________________________________<br>
                      OAuth mailing list<br>
                      <a moz-do-not-send="true"
                        href="/mc/compose?to=OAuth@ietf.org">OAuth@ietf.org</a><br>
                      <a moz-do-not-send="true"
                        href="https://www.ietf.org/mailman/listinfo/oauth"
                        target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
                  </div>
                </td>
              </tr>
            </tbody>
          </table>
          <p class="MsoNormal"><span style="font-size: 10pt;
              font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;"><o:p>Â </o:p></span></p>
        </div>
      </div>
      =
      <pre wrap="">
<fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></pre>
    </blockquote>
    <br>
  </body>
</html>

--------------000307010205000402070802--

From gffletch@aol.com  Tue Mar 29 10:54:20 2011
Return-Path: <gffletch@aol.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7F50D3A6931 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 10:54:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.195
X-Spam-Level: 
X-Spam-Status: No, score=-2.195 tagged_above=-999 required=5 tests=[AWL=0.402,  BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P-4quwbNvhRF for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 10:54:18 -0700 (PDT)
Received: from imr-mb02.mx.aol.com (imr-mb02.mx.aol.com [64.12.207.163]) by core3.amsl.com (Postfix) with ESMTP id 94A7E3A68E4 for <oauth@ietf.org>; Tue, 29 Mar 2011 10:54:17 -0700 (PDT)
Received: from mtaout-db06.r1000.mx.aol.com (mtaout-db06.r1000.mx.aol.com [172.29.51.198]) by imr-mb02.mx.aol.com (8.14.1/8.14.1) with ESMTP id p2THtRWx030337; Tue, 29 Mar 2011 13:55:28 -0400
Received: from palantir.local (unknown [10.181.183.161]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mtaout-db06.r1000.mx.aol.com (MUA/Third Party Client Interface) with ESMTPSA id 5E4FFE000130; Tue, 29 Mar 2011 13:55:27 -0400 (EDT)
Message-ID: <4D921D0F.1080303@aol.com>
Date: Tue, 29 Mar 2011 13:55:27 -0400
From: George Fletcher <gffletch@aol.com>
Organization: AOL LLC
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: fcorella@pomcor.com
References: <835237.54303.qm@web55808.mail.re3.yahoo.com>
In-Reply-To: <835237.54303.qm@web55808.mail.re3.yahoo.com>
Content-Type: multipart/alternative; boundary="------------010207020000060105030705"
x-aol-global-disposition: G
X-AOL-SCOLL-SCORE: 0:2:515866144:93952408  
X-AOL-SCOLL-URL_COUNT: 0  
x-aol-sid: 3039ac1d33c64d921d0f73d2
X-AOL-IP: 10.181.183.161
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 17:54:20 -0000

This is a multi-part message in MIME format.
--------------010207020000060105030705
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Francisco,

So the examples that Justin gave were either localhost or non HTTP based 
schemes. If OAuth2 is to support these other schemes (often used in 
mobile clients) then I'm not sure how TLS can be a MUST unless it's 
qualified to apply to HTTP based URLs only.

Is it sufficient to document this possible exposure in the security 
section such that the spec doesn't preclude the use of OAuth2 with non 
HTTP based redirect_uri?

Thanks,
George

On 3/29/11 1:05 PM, Francisco Corella wrote:
> Eran,
>
> It's not a reasonable compromise.  #2 MUST use tls UNLESS of course it 
> targets localhost.  If #2 is sent without TLS to a Web server, the 
> authorization code can be easily intercepted by an attacker.  The 
> attacker can then use it to obtain protected resources by submitting 
> the authorization code to the client.  (This is independent of whether 
> the client authenticates itself when exchanging the authorization code 
> for an access token or not.) In the Facebook use case, the attacker 
> can use the authorization code to log in to the client using the 
> user's Facebook identity.  I believe this vulnerability exists in many 
> implementations of the Facebook login button today.
>
> Btw, I've pointed this out before three or four times on this mailing 
> list, including in a response to the WGLC that you never replied to.
>
> Francisco
>
> --- On *Mon, 3/28/11, Eran Hammer-Lahav /<eran@hueniverse.com>/* wrote:
>
>
>     From: Eran Hammer-Lahav <eran@hueniverse.com>
>     Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>     To: "Phil Hunt" <phil.hunt@oracle.com>, "Justin Richer"
>     <jricher@mitre.org>
>     Cc: "OAuth WG" <oauth@ietf.org>
>     Date: Monday, March 28, 2011, 10:28 PM
>
>     The code is returned in two steps:
>
>     1. The authorization server replies to the user-agent request
>     (providing authorization) with a redirection instruction typically
>     using the Location response header field.
>     2. The user-agent makes an HTTP GET request to the provided
>     location (which may be something other than an HTTP URI, or an
>     HTTP URI to localhost).
>
>     #1 is an HTTP response to a user-agent request to the
>     authorization endpoint (or a subsequent one if the server
>     implementation has multiple authorization steps).
>
>     #2 is an HTTP request made by the user-agent.
>
>     In order for the code to be secure end-to-end, both steps must use
>     TLS. The arguments made against making TLS required are based on
>     use cases for #2. We can make #1 (the authorization endpoint
>     require TLS since it already has to support it for the 'token'
>     response type. We should make callbacks a SHOULD for TLS.
>
>     Does this sound like a reasonable compromise?
>
>     EHL
>
>     > -----Original Message-----
>     > From: Phil Hunt [mailto:phil.hunt@oracle.com
>     </mc/compose?to=phil.hunt@oracle.com>]
>     > Sent: Monday, March 28, 2011 2:28 PM
>     > To: Justin Richer
>     > Cc: Eran Hammer-Lahav; OAuth WG
>     > Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>     >
>     > This was referring to section 2.1 that the authorization server
>     must use TLS
>     > when returning an authorization code.
>     >
>     > If it doesn't use TLS then the code being returned to the client
>     can be
>     > intercepted.
>     >
>     > Or did I miss something?
>     >
>     > Phil
>     > phil.hunt@oracle.com </mc/compose?to=phil.hunt@oracle.com>
>     >
>     >
>     >
>     >
>     > On 2011-03-28, at 1:37 PM, Justin Richer wrote:
>     >
>     > > Phil,
>     > >
>     > > The main difference is that it's a requirement on the *client*
>     instead
>     > > of the *provider* side of the equation, and clients aren't
>     always even
>     > > speaking HTTP. I agree that all client web servers SHOULD do it. A
>     > > particular provider can even REQUIRE it for their registered
>     clients,
>     > > a step that is outside the scope of OAuth. But there are real,
>     in-use
>     > > patterns that don't require the client to make an HTTP request
>     to an
>     > > external service.
>     > >
>     > > I don't see how Firesheep is relevant to this discussion -- if
>     your
>     > > browser is making a call to localhost to get the token, who
>     outside of
>     > > your machine is going to do it? I'm not talking about
>     convenience for
>     > > developers here (which I would argue should NOT be discounted, but
>     > > that's another argument), I'm talking about cases where the
>     browser
>     > > isn't going outside of a trusted security boundary. There are also
>     > > instances where there may not even be an HTTP transaction
>     involved,
>     > > let alone one that could support TLS.
>     > >
>     > > -- Justin
>     > >
>     > > On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:
>     > >> Justin, How is that so? Remember firesheep?  I wouldn't want the
>     > authorization code being exchanged without TLS in a cafe.
>     Intercept is just
>     > too easy. And as I mentioned earlier, client credentials are
>     already very weak
>     > in many cases. In contrast, two web servers are hard to sniff
>     unless you are
>     > able to gain access to their network communications path.
>     > >>
>     > >> As for testing, it seems more reasonable to put servers in
>     temporary non-
>     > compliance while testing rather then allow non-secure servers in
>     production
>     > because of the SHOULD loophole.
>     > >>
>     > >> Also, while it does seem convenient for the developer not to
>     have to use
>     > TLS for authz codes, note that the developer still has to have
>     TLS enabled
>     > when exchanging the code for an access token. So I'm not sure
>     how relaxing
>     > TLS for obtaining authorization actually simplifies the
>     developer lifecycle since
>     > they still have to set it up to test the other parts.  In my
>     view, it would be ok
>     > for a developer to temporarily disable TLS everywhere during
>     development -
>     > - which places operation outside RFC compliance while developing
>     -- but
>     > forces compliance once they go into production.
>     > >>
>     > >> It seems like I had to give a pretty substantial
>     justification and we backed
>     > off because TLS is seen as inconvenient. I think we need more
>     evidence that
>     > there are safe cases that don't need TLS.
>     > >>
>     > >> Sorry for pushing hard on this one, but TLS is the backbone
>     of OAuth
>     > security at present.
>     > >>
>     > >> Phil
>     > >> phil.hunt@oracle.com </mc/compose?to=phil.hunt@oracle.com>
>     > >>
>     > >>
>     > >>
>     > >>
>     > >> On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:
>     > >>
>     > >>> No change then. But the security considerations section must
>     reflect
>     > this.
>     > >>>
>     > >>> EHL
>     > >>>
>     > >>>> -----Original Message-----
>     > >>>> From: Justin Richer [mailto:jricher@mitre.org
>     </mc/compose?to=jricher@mitre.org>]
>     > >>>> Sent: Monday, March 28, 2011 10:05 AM
>     > >>>> To: Eran Hammer-Lahav
>     > >>>> Cc: Phil Hunt; OAuth WG
>     > >>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>     > >>>>
>     > >>>> What about non-http return uri's, or client-localhost, such as
>     > >>>>
>     > >>>> someapp://app/?code=foo
>     > >>>>
>     > >>>> http://localhost:87345/?code=foo
>     > >>>>
>     > >>>> HTTPS makes sense when you're talking between two web
>     servers, but
>     > >>>> it seems to fall apart otherwise. I think SHOULD is
>     appropriate here.
>     > >>>>
>     > >>>> -- Justin
>     > >>>>
>     > >>>>
>     > >>>> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
>     > >>>>> Unless someone has an objection, I'll make the change from
>     SHOULD
>     > >>>>> to
>     > >>>> MUST.
>     > >>>>>
>     > >>>>> EHL
>     > >>>>>
>     > >>>>>> -----Original Message-----
>     > >>>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com
>     </mc/compose?to=phil.hunt@oracle.com>]
>     > >>>>>> Sent: Friday, March 25, 2011 12:42 PM
>     > >>>>>> To: Eran Hammer-Lahav
>     > >>>>>> Cc: OAuth WG; Chuck & Mara Mortimore
>     > >>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>     > >>>>>>
>     > >>>>>> Regarding the message: http://www.ietf.org/mail-
>     > >>>>>> archive/web/oauth/current/msg05762.html  (sorry I somehow
>     lost
>     > >>>>>> the message in my email).
>     > >>>>>>
>     > >>>>>> This issue is theft of the authorization code during the
>     redirect.
>     > >>>>>> Authenticating the client is an important feature and
>     goes a long
>     > >>>>>> way, but it is not sufficient since in many cases, the
>     > >>>>>> client_id/client_secret will likely be hard coded and
>     relatively
>     > >>>>>> easy to deduce (e.g. mobile client apps).  Of course a strong
>     > >>>>>> client authentication won't have this issue. This makes many
>     > >>>>>> consumer situations very susceptible to an attack where the
>     > >>>>>> authorization code is
>     > >>>> intercepted.
>     > >>>>>>
>     > >>>>>> For more information look at the SAML Artifact issues in
>     section
>     > >>>>>> 6.5 (specifically stolen artifact, replay, etc) of this
>     document:
>     > >>>>>> http://docs.oasis-
>     > >>>>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
>     > >>>>>>
>     > >>>>>> There are a number of remediations suggested (small lifetime,
>     > >>>>>> single use), but the foundational one is confidentiality
>     of the
>     > >>>>>> exchange (TLS). Hence the recommendation that the return
>     of an
>     > >>>>>> authorization code be kept secure with a MUST for TLS.
>     > >>>>>>
>     > >>>>>> Phil
>     > >>>>>> phil.hunt@oracle.com </mc/compose?to=phil.hunt@oracle.com>
>     > >>>>>>
>     > >>>>>>
>     > >>>>>>
>     > >>>>>>
>     > >>>>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
>     > >>>>>>
>     > >>>>>>>
>     > >>>>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
>     > >>>>>> <eran@hueniverse.com
>     </mc/compose?to=eran@hueniverse.com>> wrote:
>     > >>>>>>>
>     > >>>>>>>>
>     > >>>>>>>>> -----Original Message-----
>     > >>>>>>>>> From: oauth-bounces@ietf.org
>     </mc/compose?to=oauth-bounces@ietf.org> [mailto:oauth-
>     > bounces@ietf.org </mc/compose?to=bounces@ietf.org>]
>     > >>>>>>>>> On Behalf Of Chuck Mortimore
>     > >>>>>>>>> Sent: Monday, March 14, 2011 6:10 PM
>     > >>>>>>>>
>     > >>>>>>>>> 1) I'd vote for dropping the following from
>     1.4.2.   In turn I'd
>     > discuss
>     > >>>> some
>     > >>>>>> of
>     > >>>>>>>>> the security considerations, such as difficulty of
>     protecting
>     > >>>>>>>>> a client_secret in almost all use-cases of this profile.
>     > >>>>>>>>>
>     > >>>>>>>>>  "Implicit grants improve the responsiveness and
>     efficiency of
>     > >>>>>>>>> some clients (such as a client implemented as an
>     in-browser
>     > >>>>>>>>> application) since it reduces the number of round trips
>     > >>>>>>>>> required to obtain an access token."
>     > >>>>>>>>
>     > >>>>>>>> Why drop it? What about it isn't accurate?
>     > >>>>>>>
>     > >>>>>>> It's accurate, but my opinion is it sends the wrong
>     message.   It's
>     > clearly
>     > >>>> the
>     > >>>>>> less secure of the response types.  By positioning it as
>     the most
>     > >>>>>> performant people may find that attractive and make the wrong
>     > >>>>>> security
>     > >>>> decision.
>     > >>>>>>>
>     > >>>>>>>
>     > >>>>>>>>
>     > >>>>>>>>> 2) Section 2.1, we should MUST TLS even for
>     Authorization Code.
>     > >>>>>>>>
>     > >>>>>>>> Why? What's the attack vector?
>     > >>>>>>>
>     > >>>>>>> See Phils comment on past experience with artifact bindings.
>     > >>>>>>> Spec should
>     > >>>>>> default for security always on, and let deployments that
>     don't
>     > >>>>>> want to use HTTPs simply be non-conformant.
>     > >>>>>>>
>     > >>>>>>>>
>     > >>>>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is
>     > >>>>>>>>> REQUIRED since in 4.1.1 it's "REQUIRED unless"
>     > >>>>>>>>
>     > >>>>>>>> The client should always confirm where the code was
>     sent to. It
>     > >>>>>>>> can omit
>     > >>>>>> the redirection is one was provided but should tell the
>     server
>     > >>>>>> where it went to. This is more consistent on the verification
>     > >>>>>> side, but if the original flow designers want to chime in
>     (Dick,
>     > >>>>>> Brian, etc.?), I'm open
>     > >>>> to change this.
>     > >>>>>>>>
>     > >>>>>>>>> 4) Section 4.2.2 - when did we drop refresh_token? 
>        I assume
>     > this
>     > >>>> goes
>     > >>>>>>>>> back to disagreement on how best to handle native
>     clients. I'd
>     > >>>>>>>>> prefer it to simply reference 5.1 and leave what is
>     issued up
>     > >>>>>>>>> to the security profile of the particular deployment
>     as to what is
>     > issued.
>     > >>>>>>>>
>     > >>>>>>>> -08 June 2010.
>     > >>>>>>>>
>     > >>>>>>>> This has been decided for a long time. I'm not eager to
>     change it.
>     > >>>>>>>
>     > >>>>>>> Thanks - I can live with it.  Unfortunately we still
>     seem to be
>     > >>>>>>> fragmenting on
>     > >>>>>> the native client approach.   Good topic for IIW I suspect
>     > >>>>>>>
>     > >>>>>>> -cmort
>     > >>>>>>>
>     > >>>>>>>>
>     > >>>>>>>> EHL
>     > >>>>>>>>
>     > >>>>>>>>
>     > >>>>>>> _______________________________________________
>     > >>>>>>> OAuth mailing list
>     > >>>>>>> OAuth@ietf.org </mc/compose?to=OAuth@ietf.org>
>     > >>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>     > >>>>>
>     > >>>>> _______________________________________________
>     > >>>>> OAuth mailing list
>     > >>>>> OAuth@ietf.org </mc/compose?to=OAuth@ietf.org>
>     > >>>>> https://www.ietf.org/mailman/listinfo/oauth
>     > >>>>
>     > >>>
>     > >>
>     > >
>     > >
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org </mc/compose?to=OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--------------010207020000060105030705
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 8bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#ffffff">
    <font face="Helvetica, Arial, sans-serif">Hi Francisco,<br>
      <br>
      So the examples that Justin gave were either localhost or non HTTP
      based schemes. If OAuth2 is to support these other schemes (often
      used in mobile clients) then I'm not sure how TLS can be a MUST
      unless it's qualified to apply to HTTP based URLs only.<br>
      <br>
      Is it sufficient to document this possible exposure in the
      security section such that the spec doesn't preclude the use of
      OAuth2 with non HTTP based redirect_uri?<br>
      <br>
      Thanks,<br>
      George<br>
    </font><br>
    On 3/29/11 1:05 PM, Francisco Corella wrote:
    <blockquote cite="mid:835237.54303.qm@web55808.mail.re3.yahoo.com"
      type="cite">
      <table border="0" cellpadding="0" cellspacing="0">
        <tbody>
          <tr>
            <td style="font: inherit;" valign="top">Eran,<br>
              <br>
              It's not a reasonable compromise.Â  #2 MUST use tls UNLESS
              of course it targets localhost.Â  If #2 is sent without TLS
              to a Web server, the authorization code can be easily
              intercepted by an attacker.Â  The attacker can then use it
              to obtain protected resources by submitting the
              authorization code to the client.Â  (This is independent of
              whether the client authenticates itself when exchanging
              the authorization code for an access token or not.) In the
              Facebook use case, the attacker can use the authorization
              code to log in to the client using the user's Facebook
              identity.Â  I believe this vulnerability exists in many
              implementations of the Facebook login button today.<br>
              <br>
              Btw, I've pointed this out before three or four times on
              this mailing list, including in a response to the WGLC
              that you never replied to.<br>
              <br>
              Francisco<br>
              <br>
              --- On <b>Mon, 3/28/11, Eran Hammer-Lahav <i><a class="moz-txt-link-rfc2396E" href="mailto:eran@hueniverse.com">&lt;eran@hueniverse.com&gt;</a></i></b>
              wrote:<br>
              <blockquote style="border-left: 2px solid rgb(16, 16,
                255); margin-left: 5px; padding-left: 5px;"><br>
                From: Eran Hammer-Lahav <a class="moz-txt-link-rfc2396E" href="mailto:eran@hueniverse.com">&lt;eran@hueniverse.com&gt;</a><br>
                Subject: Re: [OAUTH-WG] WGLC on
                draft-ietf-oauth-v2-13.txt<br>
                To: "Phil Hunt" <a class="moz-txt-link-rfc2396E" href="mailto:phil.hunt@oracle.com">&lt;phil.hunt@oracle.com&gt;</a>, "Justin
                Richer" <a class="moz-txt-link-rfc2396E" href="mailto:jricher@mitre.org">&lt;jricher@mitre.org&gt;</a><br>
                Cc: "OAuth WG" <a class="moz-txt-link-rfc2396E" href="mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a><br>
                Date: Monday, March 28, 2011, 10:28 PM<br>
                <br>
                <div class="plainMail">The code is returned in two
                  steps:<br>
                  <br>
                  1. The authorization server replies to the user-agent
                  request (providing authorization) with a redirection
                  instruction typically using the Location response
                  header field.<br>
                  2. The user-agent makes an HTTP GET request to the
                  provided location (which may be something other than
                  an HTTP URI, or an HTTP URI to localhost).<br>
                  <br>
                  #1 is an HTTP response to a user-agent request to the
                  authorization endpoint (or a subsequent one if the
                  server implementation has multiple authorization
                  steps).<br>
                  <br>
                  #2 is an HTTP request made by the user-agent.<br>
                  <br>
                  In order for the code to be secure end-to-end, both
                  steps must use TLS. The arguments made against making
                  TLS required are based on use cases for #2. We can
                  make #1 (the authorization endpoint require TLS since
                  it already has to support it for the 'token' response
                  type. We should make callbacks a SHOULD for TLS.<br>
                  <br>
                  Does this sound like a reasonable compromise?<br>
                  <br>
                  EHL<br>
                  <br>
                  &gt; -----Original Message-----<br>
                  &gt; From: Phil Hunt [mailto:<a moz-do-not-send="true"
                    ymailto="mailto:phil.hunt@oracle.com"
                    href="/mc/compose?to=phil.hunt@oracle.com">phil.hunt@oracle.com</a>]<br>
                  &gt; Sent: Monday, March 28, 2011 2:28 PM<br>
                  &gt; To: Justin Richer<br>
                  &gt; Cc: Eran Hammer-Lahav; OAuth WG<br>
                  &gt; Subject: Re: [OAUTH-WG] WGLC on
                  draft-ietf-oauth-v2-13.txt<br>
                  &gt; <br>
                  &gt; This was referring to section 2.1 that the
                  authorization server must use TLS<br>
                  &gt; when returning an authorization code.<br>
                  &gt; <br>
                  &gt; If it doesn't use TLS then the code being
                  returned to the client can be<br>
                  &gt; intercepted.<br>
                  &gt; <br>
                  &gt; Or did I miss something?<br>
                  &gt; <br>
                  &gt; Phil<br>
                  &gt; <a moz-do-not-send="true"
                    ymailto="mailto:phil.hunt@oracle.com"
                    href="/mc/compose?to=phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>
                  &gt; <br>
                  &gt; <br>
                  &gt; <br>
                  &gt; <br>
                  &gt; On 2011-03-28, at 1:37 PM, Justin Richer wrote:<br>
                  &gt; <br>
                  &gt; &gt; Phil,<br>
                  &gt; &gt;<br>
                  &gt; &gt; The main difference is that it's a
                  requirement on the *client* instead<br>
                  &gt; &gt; of the *provider* side of the equation, and
                  clients aren't always even<br>
                  &gt; &gt; speaking HTTP. I agree that all client web
                  servers SHOULD do it. A<br>
                  &gt; &gt; particular provider can even REQUIRE it for
                  their registered clients,<br>
                  &gt; &gt; a step that is outside the scope of OAuth.
                  But there are real, in-use<br>
                  &gt; &gt; patterns that don't require the client to
                  make an HTTP request to an<br>
                  &gt; &gt; external service.<br>
                  &gt; &gt;<br>
                  &gt; &gt; I don't see how Firesheep is relevant to
                  this discussion -- if your<br>
                  &gt; &gt; browser is making a call to localhost to get
                  the token, who outside of<br>
                  &gt; &gt; your machine is going to do it? I'm not
                  talking about convenience for<br>
                  &gt; &gt; developers here (which I would argue should
                  NOT be discounted, but<br>
                  &gt; &gt; that's another argument), I'm talking about
                  cases where the browser<br>
                  &gt; &gt; isn't going outside of a trusted security
                  boundary. There are also<br>
                  &gt; &gt; instances where there may not even be an
                  HTTP transaction involved,<br>
                  &gt; &gt; let alone one that could support TLS.<br>
                  &gt; &gt;<br>
                  &gt; &gt; -- Justin<br>
                  &gt; &gt;<br>
                  &gt; &gt; On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt
                  wrote:<br>
                  &gt; &gt;&gt; Justin, How is that so? Remember
                  firesheep?Â  I wouldn't want the<br>
                  &gt; authorization code being exchanged without TLS in
                  a cafe. Intercept is just<br>
                  &gt; too easy. And as I mentioned earlier, client
                  credentials are already very weak<br>
                  &gt; in many cases. In contrast, two web servers are
                  hard to sniff unless you are<br>
                  &gt; able to gain access to their network
                  communications path.<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; As for testing, it seems more reasonable
                  to put servers in temporary non-<br>
                  &gt; compliance while testing rather then allow
                  non-secure servers in production<br>
                  &gt; because of the SHOULD loophole.<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; Also, while it does seem convenient for
                  the developer not to have to use<br>
                  &gt; TLS for authz codes, note that the developer
                  still has to have TLS enabled<br>
                  &gt; when exchanging the code for an access token. So
                  I'm not sure how relaxing<br>
                  &gt; TLS for obtaining authorization actually
                  simplifies the developer lifecycle since<br>
                  &gt; they still have to set it up to test the other
                  parts.Â  In my view, it would be ok<br>
                  &gt; for a developer to temporarily disable TLS
                  everywhere during development -<br>
                  &gt; - which places operation outside RFC compliance
                  while developing -- but<br>
                  &gt; forces compliance once they go into production.<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; It seems like I had to give a pretty
                  substantial justification and we backed<br>
                  &gt; off because TLS is seen as inconvenient. I think
                  we need more evidence that<br>
                  &gt; there are safe cases that don't need TLS.<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; Sorry for pushing hard on this one, but
                  TLS is the backbone of OAuth<br>
                  &gt; security at present.<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; Phil<br>
                  &gt; &gt;&gt; <a moz-do-not-send="true"
                    ymailto="mailto:phil.hunt@oracle.com"
                    href="/mc/compose?to=phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; On 2011-03-28, at 12:52 PM, Eran
                  Hammer-Lahav wrote:<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt;&gt; No change then. But the security
                  considerations section must reflect<br>
                  &gt; this.<br>
                  &gt; &gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt; EHL<br>
                  &gt; &gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; -----Original Message-----<br>
                  &gt; &gt;&gt;&gt;&gt; From: Justin Richer [mailto:<a
                    moz-do-not-send="true"
                    ymailto="mailto:jricher@mitre.org"
                    href="/mc/compose?to=jricher@mitre.org">jricher@mitre.org</a>]<br>
                  &gt; &gt;&gt;&gt;&gt; Sent: Monday, March 28, 2011
                  10:05 AM<br>
                  &gt; &gt;&gt;&gt;&gt; To: Eran Hammer-Lahav<br>
                  &gt; &gt;&gt;&gt;&gt; Cc: Phil Hunt; OAuth WG<br>
                  &gt; &gt;&gt;&gt;&gt; Subject: Re: [OAUTH-WG] WGLC on
                  draft-ietf-oauth-v2-13.txt<br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; What about non-http return
                  uri's, or client-localhost, such as<br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; someapp://app/?code=foo<br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; <a moz-do-not-send="true"
                    href="http://localhost:87345/?code=foo"
                    target="_blank">http://localhost:87345/?code=foo</a><br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; HTTPS makes sense when you're
                  talking between two web servers, but<br>
                  &gt; &gt;&gt;&gt;&gt; it seems to fall apart
                  otherwise. I think SHOULD is appropriate here.<br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; -- Justin<br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; On Fri, 2011-03-25 at 16:03
                  -0400, Eran Hammer-Lahav wrote:<br>
                  &gt; &gt;&gt;&gt;&gt;&gt; Unless someone has an
                  objection, I'll make the change from SHOULD<br>
                  &gt; &gt;&gt;&gt;&gt;&gt; to<br>
                  &gt; &gt;&gt;&gt;&gt; MUST.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt; EHL<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; -----Original
                  Message-----<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; From: Phil Hunt [mailto:<a
                    moz-do-not-send="true"
                    ymailto="mailto:phil.hunt@oracle.com"
                    href="/mc/compose?to=phil.hunt@oracle.com">phil.hunt@oracle.com</a>]<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Sent: Friday, March 25,
                  2011 12:42 PM<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; To: Eran Hammer-Lahav<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Cc: OAuth WG; Chuck
                  &amp; Mara Mortimore<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Subject: Re: [OAUTH-WG]
                  WGLC on draft-ietf-oauth-v2-13.txt<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Regarding the message: <a
                    moz-do-not-send="true"
                    href="http://www.ietf.org/mail-" target="_blank">http://www.ietf.org/mail-</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;
                  archive/web/oauth/current/msg05762.htmlÂ  (sorry I
                  somehow lost<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; the message in my
                  email).<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; This issue is theft of
                  the authorization code during the redirect.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Authenticating the
                  client is an important feature and goes a long<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; way, but it is not
                  sufficient since in many cases, the<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; client_id/client_secret
                  will likely be hard coded and relatively<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; easy to deduce (e.g.
                  mobile client apps).Â  Of course a strong<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; client authentication
                  won't have this issue. This makes many<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; consumer situations very
                  susceptible to an attack where the<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code is<br>
                  &gt; &gt;&gt;&gt;&gt; intercepted.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; For more information
                  look at the SAML Artifact issues in section<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; 6.5 (specifically stolen
                  artifact, replay, etc) of this document:<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; <a
                    moz-do-not-send="true" href="http://docs.oasis-"
                    target="_blank">http://docs.oasis-</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;
                  open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; There are a number of
                  remediations suggested (small lifetime,<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; single use), but the
                  foundational one is confidentiality of the<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; exchange (TLS). Hence
                  the recommendation that the return of an<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code be
                  kept secure with a MUST for TLS.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Phil<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; <a
                    moz-do-not-send="true"
                    ymailto="mailto:phil.hunt@oracle.com"
                    href="/mc/compose?to=phil.hunt@oracle.com">phil.hunt@oracle.com</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; On 2011-03-24, at 7:22
                  PM, Chuck Mortimore wrote:<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; On Mar 24, 2011, at
                  6:36 PM, "Eran Hammer-Lahav"<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; &lt;<a
                    moz-do-not-send="true"
                    ymailto="mailto:eran@hueniverse.com"
                    href="/mc/compose?to=eran@hueniverse.com">eran@hueniverse.com</a>&gt;
                  wrote:<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;
                  -----Original Message-----<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; From: <a
                    moz-do-not-send="true"
                    ymailto="mailto:oauth-bounces@ietf.org"
                    href="/mc/compose?to=oauth-bounces@ietf.org">oauth-bounces@ietf.org</a>
                  [<a class="moz-txt-link-freetext" href="mailto:oauth">mailto:oauth</a>-<br>
                  &gt; <a moz-do-not-send="true"
                    ymailto="mailto:bounces@ietf.org"
                    href="/mc/compose?to=bounces@ietf.org">bounces@ietf.org</a>]<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; On Behalf Of
                  Chuck Mortimore<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Sent:
                  Monday, March 14, 2011 6:10 PM<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 1) I'd vote
                  for dropping the following from 1.4.2.Â Â Â In turn I'd<br>
                  &gt; discuss<br>
                  &gt; &gt;&gt;&gt;&gt; some<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; of<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; the security
                  considerations, such as difficulty of protecting<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; a
                  client_secret in almost all use-cases of this profile.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;Â  "Implicit
                  grants improve the responsiveness and efficiency of<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; some clients
                  (such as a client implemented as an in-browser<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; application)
                  since it reduces the number of round trips<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; required to
                  obtain an access token."<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why drop it?
                  What about it isn't accurate?<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; It's accurate, but
                  my opinion is it sends the wrong message.Â Â Â It's<br>
                  &gt; clearly<br>
                  &gt; &gt;&gt;&gt;&gt; the<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; less secure of the
                  response types.Â  By positioning it as the most<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; performant people may
                  find that attractive and make the wrong<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; security<br>
                  &gt; &gt;&gt;&gt;&gt; decision.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 2) Section
                  2.1, we should MUST TLS even for Authorization Code.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why? What's the
                  attack vector?<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; See Phils comment on
                  past experience with artifact bindings.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Spec should<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; default for security
                  always on, and let deployments that don't<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; want to use HTTPs simply
                  be non-conformant.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 3) Section
                  4.1.3 - not clear to me why redirect_uri is<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; REQUIRED
                  since in 4.1.1 it's "REQUIRED unless"<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; The client
                  should always confirm where the code was sent to. It<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; can omit<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; the redirection is one
                  was provided but should tell the server<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; where it went to. This
                  is more consistent on the verification<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; side, but if the
                  original flow designers want to chime in (Dick,<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Brian, etc.?), I'm open<br>
                  &gt; &gt;&gt;&gt;&gt; to change this.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 4) Section
                  4.2.2 - when did we drop refresh_token?Â  Â Â Â I assume<br>
                  &gt; this<br>
                  &gt; &gt;&gt;&gt;&gt; goes<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; back to
                  disagreement on how best to handle native clients. I'd<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; prefer it to
                  simply reference 5.1 and leave what is issued up<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; to the
                  security profile of the particular deployment as to
                  what is<br>
                  &gt; issued.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; -08 June 2010.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; This has been
                  decided for a long time. I'm not eager to change it.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Thanks - I can live
                  with it.Â  Unfortunately we still seem to be<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; fragmenting on<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; the native client
                  approach.Â Â Â Good topic for IIW I suspect<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; -cmort<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; EHL<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;
                  _______________________________________________<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a
                    moz-do-not-send="true"
                    ymailto="mailto:OAuth@ietf.org"
                    href="/mc/compose?to=OAuth@ietf.org">OAuth@ietf.org</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a
                    moz-do-not-send="true"
                    href="https://www.ietf.org/mailman/listinfo/oauth"
                    target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;
                  _______________________________________________<br>
                  &gt; &gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>
                  &gt; &gt;&gt;&gt;&gt;&gt; <a moz-do-not-send="true"
                    ymailto="mailto:OAuth@ietf.org"
                    href="/mc/compose?to=OAuth@ietf.org">OAuth@ietf.org</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt; <a moz-do-not-send="true"
                    href="https://www.ietf.org/mailman/listinfo/oauth"
                    target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;<br>
                  &gt; &gt;<br>
                  <br>
                  _______________________________________________<br>
                  OAuth mailing list<br>
                  <a moz-do-not-send="true"
                    ymailto="mailto:OAuth@ietf.org"
                    href="/mc/compose?to=OAuth@ietf.org">OAuth@ietf.org</a><br>
                  <a moz-do-not-send="true"
                    href="https://www.ietf.org/mailman/listinfo/oauth"
                    target="_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                </div>
              </blockquote>
            </td>
          </tr>
        </tbody>
      </table>
      <pre wrap="">
<fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
  </body>
</html>

--------------010207020000060105030705--

From phil.hunt@oracle.com  Tue Mar 29 11:02:09 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 13BA83A6A7F for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 11:02:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.565
X-Spam-Level: 
X-Spam-Status: No, score=-6.565 tagged_above=-999 required=5 tests=[AWL=0.032,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VcvtAqJ+0isT for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 11:02:06 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 152E33A6A76 for <oauth@ietf.org>; Tue, 29 Mar 2011 11:02:06 -0700 (PDT)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2TI3XGw010683 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 29 Mar 2011 18:03:34 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by rcsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2TI3VT1014239 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 29 Mar 2011 18:03:32 GMT
Received: from abhmt021.oracle.com (abhmt021.oracle.com [141.146.116.30]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2TI3VsC018354; Tue, 29 Mar 2011 13:03:31 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 29 Mar 2011 11:03:29 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-13-992060674
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <4D921D0F.1080303@aol.com>
Date: Tue, 29 Mar 2011 11:03:27 -0700
Message-Id: <59EC5976-671D-4D9D-B500-8F9F90FA7D4E@oracle.com>
References: <835237.54303.qm@web55808.mail.re3.yahoo.com> <4D921D0F.1080303@aol.com>
To: George Fletcher <gffletch@aol.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090206.4D921EF5.0044,ss=1,fgs=0
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 18:02:09 -0000

--Apple-Mail-13-992060674
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

My primary concern is that when the authorization code is handed back to =
the target app (in this case by way of redirect through a =
user-agent/browser), then the return path to the browser is at least =
secure.  If the browser/user-agent is redirecting to a local app, then =
no big deal. BUT, if the app is redirecting back to a web service, then =
that path too must be secure.

So both #1 and #2 (described earlier) MUST be secure unless redirect is =
local in which case 2 (outgoing GET by user agent) is optional since it =
cannot be scanned. =20

I think SHOULD is too weak (too broad). I'd rather have a MUST with an =
appropriate specific exception to cover the local portion of the =
redirect.

Phil
phil.hunt@oracle.com




On 2011-03-29, at 10:55 AM, George Fletcher wrote:

> Hi Francisco,
>=20
> So the examples that Justin gave were either localhost or non HTTP =
based schemes. If OAuth2 is to support these other schemes (often used =
in mobile clients) then I'm not sure how TLS can be a MUST unless it's =
qualified to apply to HTTP based URLs only.
>=20
> Is it sufficient to document this possible exposure in the security =
section such that the spec doesn't preclude the use of OAuth2 with non =
HTTP based redirect_uri?
>=20
> Thanks,
> George
>=20
> On 3/29/11 1:05 PM, Francisco Corella wrote:
>>=20
>> Eran,
>>=20
>> It's not a reasonable compromise.  #2 MUST use tls UNLESS of course =
it targets localhost.  If #2 is sent without TLS to a Web server, the =
authorization code can be easily intercepted by an attacker.  The =
attacker can then use it to obtain protected resources by submitting the =
authorization code to the client.  (This is independent of whether the =
client authenticates itself when exchanging the authorization code for =
an access token or not.) In the Facebook use case, the attacker can use =
the authorization code to log in to the client using the user's Facebook =
identity.  I believe this vulnerability exists in many implementations =
of the Facebook login button today.
>>=20
>> Btw, I've pointed this out before three or four times on this mailing =
list, including in a response to the WGLC that you never replied to.
>>=20
>> Francisco
>>=20
>> --- On Mon, 3/28/11, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
>>=20
>> From: Eran Hammer-Lahav <eran@hueniverse.com>
>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>> To: "Phil Hunt" <phil.hunt@oracle.com>, "Justin Richer" =
<jricher@mitre.org>
>> Cc: "OAuth WG" <oauth@ietf.org>
>> Date: Monday, March 28, 2011, 10:28 PM
>>=20
>> The code is returned in two steps:
>>=20
>> 1. The authorization server replies to the user-agent request =
(providing authorization) with a redirection instruction typically using =
the Location response header field.
>> 2. The user-agent makes an HTTP GET request to the provided location =
(which may be something other than an HTTP URI, or an HTTP URI to =
localhost).
>>=20
>> #1 is an HTTP response to a user-agent request to the authorization =
endpoint (or a subsequent one if the server implementation has multiple =
authorization steps).
>>=20
>> #2 is an HTTP request made by the user-agent.
>>=20
>> In order for the code to be secure end-to-end, both steps must use =
TLS. The arguments made against making TLS required are based on use =
cases for #2. We can make #1 (the authorization endpoint require TLS =
since it already has to support it for the 'token' response type. We =
should make callbacks a SHOULD for TLS.
>>=20
>> Does this sound like a reasonable compromise?
>>=20
>> EHL
>>=20
>> > -----Original Message-----
>> > From: Phil Hunt [mailto:phil.hunt@oracle.com]
>> > Sent: Monday, March 28, 2011 2:28 PM
>> > To: Justin Richer
>> > Cc: Eran Hammer-Lahav; OAuth WG
>> > Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>> >=20
>> > This was referring to section 2.1 that the authorization server =
must use TLS
>> > when returning an authorization code.
>> >=20
>> > If it doesn't use TLS then the code being returned to the client =
can be
>> > intercepted.
>> >=20
>> > Or did I miss something?
>> >=20
>> > Phil
>> > phil.hunt@oracle.com
>> >=20
>> >=20
>> >=20
>> >=20
>> > On 2011-03-28, at 1:37 PM, Justin Richer wrote:
>> >=20
>> > > Phil,
>> > >
>> > > The main difference is that it's a requirement on the *client* =
instead
>> > > of the *provider* side of the equation, and clients aren't always =
even
>> > > speaking HTTP. I agree that all client web servers SHOULD do it. =
A
>> > > particular provider can even REQUIRE it for their registered =
clients,
>> > > a step that is outside the scope of OAuth. But there are real, =
in-use
>> > > patterns that don't require the client to make an HTTP request to =
an
>> > > external service.
>> > >
>> > > I don't see how Firesheep is relevant to this discussion -- if =
your
>> > > browser is making a call to localhost to get the token, who =
outside of
>> > > your machine is going to do it? I'm not talking about convenience =
for
>> > > developers here (which I would argue should NOT be discounted, =
but
>> > > that's another argument), I'm talking about cases where the =
browser
>> > > isn't going outside of a trusted security boundary. There are =
also
>> > > instances where there may not even be an HTTP transaction =
involved,
>> > > let alone one that could support TLS.
>> > >
>> > > -- Justin
>> > >
>> > > On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:
>> > >> Justin, How is that so? Remember firesheep?  I wouldn't want the
>> > authorization code being exchanged without TLS in a cafe. Intercept =
is just
>> > too easy. And as I mentioned earlier, client credentials are =
already very weak
>> > in many cases. In contrast, two web servers are hard to sniff =
unless you are
>> > able to gain access to their network communications path.
>> > >>
>> > >> As for testing, it seems more reasonable to put servers in =
temporary non-
>> > compliance while testing rather then allow non-secure servers in =
production
>> > because of the SHOULD loophole.
>> > >>
>> > >> Also, while it does seem convenient for the developer not to =
have to use
>> > TLS for authz codes, note that the developer still has to have TLS =
enabled
>> > when exchanging the code for an access token. So I'm not sure how =
relaxing
>> > TLS for obtaining authorization actually simplifies the developer =
lifecycle since
>> > they still have to set it up to test the other parts.  In my view, =
it would be ok
>> > for a developer to temporarily disable TLS everywhere during =
development -
>> > - which places operation outside RFC compliance while developing -- =
but
>> > forces compliance once they go into production.
>> > >>
>> > >> It seems like I had to give a pretty substantial justification =
and we backed
>> > off because TLS is seen as inconvenient. I think we need more =
evidence that
>> > there are safe cases that don't need TLS.
>> > >>
>> > >> Sorry for pushing hard on this one, but TLS is the backbone of =
OAuth
>> > security at present.
>> > >>
>> > >> Phil
>> > >> phil.hunt@oracle.com
>> > >>
>> > >>
>> > >>
>> > >>
>> > >> On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:
>> > >>
>> > >>> No change then. But the security considerations section must =
reflect
>> > this.
>> > >>>
>> > >>> EHL
>> > >>>
>> > >>>> -----Original Message-----
>> > >>>> From: Justin Richer [mailto:jricher@mitre.org]
>> > >>>> Sent: Monday, March 28, 2011 10:05 AM
>> > >>>> To: Eran Hammer-Lahav
>> > >>>> Cc: Phil Hunt; OAuth WG
>> > >>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>> > >>>>
>> > >>>> What about non-http return uri's, or client-localhost, such as
>> > >>>>
>> > >>>> someapp://app/?code=3Dfoo
>> > >>>>
>> > >>>> http://localhost:87345/?code=3Dfoo
>> > >>>>
>> > >>>> HTTPS makes sense when you're talking between two web servers, =
but
>> > >>>> it seems to fall apart otherwise. I think SHOULD is =
appropriate here.
>> > >>>>
>> > >>>> -- Justin
>> > >>>>
>> > >>>>
>> > >>>> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
>> > >>>>> Unless someone has an objection, I'll make the change from =
SHOULD
>> > >>>>> to
>> > >>>> MUST.
>> > >>>>>
>> > >>>>> EHL
>> > >>>>>
>> > >>>>>> -----Original Message-----
>> > >>>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
>> > >>>>>> Sent: Friday, March 25, 2011 12:42 PM
>> > >>>>>> To: Eran Hammer-Lahav
>> > >>>>>> Cc: OAuth WG; Chuck & Mara Mortimore
>> > >>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>> > >>>>>>
>> > >>>>>> Regarding the message: http://www.ietf.org/mail-
>> > >>>>>> archive/web/oauth/current/msg05762.html  (sorry I somehow =
lost
>> > >>>>>> the message in my email).
>> > >>>>>>
>> > >>>>>> This issue is theft of the authorization code during the =
redirect.
>> > >>>>>> Authenticating the client is an important feature and goes a =
long
>> > >>>>>> way, but it is not sufficient since in many cases, the
>> > >>>>>> client_id/client_secret will likely be hard coded and =
relatively
>> > >>>>>> easy to deduce (e.g. mobile client apps).  Of course a =
strong
>> > >>>>>> client authentication won't have this issue. This makes many
>> > >>>>>> consumer situations very susceptible to an attack where the
>> > >>>>>> authorization code is
>> > >>>> intercepted.
>> > >>>>>>
>> > >>>>>> For more information look at the SAML Artifact issues in =
section
>> > >>>>>> 6.5 (specifically stolen artifact, replay, etc) of this =
document:
>> > >>>>>> http://docs.oasis-
>> > >>>>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
>> > >>>>>>
>> > >>>>>> There are a number of remediations suggested (small =
lifetime,
>> > >>>>>> single use), but the foundational one is confidentiality of =
the
>> > >>>>>> exchange (TLS). Hence the recommendation that the return of =
an
>> > >>>>>> authorization code be kept secure with a MUST for TLS.
>> > >>>>>>
>> > >>>>>> Phil
>> > >>>>>> phil.hunt@oracle.com
>> > >>>>>>
>> > >>>>>>
>> > >>>>>>
>> > >>>>>>
>> > >>>>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
>> > >>>>>>
>> > >>>>>>>
>> > >>>>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
>> > >>>>>> <eran@hueniverse.com> wrote:
>> > >>>>>>>
>> > >>>>>>>>
>> > >>>>>>>>> -----Original Message-----
>> > >>>>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-
>> > bounces@ietf.org]
>> > >>>>>>>>> On Behalf Of Chuck Mortimore
>> > >>>>>>>>> Sent: Monday, March 14, 2011 6:10 PM
>> > >>>>>>>>
>> > >>>>>>>>> 1) I'd vote for dropping the following from 1.4.2.   In =
turn I'd
>> > discuss
>> > >>>> some
>> > >>>>>> of
>> > >>>>>>>>> the security considerations, such as difficulty of =
protecting
>> > >>>>>>>>> a client_secret in almost all use-cases of this profile.
>> > >>>>>>>>>
>> > >>>>>>>>>  "Implicit grants improve the responsiveness and =
efficiency of
>> > >>>>>>>>> some clients (such as a client implemented as an =
in-browser
>> > >>>>>>>>> application) since it reduces the number of round trips
>> > >>>>>>>>> required to obtain an access token."
>> > >>>>>>>>
>> > >>>>>>>> Why drop it? What about it isn't accurate?
>> > >>>>>>>
>> > >>>>>>> It's accurate, but my opinion is it sends the wrong =
message.   It's
>> > clearly
>> > >>>> the
>> > >>>>>> less secure of the response types.  By positioning it as the =
most
>> > >>>>>> performant people may find that attractive and make the =
wrong
>> > >>>>>> security
>> > >>>> decision.
>> > >>>>>>>
>> > >>>>>>>
>> > >>>>>>>>
>> > >>>>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization =
Code.
>> > >>>>>>>>
>> > >>>>>>>> Why? What's the attack vector?
>> > >>>>>>>
>> > >>>>>>> See Phils comment on past experience with artifact =
bindings.
>> > >>>>>>> Spec should
>> > >>>>>> default for security always on, and let deployments that =
don't
>> > >>>>>> want to use HTTPs simply be non-conformant.
>> > >>>>>>>
>> > >>>>>>>>
>> > >>>>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is
>> > >>>>>>>>> REQUIRED since in 4.1.1 it's "REQUIRED unless"
>> > >>>>>>>>
>> > >>>>>>>> The client should always confirm where the code was sent =
to. It
>> > >>>>>>>> can omit
>> > >>>>>> the redirection is one was provided but should tell the =
server
>> > >>>>>> where it went to. This is more consistent on the =
verification
>> > >>>>>> side, but if the original flow designers want to chime in =
(Dick,
>> > >>>>>> Brian, etc.?), I'm open
>> > >>>> to change this.
>> > >>>>>>>>
>> > >>>>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?     I =
assume
>> > this
>> > >>>> goes
>> > >>>>>>>>> back to disagreement on how best to handle native =
clients. I'd
>> > >>>>>>>>> prefer it to simply reference 5.1 and leave what is =
issued up
>> > >>>>>>>>> to the security profile of the particular deployment as =
to what is
>> > issued.
>> > >>>>>>>>
>> > >>>>>>>> -08 June 2010.
>> > >>>>>>>>
>> > >>>>>>>> This has been decided for a long time. I'm not eager to =
change it.
>> > >>>>>>>
>> > >>>>>>> Thanks - I can live with it.  Unfortunately we still seem =
to be
>> > >>>>>>> fragmenting on
>> > >>>>>> the native client approach.   Good topic for IIW I suspect
>> > >>>>>>>
>> > >>>>>>> -cmort
>> > >>>>>>>
>> > >>>>>>>>
>> > >>>>>>>> EHL
>> > >>>>>>>>
>> > >>>>>>>>
>> > >>>>>>> _______________________________________________
>> > >>>>>>> OAuth mailing list
>> > >>>>>>> OAuth@ietf.org
>> > >>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>> > >>>>>
>> > >>>>> _______________________________________________
>> > >>>>> OAuth mailing list
>> > >>>>> OAuth@ietf.org
>> > >>>>> https://www.ietf.org/mailman/listinfo/oauth
>> > >>>>
>> > >>>
>> > >>
>> > >
>> > >
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail-13-992060674
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">My =
primary concern is that when the authorization code is handed back to =
the target app (in this case by way of redirect through a =
user-agent/browser), then the return path to the browser is at least =
secure. &nbsp;If the browser/user-agent is redirecting to a local app, =
then no big deal. BUT, if the app is redirecting back to a web service, =
then that path too must be secure.<div><br></div><div>So both #1 and #2 =
(described earlier) MUST be secure unless redirect is local in which =
case 2 (outgoing GET by user agent) is optional since it cannot be =
scanned. &nbsp;</div><div><br></div><div>I think SHOULD is too weak (too =
broad). I'd rather have a MUST with an appropriate specific exception to =
cover the local portion of the redirect.</div><div><br></div><div><span =
class=3D"Apple-style-span" style=3D"font-size: 12px; =
">Phil</span></div><div><div><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-align: auto; text-indent: 0px; text-transform: none; =
white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-29, at 10:55 AM, George Fletcher =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">
<div text=3D"#000000" bgcolor=3D"#ffffff">
    <font face=3D"Helvetica, Arial, sans-serif">Hi Francisco,<br>
      <br>
      So the examples that Justin gave were either localhost or non HTTP
      based schemes. If OAuth2 is to support these other schemes (often
      used in mobile clients) then I'm not sure how TLS can be a MUST
      unless it's qualified to apply to HTTP based URLs only.<br>
      <br>
      Is it sufficient to document this possible exposure in the
      security section such that the spec doesn't preclude the use of
      OAuth2 with non HTTP based redirect_uri?<br>
      <br>
      Thanks,<br>
      George<br>
    </font><br>
    On 3/29/11 1:05 PM, Francisco Corella wrote:
    <blockquote cite=3D"mid:835237.54303.qm@web55808.mail.re3.yahoo.com" =
type=3D"cite">
      <table border=3D"0" cellpadding=3D"0" cellspacing=3D"0">
        <tbody>
          <tr>
            <td style=3D"font: inherit;" valign=3D"top">Eran,<br>
              <br>
              It's not a reasonable compromise.&nbsp; #2 MUST use tls =
UNLESS
              of course it targets localhost.&nbsp; If #2 is sent =
without TLS
              to a Web server, the authorization code can be easily
              intercepted by an attacker.&nbsp; The attacker can then =
use it
              to obtain protected resources by submitting the
              authorization code to the client.&nbsp; (This is =
independent of
              whether the client authenticates itself when exchanging
              the authorization code for an access token or not.) In the
              Facebook use case, the attacker can use the authorization
              code to log in to the client using the user's Facebook
              identity.&nbsp; I believe this vulnerability exists in =
many
              implementations of the Facebook login button today.<br>
              <br>
              Btw, I've pointed this out before three or four times on
              this mailing list, including in a response to the WGLC
              that you never replied to.<br>
              <br>
              Francisco<br>
              <br>
              --- On <b>Mon, 3/28/11, Eran Hammer-Lahav <i><a =
class=3D"moz-txt-link-rfc2396E" =
href=3D"mailto:eran@hueniverse.com">&lt;eran@hueniverse.com&gt;</a></i></b=
>
              wrote:<br>
              <blockquote style=3D"border-left: 2px solid rgb(16, 16,
                255); margin-left: 5px; padding-left: 5px;"><br>
                From: Eran Hammer-Lahav <a class=3D"moz-txt-link-rfc2396E"=
 href=3D"mailto:eran@hueniverse.com">&lt;eran@hueniverse.com&gt;</a><br>
                Subject: Re: [OAUTH-WG] WGLC on
                draft-ietf-oauth-v2-13.txt<br>
                To: "Phil Hunt" <a class=3D"moz-txt-link-rfc2396E" =
href=3D"mailto:phil.hunt@oracle.com">&lt;phil.hunt@oracle.com&gt;</a>, =
"Justin
                Richer" <a class=3D"moz-txt-link-rfc2396E" =
href=3D"mailto:jricher@mitre.org">&lt;jricher@mitre.org&gt;</a><br>
                Cc: "OAuth WG" <a class=3D"moz-txt-link-rfc2396E" =
href=3D"mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</a><br>
                Date: Monday, March 28, 2011, 10:28 PM<br>
                <br>
                <div class=3D"plainMail">The code is returned in two
                  steps:<br>
                  <br>
                  1. The authorization server replies to the user-agent
                  request (providing authorization) with a redirection
                  instruction typically using the Location response
                  header field.<br>
                  2. The user-agent makes an HTTP GET request to the
                  provided location (which may be something other than
                  an HTTP URI, or an HTTP URI to localhost).<br>
                  <br>
                  #1 is an HTTP response to a user-agent request to the
                  authorization endpoint (or a subsequent one if the
                  server implementation has multiple authorization
                  steps).<br>
                  <br>
                  #2 is an HTTP request made by the user-agent.<br>
                  <br>
                  In order for the code to be secure end-to-end, both
                  steps must use TLS. The arguments made against making
                  TLS required are based on use cases for #2. We can
                  make #1 (the authorization endpoint require TLS since
                  it already has to support it for the 'token' response
                  type. We should make callbacks a SHOULD for TLS.<br>
                  <br>
                  Does this sound like a reasonable compromise?<br>
                  <br>
                  EHL<br>
                  <br>
                  &gt; -----Original Message-----<br>
                  &gt; From: Phil Hunt [mailto:<a moz-do-not-send=3D"true"=
 ymailto=3D"mailto:phil.hunt@oracle.com" =
href=3D"x-msg://77/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.=
com</a>]<br>
                  &gt; Sent: Monday, March 28, 2011 2:28 PM<br>
                  &gt; To: Justin Richer<br>
                  &gt; Cc: Eran Hammer-Lahav; OAuth WG<br>
                  &gt; Subject: Re: [OAUTH-WG] WGLC on
                  draft-ietf-oauth-v2-13.txt<br>
                  &gt; <br>
                  &gt; This was referring to section 2.1 that the
                  authorization server must use TLS<br>
                  &gt; when returning an authorization code.<br>
                  &gt; <br>
                  &gt; If it doesn't use TLS then the code being
                  returned to the client can be<br>
                  &gt; intercepted.<br>
                  &gt; <br>
                  &gt; Or did I miss something?<br>
                  &gt; <br>
                  &gt; Phil<br>
                  &gt; <a moz-do-not-send=3D"true" =
ymailto=3D"mailto:phil.hunt@oracle.com" =
href=3D"x-msg://77/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.=
com</a><br>
                  &gt; <br>
                  &gt; <br>
                  &gt; <br>
                  &gt; <br>
                  &gt; On 2011-03-28, at 1:37 PM, Justin Richer =
wrote:<br>
                  &gt; <br>
                  &gt; &gt; Phil,<br>
                  &gt; &gt;<br>
                  &gt; &gt; The main difference is that it's a
                  requirement on the *client* instead<br>
                  &gt; &gt; of the *provider* side of the equation, and
                  clients aren't always even<br>
                  &gt; &gt; speaking HTTP. I agree that all client web
                  servers SHOULD do it. A<br>
                  &gt; &gt; particular provider can even REQUIRE it for
                  their registered clients,<br>
                  &gt; &gt; a step that is outside the scope of OAuth.
                  But there are real, in-use<br>
                  &gt; &gt; patterns that don't require the client to
                  make an HTTP request to an<br>
                  &gt; &gt; external service.<br>
                  &gt; &gt;<br>
                  &gt; &gt; I don't see how Firesheep is relevant to
                  this discussion -- if your<br>
                  &gt; &gt; browser is making a call to localhost to get
                  the token, who outside of<br>
                  &gt; &gt; your machine is going to do it? I'm not
                  talking about convenience for<br>
                  &gt; &gt; developers here (which I would argue should
                  NOT be discounted, but<br>
                  &gt; &gt; that's another argument), I'm talking about
                  cases where the browser<br>
                  &gt; &gt; isn't going outside of a trusted security
                  boundary. There are also<br>
                  &gt; &gt; instances where there may not even be an
                  HTTP transaction involved,<br>
                  &gt; &gt; let alone one that could support TLS.<br>
                  &gt; &gt;<br>
                  &gt; &gt; -- Justin<br>
                  &gt; &gt;<br>
                  &gt; &gt; On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt
                  wrote:<br>
                  &gt; &gt;&gt; Justin, How is that so? Remember
                  firesheep?&nbsp; I wouldn't want the<br>
                  &gt; authorization code being exchanged without TLS in
                  a cafe. Intercept is just<br>
                  &gt; too easy. And as I mentioned earlier, client
                  credentials are already very weak<br>
                  &gt; in many cases. In contrast, two web servers are
                  hard to sniff unless you are<br>
                  &gt; able to gain access to their network
                  communications path.<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; As for testing, it seems more reasonable
                  to put servers in temporary non-<br>
                  &gt; compliance while testing rather then allow
                  non-secure servers in production<br>
                  &gt; because of the SHOULD loophole.<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; Also, while it does seem convenient for
                  the developer not to have to use<br>
                  &gt; TLS for authz codes, note that the developer
                  still has to have TLS enabled<br>
                  &gt; when exchanging the code for an access token. So
                  I'm not sure how relaxing<br>
                  &gt; TLS for obtaining authorization actually
                  simplifies the developer lifecycle since<br>
                  &gt; they still have to set it up to test the other
                  parts.&nbsp; In my view, it would be ok<br>
                  &gt; for a developer to temporarily disable TLS
                  everywhere during development -<br>
                  &gt; - which places operation outside RFC compliance
                  while developing -- but<br>
                  &gt; forces compliance once they go into =
production.<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; It seems like I had to give a pretty
                  substantial justification and we backed<br>
                  &gt; off because TLS is seen as inconvenient. I think
                  we need more evidence that<br>
                  &gt; there are safe cases that don't need TLS.<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; Sorry for pushing hard on this one, but
                  TLS is the backbone of OAuth<br>
                  &gt; security at present.<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; Phil<br>
                  &gt; &gt;&gt; <a moz-do-not-send=3D"true" =
ymailto=3D"mailto:phil.hunt@oracle.com" =
href=3D"x-msg://77/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.=
com</a><br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt; On 2011-03-28, at 12:52 PM, Eran
                  Hammer-Lahav wrote:<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;&gt;&gt; No change then. But the security
                  considerations section must reflect<br>
                  &gt; this.<br>
                  &gt; &gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt; EHL<br>
                  &gt; &gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; -----Original Message-----<br>
                  &gt; &gt;&gt;&gt;&gt; From: Justin Richer [mailto:<a =
moz-do-not-send=3D"true" ymailto=3D"mailto:jricher@mitre.org" =
href=3D"x-msg://77/mc/compose?to=3Djricher@mitre.org">jricher@mitre.org</a=
>]<br>
                  &gt; &gt;&gt;&gt;&gt; Sent: Monday, March 28, 2011
                  10:05 AM<br>
                  &gt; &gt;&gt;&gt;&gt; To: Eran Hammer-Lahav<br>
                  &gt; &gt;&gt;&gt;&gt; Cc: Phil Hunt; OAuth WG<br>
                  &gt; &gt;&gt;&gt;&gt; Subject: Re: [OAUTH-WG] WGLC on
                  draft-ietf-oauth-v2-13.txt<br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; What about non-http return
                  uri's, or client-localhost, such as<br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; <a =
href=3D"someapp://app/?code=3Dfoo">someapp://app/?code=3Dfoo</a><br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; <a moz-do-not-send=3D"true" =
href=3D"http://localhost:87345/?code=3Dfoo" =
target=3D"_blank">http://localhost:87345/?code=3Dfoo</a><br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; HTTPS makes sense when you're
                  talking between two web servers, but<br>
                  &gt; &gt;&gt;&gt;&gt; it seems to fall apart
                  otherwise. I think SHOULD is appropriate here.<br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; -- Justin<br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt; On Fri, 2011-03-25 at 16:03
                  -0400, Eran Hammer-Lahav wrote:<br>
                  &gt; &gt;&gt;&gt;&gt;&gt; Unless someone has an
                  objection, I'll make the change from SHOULD<br>
                  &gt; &gt;&gt;&gt;&gt;&gt; to<br>
                  &gt; &gt;&gt;&gt;&gt; MUST.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt; EHL<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; -----Original
                  Message-----<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; From: Phil Hunt =
[mailto:<a moz-do-not-send=3D"true" =
ymailto=3D"mailto:phil.hunt@oracle.com" =
href=3D"x-msg://77/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.=
com</a>]<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Sent: Friday, March 25,
                  2011 12:42 PM<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; To: Eran =
Hammer-Lahav<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Cc: OAuth WG; Chuck
                  &amp; Mara Mortimore<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Subject: Re: [OAUTH-WG]
                  WGLC on draft-ietf-oauth-v2-13.txt<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Regarding the message: =
<a moz-do-not-send=3D"true" href=3D"http://www.ietf.org/mail-" =
target=3D"_blank">http://www.ietf.org/mail-</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;
                  archive/web/oauth/current/msg05762.html&nbsp; (sorry I
                  somehow lost<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; the message in my
                  email).<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; This issue is theft of
                  the authorization code during the redirect.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Authenticating the
                  client is an important feature and goes a long<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; way, but it is not
                  sufficient since in many cases, the<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; client_id/client_secret
                  will likely be hard coded and relatively<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; easy to deduce (e.g.
                  mobile client apps).&nbsp; Of course a strong<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; client authentication
                  won't have this issue. This makes many<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; consumer situations very
                  susceptible to an attack where the<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code =
is<br>
                  &gt; &gt;&gt;&gt;&gt; intercepted.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; For more information
                  look at the SAML Artifact issues in section<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; 6.5 (specifically stolen
                  artifact, replay, etc) of this document:<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; <a =
moz-do-not-send=3D"true" href=3D"http://docs.oasis-/" =
target=3D"_blank">http://docs.oasis-</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;
                  <a =
href=3D"http://open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf">o=
pen.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; There are a number of
                  remediations suggested (small lifetime,<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; single use), but the
                  foundational one is confidentiality of the<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; exchange (TLS). Hence
                  the recommendation that the return of an<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code be
                  kept secure with a MUST for TLS.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Phil<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; <a =
moz-do-not-send=3D"true" ymailto=3D"mailto:phil.hunt@oracle.com" =
href=3D"x-msg://77/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.=
com</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; On 2011-03-24, at 7:22
                  PM, Chuck Mortimore wrote:<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; On Mar 24, 2011, at
                  6:36 PM, "Eran Hammer-Lahav"<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; &lt;<a =
moz-do-not-send=3D"true" ymailto=3D"mailto:eran@hueniverse.com" =
href=3D"x-msg://77/mc/compose?to=3Deran@hueniverse.com">eran@hueniverse.co=
m</a>&gt;
                  wrote:<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;
                  -----Original Message-----<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; From: <a =
moz-do-not-send=3D"true" ymailto=3D"mailto:oauth-bounces@ietf.org" =
href=3D"x-msg://77/mc/compose?to=3Doauth-bounces@ietf.org">oauth-bounces@i=
etf.org</a>
                  [<a class=3D"moz-txt-link-freetext" =
href=3D"mailto:oauth">mailto:oauth</a>-<br>
                  &gt; <a moz-do-not-send=3D"true" =
ymailto=3D"mailto:bounces@ietf.org" =
href=3D"x-msg://77/mc/compose?to=3Dbounces@ietf.org">bounces@ietf.org</a>]=
<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; On Behalf Of
                  Chuck Mortimore<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Sent:
                  Monday, March 14, 2011 6:10 PM<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 1) I'd vote
                  for dropping the following from =
1.4.2.&nbsp;&nbsp;&nbsp;In turn I'd<br>
                  &gt; discuss<br>
                  &gt; &gt;&gt;&gt;&gt; some<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; of<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; the security
                  considerations, such as difficulty of protecting<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; a
                  client_secret in almost all use-cases of this =
profile.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&nbsp; =
"Implicit
                  grants improve the responsiveness and efficiency =
of<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; some clients
                  (such as a client implemented as an in-browser<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; application)
                  since it reduces the number of round trips<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; required to
                  obtain an access token."<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why drop it?
                  What about it isn't accurate?<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; It's accurate, but
                  my opinion is it sends the wrong =
message.&nbsp;&nbsp;&nbsp;It's<br>
                  &gt; clearly<br>
                  &gt; &gt;&gt;&gt;&gt; the<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; less secure of the
                  response types.&nbsp; By positioning it as the =
most<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; performant people may
                  find that attractive and make the wrong<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; security<br>
                  &gt; &gt;&gt;&gt;&gt; decision.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 2) Section
                  2.1, we should MUST TLS even for Authorization =
Code.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why? What's the
                  attack vector?<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; See Phils comment on
                  past experience with artifact bindings.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Spec should<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; default for security
                  always on, and let deployments that don't<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; want to use HTTPs simply
                  be non-conformant.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 3) Section
                  4.1.3 - not clear to me why redirect_uri is<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; REQUIRED
                  since in 4.1.1 it's "REQUIRED unless"<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; The client
                  should always confirm where the code was sent to. =
It<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; can omit<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; the redirection is one
                  was provided but should tell the server<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; where it went to. This
                  is more consistent on the verification<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; side, but if the
                  original flow designers want to chime in (Dick,<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Brian, etc.?), I'm =
open<br>
                  &gt; &gt;&gt;&gt;&gt; to change this.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 4) Section
                  4.2.2 - when did we drop refresh_token?&nbsp; =
&nbsp;&nbsp;&nbsp;I assume<br>
                  &gt; this<br>
                  &gt; &gt;&gt;&gt;&gt; goes<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; back to
                  disagreement on how best to handle native clients. =
I'd<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; prefer it to
                  simply reference 5.1 and leave what is issued up<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; to the
                  security profile of the particular deployment as to
                  what is<br>
                  &gt; issued.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; -08 June =
2010.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; This has been
                  decided for a long time. I'm not eager to change =
it.<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Thanks - I can live
                  with it.&nbsp; Unfortunately we still seem to be<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; fragmenting on<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; the native client
                  approach.&nbsp;&nbsp;&nbsp;Good topic for IIW I =
suspect<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; -cmort<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; EHL<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;
                  _______________________________________________<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; OAuth mailing =
list<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a =
moz-do-not-send=3D"true" ymailto=3D"mailto:OAuth@ietf.org" =
href=3D"x-msg://77/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a =
moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;&gt;&gt;
                  _______________________________________________<br>
                  &gt; &gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>
                  &gt; &gt;&gt;&gt;&gt;&gt; <a moz-do-not-send=3D"true" =
ymailto=3D"mailto:OAuth@ietf.org" =
href=3D"x-msg://77/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br>
                  &gt; &gt;&gt;&gt;&gt;&gt; <a moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                  &gt; &gt;&gt;&gt;&gt;<br>
                  &gt; &gt;&gt;&gt;<br>
                  &gt; &gt;&gt;<br>
                  &gt; &gt;<br>
                  &gt; &gt;<br>
                  <br>
                  _______________________________________________<br>
                  OAuth mailing list<br>
                  <a moz-do-not-send=3D"true" =
ymailto=3D"mailto:OAuth@ietf.org" =
href=3D"x-msg://77/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br>
                  <a moz-do-not-send=3D"true" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
                </div>
              </blockquote>
            </td>
          </tr>
        </tbody>
      </table>
      <pre wrap=3D""><fieldset class=3D"mimeAttachmentHeader"></fieldset>
_______________________________________________
OAuth mailing list
<a class=3D"moz-txt-link-abbreviated" =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class=3D"moz-txt-link-freetext" =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a>
</pre>
    </blockquote>
  </div>

</blockquote></div><br></div></body></html>=

--Apple-Mail-13-992060674--

From fcorella@pomcor.com  Tue Mar 29 11:44:26 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 516233A6873 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 11:44:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.477
X-Spam-Level: 
X-Spam-Status: No, score=-2.477 tagged_above=-999 required=5 tests=[AWL=0.121,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1MaFAQGyoa0v for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 11:44:25 -0700 (PDT)
Received: from web55801.mail.re3.yahoo.com (web55801.mail.re3.yahoo.com [216.252.110.47]) by core3.amsl.com (Postfix) with SMTP id BCBC83A682B for <oauth@ietf.org>; Tue, 29 Mar 2011 11:44:22 -0700 (PDT)
Received: (qmail 75888 invoked by uid 60001); 29 Mar 2011 18:45:59 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1301424359; bh=Ssh9BLYocIa7wDZGb/xRqMMjjlzj43oCT8dZpH4g6KQ=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=pPgwiUI132RUBGUpxou5TspIe5DJe/IHUHERCV0NCB87z0+bBNjshjA6WIqaCiZsNJG9tFhnbxjfGhAliscqFMEaMrzWDV03GS91bBH9/45F9iA4++NCmXZMDWd83N88zuYFwzw7USk+4uv9nxG7uRgZY9XNWezW1Ctz6yctrjk=
Message-ID: <103040.70321.qm@web55801.mail.re3.yahoo.com>
X-YMail-OSG: mgkc8BgVM1mebTiGzyQq2Y8T7THsfKaQHFxs0L9um1Uq1hR 2VPU4pey4PfL7a51iCqWqXGraIZheVojXVDlAmgKMSNzRGcWlptEhJ5Vga8s cBTHboB8Ozx9n_hNPO05SnSLREDJgkZHqH5s0ualew9LdBsjRtLE664hZkl6 XiA1zPevX2u8QPqc2ErhZXr5l93THN.UthP.W85FTjrnIPJropWFtwnHIT_I 9.OMEfY6Mywu7wZVHg55JK0vVz1o_cVdf2bsIgxunnXi9CBPanQHyJPD.Ja2 55eCpDBhFsMRm6SGeEX7nG57oT2tjBkxbXp1WwrmjtvJIeL8mPOXNtMwx4iY 14q7e3102endmNmJ09VpjoUlSC27a79wee.Qc4yaTWtDt8n4TTz4KXMlD_2D PwXUQ
Received: from [67.91.91.101] by web55801.mail.re3.yahoo.com via HTTP; Tue, 29 Mar 2011 11:45:58 PDT
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/12.0.2 YahooMailWebService/0.8.109.295617
Date: Tue, 29 Mar 2011 11:45:58 -0700 (PDT)
From: Francisco Corella <fcorella@pomcor.com>
To: Phil Hunt <phil.hunt@oracle.com>, Justin Richer <jricher@mitre.org>, Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564304B9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1343167853-1301424358=:70321"
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 18:44:26 -0000

--0-1343167853-1301424358=:70321
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

> Can you explain how intercepting the authorization code
> without having access to the client credentials is a
> problem? For the sake of discussion, assume that the client
> has valid and secure credentials that an attacker cannot
> access. Also assume that the client has implemented some
> form of cross-site protection.

One way: man-in-the-middle attack.=C2=A0 The traffic between the legitimate
user's browser and the client goes through the attacker's machine
(easy to set up with a rogue WiFi access point).=C2=A0 The user's browser
sends an http request to the client, targeting the redirect URI.=C2=A0 The
attacker's machine doesn't let that request go through.=C2=A0 The attacker
then sends the same identical request from the attacker's own browser.
When the client receives the request, it has no way to tell that it is
coming from the attacker's browser rather than from the user's
browser.=C2=A0 The client exchanges the authorization code for an access
token, uses the access token to obtain protected resources belonging
to the user, and delivers those resources to the attacker's browser.
(Or manipulates those resources as directed by the attacker's
browser.)=C2=A0 In the Facebook use case, the client logs the user in upon
verifying that the authorization code is valid by exchanging it
successfully for an access token.

Another way (passive attack): The attacker observes the request from
the user's browser to the client.=C2=A0 The attacker does not stop the
request.=C2=A0 The client receives the request with the authorization code
and exchanges the authorization code for the access token.=C2=A0 Now the
attacker sends the same request from the attacker's own browser.=C2=A0 The
client receives the second request and exchanges the authorization
code for another access token.=C2=A0 Upon receiving the second request for
the same authorization code, the authorization server revokes the
first access token, as suggested in section 4.1.2 of the
specification: "If an authorization code is used more than once, the
auhorization server MAY revoke all tokens previously issued based on
that authorization code".=C2=A0 The client then uses the second access
token to access protected resources for the benefit of the attacker.
In the Facebook use case, the attacker is logged in as the legitimate
user.

> I don=E2=80=9A=C3=84=C3=B4t know much about FB=E2=80=9A=C3=84=C3=B4s impl=
ementation but if they
> allow the authorization code to be used for anything other
> than exchanged for an access token using secure client
> credentials, then they are not implementing the protocol as
> specified.

Facebook uses the protocol correctly, but the examples in the Facebook
documentation use http rather than https for redirect URIs, so
implementations that follow the examples use http rather than https.

Francisco


--0-1343167853-1301424358=:70321
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">&gt; Can you explain how intercepting the aut=
horization code<br>&gt; without having access to the client credentials is =
a<br>&gt; problem? For the sake of discussion, assume that the client<br>&g=
t; has valid and secure credentials that an attacker cannot<br>&gt; access.=
 Also assume that the client has implemented some<br>&gt; form of cross-sit=
e protection.<br><br>One way: man-in-the-middle attack.&nbsp; The traffic b=
etween the legitimate<br>user's browser and the client goes through the att=
acker's machine<br>(easy to set up with a rogue WiFi access point).&nbsp; T=
he user's browser<br>sends an http request to the client, targeting the red=
irect URI.&nbsp; The<br>attacker's machine doesn't let that request go thro=
ugh.&nbsp; The attacker<br>then sends the same identical request from the a=
ttacker's own browser.<br>When the client receives the request, it has no w=
ay
 to tell that it is<br>coming from the attacker's browser rather than from =
the user's<br>browser.&nbsp; The client exchanges the authorization code fo=
r an access<br>token, uses the access token to obtain protected resources b=
elonging<br>to the user, and delivers those resources to the attacker's bro=
wser.<br>(Or manipulates those resources as directed by the attacker's<br>b=
rowser.)&nbsp; In the Facebook use case, the client logs the user in upon<b=
r>verifying that the authorization code is valid by exchanging it<br>succes=
sfully for an access token.<br><br>Another way (passive attack): The attack=
er observes the request from<br>the user's browser to the client.&nbsp; The=
 attacker does not stop the<br>request.&nbsp; The client receives the reque=
st with the authorization code<br>and exchanges the authorization code for =
the access token.&nbsp; Now the<br>attacker sends the same request from the=
 attacker's own browser.&nbsp; The<br>client receives the second
 request and exchanges the authorization<br>code for another access token.&=
nbsp; Upon receiving the second request for<br>the same authorization code,=
 the authorization server revokes the<br>first access token, as suggested i=
n section 4.1.2 of the<br>specification: "If an authorization code is used =
more than once, the<br>auhorization server MAY revoke all tokens previously=
 issued based on<br>that authorization code".&nbsp; The client then uses th=
e second access<br>token to access protected resources for the benefit of t=
he attacker.<br>In the Facebook use case, the attacker is logged in as the =
legitimate<br>user.<br><br>&gt; I don=E2=80=9A=C3=84=C3=B4t know much about=
 FB=E2=80=9A=C3=84=C3=B4s implementation but if they<br>&gt; allow the auth=
orization code to be used for anything other<br>&gt; than exchanged for an =
access token using secure client<br>&gt; credentials, then they are not imp=
lementing the protocol as<br>&gt; specified.<br><br>Facebook uses the proto=
col correctly, but
 the examples in the Facebook<br>documentation use http rather than https f=
or redirect URIs, so<br>implementations that follow the examples use http r=
ather than https.<br><br>Francisco<br><br></td></tr></table>
--0-1343167853-1301424358=:70321--

From fcorella@pomcor.com  Tue Mar 29 12:02:19 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D48303A6971 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 12:02:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.489
X-Spam-Level: 
X-Spam-Status: No, score=-2.489 tagged_above=-999 required=5 tests=[AWL=0.108,  BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9QVxyTylvg1W for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 12:02:16 -0700 (PDT)
Received: from web55805.mail.re3.yahoo.com (web55805.mail.re3.yahoo.com [216.252.110.51]) by core3.amsl.com (Postfix) with SMTP id 563533A6A82 for <oauth@ietf.org>; Tue, 29 Mar 2011 12:02:15 -0700 (PDT)
Received: (qmail 39555 invoked by uid 60001); 29 Mar 2011 19:03:51 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1301425431; bh=Hkyzmg7c34e3HXUTr2B2pAiqitm3iqZlPjmxTfauJR0=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=brYNsCuqmS1jK0LJ5XbmaPEDbXuwiyaTLIPeIcRZ6P5M5MZdDezqM8pUdAJmlzwyNlnLCvX1xIsxER4EXhFroPmjeeRvqpqs42vTXLegI3MKBYFnnlWv4aeGUK3yYWkEL06rz9/1kNCm7m2l29jaAG/FAEUUOqL3LRS8hN6m9yw=
Message-ID: <903674.27371.qm@web55805.mail.re3.yahoo.com>
X-YMail-OSG: Ov7rQdwVM1kCciwfGpzbYB9B1Ul97C3qY9XRd8kF31qOUXF 8Qw4iuOln6cSY1ARfEOv0j33GOd8WivsHM._ROrVdn7CGPz_.oCoC8._Bh0Y a7Erdjb3CY86IgCkHS..mxBE5pxNli1W9dKYYlL83aNneWDxKX.5r4s1QQIK VDrlEzsW.SnRP09.9cBkv8wRivhGGFk.sqUaLcyBIBoQIAiQO8nTtuVqJEgR LOgCcvZ5nvFsYKm5Qpfe5qvBQ1FMxBfDJP5rv.t1Y3Wvl.iz6YlcFWH6IWwR JeNSh.JqFHQihFac.gtQUENG4wcyGxU76jBhkmBF648GUpCgbPLRfHhzfK9D tezMQhRLFgxbYfQK1XaM1xWmsh3HSyzB7LKIEO.axDdmCeIoU31d2VH6Z49o Q9f.7LRasfhzl
Received: from [67.91.91.101] by web55805.mail.re3.yahoo.com via HTTP; Tue, 29 Mar 2011 12:03:50 PDT
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/12.0.2 YahooMailWebService/0.8.109.295617
Date: Tue, 29 Mar 2011 12:03:50 -0700 (PDT)
From: Francisco Corella <fcorella@pomcor.com>
To: George Fletcher <gffletch@aol.com>
In-Reply-To: <4D921C87.1080006@aol.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1362187757-1301425430=:27371"
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 19:02:19 -0000

--0-1362187757-1301425430=:27371
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

George,

Yes, that's another attack scenario.=C2=A0 (It would be clearer if the soci=
al site where not a subdomain of example.com).=C2=A0 In your scenario, the =
user and the attacker have ordinary credentials (userid and password) with =
the client (example.com) and they both log in to the client before the atta=
ck.=C2=A0 In the "login with Facebook" scenario, neither the user nor the a=
ttacker need to have password credentials with the client.=C2=A0 The attack=
er does not need to have an account with the client, and gets logged with t=
he client as the user as a result of the attack.

Franciso

--- On Tue, 3/29/11, George Fletcher <gffletch@aol.com> wrote:

From: George Fletcher <gffletch@aol.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: "fcorella@pomcor.com" <fcorella@pomcor.com>
Cc: "Eran Hammer-Lahav" <eran@hueniverse.com>, "Phil Hunt" <phil.hunt@oracl=
e.com>, "Justin Richer" <jricher@mitre.org>, "OAuth WG" <oauth@ietf.org>, "=
Karen P. Lewison" <kplewison@pomcor.com>
Date: Tuesday, March 29, 2011, 5:53 PM

=0A=0A  =0A    =0A    =0A  Along this same line...
=0A     =20
=0A    To make sure I=0A      understand, the attacker must execute a MITM =
attack against the=0A      redirect_uri so that it receives the code value =
and ensures the=0A      code value is never exchanged at the authorization =
service by the=0A      original requester. Then the attacker takes the code=
 and presents=0A      it to the same service but under a different controll=
ing party.=0A      This ensures that the correct client authentication take=
s place=0A      and associates the delegated authorization with a different=
 user=0A      at the "client" service.
=0A     =20
=0A      Basically, Alice goes to example.com and authenticates with her=0A=
      example.com credentials. She then tries to associate resources=0A    =
  socialsite.example.com. The MITM attacker captures the code when=0A      =
socialsite.example.com redirects the browser to example.com. The=0A      MI=
TM attacker returns an error to Alice.
=0A     =20
=0A      The Attacker then logs into example.com with a different set of=0A=
      credentials. When the attacker tries to associate resources from=0A  =
    socialsite.example.com, the MITM attack returns Alice's code to=0A     =
 example.com. Example.com then retrieves the access_token and=0A      assoc=
iates Alice's resources to the attackers identity at=0A      example.com.
=0A     =20
=0A      So I see this as an exposure where the client has it's own idea of=
=0A      who the user is and is then using OAuth to associate resources=0A =
     with the that user.=20
=0A     =20
=0A      Thanks,
=0A      George
=0A   =20
=0A    On 3/29/11 1:42 PM, Eran Hammer-Lahav wrote:=0A    =0A      =0A     =
 =0A      =0A      =0A        Can you explain how intercepting the=0A      =
      authorization code without having access to the client=0A            =
credentials is a problem? For the sake of discussion, assume=0A            =
that the client has valid and secure credentials that an=0A            atta=
cker cannot access. Also assume that the client has=0A            implement=
ed some form of cross-site protection. =0A         =C2=A0 =0A        I don=
=E2=80=99t know much about FB=E2=80=99s implementation but=0A            if=
 they allow the authorization code to be used for anything=0A            ot=
her than exchanged for an access token using secure client=0A            cr=
edentials, then they are not implementing the protocol as=0A            spe=
cified. =0A         =C2=A0 =0A        EHL =0A         =C2=A0 =0A        =0A=
          =0A            =0A              From: Francisco=0A               =
   Corella [mailto:fcorella@pomcor.com]=20
=0A                  Sent: Tuesday, March 29, 2011 10:05 AM
=0A                  To: Phil Hunt; Justin Richer; Eran Hammer-Lahav
=0A                  Cc: OAuth WG; Karen P. Lewison
=0A                  Subject: Re: [OAUTH-WG] WGLC on=0A                  dr=
aft-ietf-oauth-v2-13.txt =0A            =0A          =0A           =C2=A0 =
=0A          =0A            =0A              =0A                =0A        =
          Eran,
=0A                   =20
=0A                    It's not a reasonable compromise.=C2=A0 #2 MUST use =
tls=0A                    UNLESS of course it targets localhost.=C2=A0 If #=
2 is=0A                    sent without TLS to a Web server, the authorizat=
ion=0A                    code can be easily intercepted by an attacker.=C2=
=A0 The=0A                    attacker can then use it to obtain protected=
=0A                    resources by submitting the authorization code to=0A=
                    the client.=C2=A0 (This is independent of whether the=
=0A                    client authenticates itself when exchanging the=0A  =
                  authorization code for an access token or not.) In=0A    =
                the Facebook use case, the attacker can use the=0A         =
           authorization code to log in to the client using the=0A         =
           user's Facebook identity.=C2=A0 I believe this=0A               =
     vulnerability exists in many implementations of the=0A                =
    Facebook login button today.
=0A                   =20
=0A                    Btw, I've pointed this out before three or four=0A  =
                  times on this mailing list, including in a response=0A   =
                 to the WGLC that you never replied to.
=0A                   =20
=0A                    Francisco
=0A                   =20
=0A                    --- On Mon, 3/28/11, Eran Hammer-Lahav <eran@huenive=
rse.com>=0A                    wrote: =0A                 =20
=0A                    From: Eran Hammer-Lahav <eran@hueniverse.com>
=0A                    Subject: Re: [OAUTH-WG] WGLC on=0A                  =
  draft-ietf-oauth-v2-13.txt
=0A                    To: "Phil Hunt" <phil.hunt@oracle.com>,=0A          =
          "Justin Richer" <jricher@mitre.org>
=0A                    Cc: "OAuth WG" <oauth@ietf.org>
=0A                    Date: Monday, March 28, 2011, 10:28 PM =0A          =
        =0A                    The code is returned in two=0A              =
        steps:
=0A                     =20
=0A                      1. The authorization server replies to the=0A     =
                 user-agent request (providing authorization) with=0A      =
                a redirection instruction typically using the=0A           =
           Location response header field.
=0A                      2. The user-agent makes an HTTP GET request to the=
=0A                      provided location (which may be something other=0A=
                      than an HTTP URI, or an HTTP URI to localhost).
=0A                     =20
=0A                      #1 is an HTTP response to a user-agent request to=
=0A                      the authorization endpoint (or a subsequent one if=
=0A                      the server implementation has multiple=0A         =
             authorization steps).
=0A                     =20
=0A                      #2 is an HTTP request made by the user-agent.
=0A                     =20
=0A                      In order for the code to be secure end-to-end,=0A =
                     both steps must use TLS. The arguments made=0A        =
              against making TLS required are based on use cases=0A        =
              for #2. We can make #1 (the authorization endpoint=0A        =
              require TLS since it already has to support it for=0A        =
              the 'token' response type. We should make=0A                 =
     callbacks a SHOULD for TLS.
=0A                     =20
=0A                      Does this sound like a reasonable compromise?
=0A                     =20
=0A                      EHL
=0A                     =20
=0A                      > -----Original Message-----
=0A                      > From: Phil Hunt [mailto:phil.hunt@oracle.com]
=0A                      > Sent: Monday, March 28, 2011 2:28 PM
=0A                      > To: Justin Richer
=0A                      > Cc: Eran Hammer-Lahav; OAuth WG
=0A                      > Subject: Re: [OAUTH-WG] WGLC on=0A              =
        draft-ietf-oauth-v2-13.txt
=0A                      >=20
=0A                      > This was referring to section 2.1 that the=0A   =
                   authorization server must use TLS
=0A                      > when returning an authorization code.
=0A                      >=20
=0A                      > If it doesn't use TLS then the code being=0A    =
                  returned to the client can be
=0A                      > intercepted.
=0A                      >=20
=0A                      > Or did I miss something?
=0A                      >=20
=0A                      > Phil
=0A                      > phil.hunt@oracle.com
=0A                      >=20
=0A                      >=20
=0A                      >=20
=0A                      >=20
=0A                      > On 2011-03-28, at 1:37 PM, Justin Richer=0A     =
                 wrote:
=0A                      >=20
=0A                      > > Phil,
=0A                      > >
=0A                      > > The main difference is that it's a=0A         =
             requirement on the *client* instead
=0A                      > > of the *provider* side of the equation,=0A    =
                  and clients aren't always even
=0A                      > > speaking HTTP. I agree that all client=0A     =
                 web servers SHOULD do it. A
=0A                      > > particular provider can even REQUIRE it=0A    =
                  for their registered clients,
=0A                      > > a step that is outside the scope of=0A        =
              OAuth. But there are real, in-use
=0A                      > > patterns that don't require the client=0A     =
                 to make an HTTP request to an
=0A                      > > external service.
=0A                      > >
=0A                      > > I don't see how Firesheep is relevant to=0A   =
                   this discussion -- if your
=0A                      > > browser is making a call to localhost to=0A   =
                   get the token, who outside of
=0A                      > > your machine is going to do it? I'm not=0A    =
                  talking about convenience for
=0A                      > > developers here (which I would argue=0A       =
               should NOT be discounted, but
=0A                      > > that's another argument), I'm talking=0A      =
                about cases where the browser
=0A                      > > isn't going outside of a trusted=0A           =
           security boundary. There are also
=0A                      > > instances where there may not even be an=0A   =
                   HTTP transaction involved,
=0A                      > > let alone one that could support TLS.
=0A                      > >
=0A                      > > -- Justin
=0A                      > >
=0A                      > > On Mon, 2011-03-28 at 16:25 -0400, Phil=0A    =
                  Hunt wrote:
=0A                      > >> Justin, How is that so? Remember=0A          =
            firesheep?=C2=A0 I wouldn't want the
=0A                      > authorization code being exchanged without=0A   =
                   TLS in a cafe. Intercept is just
=0A                      > too easy. And as I mentioned earlier, client=0A =
                     credentials are already very weak
=0A                      > in many cases. In contrast, two web servers=0A  =
                    are hard to sniff unless you are
=0A                      > able to gain access to their network=0A         =
             communications path.
=0A                      > >>
=0A                      > >> As for testing, it seems more=0A             =
         reasonable to put servers in temporary non-
=0A                      > compliance while testing rather then allow=0A   =
                   non-secure servers in production
=0A                      > because of the SHOULD loophole.
=0A                      > >>
=0A                      > >> Also, while it does seem convenient=0A       =
               for the developer not to have to use
=0A                      > TLS for authz codes, note that the developer=0A =
                     still has to have TLS enabled
=0A                      > when exchanging the code for an access token.=0A=
                      So I'm not sure how relaxing
=0A                      > TLS for obtaining authorization actually=0A     =
                 simplifies the developer lifecycle since
=0A                      > they still have to set it up to test the=0A     =
                 other parts.=C2=A0 In my view, it would be ok
=0A                      > for a developer to temporarily disable TLS=0A   =
                   everywhere during development -
=0A                      > - which places operation outside RFC=0A         =
             compliance while developing -- but
=0A                      > forces compliance once they go into=0A          =
            production.
=0A                      > >>
=0A                      > >> It seems like I had to give a pretty=0A      =
                substantial justification and we backed
=0A                      > off because TLS is seen as inconvenient. I=0A   =
                   think we need more evidence that
=0A                      > there are safe cases that don't need TLS.
=0A                      > >>
=0A                      > >> Sorry for pushing hard on this one,=0A       =
               but TLS is the backbone of OAuth
=0A                      > security at present.
=0A                      > >>
=0A                      > >> Phil
=0A                      > >> phil.hunt@oracle.com
=0A                      > >>
=0A                      > >>
=0A                      > >>
=0A                      > >>
=0A                      > >> On 2011-03-28, at 12:52 PM, Eran=0A          =
            Hammer-Lahav wrote:
=0A                      > >>
=0A                      > >>> No change then. But the security=0A         =
             considerations section must reflect
=0A                      > this.
=0A                      > >>>
=0A                      > >>> EHL
=0A                      > >>>
=0A                      > >>>> -----Original Message-----
=0A                      > >>>> From: Justin Richer [mailto:jricher@mitre.o=
rg]
=0A                      > >>>> Sent: Monday, March 28, 2011=0A            =
          10:05 AM
=0A                      > >>>> To: Eran Hammer-Lahav
=0A                      > >>>> Cc: Phil Hunt; OAuth WG
=0A                      > >>>> Subject: Re: [OAUTH-WG] WGLC=0A            =
          on draft-ietf-oauth-v2-13.txt
=0A                      > >>>>
=0A                      > >>>> What about non-http return=0A              =
        uri's, or client-localhost, such as
=0A                      > >>>>
=0A                      > >>>> someapp://app/?code=3Dfoo
=0A                      > >>>>
=0A                      > >>>> http://localhost:87345/?code=3Dfoo
=0A                      > >>>>
=0A                      > >>>> HTTPS makes sense when=0A                  =
    you're talking between two web servers, but
=0A                      > >>>> it seems to fall apart=0A                  =
    otherwise. I think SHOULD is appropriate here.
=0A                      > >>>>
=0A                      > >>>> -- Justin
=0A                      > >>>>
=0A                      > >>>>
=0A                      > >>>> On Fri, 2011-03-25 at 16:03=0A             =
         -0400, Eran Hammer-Lahav wrote:
=0A                      > >>>>> Unless someone has an=0A                  =
    objection, I'll make the change from SHOULD
=0A                      > >>>>> to
=0A                      > >>>> MUST.
=0A                      > >>>>>
=0A                      > >>>>> EHL
=0A                      > >>>>>
=0A                      > >>>>>> -----Original=0A                      Mes=
sage-----
=0A                      > >>>>>> From: Phil Hunt=0A                      [=
mailto:phil.hunt@oracle.com]
=0A                      > >>>>>> Sent: Friday, March=0A                   =
   25, 2011 12:42 PM
=0A                      > >>>>>> To: Eran=0A                      Hammer-L=
ahav
=0A                      > >>>>>> Cc: OAuth WG; Chuck=0A                   =
   & Mara Mortimore
=0A                      > >>>>>> Subject: Re:=0A                      [OAU=
TH-WG] WGLC on draft-ietf-oauth-v2-13.txt
=0A                      > >>>>>>
=0A                      > >>>>>> Regarding the=0A                      mes=
sage: http://www.ietf.org/mail-
=0A                      > >>>>>>=0A                      archive/web/oauth=
/current/msg05762.html=C2=A0 (sorry I=0A                      somehow lost
=0A                      > >>>>>> the message in my=0A                     =
 email).
=0A                      > >>>>>>
=0A                      > >>>>>> This issue is theft=0A                   =
   of the authorization code during the redirect.
=0A                      > >>>>>> Authenticating the=0A                    =
  client is an important feature and goes a long
=0A                      > >>>>>> way, but it is not=0A                    =
  sufficient since in many cases, the
=0A                      > >>>>>>=0A                      client_id/client_=
secret will likely be hard coded=0A                      and relatively
=0A                      > >>>>>> easy to deduce (e.g.=0A                  =
    mobile client apps).=C2=A0 Of course a strong
=0A                      > >>>>>> client=0A                      authentica=
tion won't have this issue. This makes=0A                      many
=0A                      > >>>>>> consumer situations=0A                   =
   very susceptible to an attack where the
=0A                      > >>>>>> authorization code=0A                    =
  is
=0A                      > >>>> intercepted.
=0A                      > >>>>>>
=0A                      > >>>>>> For more information=0A                  =
    look at the SAML Artifact issues in section
=0A                      > >>>>>> 6.5 (specifically=0A                     =
 stolen artifact, replay, etc) of this document:
=0A                      > >>>>>> http://docs.oasis-
=0A                      > >>>>>>=0A                      open.org/security=
/saml/v2.0/saml-sec-consider-2.0-os.pdf
=0A                      > >>>>>>
=0A                      > >>>>>> There are a number=0A                    =
  of remediations suggested (small lifetime,
=0A                      > >>>>>> single use), but the=0A                  =
    foundational one is confidentiality of the
=0A                      > >>>>>> exchange (TLS).=0A                      H=
ence the recommendation that the return of an
=0A                      > >>>>>> authorization code=0A                    =
  be kept secure with a MUST for TLS.
=0A                      > >>>>>>
=0A                      > >>>>>> Phil
=0A                      > >>>>>> phil.hunt@oracle.com
=0A                      > >>>>>>
=0A                      > >>>>>>
=0A                      > >>>>>>
=0A                      > >>>>>>
=0A                      > >>>>>> On 2011-03-24, at=0A                     =
 7:22 PM, Chuck Mortimore wrote:
=0A                      > >>>>>>
=0A                      > >>>>>>>
=0A                      > >>>>>>> On Mar 24, 2011,=0A                     =
 at 6:36 PM, "Eran Hammer-Lahav"
=0A                      > >>>>>> <eran@hueniverse.com>=0A                 =
     wrote:
=0A                      > >>>>>>>
=0A                      > >>>>>>>>
=0A                      > >>>>>>>>>=0A                      -----Original =
Message-----
=0A                      > >>>>>>>>> From: oauth-bounces@ietf.org=0A       =
               [mailto:oauth-
=0A                      > bounces@ietf.org]
=0A                      > >>>>>>>>> On=0A                      Behalf Of C=
huck Mortimore
=0A                      > >>>>>>>>> Sent:=0A                      Monday, =
March 14, 2011 6:10 PM
=0A                      > >>>>>>>>
=0A                      > >>>>>>>>> 1) I'd=0A                      vote fo=
r dropping the following from 1.4.2.=C2=A0=C2=A0=C2=A0In=0A                =
      turn I'd
=0A                      > discuss
=0A                      > >>>> some
=0A                      > >>>>>> of
=0A                      > >>>>>>>>> the=0A                      security c=
onsiderations, such as difficulty of=0A                      protecting
=0A                      > >>>>>>>>> a=0A                      client_secre=
t in almost all use-cases of this=0A                      profile.
=0A                      > >>>>>>>>>
=0A                      > >>>>>>>>>=C2=A0=0A                      "Implici=
t grants improve the responsiveness and=0A                      efficiency =
of
=0A                      > >>>>>>>>> some=0A                      clients (=
such as a client implemented as an=0A                      in-browser
=0A                      > >>>>>>>>>=0A                      application) s=
ince it reduces the number of round=0A                      trips
=0A                      > >>>>>>>>> required=0A                      to ob=
tain an access token."
=0A                      > >>>>>>>>
=0A                      > >>>>>>>> Why drop it?=0A                      Wh=
at about it isn't accurate?
=0A                      > >>>>>>>
=0A                      > >>>>>>> It's accurate,=0A                      b=
ut my opinion is it sends the wrong=0A                      message.=C2=A0=
=C2=A0=C2=A0It's
=0A                      > clearly
=0A                      > >>>> the
=0A                      > >>>>>> less secure of the=0A                    =
  response types.=C2=A0 By positioning it as the most
=0A                      > >>>>>> performant people=0A                     =
 may find that attractive and make the wrong
=0A                      > >>>>>> security
=0A                      > >>>> decision.
=0A                      > >>>>>>>
=0A                      > >>>>>>>
=0A                      > >>>>>>>>
=0A                      > >>>>>>>>> 2)=0A                      Section 2.1=
, we should MUST TLS even for=0A                      Authorization Code.
=0A                      > >>>>>>>>
=0A                      > >>>>>>>> Why? What's=0A                      the=
 attack vector?
=0A                      > >>>>>>>
=0A                      > >>>>>>> See Phils=0A                      commen=
t on past experience with artifact bindings.
=0A                      > >>>>>>> Spec should
=0A                      > >>>>>> default for security=0A                  =
    always on, and let deployments that don't
=0A                      > >>>>>> want to use HTTPs=0A                     =
 simply be non-conformant.
=0A                      > >>>>>>>
=0A                      > >>>>>>>>
=0A                      > >>>>>>>>> 3)=0A                      Section 4.1=
.3 - not clear to me why redirect_uri=0A                      is
=0A                      > >>>>>>>>> REQUIRED=0A                      since=
 in 4.1.1 it's "REQUIRED unless"
=0A                      > >>>>>>>>
=0A                      > >>>>>>>> The client=0A                      shou=
ld always confirm where the code was sent to.=0A                      It
=0A                      > >>>>>>>> can omit
=0A                      > >>>>>> the redirection is=0A                    =
  one was provided but should tell the server
=0A                      > >>>>>> where it went to.=0A                     =
 This is more consistent on the verification
=0A                      > >>>>>> side, but if the=0A                      =
original flow designers want to chime in (Dick,
=0A                      > >>>>>> Brian, etc.?), I'm=0A                    =
  open
=0A                      > >>>> to change this.
=0A                      > >>>>>>>>
=0A                      > >>>>>>>>> 4)=0A                      Section 4.2=
.2 - when did we drop refresh_token?=C2=A0=0A                      =C2=A0=
=C2=A0=C2=A0I assume
=0A                      > this
=0A                      > >>>> goes
=0A                      > >>>>>>>>> back to=0A                      disagr=
eement on how best to handle native clients.=0A                      I'd
=0A                      > >>>>>>>>> prefer=0A                      it to s=
imply reference 5.1 and leave what is=0A                      issued up
=0A                      > >>>>>>>>> to the=0A                      securit=
y profile of the particular deployment as=0A                      to what i=
s
=0A                      > issued.
=0A                      > >>>>>>>>
=0A                      > >>>>>>>> -08 June=0A                      2010.
=0A                      > >>>>>>>>
=0A                      > >>>>>>>> This has=0A                      been d=
ecided for a long time. I'm not eager to=0A                      change it.
=0A                      > >>>>>>>
=0A                      > >>>>>>> Thanks - I can=0A                      l=
ive with it.=C2=A0 Unfortunately we still seem to be
=0A                      > >>>>>>> fragmenting on
=0A                      > >>>>>> the native client=0A                     =
 approach.=C2=A0=C2=A0=C2=A0Good topic for IIW I suspect
=0A                      > >>>>>>>
=0A                      > >>>>>>> -cmort
=0A                      > >>>>>>>
=0A                      > >>>>>>>>
=0A                      > >>>>>>>> EHL
=0A                      > >>>>>>>>
=0A                      > >>>>>>>>
=0A                      > >>>>>>>=0A                      ________________=
_______________________________
=0A                      > >>>>>>> OAuth mailing=0A                      li=
st
=0A                      > >>>>>>> OAuth@ietf.org
=0A                      > >>>>>>> https://www.ietf.org/mailman/listinfo/oa=
uth
=0A                      > >>>>>
=0A                      > >>>>>=0A                      __________________=
_____________________________
=0A                      > >>>>> OAuth mailing list
=0A                      > >>>>> OAuth@ietf.org
=0A                      > >>>>> https://www.ietf.org/mailman/listinfo/oaut=
h
=0A                      > >>>>
=0A                      > >>>
=0A                      > >>
=0A                      > >
=0A                      > >
=0A                     =20
=0A                      _______________________________________________
=0A                      OAuth mailing list
=0A                      OAuth@ietf.org
=0A                      https://www.ietf.org/mailman/listinfo/oauth =0A   =
               =0A                =0A              =0A            =0A      =
    =0A           =C2=A0 =0A        =0A      =0A      =3D=0A     =20
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth=0A    =0A   =20
=0A  =0A
--0-1362187757-1301425430=:27371
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">George,<br><br>Yes, that's another attack sce=
nario.&nbsp; (It would be clearer if the social site where not a subdomain =
of example.com).&nbsp; In your scenario, the user and the attacker have ord=
inary credentials (userid and password) with the client (example.com) and t=
hey both log in to the client before the attack.&nbsp; In the "login with F=
acebook" scenario, neither the user nor the attacker need to have password =
credentials with the client.&nbsp; The attacker does not need to have an ac=
count with the client, and gets logged with the client as the user as a res=
ult of the attack.<br><br>Franciso<br><br>--- On <b>Tue, 3/29/11, George Fl=
etcher <i>&lt;gffletch@aol.com&gt;</i></b> wrote:<br><blockquote style=3D"b=
order-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px=
;"><br>From: George Fletcher &lt;gffletch@aol.com&gt;<br>Subject: Re: [OAUT=
H-WG]
 WGLC on draft-ietf-oauth-v2-13.txt<br>To: "fcorella@pomcor.com" &lt;fcorel=
la@pomcor.com&gt;<br>Cc: "Eran Hammer-Lahav" &lt;eran@hueniverse.com&gt;, "=
Phil Hunt" &lt;phil.hunt@oracle.com&gt;, "Justin Richer" &lt;jricher@mitre.=
org&gt;, "OAuth WG" &lt;oauth@ietf.org&gt;, "Karen P. Lewison" &lt;kplewiso=
n@pomcor.com&gt;<br>Date: Tuesday, March 29, 2011, 5:53 PM<br><br><div id=
=3D"yiv1913075545">=0A=0A  =0A    =0A    <title></title>=0A  <font face=3D"=
Helvetica, Arial, sans-serif">Along this same line...<br>=0A      <br>=0A  =
  </font><font face=3D"Helvetica, Arial, sans-serif">To make sure I=0A     =
 understand, the attacker must execute a MITM attack against the=0A      re=
direct_uri so that it receives the code value and ensures the=0A      code =
value is never exchanged at the authorization service by the=0A      origin=
al requester. Then the attacker takes the code and presents=0A      it to t=
he same service but under a different controlling party.=0A      This ensur=
es that the correct client authentication takes place=0A      and associate=
s the delegated authorization with a different user=0A      at the "client"=
 service.<br>=0A      <br>=0A      Basically, Alice goes to example.com and=
 authenticates with her=0A      example.com credentials. She then tries to =
associate resources=0A      socialsite.example.com. The MITM attacker captu=
res the code when=0A      socialsite.example.com redirects the browser to e=
xample.com. The=0A      MITM attacker returns an error to Alice.<br>=0A    =
  <br>=0A      The Attacker then logs into example.com with a different set=
 of=0A      credentials. When the attacker tries to associate resources fro=
m=0A      socialsite.example.com, the MITM attack returns Alice's code to=
=0A      example.com. Example.com then retrieves the access_token and=0A   =
   associates Alice's resources to the attackers identity at=0A      exampl=
e.com.<br>=0A      <br>=0A      So I see this as an exposure where the clie=
nt has it's own idea of=0A      who the user is and is then using OAuth to =
associate resources=0A      with the that user. <br>=0A      <br>=0A      T=
hanks,<br>=0A      George<br>=0A    </font><br>=0A    On 3/29/11 1:42 PM, E=
ran Hammer-Lahav wrote:=0A    <blockquote type=3D"cite">=0A      =0A      =
=0A      <style><!--=0A#yiv1913075545  =0A _filtered #yiv1913075545 {font-f=
amily:Calibri;panose-1:2 15 5 2 2 2 4 3 2 4;}=0A _filtered #yiv1913075545 {=
font-family:Tahoma;panose-1:2 11 6 4 3 5 4 4 2 4;}=0A#yiv1913075545  =0A#yi=
v1913075545 p.yiv1913075545MsoNormal, #yiv1913075545 li.yiv1913075545MsoNor=
mal, #yiv1913075545 div.yiv1913075545MsoNormal=0A=09{margin:0in;margin-bott=
om:.0001pt;font-size:12.0pt;font-family:"serif";}=0A#yiv1913075545 a:link, =
#yiv1913075545 span.yiv1913075545MsoHyperlink=0A=09{color:blue;text-decorat=
ion:underline;}=0A#yiv1913075545 a:visited, #yiv1913075545 span.yiv19130755=
45MsoHyperlinkFollowed=0A=09{color:purple;text-decoration:underline;}=0A#yi=
v1913075545 span.yiv1913075545EmailStyle17=0A=09{font-family:"sans-serif";c=
olor:#1F497D;}=0A#yiv1913075545 .yiv1913075545MsoChpDefault=0A=09{font-fami=
ly:"sans-serif";}=0A _filtered #yiv1913075545 {margin:1.0in 1.0in 1.0in 1.0=
in;}=0A#yiv1913075545 div.yiv1913075545WordSection1=0A=09{}=0A--></style>=
=0A      <div class=3D"yiv1913075545WordSection1">=0A        <p class=3D"yi=
v1913075545MsoNormal"><span style=3D"font-size: 11pt; color: rgb(31, 73, 12=
5);">Can you explain how intercepting the=0A            authorization code =
without having access to the client=0A            credentials is a problem?=
 For the sake of discussion, assume=0A            that the client has valid=
 and secure credentials that an=0A            attacker cannot access. Also =
assume that the client has=0A            implemented some form of cross-sit=
e protection.</span></p> =0A        <p class=3D"yiv1913075545MsoNormal"><sp=
an style=3D"font-size: 11pt; color: rgb(31, 73, 125);"> &nbsp;</span></p> =
=0A        <p class=3D"yiv1913075545MsoNormal"><span style=3D"font-size: 11=
pt; color: rgb(31, 73, 125);">I don=E2=80=99t know much about FB=E2=80=99s =
implementation but=0A            if they allow the authorization code to be=
 used for anything=0A            other than exchanged for an access token u=
sing secure client=0A            credentials, then they are not implementin=
g the protocol as=0A            specified.</span></p> =0A        <p class=
=3D"yiv1913075545MsoNormal"><span style=3D"font-size: 11pt; color: rgb(31, =
73, 125);"> &nbsp;</span></p> =0A        <p class=3D"yiv1913075545MsoNormal=
"><span style=3D"font-size: 11pt; color: rgb(31, 73, 125);">EHL</span></p> =
=0A        <p class=3D"yiv1913075545MsoNormal"><span style=3D"font-size: 11=
pt; color: rgb(31, 73, 125);"> &nbsp;</span></p> =0A        <div style=3D"b=
order-width: medium medium medium 1.5pt; border-style: none none none solid=
; border-color: blue; padding: 0in 0in 0in 4pt;">=0A          <div>=0A     =
       <div style=3D"border-width: 1pt medium medium; border-style: solid n=
one none; border-color: rgb(181, 196, 223); padding: 3pt 0in 0in;">=0A     =
         <p class=3D"yiv1913075545MsoNormal"><b><span style=3D"font-size: 1=
0pt;">From:</span></b><span style=3D"font-size: 10pt;"> Francisco=0A       =
           Corella [<a rel=3D"nofollow" class=3D"yiv1913075545moz-txt-link-=
freetext" ymailto=3D"mailto:fcorella@pomcor.com" target=3D"_blank" href=3D"=
/mc/compose?to=3Dfcorella@pomcor.com">mailto:fcorella@pomcor.com</a>] <br>=
=0A                  <b>Sent:</b> Tuesday, March 29, 2011 10:05 AM<br>=0A  =
                <b>To:</b> Phil Hunt; Justin Richer; Eran Hammer-Lahav<br>=
=0A                  <b>Cc:</b> OAuth WG; Karen P. Lewison<br>=0A          =
        <b>Subject:</b> Re: [OAUTH-WG] WGLC on=0A                  draft-ie=
tf-oauth-v2-13.txt</span></p> =0A            </div>=0A          </div>=0A  =
        <p class=3D"yiv1913075545MsoNormal"> &nbsp;</p> =0A          <table=
 class=3D"yiv1913075545MsoNormalTable" border=3D"0" cellpadding=3D"0" cells=
pacing=3D"0">=0A            <tbody>=0A              <tr>=0A                =
<td style=3D"padding: 0in;" valign=3D"top">=0A                  <p class=3D=
"yiv1913075545MsoNormal">Eran,<br>=0A                    <br>=0A           =
         It's not a reasonable compromise.&nbsp; #2 MUST use tls=0A        =
            UNLESS of course it targets localhost.&nbsp; If #2 is=0A       =
             sent without TLS to a Web server, the authorization=0A        =
            code can be easily intercepted by an attacker.&nbsp; The=0A    =
                attacker can then use it to obtain protected=0A            =
        resources by submitting the authorization code to=0A               =
     the client.&nbsp; (This is independent of whether the=0A              =
      client authenticates itself when exchanging the=0A                   =
 authorization code for an access token or not.) In=0A                    t=
he Facebook use case, the attacker can use the=0A                    author=
ization code to log in to the client using the=0A                    user's=
 Facebook identity.&nbsp; I believe this=0A                    vulnerabilit=
y exists in many implementations of the=0A                    Facebook logi=
n button today.<br>=0A                    <br>=0A                    Btw, I=
've pointed this out before three or four=0A                    times on th=
is mailing list, including in a response=0A                    to the WGLC =
that you never replied to.<br>=0A                    <br>=0A               =
     Francisco<br>=0A                    <br>=0A                    --- On =
<b>Mon, 3/28/11, Eran Hammer-Lahav <i>&lt;<a rel=3D"nofollow" ymailto=3D"ma=
ilto:eran@hueniverse.com" target=3D"_blank" href=3D"/mc/compose?to=3Deran@h=
ueniverse.com">eran@hueniverse.com</a>&gt;</i></b>=0A                    wr=
ote:</p> =0A                  <p class=3D"yiv1913075545MsoNormal" style=3D"=
margin-bottom: 12pt;"><br>=0A                    From: Eran Hammer-Lahav &l=
t;<a rel=3D"nofollow" ymailto=3D"mailto:eran@hueniverse.com" target=3D"_bla=
nk" href=3D"/mc/compose?to=3Deran@hueniverse.com">eran@hueniverse.com</a>&g=
t;<br>=0A                    Subject: Re: [OAUTH-WG] WGLC on=0A            =
        draft-ietf-oauth-v2-13.txt<br>=0A                    To: "Phil Hunt=
" &lt;<a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D=
"_blank" href=3D"/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.co=
m</a>&gt;,=0A                    "Justin Richer" &lt;<a rel=3D"nofollow" ym=
ailto=3D"mailto:jricher@mitre.org" target=3D"_blank" href=3D"/mc/compose?to=
=3Djricher@mitre.org">jricher@mitre.org</a>&gt;<br>=0A                    C=
c: "OAuth WG" &lt;<a rel=3D"nofollow" ymailto=3D"mailto:oauth@ietf.org" tar=
get=3D"_blank" href=3D"/mc/compose?to=3Doauth@ietf.org">oauth@ietf.org</a>&=
gt;<br>=0A                    Date: Monday, March 28, 2011, 10:28 PM</p> =
=0A                  <div>=0A                    <p class=3D"yiv1913075545M=
soNormal">The code is returned in two=0A                      steps:<br>=0A=
                      <br>=0A                      1. The authorization ser=
ver replies to the=0A                      user-agent request (providing au=
thorization) with=0A                      a redirection instruction typical=
ly using the=0A                      Location response header field.<br>=0A=
                      2. The user-agent makes an HTTP GET request to the=0A=
                      provided location (which may be something other=0A   =
                   than an HTTP URI, or an HTTP URI to localhost).<br>=0A  =
                    <br>=0A                      #1 is an HTTP response to =
a user-agent request to=0A                      the authorization endpoint =
(or a subsequent one if=0A                      the server implementation h=
as multiple=0A                      authorization steps).<br>=0A           =
           <br>=0A                      #2 is an HTTP request made by the u=
ser-agent.<br>=0A                      <br>=0A                      In orde=
r for the code to be secure end-to-end,=0A                      both steps =
must use TLS. The arguments made=0A                      against making TLS=
 required are based on use cases=0A                      for #2. We can mak=
e #1 (the authorization endpoint=0A                      require TLS since =
it already has to support it for=0A                      the 'token' respon=
se type. We should make=0A                      callbacks a SHOULD for TLS.=
<br>=0A                      <br>=0A                      Does this sound l=
ike a reasonable compromise?<br>=0A                      <br>=0A           =
           EHL<br>=0A                      <br>=0A                      &gt=
; -----Original Message-----<br>=0A                      &gt; From: Phil Hu=
nt [mailto:<a rel=3D"nofollow">phil.hunt@oracle.com</a>]<br>=0A            =
          &gt; Sent: Monday, March 28, 2011 2:28 PM<br>=0A                 =
     &gt; To: Justin Richer<br>=0A                      &gt; Cc: Eran Hamme=
r-Lahav; OAuth WG<br>=0A                      &gt; Subject: Re: [OAUTH-WG] =
WGLC on=0A                      draft-ietf-oauth-v2-13.txt<br>=0A          =
            &gt; <br>=0A                      &gt; This was referring to se=
ction 2.1 that the=0A                      authorization server must use TL=
S<br>=0A                      &gt; when returning an authorization code.<br=
>=0A                      &gt; <br>=0A                      &gt; If it does=
n't use TLS then the code being=0A                      returned to the cli=
ent can be<br>=0A                      &gt; intercepted.<br>=0A            =
          &gt; <br>=0A                      &gt; Or did I miss something?<b=
r>=0A                      &gt; <br>=0A                      &gt; Phil<br>=
=0A                      &gt; <a rel=3D"nofollow">phil.hunt@oracle.com</a><=
br>=0A                      &gt; <br>=0A                      &gt; <br>=0A =
                     &gt; <br>=0A                      &gt; <br>=0A        =
              &gt; On 2011-03-28, at 1:37 PM, Justin Richer=0A             =
         wrote:<br>=0A                      &gt; <br>=0A                   =
   &gt; &gt; Phil,<br>=0A                      &gt; &gt;<br>=0A            =
          &gt; &gt; The main difference is that it's a=0A                  =
    requirement on the *client* instead<br>=0A                      &gt; &g=
t; of the *provider* side of the equation,=0A                      and clie=
nts aren't always even<br>=0A                      &gt; &gt; speaking HTTP.=
 I agree that all client=0A                      web servers SHOULD do it. =
A<br>=0A                      &gt; &gt; particular provider can even REQUIR=
E it=0A                      for their registered clients,<br>=0A          =
            &gt; &gt; a step that is outside the scope of=0A               =
       OAuth. But there are real, in-use<br>=0A                      &gt; &=
gt; patterns that don't require the client=0A                      to make =
an HTTP request to an<br>=0A                      &gt; &gt; external servic=
e.<br>=0A                      &gt; &gt;<br>=0A                      &gt; &=
gt; I don't see how Firesheep is relevant to=0A                      this d=
iscussion -- if your<br>=0A                      &gt; &gt; browser is makin=
g a call to localhost to=0A                      get the token, who outside=
 of<br>=0A                      &gt; &gt; your machine is going to do it? I=
'm not=0A                      talking about convenience for<br>=0A        =
              &gt; &gt; developers here (which I would argue=0A            =
          should NOT be discounted, but<br>=0A                      &gt; &g=
t; that's another argument), I'm talking=0A                      about case=
s where the browser<br>=0A                      &gt; &gt; isn't going outsi=
de of a trusted=0A                      security boundary. There are also<b=
r>=0A                      &gt; &gt; instances where there may not even be =
an=0A                      HTTP transaction involved,<br>=0A               =
       &gt; &gt; let alone one that could support TLS.<br>=0A              =
        &gt; &gt;<br>=0A                      &gt; &gt; -- Justin<br>=0A   =
                   &gt; &gt;<br>=0A                      &gt; &gt; On Mon, =
2011-03-28 at 16:25 -0400, Phil=0A                      Hunt wrote:<br>=0A =
                     &gt; &gt;&gt; Justin, How is that so? Remember=0A     =
                 firesheep?&nbsp; I wouldn't want the<br>=0A               =
       &gt; authorization code being exchanged without=0A                  =
    TLS in a cafe. Intercept is just<br>=0A                      &gt; too e=
asy. And as I mentioned earlier, client=0A                      credentials=
 are already very weak<br>=0A                      &gt; in many cases. In c=
ontrast, two web servers=0A                      are hard to sniff unless y=
ou are<br>=0A                      &gt; able to gain access to their networ=
k=0A                      communications path.<br>=0A                      =
&gt; &gt;&gt;<br>=0A                      &gt; &gt;&gt; As for testing, it =
seems more=0A                      reasonable to put servers in temporary n=
on-<br>=0A                      &gt; compliance while testing rather then a=
llow=0A                      non-secure servers in production<br>=0A       =
               &gt; because of the SHOULD loophole.<br>=0A                 =
     &gt; &gt;&gt;<br>=0A                      &gt; &gt;&gt; Also, while it=
 does seem convenient=0A                      for the developer not to have=
 to use<br>=0A                      &gt; TLS for authz codes, note that the=
 developer=0A                      still has to have TLS enabled<br>=0A    =
                  &gt; when exchanging the code for an access token.=0A    =
                  So I'm not sure how relaxing<br>=0A                      =
&gt; TLS for obtaining authorization actually=0A                      simpl=
ifies the developer lifecycle since<br>=0A                      &gt; they s=
till have to set it up to test the=0A                      other parts.&nbs=
p; In my view, it would be ok<br>=0A                      &gt; for a develo=
per to temporarily disable TLS=0A                      everywhere during de=
velopment -<br>=0A                      &gt; - which places operation outsi=
de RFC=0A                      compliance while developing -- but<br>=0A   =
                   &gt; forces compliance once they go into=0A             =
         production.<br>=0A                      &gt; &gt;&gt;<br>=0A      =
                &gt; &gt;&gt; It seems like I had to give a pretty=0A      =
                substantial justification and we backed<br>=0A             =
         &gt; off because TLS is seen as inconvenient. I=0A                =
      think we need more evidence that<br>=0A                      &gt; the=
re are safe cases that don't need TLS.<br>=0A                      &gt; &gt=
;&gt;<br>=0A                      &gt; &gt;&gt; Sorry for pushing hard on t=
his one,=0A                      but TLS is the backbone of OAuth<br>=0A   =
                   &gt; security at present.<br>=0A                      &g=
t; &gt;&gt;<br>=0A                      &gt; &gt;&gt; Phil<br>=0A          =
            &gt; &gt;&gt; <a rel=3D"nofollow">phil.hunt@oracle.com</a><br>=
=0A                      &gt; &gt;&gt;<br>=0A                      &gt; &gt=
;&gt;<br>=0A                      &gt; &gt;&gt;<br>=0A                     =
 &gt; &gt;&gt;<br>=0A                      &gt; &gt;&gt; On 2011-03-28, at =
12:52 PM, Eran=0A                      Hammer-Lahav wrote:<br>=0A          =
            &gt; &gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt; No =
change then. But the security=0A                      considerations sectio=
n must reflect<br>=0A                      &gt; this.<br>=0A               =
       &gt; &gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt; EHL<=
br>=0A                      &gt; &gt;&gt;&gt;<br>=0A                      &=
gt; &gt;&gt;&gt;&gt; -----Original Message-----<br>=0A                     =
 &gt; &gt;&gt;&gt;&gt; From: Justin Richer [mailto:<a rel=3D"nofollow">jric=
her@mitre.org</a>]<br>=0A                      &gt; &gt;&gt;&gt;&gt; Sent: =
Monday, March 28, 2011=0A                      10:05 AM<br>=0A             =
         &gt; &gt;&gt;&gt;&gt; To: Eran Hammer-Lahav<br>=0A                =
      &gt; &gt;&gt;&gt;&gt; Cc: Phil Hunt; OAuth WG<br>=0A                 =
     &gt; &gt;&gt;&gt;&gt; Subject: Re: [OAUTH-WG] WGLC=0A                 =
     on draft-ietf-oauth-v2-13.txt<br>=0A                      &gt; &gt;&gt=
;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt; What about non-=
http return=0A                      uri's, or client-localhost, such as<br>=
=0A                      &gt; &gt;&gt;&gt;&gt;<br>=0A                      =
&gt; &gt;&gt;&gt;&gt; someapp://app/?code=3Dfoo<br>=0A                     =
 &gt; &gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt; <a=
 rel=3D"nofollow" target=3D"_blank"  href=3D"http://localhost:87345/?code=
=3Dfoo">http://localhost:87345/?code=3Dfoo</a><br>=0A                      =
&gt; &gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt; HTT=
PS makes sense when=0A                      you're talking between two web =
servers, but<br>=0A                      &gt; &gt;&gt;&gt;&gt; it seems to =
fall apart=0A                      otherwise. I think SHOULD is appropriate=
 here.<br>=0A                      &gt; &gt;&gt;&gt;&gt;<br>=0A            =
          &gt; &gt;&gt;&gt;&gt; -- Justin<br>=0A                      &gt; =
&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;<br>=0A  =
                    &gt; &gt;&gt;&gt;&gt; On Fri, 2011-03-25 at 16:03=0A   =
                   -0400, Eran Hammer-Lahav wrote:<br>=0A                  =
    &gt; &gt;&gt;&gt;&gt;&gt; Unless someone has an=0A                     =
 objection, I'll make the change from SHOULD<br>=0A                      &g=
t; &gt;&gt;&gt;&gt;&gt; to<br>=0A                      &gt; &gt;&gt;&gt;&gt=
; MUST.<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;<br>=0A       =
               &gt; &gt;&gt;&gt;&gt;&gt; EHL<br>=0A                      &g=
t; &gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&g=
t;&gt; -----Original=0A                      Message-----<br>=0A           =
           &gt; &gt;&gt;&gt;&gt;&gt;&gt; From: Phil Hunt=0A                =
      [mailto:<a rel=3D"nofollow">phil.hunt@oracle.com</a>]<br>=0A         =
             &gt; &gt;&gt;&gt;&gt;&gt;&gt; Sent: Friday, March=0A          =
            25, 2011 12:42 PM<br>=0A                      &gt; &gt;&gt;&gt;=
&gt;&gt;&gt; To: Eran=0A                      Hammer-Lahav<br>=0A          =
            &gt; &gt;&gt;&gt;&gt;&gt;&gt; Cc: OAuth WG; Chuck=0A           =
           &amp; Mara Mortimore<br>=0A                      &gt; &gt;&gt;&g=
t;&gt;&gt;&gt; Subject: Re:=0A                      [OAUTH-WG] WGLC on draf=
t-ietf-oauth-v2-13.txt<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt=
;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; Regarding t=
he=0A                      message: <a rel=3D"nofollow" target=3D"_blank" h=
ref=3D"http://www.ietf.org/mail-">http://www.ietf.org/mail-</a><br>=0A     =
                 &gt; &gt;&gt;&gt;&gt;&gt;&gt;=0A                      arch=
ive/web/oauth/current/msg05762.html&nbsp; (sorry I=0A                      =
somehow lost<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; the =
message in my=0A                      email).<br>=0A                      &=
gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&=
gt;&gt;&gt; This issue is theft=0A                      of the authorizatio=
n code during the redirect.<br>=0A                      &gt; &gt;&gt;&gt;&g=
t;&gt;&gt; Authenticating the=0A                      client is an importan=
t feature and goes a long<br>=0A                      &gt; &gt;&gt;&gt;&gt;=
&gt;&gt; way, but it is not=0A                      sufficient since in man=
y cases, the<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;=0A  =
                    client_id/client_secret will likely be hard coded=0A   =
                   and relatively<br>=0A                      &gt; &gt;&gt;=
&gt;&gt;&gt;&gt; easy to deduce (e.g.=0A                      mobile client=
 apps).&nbsp; Of course a strong<br>=0A                      &gt; &gt;&gt;&=
gt;&gt;&gt;&gt; client=0A                      authentication won't have th=
is issue. This makes=0A                      many<br>=0A                   =
   &gt; &gt;&gt;&gt;&gt;&gt;&gt; consumer situations=0A                    =
  very susceptible to an attack where the<br>=0A                      &gt; =
&gt;&gt;&gt;&gt;&gt;&gt; authorization code=0A                      is<br>=
=0A                      &gt; &gt;&gt;&gt;&gt; intercepted.<br>=0A         =
             &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt;=
 &gt;&gt;&gt;&gt;&gt;&gt; For more information=0A                      look=
 at the SAML Artifact issues in section<br>=0A                      &gt; &g=
t;&gt;&gt;&gt;&gt;&gt; 6.5 (specifically=0A                      stolen art=
ifact, replay, etc) of this document:<br>=0A                      &gt; &gt;=
&gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"http://d=
ocs.oasis-">http://docs.oasis-</a><br>=0A                      &gt; &gt;&gt=
;&gt;&gt;&gt;&gt;=0A                      open.org/security/saml/v2.0/saml-=
sec-consider-2.0-os.pdf<br>=0A                      &gt; &gt;&gt;&gt;&gt;&g=
t;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; There are =
a number=0A                      of remediations suggested (small lifetime,=
<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; single use), but=
 the=0A                      foundational one is confidentiality of the<br>=
=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; exchange (TLS).=0A  =
                    Hence the recommendation that the return of an<br>=0A  =
                    &gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code=0A    =
                  be kept secure with a MUST for TLS.<br>=0A               =
       &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&=
gt;&gt;&gt;&gt;&gt; Phil<br>=0A                      &gt; &gt;&gt;&gt;&gt;&=
gt;&gt; <a rel=3D"nofollow">phil.hunt@oracle.com</a><br>=0A                =
      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&g=
t;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt=
;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>=0A         =
             &gt; &gt;&gt;&gt;&gt;&gt;&gt; On 2011-03-24, at=0A            =
          7:22 PM, Chuck Mortimore wrote:<br>=0A                      &gt; =
&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&=
gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; O=
n Mar 24, 2011,=0A                      at 6:36 PM, "Eran Hammer-Lahav"<br>=
=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; &lt;<a rel=3D"nofoll=
ow">eran@hueniverse.com</a>&gt;=0A                      wrote:<br>=0A      =
                &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                   =
   &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &=
gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=0A                      -----Original M=
essage-----<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&g=
t;&gt; From: <a rel=3D"nofollow">oauth-bounces@ietf.org</a>=0A             =
         [<a rel=3D"nofollow" class=3D"yiv1913075545moz-txt-link-freetext" =
ymailto=3D"mailto:oauth" target=3D"_blank" href=3D"/mc/compose?to=3Doauth">=
mailto:oauth</a>-<br>=0A                      &gt; <a rel=3D"nofollow">boun=
ces@ietf.org</a>]<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;=
&gt;&gt;&gt; On=0A                      Behalf Of Chuck Mortimore<br>=0A   =
                   &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Sent:=0A      =
                Monday, March 14, 2011 6:10 PM<br>=0A                      =
&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;=
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 1) I'd=0A                      vote for dr=
opping the following from 1.4.2.&nbsp;&nbsp;&nbsp;In=0A                    =
  turn I'd<br>=0A                      &gt; discuss<br>=0A                 =
     &gt; &gt;&gt;&gt;&gt; some<br>=0A                      &gt; &gt;&gt;&g=
t;&gt;&gt;&gt; of<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;=
&gt;&gt;&gt; the=0A                      security considerations, such as d=
ifficulty of=0A                      protecting<br>=0A                     =
 &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; a=0A                      client=
_secret in almost all use-cases of this=0A                      profile.<br=
>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A =
                     &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&nbsp;=0A    =
                  "Implicit grants improve the responsiveness and=0A       =
               efficiency of<br>=0A                      &gt; &gt;&gt;&gt;&=
gt;&gt;&gt;&gt;&gt;&gt; some=0A                      clients (such as a cli=
ent implemented as an=0A                      in-browser<br>=0A            =
          &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=0A                     =
 application) since it reduces the number of round=0A                      =
trips<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=
 required=0A                      to obtain an access token."<br>=0A       =
               &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                =
      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why drop it?=0A                =
      What about it isn't accurate?<br>=0A                      &gt; &gt;&g=
t;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt=
;&gt;&gt; It's accurate,=0A                      but my opinion is it sends=
 the wrong=0A                      message.&nbsp;&nbsp;&nbsp;It's<br>=0A   =
                   &gt; clearly<br>=0A                      &gt; &gt;&gt;&g=
t;&gt; the<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; less s=
ecure of the=0A                      response types.&nbsp; By positioning i=
t as the most<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; per=
formant people=0A                      may find that attractive and make th=
e wrong<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; security<=
br>=0A                      &gt; &gt;&gt;&gt;&gt; decision.<br>=0A         =
             &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      =
&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;=
&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&=
gt;&gt;&gt;&gt;&gt; 2)=0A                      Section 2.1, we should MUST =
TLS even for=0A                      Authorization Code.<br>=0A            =
          &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                     =
 &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why? What's=0A                      =
the attack vector?<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt=
;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; See Phi=
ls=0A                      comment on past experience with artifact binding=
s.<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Spec shoul=
d<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; default for sec=
urity=0A                      always on, and let deployments that don't<br>=
=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; want to use HTTPs=0A=
                      simply be non-conformant.<br>=0A                     =
 &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt=
;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;=
&gt;&gt;&gt;&gt;&gt; 3)=0A                      Section 4.1.3 - not clear t=
o me why redirect_uri=0A                      is<br>=0A                    =
  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; REQUIRED=0A                    =
  since in 4.1.1 it's "REQUIRED unless"<br>=0A                      &gt; &g=
t;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt=
;&gt;&gt;&gt;&gt;&gt; The client=0A                      should always conf=
irm where the code was sent to.=0A                      It<br>=0A          =
            &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; can omit<br>=0A          =
            &gt; &gt;&gt;&gt;&gt;&gt;&gt; the redirection is=0A            =
          one was provided but should tell the server<br>=0A               =
       &gt; &gt;&gt;&gt;&gt;&gt;&gt; where it went to.=0A                  =
    This is more consistent on the verification<br>=0A                     =
 &gt; &gt;&gt;&gt;&gt;&gt;&gt; side, but if the=0A                      ori=
ginal flow designers want to chime in (Dick,<br>=0A                      &g=
t; &gt;&gt;&gt;&gt;&gt;&gt; Brian, etc.?), I'm=0A                      open=
<br>=0A                      &gt; &gt;&gt;&gt;&gt; to change this.<br>=0A  =
                    &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A           =
           &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 4)=0A                 =
     Section 4.2.2 - when did we drop refresh_token?&nbsp;=0A              =
        &nbsp;&nbsp;&nbsp;I assume<br>=0A                      &gt; this<br=
>=0A                      &gt; &gt;&gt;&gt;&gt; goes<br>=0A                =
      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; back to=0A                 =
     disagreement on how best to handle native clients.=0A                 =
     I'd<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&=
gt; prefer=0A                      it to simply reference 5.1 and leave wha=
t is=0A                      issued up<br>=0A                      &gt; &gt=
;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; to the=0A                      security p=
rofile of the particular deployment as=0A                      to what is<b=
r>=0A                      &gt; issued.<br>=0A                      &gt; &g=
t;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt=
;&gt;&gt;&gt;&gt;&gt; -08 June=0A                      2010.<br>=0A        =
              &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                 =
     &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; This has=0A                     =
 been decided for a long time. I'm not eager to=0A                      cha=
nge it.<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=
=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Thanks - I can=
=0A                      live with it.&nbsp; Unfortunately we still seem to=
 be<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; fragmenti=
ng on<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt; the native =
client=0A                      approach.&nbsp;&nbsp;&nbsp;Good topic for II=
W I suspect<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<b=
r>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; -cmort<br>=0A =
                     &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A              =
        &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &=
gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; EHL<br>=0A                      &gt; &=
gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&g=
t;&gt;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt=
;&gt;&gt;=0A                      _________________________________________=
______<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; OAuth =
mailing=0A                      list<br>=0A                      &gt; &gt;&=
gt;&gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow">OAuth@ietf.org</a><br>=0A      =
                &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow" targe=
t=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://w=
ww.ietf.org/mailman/listinfo/oauth</a><br>=0A                      &gt; &gt=
;&gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt;=0A =
                     _______________________________________________<br>=0A=
                      &gt; &gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>=0A  =
                    &gt; &gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow">OAuth@iet=
f.org</a><br>=0A                      &gt; &gt;&gt;&gt;&gt;&gt; <a rel=3D"n=
ofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oa=
uth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=0A                =
      &gt; &gt;&gt;&gt;&gt;<br>=0A                      &gt; &gt;&gt;&gt;<b=
r>=0A                      &gt; &gt;&gt;<br>=0A                      &gt; &=
gt;<br>=0A                      &gt; &gt;<br>=0A                      <br>=
=0A                      _______________________________________________<br=
>=0A                      OAuth mailing list<br>=0A                      <a=
 rel=3D"nofollow">OAuth@ietf.org</a><br>=0A                      <a rel=3D"=
nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/o=
auth">https://www.ietf.org/mailman/listinfo/oauth</a></p> =0A              =
    </div>=0A                </td>=0A              </tr>=0A            </tb=
ody>=0A          </table>=0A          <p class=3D"yiv1913075545MsoNormal"><=
span style=3D"font-size: 10pt;"> &nbsp;</span></p> =0A        </div>=0A    =
  </div>=0A      =3D=0A      <pre><fieldset class=3D"yiv1913075545mimeAttac=
hmentHeader"></fieldset><br>_______________________________________________=
<br>OAuth mailing list<br><a rel=3D"nofollow" class=3D"yiv1913075545moz-txt=
-link-abbreviated" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=
=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br><a rel=3D"nofoll=
ow" class=3D"yiv1913075545moz-txt-link-freetext" target=3D"_blank" href=3D"=
https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/l=
istinfo/oauth</a></pre>=0A    </blockquote>=0A    <br>=0A  =0A</div></block=
quote></td></tr></table>
--0-1362187757-1301425430=:27371--

From fcorella@pomcor.com  Tue Mar 29 12:03:42 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 27E403A6A94 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 12:03:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.499
X-Spam-Level: 
X-Spam-Status: No, score=-2.499 tagged_above=-999 required=5 tests=[AWL=0.098,  BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QwW1fj+fr55b for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 12:03:39 -0700 (PDT)
Received: from web55801.mail.re3.yahoo.com (web55801.mail.re3.yahoo.com [216.252.110.47]) by core3.amsl.com (Postfix) with SMTP id B45733A6A1E for <oauth@ietf.org>; Tue, 29 Mar 2011 12:03:36 -0700 (PDT)
Received: (qmail 83436 invoked by uid 60001); 29 Mar 2011 19:05:14 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1301425514; bh=/Myr7UmOecwFr0QnZaqGpfJu+vP5S5FOJ5Gy1+sT0+o=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=mSd8UV/gwGLcHcWER8zdbwUiCaMRB9XPjq3vvyF4N1DXaHVt/wU0a6U4zcPyELxk4NzuFitGsixWBWRRUJ2RFzIjd+AVYr6LVqCgXQ4cy8JpHwmn1dZHIvpKOKuDdPTlsupq7+ye4FiJB8KSnaGV8GFJ1eJPxOf22YPZ1hxQbro=
Message-ID: <545045.83060.qm@web55801.mail.re3.yahoo.com>
X-YMail-OSG: FsUbGo4VM1l1.Am0JqMLzARvD5WPzs2DkHXSP.1tnCw3cCC G0.FuhXY7s6nNxbkityWQviuwE5dAD8yo4KJ62AoT9MLrkykuHhSQXrss9li wXKyxipu61B6pz9ocUdzfGSUSBXut3k4buaWb9eNGJQlBkzqPtsjecqcR4vh T9GZCejvTWVEwq2NIrDmVx096Hs2XqdCw7oWgFze5Zy9kUhWq.8nq_pIwxz. HynHLUYCoKZQXtSpt2togdfO5Sb.ded1SeOlerf6WPhg1E2K5gtfuKHlpvXv epXv3sThpHEM.6mYjccPIc2rFaQkIWydHIWB2Z9f08vy5v.q6M6Je0A3TNF3 e.L0piTGYAuxuUGTv6C8NNbwOBW07PTLKTfuHNZd9jhDXw8qNMuQ0lRKJ5RF M0y3u6l1xW8DF
Received: from [67.91.91.101] by web55801.mail.re3.yahoo.com via HTTP; Tue, 29 Mar 2011 12:05:14 PDT
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/12.0.2 YahooMailWebService/0.8.109.295617
Date: Tue, 29 Mar 2011 12:05:14 -0700 (PDT)
From: Francisco Corella <fcorella@pomcor.com>
To: George Fletcher <gffletch@aol.com>, Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <59EC5976-671D-4D9D-B500-8F9F90FA7D4E@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1812889459-1301425514=:83060"
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 19:03:42 -0000

--0-1812889459-1301425514=:83060
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

I agree.=A0=A0=A0=A0=A0=A0=A0 - Francisco

--- On Tue, 3/29/11, Phil Hunt <phil.hunt@oracle.com> wrote:

From: Phil Hunt <phil.hunt@oracle.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: "George Fletcher" <gffletch@aol.com>
Cc: fcorella@pomcor.com, "Justin Richer" <jricher@mitre.org>, "Eran Hammer-=
Lahav" <eran@hueniverse.com>, "OAuth WG" <oauth@ietf.org>, "Karen P. Lewiso=
n" <kplewison@pomcor.com>
Date: Tuesday, March 29, 2011, 6:03 PM

My primary concern is that when the authorization code is handed back to th=
e target app (in this case by way of redirect through a user-agent/browser)=
, then the return path to the browser is at least secure. =A0If the browser=
/user-agent is redirecting to a local app, then no big deal. BUT, if the ap=
p is redirecting back to a web service, then that path too must be secure.
So both #1 and #2 (described earlier) MUST be secure unless redirect is loc=
al in which case 2 (outgoing GET by user agent) is optional since it cannot=
 be scanned. =A0
I think SHOULD is too weak (too broad). I'd rather have a MUST with an appr=
opriate specific exception to cover the local portion of the redirect.
Philphil.hunt@oracle.com


=0A=0A
On 2011-03-29, at 10:55 AM, George Fletcher wrote:
=0A=0A    Hi Francisco,
=0A     =20
=0A      So the examples that Justin gave were either localhost or non HTTP=
=0A      based schemes. If OAuth2 is to support these other schemes (often=
=0A      used in mobile clients) then I'm not sure how TLS can be a MUST=0A=
      unless it's qualified to apply to HTTP based URLs only.
=0A     =20
=0A      Is it sufficient to document this possible exposure in the=0A     =
 security section such that the spec doesn't preclude the use of=0A      OA=
uth2 with non HTTP based redirect_uri?
=0A     =20
=0A      Thanks,
=0A      George
=0A   =20
=0A    On 3/29/11 1:05 PM, Francisco Corella wrote:=0A    =0A      =0A     =
   =0A          =0A            Eran,
=0A             =20
=0A              It's not a reasonable compromise.=A0 #2 MUST use tls UNLES=
S=0A              of course it targets localhost.=A0 If #2 is sent without =
TLS=0A              to a Web server, the authorization code can be easily=
=0A              intercepted by an attacker.=A0 The attacker can then use i=
t=0A              to obtain protected resources by submitting the=0A       =
       authorization code to the client.=A0 (This is independent of=0A     =
         whether the client authenticates itself when exchanging=0A        =
      the authorization code for an access token or not.) In the=0A        =
      Facebook use case, the attacker can use the authorization=0A         =
     code to log in to the client using the user's Facebook=0A             =
 identity.=A0 I believe this vulnerability exists in many=0A              i=
mplementations of the Facebook login button today.
=0A             =20
=0A              Btw, I've pointed this out before three or four times on=
=0A              this mailing list, including in a response to the WGLC=0A =
             that you never replied to.
=0A             =20
=0A              Francisco
=0A             =20
=0A              --- On Mon, 3/28/11, Eran Hammer-Lahav <eran@hueniverse.co=
m>=0A              wrote:
=0A             =20
=0A                From: Eran Hammer-Lahav <eran@hueniverse.com>
=0A                Subject: Re: [OAUTH-WG] WGLC on=0A                draft-=
ietf-oauth-v2-13.txt
=0A                To: "Phil Hunt" <phil.hunt@oracle.com>, "Justin=0A      =
          Richer" <jricher@mitre.org>
=0A                Cc: "OAuth WG" <oauth@ietf.org>
=0A                Date: Monday, March 28, 2011, 10:28 PM
=0A               =20
=0A                The code is returned in two=0A                  steps:
=0A                 =20
=0A                  1. The authorization server replies to the user-agent=
=0A                  request (providing authorization) with a redirection=
=0A                  instruction typically using the Location response=0A  =
                header field.
=0A                  2. The user-agent makes an HTTP GET request to the=0A =
                 provided location (which may be something other than=0A   =
               an HTTP URI, or an HTTP URI to localhost).
=0A                 =20
=0A                  #1 is an HTTP response to a user-agent request to the=
=0A                  authorization endpoint (or a subsequent one if the=0A =
                 server implementation has multiple authorization=0A       =
           steps).
=0A                 =20
=0A                  #2 is an HTTP request made by the user-agent.
=0A                 =20
=0A                  In order for the code to be secure end-to-end, both=0A=
                  steps must use TLS. The arguments made against making=0A =
                 TLS required are based on use cases for #2. We can=0A     =
             make #1 (the authorization endpoint require TLS since=0A      =
            it already has to support it for the 'token' response=0A       =
           type. We should make callbacks a SHOULD for TLS.
=0A                 =20
=0A                  Does this sound like a reasonable compromise?
=0A                 =20
=0A                  EHL
=0A                 =20
=0A                  > -----Original Message-----
=0A                  > From: Phil Hunt [mailto:phil.hunt@oracle.com]
=0A                  > Sent: Monday, March 28, 2011 2:28 PM
=0A                  > To: Justin Richer
=0A                  > Cc: Eran Hammer-Lahav; OAuth WG
=0A                  > Subject: Re: [OAUTH-WG] WGLC on=0A                  =
draft-ietf-oauth-v2-13.txt
=0A                  >=20
=0A                  > This was referring to section 2.1 that the=0A       =
           authorization server must use TLS
=0A                  > when returning an authorization code.
=0A                  >=20
=0A                  > If it doesn't use TLS then the code being=0A        =
          returned to the client can be
=0A                  > intercepted.
=0A                  >=20
=0A                  > Or did I miss something?
=0A                  >=20
=0A                  > Phil
=0A                  > phil.hunt@oracle.com
=0A                  >=20
=0A                  >=20
=0A                  >=20
=0A                  >=20
=0A                  > On 2011-03-28, at 1:37 PM, Justin Richer wrote:
=0A                  >=20
=0A                  > > Phil,
=0A                  > >
=0A                  > > The main difference is that it's a=0A             =
     requirement on the *client* instead
=0A                  > > of the *provider* side of the equation, and=0A    =
              clients aren't always even
=0A                  > > speaking HTTP. I agree that all client web=0A     =
             servers SHOULD do it. A
=0A                  > > particular provider can even REQUIRE it for=0A    =
              their registered clients,
=0A                  > > a step that is outside the scope of OAuth.=0A     =
             But there are real, in-use
=0A                  > > patterns that don't require the client to=0A      =
            make an HTTP request to an
=0A                  > > external service.
=0A                  > >
=0A                  > > I don't see how Firesheep is relevant to=0A       =
           this discussion -- if your
=0A                  > > browser is making a call to localhost to get=0A   =
               the token, who outside of
=0A                  > > your machine is going to do it? I'm not=0A        =
          talking about convenience for
=0A                  > > developers here (which I would argue should=0A    =
              NOT be discounted, but
=0A                  > > that's another argument), I'm talking about=0A    =
              cases where the browser
=0A                  > > isn't going outside of a trusted security=0A      =
            boundary. There are also
=0A                  > > instances where there may not even be an=0A       =
           HTTP transaction involved,
=0A                  > > let alone one that could support TLS.
=0A                  > >
=0A                  > > -- Justin
=0A                  > >
=0A                  > > On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt=0A   =
               wrote:
=0A                  > >> Justin, How is that so? Remember=0A              =
    firesheep?=A0 I wouldn't want the
=0A                  > authorization code being exchanged without TLS in=0A=
                  a cafe. Intercept is just
=0A                  > too easy. And as I mentioned earlier, client=0A     =
             credentials are already very weak
=0A                  > in many cases. In contrast, two web servers are=0A  =
                hard to sniff unless you are
=0A                  > able to gain access to their network=0A             =
     communications path.
=0A                  > >>
=0A                  > >> As for testing, it seems more reasonable=0A      =
            to put servers in temporary non-
=0A                  > compliance while testing rather then allow=0A       =
           non-secure servers in production
=0A                  > because of the SHOULD loophole.
=0A                  > >>
=0A                  > >> Also, while it does seem convenient for=0A       =
           the developer not to have to use
=0A                  > TLS for authz codes, note that the developer=0A     =
             still has to have TLS enabled
=0A                  > when exchanging the code for an access token. So=0A =
                 I'm not sure how relaxing
=0A                  > TLS for obtaining authorization actually=0A         =
         simplifies the developer lifecycle since
=0A                  > they still have to set it up to test the other=0A   =
               parts.=A0 In my view, it would be ok
=0A                  > for a developer to temporarily disable TLS=0A       =
           everywhere during development -
=0A                  > - which places operation outside RFC compliance=0A  =
                while developing -- but
=0A                  > forces compliance once they go into production.
=0A                  > >>
=0A                  > >> It seems like I had to give a pretty=0A          =
        substantial justification and we backed
=0A                  > off because TLS is seen as inconvenient. I think=0A =
                 we need more evidence that
=0A                  > there are safe cases that don't need TLS.
=0A                  > >>
=0A                  > >> Sorry for pushing hard on this one, but=0A       =
           TLS is the backbone of OAuth
=0A                  > security at present.
=0A                  > >>
=0A                  > >> Phil
=0A                  > >> phil.hunt@oracle.com
=0A                  > >>
=0A                  > >>
=0A                  > >>
=0A                  > >>
=0A                  > >> On 2011-03-28, at 12:52 PM, Eran=0A              =
    Hammer-Lahav wrote:
=0A                  > >>
=0A                  > >>> No change then. But the security=0A             =
     considerations section must reflect
=0A                  > this.
=0A                  > >>>
=0A                  > >>> EHL
=0A                  > >>>
=0A                  > >>>> -----Original Message-----
=0A                  > >>>> From: Justin Richer [mailto:jricher@mitre.org]
=0A                  > >>>> Sent: Monday, March 28, 2011=0A                =
  10:05 AM
=0A                  > >>>> To: Eran Hammer-Lahav
=0A                  > >>>> Cc: Phil Hunt; OAuth WG
=0A                  > >>>> Subject: Re: [OAUTH-WG] WGLC on=0A             =
     draft-ietf-oauth-v2-13.txt
=0A                  > >>>>
=0A                  > >>>> What about non-http return=0A                  =
uri's, or client-localhost, such as
=0A                  > >>>>
=0A                  > >>>> someapp://app/?code=3Dfoo
=0A                  > >>>>
=0A                  > >>>> http://localhost:87345/?code=3Dfoo
=0A                  > >>>>
=0A                  > >>>> HTTPS makes sense when you're=0A               =
   talking between two web servers, but
=0A                  > >>>> it seems to fall apart=0A                  othe=
rwise. I think SHOULD is appropriate here.
=0A                  > >>>>
=0A                  > >>>> -- Justin
=0A                  > >>>>
=0A                  > >>>>
=0A                  > >>>> On Fri, 2011-03-25 at 16:03=0A                 =
 -0400, Eran Hammer-Lahav wrote:
=0A                  > >>>>> Unless someone has an=0A                  obje=
ction, I'll make the change from SHOULD
=0A                  > >>>>> to
=0A                  > >>>> MUST.
=0A                  > >>>>>
=0A                  > >>>>> EHL
=0A                  > >>>>>
=0A                  > >>>>>> -----Original=0A                  Message----=
-
=0A                  > >>>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
=0A                  > >>>>>> Sent: Friday, March 25,=0A                  2=
011 12:42 PM
=0A                  > >>>>>> To: Eran Hammer-Lahav
=0A                  > >>>>>> Cc: OAuth WG; Chuck=0A                  & Mar=
a Mortimore
=0A                  > >>>>>> Subject: Re: [OAUTH-WG]=0A                  W=
GLC on draft-ietf-oauth-v2-13.txt
=0A                  > >>>>>>
=0A                  > >>>>>> Regarding the message: http://www.ietf.org/ma=
il-
=0A                  > >>>>>>=0A                  archive/web/oauth/current=
/msg05762.html=A0 (sorry I=0A                  somehow lost
=0A                  > >>>>>> the message in my=0A                  email).
=0A                  > >>>>>>
=0A                  > >>>>>> This issue is theft of=0A                  th=
e authorization code during the redirect.
=0A                  > >>>>>> Authenticating the=0A                  client=
 is an important feature and goes a long
=0A                  > >>>>>> way, but it is not=0A                  suffic=
ient since in many cases, the
=0A                  > >>>>>> client_id/client_secret=0A                  w=
ill likely be hard coded and relatively
=0A                  > >>>>>> easy to deduce (e.g.=0A                  mobi=
le client apps).=A0 Of course a strong
=0A                  > >>>>>> client authentication=0A                  won=
't have this issue. This makes many
=0A                  > >>>>>> consumer situations very=0A                  =
susceptible to an attack where the
=0A                  > >>>>>> authorization code is
=0A                  > >>>> intercepted.
=0A                  > >>>>>>
=0A                  > >>>>>> For more information=0A                  look=
 at the SAML Artifact issues in section
=0A                  > >>>>>> 6.5 (specifically stolen=0A                  =
artifact, replay, etc) of this document:
=0A                  > >>>>>> http://docs.oasis-
=0A                  > >>>>>>=0A                  open.org/security/saml/v2=
.0/saml-sec-consider-2.0-os.pdf
=0A                  > >>>>>>
=0A                  > >>>>>> There are a number of=0A                  rem=
ediations suggested (small lifetime,
=0A                  > >>>>>> single use), but the=0A                  foun=
dational one is confidentiality of the
=0A                  > >>>>>> exchange (TLS). Hence=0A                  the=
 recommendation that the return of an
=0A                  > >>>>>> authorization code be=0A                  kep=
t secure with a MUST for TLS.
=0A                  > >>>>>>
=0A                  > >>>>>> Phil
=0A                  > >>>>>> phil.hunt@oracle.com
=0A                  > >>>>>>
=0A                  > >>>>>>
=0A                  > >>>>>>
=0A                  > >>>>>>
=0A                  > >>>>>> On 2011-03-24, at 7:22=0A                  PM=
, Chuck Mortimore wrote:
=0A                  > >>>>>>
=0A                  > >>>>>>>
=0A                  > >>>>>>> On Mar 24, 2011, at=0A                  6:36=
 PM, "Eran Hammer-Lahav"
=0A                  > >>>>>> <eran@hueniverse.com>=0A                  wro=
te:
=0A                  > >>>>>>>
=0A                  > >>>>>>>>
=0A                  > >>>>>>>>>=0A                  -----Original Message-=
----
=0A                  > >>>>>>>>> From: oauth-bounces@ietf.org=0A           =
       [mailto:oauth-
=0A                  > bounces@ietf.org]
=0A                  > >>>>>>>>> On Behalf Of=0A                  Chuck Mor=
timore
=0A                  > >>>>>>>>> Sent:=0A                  Monday, March 14=
, 2011 6:10 PM
=0A                  > >>>>>>>>
=0A                  > >>>>>>>>> 1) I'd vote=0A                  for droppi=
ng the following from 1.4.2.=A0=A0=A0In turn I'd
=0A                  > discuss
=0A                  > >>>> some
=0A                  > >>>>>> of
=0A                  > >>>>>>>>> the security=0A                  considera=
tions, such as difficulty of protecting
=0A                  > >>>>>>>>> a=0A                  client_secret in alm=
ost all use-cases of this profile.
=0A                  > >>>>>>>>>
=0A                  > >>>>>>>>>=A0 "Implicit=0A                  grants im=
prove the responsiveness and efficiency of
=0A                  > >>>>>>>>> some clients=0A                  (such as =
a client implemented as an in-browser
=0A                  > >>>>>>>>> application)=0A                  since it =
reduces the number of round trips
=0A                  > >>>>>>>>> required to=0A                  obtain an =
access token."
=0A                  > >>>>>>>>
=0A                  > >>>>>>>> Why drop it?=0A                  What about=
 it isn't accurate?
=0A                  > >>>>>>>
=0A                  > >>>>>>> It's accurate, but=0A                  my op=
inion is it sends the wrong message.=A0=A0=A0It's
=0A                  > clearly
=0A                  > >>>> the
=0A                  > >>>>>> less secure of the=0A                  respon=
se types.=A0 By positioning it as the most
=0A                  > >>>>>> performant people may=0A                  fin=
d that attractive and make the wrong
=0A                  > >>>>>> security
=0A                  > >>>> decision.
=0A                  > >>>>>>>
=0A                  > >>>>>>>
=0A                  > >>>>>>>>
=0A                  > >>>>>>>>> 2) Section=0A                  2.1, we sho=
uld MUST TLS even for Authorization Code.
=0A                  > >>>>>>>>
=0A                  > >>>>>>>> Why? What's the=0A                  attack =
vector?
=0A                  > >>>>>>>
=0A                  > >>>>>>> See Phils comment on=0A                  pas=
t experience with artifact bindings.
=0A                  > >>>>>>> Spec should
=0A                  > >>>>>> default for security=0A                  alwa=
ys on, and let deployments that don't
=0A                  > >>>>>> want to use HTTPs simply=0A                  =
be non-conformant.
=0A                  > >>>>>>>
=0A                  > >>>>>>>>
=0A                  > >>>>>>>>> 3) Section=0A                  4.1.3 - not=
 clear to me why redirect_uri is
=0A                  > >>>>>>>>> REQUIRED=0A                  since in 4.1.=
1 it's "REQUIRED unless"
=0A                  > >>>>>>>>
=0A                  > >>>>>>>> The client=0A                  should alway=
s confirm where the code was sent to. It
=0A                  > >>>>>>>> can omit
=0A                  > >>>>>> the redirection is one=0A                  wa=
s provided but should tell the server
=0A                  > >>>>>> where it went to. This=0A                  is=
 more consistent on the verification
=0A                  > >>>>>> side, but if the=0A                  original=
 flow designers want to chime in (Dick,
=0A                  > >>>>>> Brian, etc.?), I'm open
=0A                  > >>>> to change this.
=0A                  > >>>>>>>>
=0A                  > >>>>>>>>> 4) Section=0A                  4.2.2 - whe=
n did we drop refresh_token?=A0 =A0=A0=A0I assume
=0A                  > this
=0A                  > >>>> goes
=0A                  > >>>>>>>>> back to=0A                  disagreement o=
n how best to handle native clients. I'd
=0A                  > >>>>>>>>> prefer it to=0A                  simply re=
ference 5.1 and leave what is issued up
=0A                  > >>>>>>>>> to the=0A                  security profil=
e of the particular deployment as to=0A                  what is
=0A                  > issued.
=0A                  > >>>>>>>>
=0A                  > >>>>>>>> -08 June 2010.
=0A                  > >>>>>>>>
=0A                  > >>>>>>>> This has been=0A                  decided f=
or a long time. I'm not eager to change it.
=0A                  > >>>>>>>
=0A                  > >>>>>>> Thanks - I can live=0A                  with=
 it.=A0 Unfortunately we still seem to be
=0A                  > >>>>>>> fragmenting on
=0A                  > >>>>>> the native client=0A                  approac=
h.=A0=A0=A0Good topic for IIW I suspect
=0A                  > >>>>>>>
=0A                  > >>>>>>> -cmort
=0A                  > >>>>>>>
=0A                  > >>>>>>>>
=0A                  > >>>>>>>> EHL
=0A                  > >>>>>>>>
=0A                  > >>>>>>>>
=0A                  > >>>>>>>=0A                  ________________________=
_______________________
=0A                  > >>>>>>> OAuth mailing list
=0A                  > >>>>>>> OAuth@ietf.org
=0A                  > >>>>>>> https://www.ietf.org/mailman/listinfo/oauth
=0A                  > >>>>>
=0A                  > >>>>>=0A                  __________________________=
_____________________
=0A                  > >>>>> OAuth mailing list
=0A                  > >>>>> OAuth@ietf.org
=0A                  > >>>>> https://www.ietf.org/mailman/listinfo/oauth
=0A                  > >>>>
=0A                  > >>>
=0A                  > >>
=0A                  > >
=0A                  > >
=0A                 =20
=0A                  _______________________________________________
=0A                  OAuth mailing list
=0A                  OAuth@ietf.org
=0A                  https://www.ietf.org/mailman/listinfo/oauth
=0A                =0A              =0A            =0A          =0A        =
=0A      =0A     =20
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
=0A    =0A  =0A=0A

--0-1812889459-1301425514=:83060
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">I agree.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; - Francisco<br><br>--- On <b>Tue, 3/29/11, Phil Hunt <i>&lt;phil.hunt=
@oracle.com&gt;</i></b> wrote:<br><blockquote style=3D"border-left: 2px sol=
id rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"><br>From: Phil H=
unt &lt;phil.hunt@oracle.com&gt;<br>Subject: Re: [OAUTH-WG] WGLC on draft-i=
etf-oauth-v2-13.txt<br>To: "George Fletcher" &lt;gffletch@aol.com&gt;<br>Cc=
: fcorella@pomcor.com, "Justin Richer" &lt;jricher@mitre.org&gt;, "Eran Ham=
mer-Lahav" &lt;eran@hueniverse.com&gt;, "OAuth WG" &lt;oauth@ietf.org&gt;, =
"Karen P. Lewison" &lt;kplewison@pomcor.com&gt;<br>Date: Tuesday, March 29,=
 2011, 6:03 PM<br><br><div id=3D"yiv61446368">My primary concern is that wh=
en the authorization code is handed back to the target app (in this case by=
 way of redirect through a user-agent/browser), then the return path to the
 browser is at least secure. &nbsp;If the browser/user-agent is redirecting=
 to a local app, then no big deal. BUT, if the app is redirecting back to a=
 web service, then that path too must be secure.<div><br></div><div>So both=
 #1 and #2 (described earlier) MUST be secure unless redirect is local in w=
hich case 2 (outgoing GET by user agent) is optional since it cannot be sca=
nned. &nbsp;</div><div><br></div><div>I think SHOULD is too weak (too broad=
). I'd rather have a MUST with an appropriate specific exception to cover t=
he local portion of the redirect.</div><div><br></div><div><span class=3D"y=
iv61446368Apple-style-span" style=3D"font-size: 12px;">Phil</span></div><di=
v><div><span class=3D"yiv61446368Apple-style-span" style=3D"border-collapse=
: separate; color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium;=
 font-style: normal; font-variant: normal; font-weight: normal; letter-spac=
ing: normal; line-height: normal; orphans: 2; text-indent: 0px;
 text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;">=
<span class=3D"yiv61446368Apple-style-span" style=3D"border-collapse: separ=
ate; color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; font-s=
tyle: normal; font-variant: normal; font-weight: normal; letter-spacing: no=
rmal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: no=
ne; white-space: normal; widows: 2; word-spacing: 0px;"><div style=3D"word-=
wrap: break-word;"><span class=3D"yiv61446368Apple-style-span" style=3D"bor=
der-collapse: separate; color: rgb(0, 0, 0); font-family: Helvetica; font-s=
ize: 12px; font-style: normal; font-variant: normal; font-weight: normal; l=
etter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; t=
ext-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><d=
iv style=3D"word-wrap: break-word;"><div><div><div><a rel=3D"nofollow" ymai=
lto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank"
 href=3D"/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.com</a></d=
iv></div></div></div></span><br class=3D"yiv61446368Apple-interchange-newli=
ne"></div></span><br class=3D"yiv61446368Apple-interchange-newline"></span>=
<br class=3D"yiv61446368Apple-interchange-newline">=0A</div>=0A<br><div><di=
v>On 2011-03-29, at 10:55 AM, George Fletcher wrote:</div><br class=3D"yiv6=
1446368Apple-interchange-newline"><blockquote type=3D"cite">=0A<div>=0A    =
<font face=3D"Helvetica, Arial, sans-serif">Hi Francisco,<br>=0A      <br>=
=0A      So the examples that Justin gave were either localhost or non HTTP=
=0A      based schemes. If OAuth2 is to support these other schemes (often=
=0A      used in mobile clients) then I'm not sure how TLS can be a MUST=0A=
      unless it's qualified to apply to HTTP based URLs only.<br>=0A      <=
br>=0A      Is it sufficient to document this possible exposure in the=0A  =
    security section such that the spec doesn't preclude the use of=0A     =
 OAuth2 with non HTTP based redirect_uri?<br>=0A      <br>=0A      Thanks,<=
br>=0A      George<br>=0A    </font><br>=0A    On 3/29/11 1:05 PM, Francisc=
o Corella wrote:=0A    <blockquote type=3D"cite">=0A      <table border=3D"=
0" cellpadding=3D"0" cellspacing=3D"0">=0A        <tbody>=0A          <tr>=
=0A            <td style=3D"font: inherit;" valign=3D"top">Eran,<br>=0A    =
          <br>=0A              It's not a reasonable compromise.&nbsp; #2 M=
UST use tls UNLESS=0A              of course it targets localhost.&nbsp; If=
 #2 is sent without TLS=0A              to a Web server, the authorization =
code can be easily=0A              intercepted by an attacker.&nbsp; The at=
tacker can then use it=0A              to obtain protected resources by sub=
mitting the=0A              authorization code to the client.&nbsp; (This i=
s independent of=0A              whether the client authenticates itself wh=
en exchanging=0A              the authorization code for an access token or=
 not.) In the=0A              Facebook use case, the attacker can use the a=
uthorization=0A              code to log in to the client using the user's =
Facebook=0A              identity.&nbsp; I believe this vulnerability exist=
s in many=0A              implementations of the Facebook login button toda=
y.<br>=0A              <br>=0A              Btw, I've pointed this out befo=
re three or four times on=0A              this mailing list, including in a=
 response to the WGLC=0A              that you never replied to.<br>=0A    =
          <br>=0A              Francisco<br>=0A              <br>=0A       =
       --- On <b>Mon, 3/28/11, Eran Hammer-Lahav <i><a rel=3D"nofollow" cla=
ss=3D"yiv61446368moz-txt-link-rfc2396E" ymailto=3D"mailto:eran@hueniverse.c=
om" target=3D"_blank" href=3D"/mc/compose?to=3Deran@hueniverse.com">&lt;era=
n@hueniverse.com&gt;</a></i></b>=0A              wrote:<br>=0A             =
 <blockquote style=3D"border-left: 2px solid rgb(16, 16, 255); margin-left:=
 5px; padding-left: 5px;"><br>=0A                From: Eran Hammer-Lahav <a=
 rel=3D"nofollow" class=3D"yiv61446368moz-txt-link-rfc2396E" ymailto=3D"mai=
lto:eran@hueniverse.com" target=3D"_blank" href=3D"/mc/compose?to=3Deran@hu=
eniverse.com">&lt;eran@hueniverse.com&gt;</a><br>=0A                Subject=
: Re: [OAUTH-WG] WGLC on=0A                draft-ietf-oauth-v2-13.txt<br>=
=0A                To: "Phil Hunt" <a rel=3D"nofollow" class=3D"yiv61446368=
moz-txt-link-rfc2396E" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_b=
lank" href=3D"/mc/compose?to=3Dphil.hunt@oracle.com">&lt;phil.hunt@oracle.c=
om&gt;</a>, "Justin=0A                Richer" <a rel=3D"nofollow" class=3D"=
yiv61446368moz-txt-link-rfc2396E" ymailto=3D"mailto:jricher@mitre.org" targ=
et=3D"_blank" href=3D"/mc/compose?to=3Djricher@mitre.org">&lt;jricher@mitre=
.org&gt;</a><br>=0A                Cc: "OAuth WG" <a rel=3D"nofollow" class=
=3D"yiv61446368moz-txt-link-rfc2396E" ymailto=3D"mailto:oauth@ietf.org" tar=
get=3D"_blank" href=3D"/mc/compose?to=3Doauth@ietf.org">&lt;oauth@ietf.org&=
gt;</a><br>=0A                Date: Monday, March 28, 2011, 10:28 PM<br>=0A=
                <br>=0A                <div class=3D"yiv61446368plainMail">=
The code is returned in two=0A                  steps:<br>=0A              =
    <br>=0A                  1. The authorization server replies to the use=
r-agent=0A                  request (providing authorization) with a redire=
ction=0A                  instruction typically using the Location response=
=0A                  header field.<br>=0A                  2. The user-agen=
t makes an HTTP GET request to the=0A                  provided location (w=
hich may be something other than=0A                  an HTTP URI, or an HTT=
P URI to localhost).<br>=0A                  <br>=0A                  #1 is=
 an HTTP response to a user-agent request to the=0A                  author=
ization endpoint (or a subsequent one if the=0A                  server imp=
lementation has multiple authorization=0A                  steps).<br>=0A  =
                <br>=0A                  #2 is an HTTP request made by the =
user-agent.<br>=0A                  <br>=0A                  In order for t=
he code to be secure end-to-end, both=0A                  steps must use TL=
S. The arguments made against making=0A                  TLS required are b=
ased on use cases for #2. We can=0A                  make #1 (the authoriza=
tion endpoint require TLS since=0A                  it already has to suppo=
rt it for the 'token' response=0A                  type. We should make cal=
lbacks a SHOULD for TLS.<br>=0A                  <br>=0A                  D=
oes this sound like a reasonable compromise?<br>=0A                  <br>=
=0A                  EHL<br>=0A                  <br>=0A                  &=
gt; -----Original Message-----<br>=0A                  &gt; From: Phil Hunt=
 [mailto:<a rel=3D"nofollow">phil.hunt@oracle.com</a>]<br>=0A              =
    &gt; Sent: Monday, March 28, 2011 2:28 PM<br>=0A                  &gt; =
To: Justin Richer<br>=0A                  &gt; Cc: Eran Hammer-Lahav; OAuth=
 WG<br>=0A                  &gt; Subject: Re: [OAUTH-WG] WGLC on=0A        =
          draft-ietf-oauth-v2-13.txt<br>=0A                  &gt; <br>=0A  =
                &gt; This was referring to section 2.1 that the=0A         =
         authorization server must use TLS<br>=0A                  &gt; whe=
n returning an authorization code.<br>=0A                  &gt; <br>=0A    =
              &gt; If it doesn't use TLS then the code being=0A            =
      returned to the client can be<br>=0A                  &gt; intercepte=
d.<br>=0A                  &gt; <br>=0A                  &gt; Or did I miss=
 something?<br>=0A                  &gt; <br>=0A                  &gt; Phil=
<br>=0A                  &gt; <a rel=3D"nofollow">phil.hunt@oracle.com</a><=
br>=0A                  &gt; <br>=0A                  &gt; <br>=0A         =
         &gt; <br>=0A                  &gt; <br>=0A                  &gt; O=
n 2011-03-28, at 1:37 PM, Justin Richer wrote:<br>=0A                  &gt;=
 <br>=0A                  &gt; &gt; Phil,<br>=0A                  &gt; &gt;=
<br>=0A                  &gt; &gt; The main difference is that it's a=0A   =
               requirement on the *client* instead<br>=0A                  =
&gt; &gt; of the *provider* side of the equation, and=0A                  c=
lients aren't always even<br>=0A                  &gt; &gt; speaking HTTP. =
I agree that all client web=0A                  servers SHOULD do it. A<br>=
=0A                  &gt; &gt; particular provider can even REQUIRE it for=
=0A                  their registered clients,<br>=0A                  &gt;=
 &gt; a step that is outside the scope of OAuth.=0A                  But th=
ere are real, in-use<br>=0A                  &gt; &gt; patterns that don't =
require the client to=0A                  make an HTTP request to an<br>=0A=
                  &gt; &gt; external service.<br>=0A                  &gt; =
&gt;<br>=0A                  &gt; &gt; I don't see how Firesheep is relevan=
t to=0A                  this discussion -- if your<br>=0A                 =
 &gt; &gt; browser is making a call to localhost to get=0A                 =
 the token, who outside of<br>=0A                  &gt; &gt; your machine i=
s going to do it? I'm not=0A                  talking about convenience for=
<br>=0A                  &gt; &gt; developers here (which I would argue sho=
uld=0A                  NOT be discounted, but<br>=0A                  &gt;=
 &gt; that's another argument), I'm talking about=0A                  cases=
 where the browser<br>=0A                  &gt; &gt; isn't going outside of=
 a trusted security=0A                  boundary. There are also<br>=0A    =
              &gt; &gt; instances where there may not even be an=0A        =
          HTTP transaction involved,<br>=0A                  &gt; &gt; let =
alone one that could support TLS.<br>=0A                  &gt; &gt;<br>=0A =
                 &gt; &gt; -- Justin<br>=0A                  &gt; &gt;<br>=
=0A                  &gt; &gt; On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt=
=0A                  wrote:<br>=0A                  &gt; &gt;&gt; Justin, H=
ow is that so? Remember=0A                  firesheep?&nbsp; I wouldn't wan=
t the<br>=0A                  &gt; authorization code being exchanged witho=
ut TLS in=0A                  a cafe. Intercept is just<br>=0A             =
     &gt; too easy. And as I mentioned earlier, client=0A                  =
credentials are already very weak<br>=0A                  &gt; in many case=
s. In contrast, two web servers are=0A                  hard to sniff unles=
s you are<br>=0A                  &gt; able to gain access to their network=
=0A                  communications path.<br>=0A                  &gt; &gt;=
&gt;<br>=0A                  &gt; &gt;&gt; As for testing, it seems more re=
asonable=0A                  to put servers in temporary non-<br>=0A       =
           &gt; compliance while testing rather then allow=0A              =
    non-secure servers in production<br>=0A                  &gt; because o=
f the SHOULD loophole.<br>=0A                  &gt; &gt;&gt;<br>=0A        =
          &gt; &gt;&gt; Also, while it does seem convenient for=0A         =
         the developer not to have to use<br>=0A                  &gt; TLS =
for authz codes, note that the developer=0A                  still has to h=
ave TLS enabled<br>=0A                  &gt; when exchanging the code for a=
n access token. So=0A                  I'm not sure how relaxing<br>=0A    =
              &gt; TLS for obtaining authorization actually=0A             =
     simplifies the developer lifecycle since<br>=0A                  &gt; =
they still have to set it up to test the other=0A                  parts.&n=
bsp; In my view, it would be ok<br>=0A                  &gt; for a develope=
r to temporarily disable TLS=0A                  everywhere during developm=
ent -<br>=0A                  &gt; - which places operation outside RFC com=
pliance=0A                  while developing -- but<br>=0A                 =
 &gt; forces compliance once they go into production.<br>=0A               =
   &gt; &gt;&gt;<br>=0A                  &gt; &gt;&gt; It seems like I had =
to give a pretty=0A                  substantial justification and we backe=
d<br>=0A                  &gt; off because TLS is seen as inconvenient. I t=
hink=0A                  we need more evidence that<br>=0A                 =
 &gt; there are safe cases that don't need TLS.<br>=0A                  &gt=
; &gt;&gt;<br>=0A                  &gt; &gt;&gt; Sorry for pushing hard on =
this one, but=0A                  TLS is the backbone of OAuth<br>=0A      =
            &gt; security at present.<br>=0A                  &gt; &gt;&gt;=
<br>=0A                  &gt; &gt;&gt; Phil<br>=0A                  &gt; &g=
t;&gt; <a rel=3D"nofollow">phil.hunt@oracle.com</a><br>=0A                 =
 &gt; &gt;&gt;<br>=0A                  &gt; &gt;&gt;<br>=0A                =
  &gt; &gt;&gt;<br>=0A                  &gt; &gt;&gt;<br>=0A               =
   &gt; &gt;&gt; On 2011-03-28, at 12:52 PM, Eran=0A                  Hamme=
r-Lahav wrote:<br>=0A                  &gt; &gt;&gt;<br>=0A                =
  &gt; &gt;&gt;&gt; No change then. But the security=0A                  co=
nsiderations section must reflect<br>=0A                  &gt; this.<br>=0A=
                  &gt; &gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&g=
t; EHL<br>=0A                  &gt; &gt;&gt;&gt;<br>=0A                  &g=
t; &gt;&gt;&gt;&gt; -----Original Message-----<br>=0A                  &gt;=
 &gt;&gt;&gt;&gt; From: Justin Richer [mailto:<a rel=3D"nofollow">jricher@m=
itre.org</a>]<br>=0A                  &gt; &gt;&gt;&gt;&gt; Sent: Monday, M=
arch 28, 2011=0A                  10:05 AM<br>=0A                  &gt; &gt=
;&gt;&gt;&gt; To: Eran Hammer-Lahav<br>=0A                  &gt; &gt;&gt;&g=
t;&gt; Cc: Phil Hunt; OAuth WG<br>=0A                  &gt; &gt;&gt;&gt;&gt=
; Subject: Re: [OAUTH-WG] WGLC on=0A                  draft-ietf-oauth-v2-1=
3.txt<br>=0A                  &gt; &gt;&gt;&gt;&gt;<br>=0A                 =
 &gt; &gt;&gt;&gt;&gt; What about non-http return=0A                  uri's=
, or client-localhost, such as<br>=0A                  &gt; &gt;&gt;&gt;&gt=
;<br>=0A                  &gt; &gt;&gt;&gt;&gt; <a rel=3D"nofollow">someapp=
://app/?code=3Dfoo</a><br>=0A                  &gt; &gt;&gt;&gt;&gt;<br>=0A=
                  &gt; &gt;&gt;&gt;&gt; <a rel=3D"nofollow" target=3D"_blan=
k"  href=3D"http://localhost:87345/?code=3Dfoo">http://localhost:87345/?cod=
e=3Dfoo</a><br>=0A                  &gt; &gt;&gt;&gt;&gt;<br>=0A           =
       &gt; &gt;&gt;&gt;&gt; HTTPS makes sense when you're=0A              =
    talking between two web servers, but<br>=0A                  &gt; &gt;&=
gt;&gt;&gt; it seems to fall apart=0A                  otherwise. I think S=
HOULD is appropriate here.<br>=0A                  &gt; &gt;&gt;&gt;&gt;<br=
>=0A                  &gt; &gt;&gt;&gt;&gt; -- Justin<br>=0A               =
   &gt; &gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;<br>=
=0A                  &gt; &gt;&gt;&gt;&gt; On Fri, 2011-03-25 at 16:03=0A  =
                -0400, Eran Hammer-Lahav wrote:<br>=0A                  &gt=
; &gt;&gt;&gt;&gt;&gt; Unless someone has an=0A                  objection,=
 I'll make the change from SHOULD<br>=0A                  &gt; &gt;&gt;&gt;=
&gt;&gt; to<br>=0A                  &gt; &gt;&gt;&gt;&gt; MUST.<br>=0A     =
             &gt; &gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt=
;&gt;&gt;&gt; EHL<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;<br>=0A =
                 &gt; &gt;&gt;&gt;&gt;&gt;&gt; -----Original=0A            =
      Message-----<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Fr=
om: Phil Hunt [mailto:<a rel=3D"nofollow">phil.hunt@oracle.com</a>]<br>=0A =
                 &gt; &gt;&gt;&gt;&gt;&gt;&gt; Sent: Friday, March 25,=0A  =
                2011 12:42 PM<br>=0A                  &gt; &gt;&gt;&gt;&gt;=
&gt;&gt; To: Eran Hammer-Lahav<br>=0A                  &gt; &gt;&gt;&gt;&gt=
;&gt;&gt; Cc: OAuth WG; Chuck=0A                  &amp; Mara Mortimore<br>=
=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Subject: Re: [OAUTH-WG]=
=0A                  WGLC on draft-ietf-oauth-v2-13.txt<br>=0A             =
     &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt=
;&gt;&gt;&gt; Regarding the message: <a rel=3D"nofollow" target=3D"_blank" =
href=3D"http://www.ietf.org/mail-">http://www.ietf.org/mail-</a><br>=0A    =
              &gt; &gt;&gt;&gt;&gt;&gt;&gt;=0A                  archive/web=
/oauth/current/msg05762.html&nbsp; (sorry I=0A                  somehow los=
t<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; the message in my=
=0A                  email).<br>=0A                  &gt; &gt;&gt;&gt;&gt;&=
gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; This issue is=
 theft of=0A                  the authorization code during the redirect.<b=
r>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Authenticating the=0A =
                 client is an important feature and goes a long<br>=0A     =
             &gt; &gt;&gt;&gt;&gt;&gt;&gt; way, but it is not=0A           =
       sufficient since in many cases, the<br>=0A                  &gt; &gt=
;&gt;&gt;&gt;&gt;&gt; client_id/client_secret=0A                  will like=
ly be hard coded and relatively<br>=0A                  &gt; &gt;&gt;&gt;&g=
t;&gt;&gt; easy to deduce (e.g.=0A                  mobile client apps).&nb=
sp; Of course a strong<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt=
; client authentication=0A                  won't have this issue. This mak=
es many<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; consumer situ=
ations very=0A                  susceptible to an attack where the<br>=0A  =
                &gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code is<br>=0A =
                 &gt; &gt;&gt;&gt;&gt; intercepted.<br>=0A                 =
 &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt=
;&gt;&gt; For more information=0A                  look at the SAML Artifac=
t issues in section<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; 6=
.5 (specifically stolen=0A                  artifact, replay, etc) of this =
document:<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; <a rel=3D"n=
ofollow" target=3D"_blank" href=3D"http://docs.oasis-/">http://docs.oasis-<=
/a><br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;=0A               =
   <a rel=3D"nofollow" target=3D"_blank" href=3D"http://open.org/security/s=
aml/v2.0/saml-sec-consider-2.0-os.pdf">open.org/security/saml/v2.0/saml-sec=
-consider-2.0-os.pdf</a><br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&=
gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; There are a numbe=
r of=0A                  remediations suggested (small lifetime,<br>=0A    =
              &gt; &gt;&gt;&gt;&gt;&gt;&gt; single use), but the=0A        =
          foundational one is confidentiality of the<br>=0A                =
  &gt; &gt;&gt;&gt;&gt;&gt;&gt; exchange (TLS). Hence=0A                  t=
he recommendation that the return of an<br>=0A                  &gt; &gt;&g=
t;&gt;&gt;&gt;&gt; authorization code be=0A                  kept secure wi=
th a MUST for TLS.<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br=
>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Phil<br>=0A            =
      &gt; &gt;&gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow">phil.hunt@oracle.co=
m</a><br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>=0A         =
         &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt=
;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>=
=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; On 2011-03-24, at 7:22=
=0A                  PM, Chuck Mortimore wrote:<br>=0A                  &gt=
; &gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt=
;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; On Mar =
24, 2011, at=0A                  6:36 PM, "Eran Hammer-Lahav"<br>=0A       =
           &gt; &gt;&gt;&gt;&gt;&gt;&gt; &lt;<a rel=3D"nofollow">eran@hueni=
verse.com</a>&gt;=0A                  wrote:<br>=0A                  &gt; &=
gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&g=
t;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt=
;&gt;=0A                  -----Original Message-----<br>=0A                =
  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; From: <a rel=3D"nofollow">oauth=
-bounces@ietf.org</a>=0A                  [<a rel=3D"nofollow" class=3D"yiv=
61446368moz-txt-link-freetext" ymailto=3D"mailto:oauth" target=3D"_blank" h=
ref=3D"/mc/compose?to=3Doauth">mailto:oauth</a>-<br>=0A                  &g=
t; <a rel=3D"nofollow">bounces@ietf.org</a>]<br>=0A                  &gt; &=
gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; On Behalf Of=0A                  Chuck =
Mortimore<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=
 Sent:=0A                  Monday, March 14, 2011 6:10 PM<br>=0A           =
       &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &=
gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 1) I'd vote=0A                  for dro=
pping the following from 1.4.2.&nbsp;&nbsp;&nbsp;In turn I'd<br>=0A        =
          &gt; discuss<br>=0A                  &gt; &gt;&gt;&gt;&gt; some<b=
r>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; of<br>=0A             =
     &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; the security=0A             =
     considerations, such as difficulty of protecting<br>=0A               =
   &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; a=0A                  client_s=
ecret in almost all use-cases of this profile.<br>=0A                  &gt;=
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;=
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&nbsp; "Implicit=0A                  grants imp=
rove the responsiveness and efficiency of<br>=0A                  &gt; &gt;=
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; some clients=0A                  (such as =
a client implemented as an in-browser<br>=0A                  &gt; &gt;&gt;=
&gt;&gt;&gt;&gt;&gt;&gt;&gt; application)=0A                  since it redu=
ces the number of round trips<br>=0A                  &gt; &gt;&gt;&gt;&gt;=
&gt;&gt;&gt;&gt;&gt; required to=0A                  obtain an access token=
."<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A    =
              &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why drop it?=0A        =
          What about it isn't accurate?<br>=0A                  &gt; &gt;&g=
t;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt=
;&gt; It's accurate, but=0A                  my opinion is it sends the wro=
ng message.&nbsp;&nbsp;&nbsp;It's<br>=0A                  &gt; clearly<br>=
=0A                  &gt; &gt;&gt;&gt;&gt; the<br>=0A                  &gt;=
 &gt;&gt;&gt;&gt;&gt;&gt; less secure of the=0A                  response t=
ypes.&nbsp; By positioning it as the most<br>=0A                  &gt; &gt;=
&gt;&gt;&gt;&gt;&gt; performant people may=0A                  find that at=
tractive and make the wrong<br>=0A                  &gt; &gt;&gt;&gt;&gt;&g=
t;&gt; security<br>=0A                  &gt; &gt;&gt;&gt;&gt; decision.<br>=
=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A              =
    &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;=
&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&=
gt;&gt;&gt;&gt; 2) Section=0A                  2.1, we should MUST TLS even=
 for Authorization Code.<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&=
gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; W=
hy? What's the=0A                  attack vector?<br>=0A                  &=
gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&=
gt;&gt;&gt;&gt; See Phils comment on=0A                  past experience wi=
th artifact bindings.<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;=
&gt; Spec should<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; defa=
ult for security=0A                  always on, and let deployments that do=
n't<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; want to use HTTPs=
 simply=0A                  be non-conformant.<br>=0A                  &gt;=
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;=
&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&=
gt;&gt; 3) Section=0A                  4.1.3 - not clear to me why redirect=
_uri is<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; R=
EQUIRED=0A                  since in 4.1.1 it's "REQUIRED unless"<br>=0A   =
               &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                =
  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; The client=0A                  shou=
ld always confirm where the code was sent to. It<br>=0A                  &g=
t; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; can omit<br>=0A                  &gt; &=
gt;&gt;&gt;&gt;&gt;&gt; the redirection is one=0A                  was prov=
ided but should tell the server<br>=0A                  &gt; &gt;&gt;&gt;&g=
t;&gt;&gt; where it went to. This=0A                  is more consistent on=
 the verification<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; sid=
e, but if the=0A                  original flow designers want to chime in =
(Dick,<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt; Brian, etc.?),=
 I'm open<br>=0A                  &gt; &gt;&gt;&gt;&gt; to change this.<br>=
=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A          =
        &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 4) Section=0A            =
      4.2.2 - when did we drop refresh_token?&nbsp; &nbsp;&nbsp;&nbsp;I ass=
ume<br>=0A                  &gt; this<br>=0A                  &gt; &gt;&gt;=
&gt;&gt; goes<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=
&gt; back to=0A                  disagreement on how best to handle native =
clients. I'd<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&=
gt; prefer it to=0A                  simply reference 5.1 and leave what is=
 issued up<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt=
; to the=0A                  security profile of the particular deployment =
as to=0A                  what is<br>=0A                  &gt; issued.<br>=
=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A          =
        &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; -08 June 2010.<br>=0A        =
          &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt=
; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; This has been=0A                  decide=
d for a long time. I'm not eager to change it.<br>=0A                  &gt;=
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;=
&gt;&gt;&gt; Thanks - I can live=0A                  with it.&nbsp; Unfortu=
nately we still seem to be<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt=
;&gt;&gt; fragmenting on<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&=
gt; the native client=0A                  approach.&nbsp;&nbsp;&nbsp;Good t=
opic for IIW I suspect<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt=
;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; -cmort<br>=
=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A              =
    &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;=
&gt;&gt;&gt;&gt;&gt;&gt;&gt; EHL<br>=0A                  &gt; &gt;&gt;&gt;&=
gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&g=
t;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;=0A        =
          _______________________________________________<br>=0A           =
       &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>=0A         =
         &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow">OAuth@ietf.o=
rg</a><br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a rel=3D"=
nofollow" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/o=
auth">https://www.ietf.org/mailman/listinfo/oauth</a><br>=0A               =
   &gt; &gt;&gt;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;&gt;&=
gt;=0A                  _______________________________________________<br>=
=0A                  &gt; &gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>=0A   =
               &gt; &gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow">OAuth@ietf.org=
</a><br>=0A                  &gt; &gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow" =
target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">http=
s://www.ietf.org/mailman/listinfo/oauth</a><br>=0A                  &gt; &g=
t;&gt;&gt;&gt;<br>=0A                  &gt; &gt;&gt;&gt;<br>=0A            =
      &gt; &gt;&gt;<br>=0A                  &gt; &gt;<br>=0A               =
   &gt; &gt;<br>=0A                  <br>=0A                  _____________=
__________________________________<br>=0A                  OAuth mailing li=
st<br>=0A                  <a rel=3D"nofollow">OAuth@ietf.org</a><br>=0A   =
               <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ie=
tf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth<=
/a><br>=0A                </div>=0A              </blockquote>=0A          =
  </td>=0A          </tr>=0A        </tbody>=0A      </table>=0A      <pre>=
<fieldset class=3D"yiv61446368mimeAttachmentHeader"></fieldset><br>________=
_______________________________________<br>OAuth mailing list<br><a rel=3D"=
nofollow" class=3D"yiv61446368moz-txt-link-abbreviated" ymailto=3D"mailto:O=
Auth@ietf.org" target=3D"_blank" href=3D"/mc/compose?to=3DOAuth@ietf.org">O=
Auth@ietf.org</a><br><a rel=3D"nofollow" class=3D"yiv61446368moz-txt-link-f=
reetext" target=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oa=
uth">https://www.ietf.org/mailman/listinfo/oauth</a><br></pre>=0A    </bloc=
kquote>=0A  </div>=0A=0A</blockquote></div><br></div></div></blockquote></t=
d></tr></table>
--0-1812889459-1301425514=:83060--

From eran@hueniverse.com  Tue Mar 29 12:45:18 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E522D3A6A2E for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 12:45:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.639
X-Spam-Level: 
X-Spam-Status: No, score=-2.639 tagged_above=-999 required=5 tests=[AWL=-0.042, BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id barQB1uS6yHA for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 12:45:02 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id E6C713A68F4 for <oauth@ietf.org>; Tue, 29 Mar 2011 12:45:01 -0700 (PDT)
Received: (qmail 19511 invoked from network); 29 Mar 2011 19:46:39 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Mar 2011 19:46:39 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Tue, 29 Mar 2011 12:46:24 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: George Fletcher <gffletch@aol.com>, "fcorella@pomcor.com" <fcorella@pomcor.com>
Date: Tue, 29 Mar 2011 12:46:18 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvuOpeza7hXgU0gRMSn9xR6XbyXWAADzMBA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <835237.54303.qm@web55808.mail.re3.yahoo.com> <4D921D0F.1080303@aol.com>
In-Reply-To: <4D921D0F.1080303@aol.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234465643051DP3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: OAuth, "Karen P. Lewison" <kplewison@pomcor.com>, WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 19:45:18 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234465643051DP3PW5EX1MB01E_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_90C41DD21FB7C64BB94121FBBC2E7234465643051DP3PW5EX1MB01E_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj1Db250ZW50LVR5cGUgY29udGVu
dD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij48bWV0YSBuYW1lPUdlbmVyYXRvciBjb250ZW50
PSJNaWNyb3NvZnQgV29yZCAxNCAoZmlsdGVyZWQgbWVkaXVtKSI+PHN0eWxlPjwhLS0NCi8qIEZv
bnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6SGVsdmV0aWNhOw0K
CXBhbm9zZS0xOjIgMTEgNiA0IDIgMiAyIDIgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1p
bHk6SGVsdmV0aWNhOw0KCXBhbm9zZS0xOjIgMTEgNiA0IDIgMiAyIDIgMiA0O30NCkBmb250LWZh
Y2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToyIDE1IDUgMiAyIDIgNCAzIDIg
NDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OlRhaG9tYTsNCglwYW5vc2UtMToyIDExIDYg
NCAzIDUgNCA0IDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkNvbnNvbGFzOw0KCXBh
bm9zZS0xOjIgMTEgNiA5IDIgMiA0IDMgMiA0O30NCi8qIFN0eWxlIERlZmluaXRpb25zICovDQpw
Lk1zb05vcm1hbCwgbGkuTXNvTm9ybWFsLCBkaXYuTXNvTm9ybWFsDQoJe21hcmdpbjowaW47DQoJ
bWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQtc2l6ZToxMi4wcHQ7DQoJZm9udC1mYW1pbHk6
IlRpbWVzIE5ldyBSb21hbiIsInNlcmlmIjsNCgljb2xvcjpibGFjazt9DQphOmxpbmssIHNwYW4u
TXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpibHVlOw0KCXRl
eHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFuLk1zb0h5cGVybGlua0Zv
bGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpwdXJwbGU7DQoJdGV4dC1k
ZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwcmUNCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1z
by1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCBDaGFyIjsNCgltYXJnaW46MGluOw0KCW1h
cmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTAuMHB0Ow0KCWZvbnQtZmFtaWx5OiJD
b3VyaWVyIE5ldyI7DQoJY29sb3I6YmxhY2s7fQ0Kc3Bhbi5IVE1MUHJlZm9ybWF0dGVkQ2hhcg0K
CXttc28tc3R5bGUtbmFtZToiSFRNTCBQcmVmb3JtYXR0ZWQgQ2hhciI7DQoJbXNvLXN0eWxlLXBy
aW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCI7DQoJZm9udC1m
YW1pbHk6Q29uc29sYXM7DQoJY29sb3I6YmxhY2s7fQ0Kc3Bhbi5FbWFpbFN0eWxlMTkNCgl7bXNv
LXN0eWxlLXR5cGU6cGVyc29uYWwtcmVwbHk7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5z
LXNlcmlmIjsNCgljb2xvcjojMUY0OTdEO30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10
eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29yZFNlY3Rpb24x
DQoJe3NpemU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBpbiAxLjBpbiAxLjBpbiAxLjBpbjt9
DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+PCEt
LVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWRlZmF1bHRzIHY6ZXh0PSJlZGl0IiBzcGlk
bWF4PSIxMDI2IiAvPg0KPC94bWw+PCFbZW5kaWZdLS0+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+
DQo8bzpzaGFwZWxheW91dCB2OmV4dD0iZWRpdCI+DQo8bzppZG1hcCB2OmV4dD0iZWRpdCIgZGF0
YT0iMSIgLz4NCjwvbzpzaGFwZWxheW91dD48L3htbD48IVtlbmRpZl0tLT48L2hlYWQ+PGJvZHkg
Ymdjb2xvcj13aGl0ZSBsYW5nPUVOLVVTIGxpbms9Ymx1ZSB2bGluaz1wdXJwbGU+PGRpdiBjbGFz
cz1Xb3JkU2VjdGlvbjE+PHAgY2xhc3M9TXNvTm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6
MTEuMHB0O2ZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+
QXMgYSBtYXR0ZXIgb2YgcHJhY3RpY2FsaXR5LCByZXF1aXJpbmcgYWxsIGNsaWVudHMgdG8gZGVw
bG95IHNlcnZlci1zaWRlIFRMUyBpcyBhYnN1cmQuIElmIHdlIG1hbmRhdGUgcmVkaXJlY3Rpb25z
IFVSSXMgdG8gdXNlIGh0dHBzLCB3ZSBhcmUgYmFzaWNhbGx5IG1ha2luZyBldmVyeW9uZSBpZ25v
cmUgaXQuIEl04oCZcyBsaWtlIGEgc3BlZWQgbGltaXQgc2lnbiBvZiA1bXBoLjxvOnA+PC9vOnA+
PC9zcGFuPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjtjb2xvcjojMUY0OTdEJz48bzpw
PiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxzcGFuIHN0eWxlPSdm
b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7Y29sb3I6
IzFGNDk3RCc+RUhMPG86cD48L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48c3Bh
biBzdHlsZT0nZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2Vy
aWYiO2NvbG9yOiMxRjQ5N0QnPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD48ZGl2IHN0eWxl
PSdib3JkZXI6bm9uZTtib3JkZXItbGVmdDpzb2xpZCBibHVlIDEuNXB0O3BhZGRpbmc6MGluIDBp
biAwaW4gNC4wcHQnPjxkaXY+PGRpdiBzdHlsZT0nYm9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpzb2xp
ZCAjQjVDNERGIDEuMHB0O3BhZGRpbmc6My4wcHQgMGluIDBpbiAwaW4nPjxwIGNsYXNzPU1zb05v
cm1hbD48Yj48c3BhbiBzdHlsZT0nZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseToiVGFob21h
Iiwic2Fucy1zZXJpZiI7Y29sb3I6d2luZG93dGV4dCc+RnJvbTo8L3NwYW4+PC9iPjxzcGFuIHN0
eWxlPSdmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiJUYWhvbWEiLCJzYW5zLXNlcmlmIjtj
b2xvcjp3aW5kb3d0ZXh0Jz4gR2VvcmdlIEZsZXRjaGVyIFttYWlsdG86Z2ZmbGV0Y2hAYW9sLmNv
bV0gPGJyPjxiPlNlbnQ6PC9iPiBUdWVzZGF5LCBNYXJjaCAyOSwgMjAxMSAxMDo1NSBBTTxicj48
Yj5Ubzo8L2I+IGZjb3JlbGxhQHBvbWNvci5jb208YnI+PGI+Q2M6PC9iPiBQaGlsIEh1bnQ7IEp1
c3RpbiBSaWNoZXI7IEVyYW4gSGFtbWVyLUxhaGF2OyBPQXV0aCBXRzsgS2FyZW4gUC4gTGV3aXNv
bjxicj48Yj5TdWJqZWN0OjwvYj4gUmU6IFtPQVVUSC1XR10gV0dMQyBvbiBkcmFmdC1pZXRmLW9h
dXRoLXYyLTEzLnR4dDxvOnA+PC9vOnA+PC9zcGFuPjwvcD48L2Rpdj48L2Rpdj48cCBjbGFzcz1N
c29Ob3JtYWw+PG86cD4mbmJzcDs8L286cD48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxzcGFuIHN0
eWxlPSdmb250LWZhbWlseToiSGVsdmV0aWNhIiwic2Fucy1zZXJpZiInPkhpIEZyYW5jaXNjbyw8
YnI+PGJyPlNvIHRoZSBleGFtcGxlcyB0aGF0IEp1c3RpbiBnYXZlIHdlcmUgZWl0aGVyIGxvY2Fs
aG9zdCBvciBub24gSFRUUCBiYXNlZCBzY2hlbWVzLiBJZiBPQXV0aDIgaXMgdG8gc3VwcG9ydCB0
aGVzZSBvdGhlciBzY2hlbWVzIChvZnRlbiB1c2VkIGluIG1vYmlsZSBjbGllbnRzKSB0aGVuIEkn
bSBub3Qgc3VyZSBob3cgVExTIGNhbiBiZSBhIE1VU1QgdW5sZXNzIGl0J3MgcXVhbGlmaWVkIHRv
IGFwcGx5IHRvIEhUVFAgYmFzZWQgVVJMcyBvbmx5Ljxicj48YnI+SXMgaXQgc3VmZmljaWVudCB0
byBkb2N1bWVudCB0aGlzIHBvc3NpYmxlIGV4cG9zdXJlIGluIHRoZSBzZWN1cml0eSBzZWN0aW9u
IHN1Y2ggdGhhdCB0aGUgc3BlYyBkb2Vzbid0IHByZWNsdWRlIHRoZSB1c2Ugb2YgT0F1dGgyIHdp
dGggbm9uIEhUVFAgYmFzZWQgcmVkaXJlY3RfdXJpPzxicj48YnI+VGhhbmtzLDxicj5HZW9yZ2U8
YnI+PC9zcGFuPjxicj5PbiAzLzI5LzExIDE6MDUgUE0sIEZyYW5jaXNjbyBDb3JlbGxhIHdyb3Rl
OiA8bzpwPjwvbzpwPjwvcD48dGFibGUgY2xhc3M9TXNvTm9ybWFsVGFibGUgYm9yZGVyPTAgY2Vs
bHNwYWNpbmc9MCBjZWxscGFkZGluZz0wPjx0cj48dGQgdmFsaWduPXRvcCBzdHlsZT0ncGFkZGlu
ZzowaW4gMGluIDBpbiAwaW4nPjxwIGNsYXNzPU1zb05vcm1hbD5FcmFuLDxicj48YnI+SXQncyBu
b3QgYSByZWFzb25hYmxlIGNvbXByb21pc2UuJm5ic3A7ICMyIE1VU1QgdXNlIHRscyBVTkxFU1Mg
b2YgY291cnNlIGl0IHRhcmdldHMgbG9jYWxob3N0LiZuYnNwOyBJZiAjMiBpcyBzZW50IHdpdGhv
dXQgVExTIHRvIGEgV2ViIHNlcnZlciwgdGhlIGF1dGhvcml6YXRpb24gY29kZSBjYW4gYmUgZWFz
aWx5IGludGVyY2VwdGVkIGJ5IGFuIGF0dGFja2VyLiZuYnNwOyBUaGUgYXR0YWNrZXIgY2FuIHRo
ZW4gdXNlIGl0IHRvIG9idGFpbiBwcm90ZWN0ZWQgcmVzb3VyY2VzIGJ5IHN1Ym1pdHRpbmcgdGhl
IGF1dGhvcml6YXRpb24gY29kZSB0byB0aGUgY2xpZW50LiZuYnNwOyAoVGhpcyBpcyBpbmRlcGVu
ZGVudCBvZiB3aGV0aGVyIHRoZSBjbGllbnQgYXV0aGVudGljYXRlcyBpdHNlbGYgd2hlbiBleGNo
YW5naW5nIHRoZSBhdXRob3JpemF0aW9uIGNvZGUgZm9yIGFuIGFjY2VzcyB0b2tlbiBvciBub3Qu
KSBJbiB0aGUgRmFjZWJvb2sgdXNlIGNhc2UsIHRoZSBhdHRhY2tlciBjYW4gdXNlIHRoZSBhdXRo
b3JpemF0aW9uIGNvZGUgdG8gbG9nIGluIHRvIHRoZSBjbGllbnQgdXNpbmcgdGhlIHVzZXIncyBG
YWNlYm9vayBpZGVudGl0eS4mbmJzcDsgSSBiZWxpZXZlIHRoaXMgdnVsbmVyYWJpbGl0eSBleGlz
dHMgaW4gbWFueSBpbXBsZW1lbnRhdGlvbnMgb2YgdGhlIEZhY2Vib29rIGxvZ2luIGJ1dHRvbiB0
b2RheS48YnI+PGJyPkJ0dywgSSd2ZSBwb2ludGVkIHRoaXMgb3V0IGJlZm9yZSB0aHJlZSBvciBm
b3VyIHRpbWVzIG9uIHRoaXMgbWFpbGluZyBsaXN0LCBpbmNsdWRpbmcgaW4gYSByZXNwb25zZSB0
byB0aGUgV0dMQyB0aGF0IHlvdSBuZXZlciByZXBsaWVkIHRvLjxicj48YnI+RnJhbmNpc2NvPGJy
Pjxicj4tLS0gT24gPGI+TW9uLCAzLzI4LzExLCBFcmFuIEhhbW1lci1MYWhhdiA8aT48YSBocmVm
PSJtYWlsdG86ZXJhbkBodWVuaXZlcnNlLmNvbSI+Jmx0O2VyYW5AaHVlbml2ZXJzZS5jb20mZ3Q7
PC9hPjwvaT48L2I+IHdyb3RlOjxicj48YnI+PG86cD48L286cD48L3A+PHAgY2xhc3M9TXNvTm9y
bWFsIHN0eWxlPSdtYXJnaW4tYm90dG9tOjEyLjBwdCc+PGJyPkZyb206IEVyYW4gSGFtbWVyLUxh
aGF2IDxhIGhyZWY9Im1haWx0bzplcmFuQGh1ZW5pdmVyc2UuY29tIj4mbHQ7ZXJhbkBodWVuaXZl
cnNlLmNvbSZndDs8L2E+PGJyPlN1YmplY3Q6IFJlOiBbT0FVVEgtV0ddIFdHTEMgb24gZHJhZnQt
aWV0Zi1vYXV0aC12Mi0xMy50eHQ8YnI+VG86ICZxdW90O1BoaWwgSHVudCZxdW90OyA8YSBocmVm
PSJtYWlsdG86cGhpbC5odW50QG9yYWNsZS5jb20iPiZsdDtwaGlsLmh1bnRAb3JhY2xlLmNvbSZn
dDs8L2E+LCAmcXVvdDtKdXN0aW4gUmljaGVyJnF1b3Q7IDxhIGhyZWY9Im1haWx0bzpqcmljaGVy
QG1pdHJlLm9yZyI+Jmx0O2pyaWNoZXJAbWl0cmUub3JnJmd0OzwvYT48YnI+Q2M6ICZxdW90O09B
dXRoIFdHJnF1b3Q7IDxhIGhyZWY9Im1haWx0bzpvYXV0aEBpZXRmLm9yZyI+Jmx0O29hdXRoQGll
dGYub3JnJmd0OzwvYT48YnI+RGF0ZTogTW9uZGF5LCBNYXJjaCAyOCwgMjAxMSwgMTA6MjggUE08
bzpwPjwvbzpwPjwvcD48ZGl2PjxwIGNsYXNzPU1zb05vcm1hbD5UaGUgY29kZSBpcyByZXR1cm5l
ZCBpbiB0d28gc3RlcHM6PGJyPjxicj4xLiBUaGUgYXV0aG9yaXphdGlvbiBzZXJ2ZXIgcmVwbGll
cyB0byB0aGUgdXNlci1hZ2VudCByZXF1ZXN0IChwcm92aWRpbmcgYXV0aG9yaXphdGlvbikgd2l0
aCBhIHJlZGlyZWN0aW9uIGluc3RydWN0aW9uIHR5cGljYWxseSB1c2luZyB0aGUgTG9jYXRpb24g
cmVzcG9uc2UgaGVhZGVyIGZpZWxkLjxicj4yLiBUaGUgdXNlci1hZ2VudCBtYWtlcyBhbiBIVFRQ
IEdFVCByZXF1ZXN0IHRvIHRoZSBwcm92aWRlZCBsb2NhdGlvbiAod2hpY2ggbWF5IGJlIHNvbWV0
aGluZyBvdGhlciB0aGFuIGFuIEhUVFAgVVJJLCBvciBhbiBIVFRQIFVSSSB0byBsb2NhbGhvc3Qp
Ljxicj48YnI+IzEgaXMgYW4gSFRUUCByZXNwb25zZSB0byBhIHVzZXItYWdlbnQgcmVxdWVzdCB0
byB0aGUgYXV0aG9yaXphdGlvbiBlbmRwb2ludCAob3IgYSBzdWJzZXF1ZW50IG9uZSBpZiB0aGUg
c2VydmVyIGltcGxlbWVudGF0aW9uIGhhcyBtdWx0aXBsZSBhdXRob3JpemF0aW9uIHN0ZXBzKS48
YnI+PGJyPiMyIGlzIGFuIEhUVFAgcmVxdWVzdCBtYWRlIGJ5IHRoZSB1c2VyLWFnZW50Ljxicj48
YnI+SW4gb3JkZXIgZm9yIHRoZSBjb2RlIHRvIGJlIHNlY3VyZSBlbmQtdG8tZW5kLCBib3RoIHN0
ZXBzIG11c3QgdXNlIFRMUy4gVGhlIGFyZ3VtZW50cyBtYWRlIGFnYWluc3QgbWFraW5nIFRMUyBy
ZXF1aXJlZCBhcmUgYmFzZWQgb24gdXNlIGNhc2VzIGZvciAjMi4gV2UgY2FuIG1ha2UgIzEgKHRo
ZSBhdXRob3JpemF0aW9uIGVuZHBvaW50IHJlcXVpcmUgVExTIHNpbmNlIGl0IGFscmVhZHkgaGFz
IHRvIHN1cHBvcnQgaXQgZm9yIHRoZSAndG9rZW4nIHJlc3BvbnNlIHR5cGUuIFdlIHNob3VsZCBt
YWtlIGNhbGxiYWNrcyBhIFNIT1VMRCBmb3IgVExTLjxicj48YnI+RG9lcyB0aGlzIHNvdW5kIGxp
a2UgYSByZWFzb25hYmxlIGNvbXByb21pc2U/PGJyPjxicj5FSEw8YnI+PGJyPiZndDsgLS0tLS1P
cmlnaW5hbCBNZXNzYWdlLS0tLS08YnI+Jmd0OyBGcm9tOiBQaGlsIEh1bnQgW21haWx0bzo8YSBo
cmVmPSIvbWMvY29tcG9zZT90bz1waGlsLmh1bnRAb3JhY2xlLmNvbSI+cGhpbC5odW50QG9yYWNs
ZS5jb208L2E+XTxicj4mZ3Q7IFNlbnQ6IE1vbmRheSwgTWFyY2ggMjgsIDIwMTEgMjoyOCBQTTxi
cj4mZ3Q7IFRvOiBKdXN0aW4gUmljaGVyPGJyPiZndDsgQ2M6IEVyYW4gSGFtbWVyLUxhaGF2OyBP
QXV0aCBXRzxicj4mZ3Q7IFN1YmplY3Q6IFJlOiBbT0FVVEgtV0ddIFdHTEMgb24gZHJhZnQtaWV0
Zi1vYXV0aC12Mi0xMy50eHQ8YnI+Jmd0OyA8YnI+Jmd0OyBUaGlzIHdhcyByZWZlcnJpbmcgdG8g
c2VjdGlvbiAyLjEgdGhhdCB0aGUgYXV0aG9yaXphdGlvbiBzZXJ2ZXIgbXVzdCB1c2UgVExTPGJy
PiZndDsgd2hlbiByZXR1cm5pbmcgYW4gYXV0aG9yaXphdGlvbiBjb2RlLjxicj4mZ3Q7IDxicj4m
Z3Q7IElmIGl0IGRvZXNuJ3QgdXNlIFRMUyB0aGVuIHRoZSBjb2RlIGJlaW5nIHJldHVybmVkIHRv
IHRoZSBjbGllbnQgY2FuIGJlPGJyPiZndDsgaW50ZXJjZXB0ZWQuPGJyPiZndDsgPGJyPiZndDsg
T3IgZGlkIEkgbWlzcyBzb21ldGhpbmc/PGJyPiZndDsgPGJyPiZndDsgUGhpbDxicj4mZ3Q7IDxh
IGhyZWY9Ii9tYy9jb21wb3NlP3RvPXBoaWwuaHVudEBvcmFjbGUuY29tIj5waGlsLmh1bnRAb3Jh
Y2xlLmNvbTwvYT48YnI+Jmd0OyA8YnI+Jmd0OyA8YnI+Jmd0OyA8YnI+Jmd0OyA8YnI+Jmd0OyBP
biAyMDExLTAzLTI4LCBhdCAxOjM3IFBNLCBKdXN0aW4gUmljaGVyIHdyb3RlOjxicj4mZ3Q7IDxi
cj4mZ3Q7ICZndDsgUGhpbCw8YnI+Jmd0OyAmZ3Q7PGJyPiZndDsgJmd0OyBUaGUgbWFpbiBkaWZm
ZXJlbmNlIGlzIHRoYXQgaXQncyBhIHJlcXVpcmVtZW50IG9uIHRoZSAqY2xpZW50KiBpbnN0ZWFk
PGJyPiZndDsgJmd0OyBvZiB0aGUgKnByb3ZpZGVyKiBzaWRlIG9mIHRoZSBlcXVhdGlvbiwgYW5k
IGNsaWVudHMgYXJlbid0IGFsd2F5cyBldmVuPGJyPiZndDsgJmd0OyBzcGVha2luZyBIVFRQLiBJ
IGFncmVlIHRoYXQgYWxsIGNsaWVudCB3ZWIgc2VydmVycyBTSE9VTEQgZG8gaXQuIEE8YnI+Jmd0
OyAmZ3Q7IHBhcnRpY3VsYXIgcHJvdmlkZXIgY2FuIGV2ZW4gUkVRVUlSRSBpdCBmb3IgdGhlaXIg
cmVnaXN0ZXJlZCBjbGllbnRzLDxicj4mZ3Q7ICZndDsgYSBzdGVwIHRoYXQgaXMgb3V0c2lkZSB0
aGUgc2NvcGUgb2YgT0F1dGguIEJ1dCB0aGVyZSBhcmUgcmVhbCwgaW4tdXNlPGJyPiZndDsgJmd0
OyBwYXR0ZXJucyB0aGF0IGRvbid0IHJlcXVpcmUgdGhlIGNsaWVudCB0byBtYWtlIGFuIEhUVFAg
cmVxdWVzdCB0byBhbjxicj4mZ3Q7ICZndDsgZXh0ZXJuYWwgc2VydmljZS48YnI+Jmd0OyAmZ3Q7
PGJyPiZndDsgJmd0OyBJIGRvbid0IHNlZSBob3cgRmlyZXNoZWVwIGlzIHJlbGV2YW50IHRvIHRo
aXMgZGlzY3Vzc2lvbiAtLSBpZiB5b3VyPGJyPiZndDsgJmd0OyBicm93c2VyIGlzIG1ha2luZyBh
IGNhbGwgdG8gbG9jYWxob3N0IHRvIGdldCB0aGUgdG9rZW4sIHdobyBvdXRzaWRlIG9mPGJyPiZn
dDsgJmd0OyB5b3VyIG1hY2hpbmUgaXMgZ29pbmcgdG8gZG8gaXQ/IEknbSBub3QgdGFsa2luZyBh
Ym91dCBjb252ZW5pZW5jZSBmb3I8YnI+Jmd0OyAmZ3Q7IGRldmVsb3BlcnMgaGVyZSAod2hpY2gg
SSB3b3VsZCBhcmd1ZSBzaG91bGQgTk9UIGJlIGRpc2NvdW50ZWQsIGJ1dDxicj4mZ3Q7ICZndDsg
dGhhdCdzIGFub3RoZXIgYXJndW1lbnQpLCBJJ20gdGFsa2luZyBhYm91dCBjYXNlcyB3aGVyZSB0
aGUgYnJvd3Nlcjxicj4mZ3Q7ICZndDsgaXNuJ3QgZ29pbmcgb3V0c2lkZSBvZiBhIHRydXN0ZWQg
c2VjdXJpdHkgYm91bmRhcnkuIFRoZXJlIGFyZSBhbHNvPGJyPiZndDsgJmd0OyBpbnN0YW5jZXMg
d2hlcmUgdGhlcmUgbWF5IG5vdCBldmVuIGJlIGFuIEhUVFAgdHJhbnNhY3Rpb24gaW52b2x2ZWQs
PGJyPiZndDsgJmd0OyBsZXQgYWxvbmUgb25lIHRoYXQgY291bGQgc3VwcG9ydCBUTFMuPGJyPiZn
dDsgJmd0Ozxicj4mZ3Q7ICZndDsgLS0gSnVzdGluPGJyPiZndDsgJmd0Ozxicj4mZ3Q7ICZndDsg
T24gTW9uLCAyMDExLTAzLTI4IGF0IDE2OjI1IC0wNDAwLCBQaGlsIEh1bnQgd3JvdGU6PGJyPiZn
dDsgJmd0OyZndDsgSnVzdGluLCBIb3cgaXMgdGhhdCBzbz8gUmVtZW1iZXIgZmlyZXNoZWVwPyZu
YnNwOyBJIHdvdWxkbid0IHdhbnQgdGhlPGJyPiZndDsgYXV0aG9yaXphdGlvbiBjb2RlIGJlaW5n
IGV4Y2hhbmdlZCB3aXRob3V0IFRMUyBpbiBhIGNhZmUuIEludGVyY2VwdCBpcyBqdXN0PGJyPiZn
dDsgdG9vIGVhc3kuIEFuZCBhcyBJIG1lbnRpb25lZCBlYXJsaWVyLCBjbGllbnQgY3JlZGVudGlh
bHMgYXJlIGFscmVhZHkgdmVyeSB3ZWFrPGJyPiZndDsgaW4gbWFueSBjYXNlcy4gSW4gY29udHJh
c3QsIHR3byB3ZWIgc2VydmVycyBhcmUgaGFyZCB0byBzbmlmZiB1bmxlc3MgeW91IGFyZTxicj4m
Z3Q7IGFibGUgdG8gZ2FpbiBhY2Nlc3MgdG8gdGhlaXIgbmV0d29yayBjb21tdW5pY2F0aW9ucyBw
YXRoLjxicj4mZ3Q7ICZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsgQXMgZm9yIHRlc3RpbmcsIGl0
IHNlZW1zIG1vcmUgcmVhc29uYWJsZSB0byBwdXQgc2VydmVycyBpbiB0ZW1wb3Jhcnkgbm9uLTxi
cj4mZ3Q7IGNvbXBsaWFuY2Ugd2hpbGUgdGVzdGluZyByYXRoZXIgdGhlbiBhbGxvdyBub24tc2Vj
dXJlIHNlcnZlcnMgaW4gcHJvZHVjdGlvbjxicj4mZ3Q7IGJlY2F1c2Ugb2YgdGhlIFNIT1VMRCBs
b29waG9sZS48YnI+Jmd0OyAmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7IEFsc28sIHdoaWxlIGl0
IGRvZXMgc2VlbSBjb252ZW5pZW50IGZvciB0aGUgZGV2ZWxvcGVyIG5vdCB0byBoYXZlIHRvIHVz
ZTxicj4mZ3Q7IFRMUyBmb3IgYXV0aHogY29kZXMsIG5vdGUgdGhhdCB0aGUgZGV2ZWxvcGVyIHN0
aWxsIGhhcyB0byBoYXZlIFRMUyBlbmFibGVkPGJyPiZndDsgd2hlbiBleGNoYW5naW5nIHRoZSBj
b2RlIGZvciBhbiBhY2Nlc3MgdG9rZW4uIFNvIEknbSBub3Qgc3VyZSBob3cgcmVsYXhpbmc8YnI+
Jmd0OyBUTFMgZm9yIG9idGFpbmluZyBhdXRob3JpemF0aW9uIGFjdHVhbGx5IHNpbXBsaWZpZXMg
dGhlIGRldmVsb3BlciBsaWZlY3ljbGUgc2luY2U8YnI+Jmd0OyB0aGV5IHN0aWxsIGhhdmUgdG8g
c2V0IGl0IHVwIHRvIHRlc3QgdGhlIG90aGVyIHBhcnRzLiZuYnNwOyBJbiBteSB2aWV3LCBpdCB3
b3VsZCBiZSBvazxicj4mZ3Q7IGZvciBhIGRldmVsb3BlciB0byB0ZW1wb3JhcmlseSBkaXNhYmxl
IFRMUyBldmVyeXdoZXJlIGR1cmluZyBkZXZlbG9wbWVudCAtPGJyPiZndDsgLSB3aGljaCBwbGFj
ZXMgb3BlcmF0aW9uIG91dHNpZGUgUkZDIGNvbXBsaWFuY2Ugd2hpbGUgZGV2ZWxvcGluZyAtLSBi
dXQ8YnI+Jmd0OyBmb3JjZXMgY29tcGxpYW5jZSBvbmNlIHRoZXkgZ28gaW50byBwcm9kdWN0aW9u
Ljxicj4mZ3Q7ICZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsgSXQgc2VlbXMgbGlrZSBJIGhhZCB0
byBnaXZlIGEgcHJldHR5IHN1YnN0YW50aWFsIGp1c3RpZmljYXRpb24gYW5kIHdlIGJhY2tlZDxi
cj4mZ3Q7IG9mZiBiZWNhdXNlIFRMUyBpcyBzZWVuIGFzIGluY29udmVuaWVudC4gSSB0aGluayB3
ZSBuZWVkIG1vcmUgZXZpZGVuY2UgdGhhdDxicj4mZ3Q7IHRoZXJlIGFyZSBzYWZlIGNhc2VzIHRo
YXQgZG9uJ3QgbmVlZCBUTFMuPGJyPiZndDsgJmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyBTb3Jy
eSBmb3IgcHVzaGluZyBoYXJkIG9uIHRoaXMgb25lLCBidXQgVExTIGlzIHRoZSBiYWNrYm9uZSBv
ZiBPQXV0aDxicj4mZ3Q7IHNlY3VyaXR5IGF0IHByZXNlbnQuPGJyPiZndDsgJmd0OyZndDs8YnI+
Jmd0OyAmZ3Q7Jmd0OyBQaGlsPGJyPiZndDsgJmd0OyZndDsgPGEgaHJlZj0iL21jL2NvbXBvc2U/
dG89cGhpbC5odW50QG9yYWNsZS5jb20iPnBoaWwuaHVudEBvcmFjbGUuY29tPC9hPjxicj4mZ3Q7
ICZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsm
Z3Q7PGJyPiZndDsgJmd0OyZndDsgT24gMjAxMS0wMy0yOCwgYXQgMTI6NTIgUE0sIEVyYW4gSGFt
bWVyLUxhaGF2IHdyb3RlOjxicj4mZ3Q7ICZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7IE5v
IGNoYW5nZSB0aGVuLiBCdXQgdGhlIHNlY3VyaXR5IGNvbnNpZGVyYXRpb25zIHNlY3Rpb24gbXVz
dCByZWZsZWN0PGJyPiZndDsgdGhpcy48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7
Jmd0OyZndDsgRUhMPGJyPiZndDsgJmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0
OyAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsgRnJv
bTogSnVzdGluIFJpY2hlciBbbWFpbHRvOjxhIGhyZWY9Ii9tYy9jb21wb3NlP3RvPWpyaWNoZXJA
bWl0cmUub3JnIj5qcmljaGVyQG1pdHJlLm9yZzwvYT5dPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0
OyBTZW50OiBNb25kYXksIE1hcmNoIDI4LCAyMDExIDEwOjA1IEFNPGJyPiZndDsgJmd0OyZndDsm
Z3Q7Jmd0OyBUbzogRXJhbiBIYW1tZXItTGFoYXY8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7IENj
OiBQaGlsIEh1bnQ7IE9BdXRoIFdHPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyBTdWJqZWN0OiBS
ZTogW09BVVRILVdHXSBXR0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgtdjItMTMudHh0PGJyPiZndDsg
Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsgV2hhdCBhYm91dCBub24t
aHR0cCByZXR1cm4gdXJpJ3MsIG9yIGNsaWVudC1sb2NhbGhvc3QsIHN1Y2ggYXM8YnI+Jmd0OyAm
Z3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyBzb21lYXBwOi8vYXBwLz9j
b2RlPWZvbzxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7
IDxhIGhyZWY9Imh0dHA6Ly9sb2NhbGhvc3Q6ODczNDUvP2NvZGU9Zm9vIiB0YXJnZXQ9Il9ibGFu
ayI+aHR0cDovL2xvY2FsaG9zdDo4NzM0NS8/Y29kZT1mb288L2E+PGJyPiZndDsgJmd0OyZndDsm
Z3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsgSFRUUFMgbWFrZXMgc2Vuc2Ugd2hlbiB5
b3UncmUgdGFsa2luZyBiZXR3ZWVuIHR3byB3ZWIgc2VydmVycywgYnV0PGJyPiZndDsgJmd0OyZn
dDsmZ3Q7Jmd0OyBpdCBzZWVtcyB0byBmYWxsIGFwYXJ0IG90aGVyd2lzZS4gSSB0aGluayBTSE9V
TEQgaXMgYXBwcm9wcmlhdGUgaGVyZS48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsg
Jmd0OyZndDsmZ3Q7Jmd0OyAtLSBKdXN0aW48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZn
dDsgJmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsgT24gRnJpLCAyMDEx
LTAzLTI1IGF0IDE2OjAzIC0wNDAwLCBFcmFuIEhhbW1lci1MYWhhdiB3cm90ZTo8YnI+Jmd0OyAm
Z3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBVbmxlc3Mgc29tZW9uZSBoYXMgYW4gb2JqZWN0aW9uLCBJJ2xs
IG1ha2UgdGhlIGNoYW5nZSBmcm9tIFNIT1VMRDxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
IHRvPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyBNVVNULjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsgRUhMPGJyPiZndDsgJmd0OyZndDsm
Z3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgLS0tLS1PcmlnaW5h
bCBNZXNzYWdlLS0tLS08YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgRnJvbTogUGhp
bCBIdW50IFttYWlsdG86PGEgaHJlZj0iL21jL2NvbXBvc2U/dG89cGhpbC5odW50QG9yYWNsZS5j
b20iPnBoaWwuaHVudEBvcmFjbGUuY29tPC9hPl08YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
OyZndDsgU2VudDogRnJpZGF5LCBNYXJjaCAyNSwgMjAxMSAxMjo0MiBQTTxicj4mZ3Q7ICZndDsm
Z3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBUbzogRXJhbiBIYW1tZXItTGFoYXY8YnI+Jmd0OyAmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyZndDsgQ2M6IE9BdXRoIFdHOyBDaHVjayAmYW1wOyBNYXJhIE1vcnRpbW9y
ZTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBTdWJqZWN0OiBSZTogW09BVVRILVdH
XSBXR0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgtdjItMTMudHh0PGJyPiZndDsgJmd0OyZndDsmZ3Q7
Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IFJlZ2FyZGluZyB0
aGUgbWVzc2FnZTogPGEgaHJlZj0iaHR0cDovL3d3dy5pZXRmLm9yZy9tYWlsLSIgdGFyZ2V0PSJf
YmxhbmsiPmh0dHA6Ly93d3cuaWV0Zi5vcmcvbWFpbC08L2E+PGJyPiZndDsgJmd0OyZndDsmZ3Q7
Jmd0OyZndDsmZ3Q7IGFyY2hpdmUvd2ViL29hdXRoL2N1cnJlbnQvbXNnMDU3NjIuaHRtbCZuYnNw
OyAoc29ycnkgSSBzb21laG93IGxvc3Q8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsg
dGhlIG1lc3NhZ2UgaW4gbXkgZW1haWwpLjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBUaGlzIGlzc3VlIGlzIHRoZWZ0IG9m
IHRoZSBhdXRob3JpemF0aW9uIGNvZGUgZHVyaW5nIHRoZSByZWRpcmVjdC48YnI+Jmd0OyAmZ3Q7
Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgQXV0aGVudGljYXRpbmcgdGhlIGNsaWVudCBpcyBhbiBpbXBv
cnRhbnQgZmVhdHVyZSBhbmQgZ29lcyBhIGxvbmc8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
OyZndDsgd2F5LCBidXQgaXQgaXMgbm90IHN1ZmZpY2llbnQgc2luY2UgaW4gbWFueSBjYXNlcywg
dGhlPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IGNsaWVudF9pZC9jbGllbnRfc2Vj
cmV0IHdpbGwgbGlrZWx5IGJlIGhhcmQgY29kZWQgYW5kIHJlbGF0aXZlbHk8YnI+Jmd0OyAmZ3Q7
Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgZWFzeSB0byBkZWR1Y2UgKGUuZy4gbW9iaWxlIGNsaWVudCBh
cHBzKS4mbmJzcDsgT2YgY291cnNlIGEgc3Ryb25nPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7IGNsaWVudCBhdXRoZW50aWNhdGlvbiB3b24ndCBoYXZlIHRoaXMgaXNzdWUuIFRoaXMg
bWFrZXMgbWFueTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBjb25zdW1lciBzaXR1
YXRpb25zIHZlcnkgc3VzY2VwdGlibGUgdG8gYW4gYXR0YWNrIHdoZXJlIHRoZTxicj4mZ3Q7ICZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBhdXRob3JpemF0aW9uIGNvZGUgaXM8YnI+Jmd0OyAmZ3Q7
Jmd0OyZndDsmZ3Q7IGludGVyY2VwdGVkLjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBGb3IgbW9yZSBpbmZvcm1hdGlvbiBs
b29rIGF0IHRoZSBTQU1MIEFydGlmYWN0IGlzc3VlcyBpbiBzZWN0aW9uPGJyPiZndDsgJmd0OyZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7IDYuNSAoc3BlY2lmaWNhbGx5IHN0b2xlbiBhcnRpZmFjdCwgcmVw
bGF5LCBldGMpIG9mIHRoaXMgZG9jdW1lbnQ6PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7IDxhIGhyZWY9Imh0dHA6Ly9kb2NzLm9hc2lzLSIgdGFyZ2V0PSJfYmxhbmsiPmh0dHA6Ly9k
b2NzLm9hc2lzLTwvYT48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgb3Blbi5vcmcv
c2VjdXJpdHkvc2FtbC92Mi4wL3NhbWwtc2VjLWNvbnNpZGVyLTIuMC1vcy5wZGY8YnI+Jmd0OyAm
Z3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsg
VGhlcmUgYXJlIGEgbnVtYmVyIG9mIHJlbWVkaWF0aW9ucyBzdWdnZXN0ZWQgKHNtYWxsIGxpZmV0
aW1lLDxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBzaW5nbGUgdXNlKSwgYnV0IHRo
ZSBmb3VuZGF0aW9uYWwgb25lIGlzIGNvbmZpZGVudGlhbGl0eSBvZiB0aGU8YnI+Jmd0OyAmZ3Q7
Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgZXhjaGFuZ2UgKFRMUykuIEhlbmNlIHRoZSByZWNvbW1lbmRh
dGlvbiB0aGF0IHRoZSByZXR1cm4gb2YgYW48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZn
dDsgYXV0aG9yaXphdGlvbiBjb2RlIGJlIGtlcHQgc2VjdXJlIHdpdGggYSBNVVNUIGZvciBUTFMu
PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7IFBoaWw8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgPGEgaHJlZj0i
L21jL2NvbXBvc2U/dG89cGhpbC5odW50QG9yYWNsZS5jb20iPnBoaWwuaHVudEBvcmFjbGUuY29t
PC9hPjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBP
biAyMDExLTAzLTI0LCBhdCA3OjIyIFBNLCBDaHVjayBNb3J0aW1vcmUgd3JvdGU6PGJyPiZndDsg
Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgT24gTWFyIDI0LCAyMDEx
LCBhdCA2OjM2IFBNLCAmcXVvdDtFcmFuIEhhbW1lci1MYWhhdiZxdW90Ozxicj4mZ3Q7ICZndDsm
Z3Q7Jmd0OyZndDsmZ3Q7Jmd0OyAmbHQ7PGEgaHJlZj0iL21jL2NvbXBvc2U/dG89ZXJhbkBodWVu
aXZlcnNlLmNvbSI+ZXJhbkBodWVuaXZlcnNlLmNvbTwvYT4mZ3Q7IHdyb3RlOjxicj4mZ3Q7ICZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyAt
LS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyBGcm9tOiA8YSBocmVmPSIvbWMvY29tcG9zZT90bz1vYXV0aC1ib3VuY2Vz
QGlldGYub3JnIj5vYXV0aC1ib3VuY2VzQGlldGYub3JnPC9hPiBbPGEgaHJlZj0ibWFpbHRvOm9h
dXRoIj5tYWlsdG86b2F1dGg8L2E+LTxicj4mZ3Q7IDxhIGhyZWY9Ii9tYy9jb21wb3NlP3RvPWJv
dW5jZXNAaWV0Zi5vcmciPmJvdW5jZXNAaWV0Zi5vcmc8L2E+XTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBPbiBCZWhhbGYgT2YgQ2h1Y2sgTW9ydGltb3JlPGJy
PiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IFNlbnQ6IE1vbmRheSwg
TWFyY2ggMTQsIDIwMTEgNjoxMCBQTTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IDEpIEkn
ZCB2b3RlIGZvciBkcm9wcGluZyB0aGUgZm9sbG93aW5nIGZyb20gMS40LjIuJm5ic3A7Jm5ic3A7
Jm5ic3A7SW4gdHVybiBJJ2Q8YnI+Jmd0OyBkaXNjdXNzPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0
OyBzb21lPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IG9mPGJyPiZndDsgJmd0OyZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IHRoZSBzZWN1cml0eSBjb25zaWRlcmF0aW9u
cywgc3VjaCBhcyBkaWZmaWN1bHR5IG9mIHByb3RlY3Rpbmc8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsm
Z3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgYSBjbGllbnRfc2VjcmV0IGluIGFsbW9zdCBhbGwgdXNl
LWNhc2VzIG9mIHRoaXMgcHJvZmlsZS48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsm
bmJzcDsgJnF1b3Q7SW1wbGljaXQgZ3JhbnRzIGltcHJvdmUgdGhlIHJlc3BvbnNpdmVuZXNzIGFu
ZCBlZmZpY2llbmN5IG9mPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7IHNvbWUgY2xpZW50cyAoc3VjaCBhcyBhIGNsaWVudCBpbXBsZW1lbnRlZCBhcyBhbiBpbi1i
cm93c2VyPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IGFwcGxp
Y2F0aW9uKSBzaW5jZSBpdCByZWR1Y2VzIHRoZSBudW1iZXIgb2Ygcm91bmQgdHJpcHM8YnI+Jmd0
OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgcmVxdWlyZWQgdG8gb2J0YWlu
IGFuIGFjY2VzcyB0b2tlbi4mcXVvdDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IFdoeSBkcm9w
IGl0PyBXaGF0IGFib3V0IGl0IGlzbid0IGFjY3VyYXRlPzxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IEl0J3Mg
YWNjdXJhdGUsIGJ1dCBteSBvcGluaW9uIGlzIGl0IHNlbmRzIHRoZSB3cm9uZyBtZXNzYWdlLiZu
YnNwOyZuYnNwOyZuYnNwO0l0J3M8YnI+Jmd0OyBjbGVhcmx5PGJyPiZndDsgJmd0OyZndDsmZ3Q7
Jmd0OyB0aGU8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgbGVzcyBzZWN1cmUgb2Yg
dGhlIHJlc3BvbnNlIHR5cGVzLiZuYnNwOyBCeSBwb3NpdGlvbmluZyBpdCBhcyB0aGUgbW9zdDxi
cj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBwZXJmb3JtYW50IHBlb3BsZSBtYXkgZmlu
ZCB0aGF0IGF0dHJhY3RpdmUgYW5kIG1ha2UgdGhlIHdyb25nPGJyPiZndDsgJmd0OyZndDsmZ3Q7
Jmd0OyZndDsmZ3Q7IHNlY3VyaXR5PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyBkZWNpc2lvbi48
YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7
Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IDIpIFNlY3Rpb24g
Mi4xLCB3ZSBzaG91bGQgTVVTVCBUTFMgZXZlbiBmb3IgQXV0aG9yaXphdGlvbiBDb2RlLjxicj4m
Z3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7
Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgV2h5PyBXaGF0J3MgdGhlIGF0dGFjayB2ZWN0b3I/PGJyPiZn
dDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7Jmd0OyZndDsgU2VlIFBoaWxzIGNvbW1lbnQgb24gcGFzdCBleHBlcmllbmNlIHdpdGggYXJ0
aWZhY3QgYmluZGluZ3MuPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBTcGVj
IHNob3VsZDxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBkZWZhdWx0IGZvciBzZWN1
cml0eSBhbHdheXMgb24sIGFuZCBsZXQgZGVwbG95bWVudHMgdGhhdCBkb24ndDxicj4mZ3Q7ICZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyB3YW50IHRvIHVzZSBIVFRQcyBzaW1wbHkgYmUgbm9uLWNv
bmZvcm1hbnQuPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7IDMpIFNlY3Rpb24gNC4xLjMgLSBub3QgY2xlYXIgdG8gbWUgd2h5
IHJlZGlyZWN0X3VyaSBpczxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0OyBSRVFVSVJFRCBzaW5jZSBpbiA0LjEuMSBpdCdzICZxdW90O1JFUVVJUkVEIHVubGVzcyZx
dW90Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0
OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgVGhlIGNsaWVudCBzaG91bGQgYWx3YXlzIGNv
bmZpcm0gd2hlcmUgdGhlIGNvZGUgd2FzIHNlbnQgdG8uIEl0PGJyPiZndDsgJmd0OyZndDsmZ3Q7
Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgY2FuIG9taXQ8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
OyZndDsgdGhlIHJlZGlyZWN0aW9uIGlzIG9uZSB3YXMgcHJvdmlkZWQgYnV0IHNob3VsZCB0ZWxs
IHRoZSBzZXJ2ZXI8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgd2hlcmUgaXQgd2Vu
dCB0by4gVGhpcyBpcyBtb3JlIGNvbnNpc3RlbnQgb24gdGhlIHZlcmlmaWNhdGlvbjxicj4mZ3Q7
ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBzaWRlLCBidXQgaWYgdGhlIG9yaWdpbmFsIGZsb3cg
ZGVzaWduZXJzIHdhbnQgdG8gY2hpbWUgaW4gKERpY2ssPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7IEJyaWFuLCBldGMuPyksIEknbSBvcGVuPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0
OyB0byBjaGFuZ2UgdGhpcy48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyA0KSBTZWN0aW9u
IDQuMi4yIC0gd2hlbiBkaWQgd2UgZHJvcCByZWZyZXNoX3Rva2VuPyZuYnNwOyAmbmJzcDsmbmJz
cDsmbmJzcDtJIGFzc3VtZTxicj4mZ3Q7IHRoaXM8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7IGdv
ZXM8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgYmFjayB0byBk
aXNhZ3JlZW1lbnQgb24gaG93IGJlc3QgdG8gaGFuZGxlIG5hdGl2ZSBjbGllbnRzLiBJJ2Q8YnI+
Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgcHJlZmVyIGl0IHRvIHNp
bXBseSByZWZlcmVuY2UgNS4xIGFuZCBsZWF2ZSB3aGF0IGlzIGlzc3VlZCB1cDxicj4mZ3Q7ICZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyB0byB0aGUgc2VjdXJpdHkgcHJvZmls
ZSBvZiB0aGUgcGFydGljdWxhciBkZXBsb3ltZW50IGFzIHRvIHdoYXQgaXM8YnI+Jmd0OyBpc3N1
ZWQuPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7
Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyAtMDggSnVuZSAyMDEwLjxicj4mZ3Q7ICZndDsm
Z3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7Jmd0OyZndDsgVGhpcyBoYXMgYmVlbiBkZWNpZGVkIGZvciBhIGxvbmcgdGltZS4gSSdtIG5v
dCBlYWdlciB0byBjaGFuZ2UgaXQuPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgVGhhbmtzIC0gSSBjYW4gbGl2
ZSB3aXRoIGl0LiZuYnNwOyBVbmZvcnR1bmF0ZWx5IHdlIHN0aWxsIHNlZW0gdG8gYmU8YnI+Jmd0
OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IGZyYWdtZW50aW5nIG9uPGJyPiZndDsgJmd0
OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IHRoZSBuYXRpdmUgY2xpZW50IGFwcHJvYWNoLiZuYnNwOyZu
YnNwOyZuYnNwO0dvb2QgdG9waWMgZm9yIElJVyBJIHN1c3BlY3Q8YnI+Jmd0OyAmZ3Q7Jmd0OyZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyAt
Y21vcnQ8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7Jmd0OyBFSEw8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxi
cj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsm
Z3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fXzxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgT0F1dGggbWFp
bGluZyBsaXN0PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyA8YSBocmVmPSIv
bWMvY29tcG9zZT90bz1PQXV0aEBpZXRmLm9yZyI+T0F1dGhAaWV0Zi5vcmc8L2E+PGJyPiZndDsg
Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyA8YSBocmVmPSJodHRwczovL3d3dy5pZXRmLm9y
Zy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoIiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly93d3cuaWV0
Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9vYXV0aDwvYT48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IF9fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsgT0F1
dGggbWFpbGluZyBsaXN0PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsgPGEgaHJlZj0iL21j
L2NvbXBvc2U/dG89T0F1dGhAaWV0Zi5vcmciPk9BdXRoQGlldGYub3JnPC9hPjxicj4mZ3Q7ICZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7IDxhIGhyZWY9Imh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4v
bGlzdGluZm8vb2F1dGgiIHRhcmdldD0iX2JsYW5rIj5odHRwczovL3d3dy5pZXRmLm9yZy9tYWls
bWFuL2xpc3RpbmZvL29hdXRoPC9hPjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAm
Z3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDs8YnI+Jmd0OyAmZ3Q7PGJy
Pjxicj5fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxicj5P
QXV0aCBtYWlsaW5nIGxpc3Q8YnI+PGEgaHJlZj0iL21jL2NvbXBvc2U/dG89T0F1dGhAaWV0Zi5v
cmciPk9BdXRoQGlldGYub3JnPC9hPjxicj48YSBocmVmPSJodHRwczovL3d3dy5pZXRmLm9yZy9t
YWlsbWFuL2xpc3RpbmZvL29hdXRoIiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly93d3cuaWV0Zi5v
cmcvbWFpbG1hbi9saXN0aW5mby9vYXV0aDwvYT48bzpwPjwvbzpwPjwvcD48L2Rpdj48L3RkPjwv
dHI+PC90YWJsZT48cHJlPjxvOnA+Jm5ic3A7PC9vOnA+PC9wcmU+PHByZT48bzpwPiZuYnNwOzwv
bzpwPjwvcHJlPjxwcmU+X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX188bzpwPjwvbzpwPjwvcHJlPjxwcmU+T0F1dGggbWFpbGluZyBsaXN0PG86cD48L286cD48
L3ByZT48cHJlPjxhIGhyZWY9Im1haWx0bzpPQXV0aEBpZXRmLm9yZyI+T0F1dGhAaWV0Zi5vcmc8
L2E+PG86cD48L286cD48L3ByZT48cHJlPjxhIGhyZWY9Imh0dHBzOi8vd3d3LmlldGYub3JnL21h
aWxtYW4vbGlzdGluZm8vb2F1dGgiPmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGlu
Zm8vb2F1dGg8L2E+PG86cD48L286cD48L3ByZT48L2Rpdj48L2Rpdj48L2JvZHk+PC9odG1sPg==

--_000_90C41DD21FB7C64BB94121FBBC2E7234465643051DP3PW5EX1MB01E_--

From eran@hueniverse.com  Tue Mar 29 12:49:34 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 36C413A6AB6 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 12:49:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.639
X-Spam-Level: 
X-Spam-Status: No, score=-2.639 tagged_above=-999 required=5 tests=[AWL=-0.041, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bTCrZ3di030j for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 12:49:33 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id C03213A6AA1 for <oauth@ietf.org>; Tue, 29 Mar 2011 12:49:32 -0700 (PDT)
Received: (qmail 31337 invoked from network); 29 Mar 2011 19:51:11 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Mar 2011 19:51:11 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Tue, 29 Mar 2011 12:50:54 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "fcorella@pomcor.com" <fcorella@pomcor.com>, Phil Hunt <phil.hunt@oracle.com>, Justin Richer <jricher@mitre.org>
Date: Tue, 29 Mar 2011 12:50:48 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvuQY0mB6FYnktJSMGI+feFjsmx7QACOTTQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564304B9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <103040.70321.qm@web55801.mail.re3.yahoo.com>
In-Reply-To: <103040.70321.qm@web55801.mail.re3.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E72344656430523P3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 19:49:34 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E72344656430523P3PW5EX1MB01E_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_90C41DD21FB7C64BB94121FBBC2E72344656430523P3PW5EX1MB01E_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_90C41DD21FB7C64BB94121FBBC2E72344656430523P3PW5EX1MB01E_--

From bcampbell@pingidentity.com  Tue Mar 29 15:30:42 2011
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 221463A695B for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 15:30:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.477
X-Spam-Level: 
X-Spam-Status: No, score=-5.477 tagged_above=-999 required=5 tests=[AWL=0.500,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JzveHbyGDH+g for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 15:30:40 -0700 (PDT)
Received: from na3sys009aog110.obsmtp.com (na3sys009aog110.obsmtp.com [74.125.149.203]) by core3.amsl.com (Postfix) with ESMTP id 624E53A6935 for <oauth@ietf.org>; Tue, 29 Mar 2011 15:30:39 -0700 (PDT)
Received: from source ([209.85.161.43]) (using TLSv1) by na3sys009aob110.postini.com ([74.125.148.12]) with SMTP ID DSNKTZJd8U4W2q3vJguMIgKbwqVMhxyWHwzy@postini.com; Tue, 29 Mar 2011 15:32:19 PDT
Received: by mail-fx0-f43.google.com with SMTP id 3so835844fxm.2 for <oauth@ietf.org>; Tue, 29 Mar 2011 15:32:17 -0700 (PDT)
Received: by 10.223.79.78 with SMTP id o14mr412549fak.110.1301437936113; Tue, 29 Mar 2011 15:32:16 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.70.198 with HTTP; Tue, 29 Mar 2011 15:31:46 -0700 (PDT)
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Tue, 29 Mar 2011 16:31:46 -0600
Message-ID: <AANLkTimY+d+i3HAWmw=zM02orfocnwWfmK4D3NNfwZLm@mail.gmail.com>
To: oauth <oauth@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1
Subject: [OAUTH-WG] Question on scope when refreshing an access token
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 22:30:42 -0000

I'm a bit confused by the text at the end of the definition of the
scope parameter in section 6 on Refreshing an Access Token[1].  It
says,

        "...  The requested scope MUST be equal or lesser
         than the scope originally granted by the resource owner, and if
         omitted is treated as equal to the previously approved scope."

In particular, what is the 'previously approved scope'?  Is it the
same as the originally granted scope?  Or is it the most recent scope
successfully requested when refreshing? If the latter, does this imply
that an AS implementation must store both the original scope and the
previously requested scope? Or is it something else?

Perhaps a better question is what is the use case behind this text?  I
assume it's some kind of down-scoping (& I apologize if this has been
discussed before and I missed it) but the intent isn't clear to me nor is
it clear what exactly is required by the spec.

Thanks for any info,
Brian



[1] link to draft 13:
http://tools.ietf.org/html/draft-ietf-oauth-v2-13#section-6 and the
most recent preview of 14 has the same text.

From fcorella@pomcor.com  Tue Mar 29 15:38:22 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CAE803A6A7B for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 15:38:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.507
X-Spam-Level: 
X-Spam-Status: No, score=-2.507 tagged_above=-999 required=5 tests=[AWL=0.091,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qVL96PX0nS6F for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 15:38:21 -0700 (PDT)
Received: from web55806.mail.re3.yahoo.com (web55806.mail.re3.yahoo.com [216.252.110.52]) by core3.amsl.com (Postfix) with SMTP id 42A543A6991 for <oauth@ietf.org>; Tue, 29 Mar 2011 15:38:21 -0700 (PDT)
Received: (qmail 20549 invoked by uid 60001); 29 Mar 2011 22:39:57 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1301438397; bh=NzaDsNXsTPXRfA+5ppcLNU1ORA5eeRC4zE6dwKHc67I=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=e5qy6K1NjYoTTgfQRu0kgZ56n66BbA3Ezkw6qD7vt6eSZogArYOJ2BcP9DRvsgt81pkG6ys38uqbZ0336k0O2m632wh3gu3rFekgcB4G5HqSiiEehTgq9nyzmgs2TxhUrGKNQjVBPFFtU5NOXCJ/xjDMcZ55m+ouV1G+DyIwNx4=
Message-ID: <92655.18400.qm@web55806.mail.re3.yahoo.com>
X-YMail-OSG: 715GmCAVM1lG6hCvHSX.TlTCP5R79bqfORZvJ0uoJOUF0mJ .UeuS9HpEx.SM.O0DTKLTrV6fJlaOi6qd0GDWeA818Tn61qP_Zn7JT_9s3W1 qPR8WLULdJ4UO4.B.ZYeVU7ICggKapT7xLPqOxhjAgZRnQH3iHl1DN5dlz.G 8ZlG7nRqReBP9jjjCi7xGnNWhC3adKQhmmgPTw889ypifeyspdM5_9tN5FgI X2GkYFD_E59jnoNm1USZ6CTvZiDWPVj_qjU0tqJt2SdFKzu1aK2ssd3T6TGg Gbd7AXRRcJz6lHu.Yi9IlAonKd9cpmlXQxS01x0Y_KNlFPGLoKXGK8e9IBeP oJi9MQnH7D1cSCkeNbsQvrMWqpGgGFitHDf.Qu7EwX80eHUG30NoisFVSLpn .Hb_K5Tzfcx9U
Received: from [67.91.91.101] by web55806.mail.re3.yahoo.com via HTTP; Tue, 29 Mar 2011 15:39:56 PDT
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/12.0.2 YahooMailWebService/0.8.109.295617
Date: Tue, 29 Mar 2011 15:39:56 -0700 (PDT)
From: Francisco Corella <fcorella@pomcor.com>
To: Phil Hunt <phil.hunt@oracle.com>, Justin Richer <jricher@mitre.org>, Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1600819670-1301438396=:18400"
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 22:38:22 -0000

--0-1600819670-1301438396=:18400
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

> Isn=E2=80=99t all this just different flavors of a session fixation attac=
ks?
> The client should use cookies and the state parameter to ensure the
> same user-agent it redirected to the authorization server is the one
> coming back.

It's not a session fixation attack.=C2=A0 It's just an interception of a
credential.=C2=A0 The authorization code is a credential that provides
access to the protected resources.=C2=A0 If the attacker can get it, the
attacker can get the protected resources (using the client as an
agent, so to speak).

A cookie won't help, since it would be sent from the browser to the client
along with the authorization code.=C2=A0 If the attacker can observe or
intercept the authorization code, the attacker and observe or
intercept the cookie.

Francisco

--- On Tue, 3/29/11, Eran Hammer-Lahav <eran@hueniverse.com> wrote:

From: Eran Hammer-Lahav <eran@hueniverse.com>
Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: "fcorella@pomcor.com" <fcorella@pomcor.com>, "Phil Hunt" <phil.hunt@ora=
cle.com>, "Justin Richer" <jricher@mitre.org>
Cc: "OAuth WG" <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>,=
 "Paul Tarjan (pt@fb.com)" <pt@fb.com>
Date: Tuesday, March 29, 2011, 7:50 PM

Isn=E2=80=99t all this just different flavors of a session fixation attacks=
? The client should use cookies and the state parameter to ensure the same =
user-agent it redirected to the authorization server is the one coming back=
. =C2=A0EHL =C2=A0From: Francisco Corella [mailto:fcorella@pomcor.com]=20
Sent: Tuesday, March 29, 2011 11:46 AM
To: Phil Hunt; Justin Richer; Eran Hammer-Lahav
Cc: OAuth WG; Karen P. Lewison; Paul Tarjan (pt@fb.com)
Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt =C2=A0> Can you =
explain how intercepting the authorization code
> without having access to the client credentials is a
> problem? For the sake of discussion, assume that the client
> has valid and secure credentials that an attacker cannot
> access. Also assume that the client has implemented some
> form of cross-site protection.

One way: man-in-the-middle attack.=C2=A0 The traffic between the legitimate
user's browser and the client goes through the attacker's machine
(easy to set up with a rogue WiFi access point).=C2=A0 The user's browser
sends an http request to the client, targeting the redirect URI.=C2=A0 The
attacker's machine doesn't let that request go through.=C2=A0 The attacker
then sends the same identical request from the attacker's own browser.
When the client receives the request, it has no way to tell that it is
coming from the attacker's browser rather than from the user's
browser.=C2=A0 The client exchanges the authorization code for an access
token, uses the access token to obtain protected resources belonging
to the user, and delivers those resources to the attacker's browser.
(Or manipulates those resources as directed by the attacker's
browser.)=C2=A0 In the Facebook use case, the client logs the user in upon
verifying that the authorization code is valid by exchanging it
successfully for an access token.

Another way (passive attack): The attacker observes the request from
the user's browser to the client.=C2=A0 The attacker does not stop the
request.=C2=A0 The client receives the request with the authorization code
and exchanges the authorization code for the access token.=C2=A0 Now the
attacker sends the same request from the attacker's own browser.=C2=A0 The
client receives the second request and exchanges the authorization
code for another access token.=C2=A0 Upon receiving the second request for
the same authorization code, the authorization server revokes the
first access token, as suggested in section 4.1.2 of the
specification: "If an authorization code is used more than once, the
auhorization server MAY revoke all tokens previously issued based on
that authorization code".=C2=A0 The client then uses the second access
token to access protected resources for the benefit of the attacker.
In the Facebook use case, the attacker is logged in as the legitimate
user.

> I don=E2=80=9A=C3=84=C3=B4t know much about FB=E2=80=9A=C3=84=C3=B4s impl=
ementation but if they
> allow the authorization code to be used for anything other
> than exchanged for an access token using secure client
> credentials, then they are not implementing the protocol as
> specified.

Facebook uses the protocol correctly, but the examples in the Facebook
documentation use http rather than https for redirect URIs, so
implementations that follow the examples use http rather than https.

Francisco =C2=A0
--0-1600819670-1301438396=:18400
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">&gt; Isn=E2=80=99t all this just different fl=
avors of a session fixation attacks?<br>&gt; The client should use cookies =
and the state parameter to ensure the<br>&gt; same user-agent it redirected=
 to the authorization server is the one<br>&gt; coming back.<br><br>It's no=
t a session fixation attack.&nbsp; It's just an interception of a<br>creden=
tial.&nbsp; The authorization code is a credential that provides<br>access =
to the protected resources.&nbsp; If the attacker can get it, the<br>attack=
er can get the protected resources (using the client as an<br>agent, so to =
speak).<br><br>A cookie won't help, since it would be sent from the browser=
 to the client<br>along with the authorization code.&nbsp; If the attacker =
can observe or<br>intercept the authorization code, the attacker and observ=
e or<br>intercept the cookie.<br><br>Francisco<br><br>--- On <b>Tue, 3/29/1=
1, Eran
 Hammer-Lahav <i>&lt;eran@hueniverse.com&gt;</i></b> wrote:<br><blockquote =
style=3D"border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding=
-left: 5px;"><br>From: Eran Hammer-Lahav &lt;eran@hueniverse.com&gt;<br>Sub=
ject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<br>To: "fcorella@po=
mcor.com" &lt;fcorella@pomcor.com&gt;, "Phil Hunt" &lt;phil.hunt@oracle.com=
&gt;, "Justin Richer" &lt;jricher@mitre.org&gt;<br>Cc: "OAuth WG" &lt;oauth=
@ietf.org&gt;, "Karen P. Lewison" &lt;kplewison@pomcor.com&gt;, "Paul Tarja=
n (pt@fb.com)" &lt;pt@fb.com&gt;<br>Date: Tuesday, March 29, 2011, 7:50 PM<=
br><br><div id=3D"yiv1552031577"><style><!--=0A#yiv1552031577  =0A _filtere=
d #yiv1552031577 {font-family:Calibri;=0Apanose-1:2 15 5 2 2 2 4 3 2 4;}=0A=
 _filtered #yiv1552031577 {font-family:Tahoma;=0Apanose-1:2 11 6 4 3 5 4 4 =
2 4;}=0A#yiv1552031577  =0A#yiv1552031577 p.yiv1552031577MsoNormal, #yiv155=
2031577 li.yiv1552031577MsoNormal, #yiv1552031577 div.yiv1552031577MsoNorma=
l=0A=09{margin:0in;=0Amargin-bottom:.0001pt;=0Afont-size:12.0pt;=0Afont-fam=
ily:"serif";}=0A#yiv1552031577 a:link, #yiv1552031577 span.yiv1552031577Mso=
Hyperlink=0A=09{=0Acolor:blue;=0Atext-decoration:underline;}=0A#yiv15520315=
77 a:visited, #yiv1552031577 span.yiv1552031577MsoHyperlinkFollowed=0A=09{=
=0Acolor:purple;=0Atext-decoration:underline;}=0A#yiv1552031577 span.yiv155=
2031577EmailStyle17=0A=09{=0Afont-family:"sans-serif";=0Acolor:#1F497D;}=0A=
#yiv1552031577 .yiv1552031577MsoChpDefault=0A=09{=0Afont-family:"sans-serif=
";}=0A _filtered #yiv1552031577 {=0Amargin:1.0in 1.0in 1.0in 1.0in;}=0A#yiv=
1552031577 div.yiv1552031577WordSection1=0A=09{}=0A--></style><div class=3D=
"yiv1552031577WordSection1"><p class=3D"yiv1552031577MsoNormal"><span style=
=3D"font-size: 11pt; font-family: &quot;sans-serif&quot;; color: rgb(31, 73=
, 125);">Isn=E2=80=99t all this just different flavors of a session fixatio=
n attacks? The client should use cookies and the state parameter to ensure =
the same user-agent it redirected to the authorization server is the one co=
ming back.</span></p><p class=3D"yiv1552031577MsoNormal"><span style=3D"fon=
t-size: 11pt; font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 125);=
"> &nbsp;</span></p><p class=3D"yiv1552031577MsoNormal"><span style=3D"font=
-size: 11pt; font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 125);"=
>EHL</span></p><p class=3D"yiv1552031577MsoNormal"><span style=3D"font-size=
: 11pt; font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 125);"> &nb=
sp;</span></p><div style=3D"border-width: medium medium medium 1.5pt; borde=
r-style: none none none solid; border-color: -moz-use-text-color
 -moz-use-text-color -moz-use-text-color blue; padding: 0in 0in 0in 4pt;"><=
div><div style=3D"border-right: medium none; border-width: 1pt medium mediu=
m; border-style: solid none none; border-color: rgb(181, 196, 223) -moz-use=
-text-color -moz-use-text-color; padding: 3pt 0in 0in;"><p class=3D"yiv1552=
031577MsoNormal"><b><span style=3D"font-size: 10pt; font-family: &quot;sans=
-serif&quot;;">From:</span></b><span style=3D"font-size: 10pt; font-family:=
 &quot;sans-serif&quot;;"> Francisco Corella [mailto:fcorella@pomcor.com] <=
br><b>Sent:</b> Tuesday, March 29, 2011 11:46 AM<br><b>To:</b> Phil Hunt; J=
ustin Richer; Eran Hammer-Lahav<br><b>Cc:</b> OAuth WG; Karen P. Lewison; P=
aul Tarjan (pt@fb.com)<br><b>Subject:</b> RE: [OAUTH-WG] WGLC on draft-ietf=
-oauth-v2-13.txt</span></p></div></div><p class=3D"yiv1552031577MsoNormal">=
 &nbsp;</p><table class=3D"yiv1552031577MsoNormalTable" border=3D"0" cellpa=
dding=3D"0" cellspacing=3D"0"><tbody><tr><td style=3D"padding: 0in;" valign=
=3D"top"><p
 class=3D"yiv1552031577MsoNormal" style=3D"margin-bottom: 12pt;">&gt; Can y=
ou explain how intercepting the authorization code<br>&gt; without having a=
ccess to the client credentials is a<br>&gt; problem? For the sake of discu=
ssion, assume that the client<br>&gt; has valid and secure credentials that=
 an attacker cannot<br>&gt; access. Also assume that the client has impleme=
nted some<br>&gt; form of cross-site protection.<br><br>One way: man-in-the=
-middle attack.&nbsp; The traffic between the legitimate<br>user's browser =
and the client goes through the attacker's machine<br>(easy to set up with =
a rogue WiFi access point).&nbsp; The user's browser<br>sends an http reque=
st to the client, targeting the redirect URI.&nbsp; The<br>attacker's machi=
ne doesn't let that request go through.&nbsp; The attacker<br>then sends th=
e same identical request from the attacker's own browser.<br>When the clien=
t receives the request, it has no way to tell that it is<br>coming from
 the attacker's browser rather than from the user's<br>browser.&nbsp; The c=
lient exchanges the authorization code for an access<br>token, uses the acc=
ess token to obtain protected resources belonging<br>to the user, and deliv=
ers those resources to the attacker's browser.<br>(Or manipulates those res=
ources as directed by the attacker's<br>browser.)&nbsp; In the Facebook use=
 case, the client logs the user in upon<br>verifying that the authorization=
 code is valid by exchanging it<br>successfully for an access token.<br><br=
>Another way (passive attack): The attacker observes the request from<br>th=
e user's browser to the client.&nbsp; The attacker does not stop the<br>req=
uest.&nbsp; The client receives the request with the authorization code<br>=
and exchanges the authorization code for the access token.&nbsp; Now the<br=
>attacker sends the same request from the attacker's own browser.&nbsp; The=
<br>client receives the second request and exchanges the
 authorization<br>code for another access token.&nbsp; Upon receiving the s=
econd request for<br>the same authorization code, the authorization server =
revokes the<br>first access token, as suggested in section 4.1.2 of the<br>=
specification: "If an authorization code is used more than once, the<br>auh=
orization server MAY revoke all tokens previously issued based on<br>that a=
uthorization code".&nbsp; The client then uses the second access<br>token t=
o access protected resources for the benefit of the attacker.<br>In the Fac=
ebook use case, the attacker is logged in as the legitimate<br>user.<br><br=
>&gt; I don=E2=80=9A=C3=84=C3=B4t know much about FB=E2=80=9A=C3=84=C3=B4s =
implementation but if they<br>&gt; allow the authorization code to be used =
for anything other<br>&gt; than exchanged for an access token using secure =
client<br>&gt; credentials, then they are not implementing the protocol as<=
br>&gt; specified.<br><br>Facebook uses the protocol correctly, but the exa=
mples in the
 Facebook<br>documentation use http rather than https for redirect URIs, so=
<br>implementations that follow the examples use http rather than https.<br=
><br>Francisco</p></td></tr></tbody></table><p class=3D"yiv1552031577MsoNor=
mal"><span style=3D"font-size: 10pt; font-family: &quot;sans-serif&quot;;">=
 &nbsp;</span></p></div></div></div></blockquote></td></tr></table>
--0-1600819670-1301438396=:18400--

From fcorella@pomcor.com  Tue Mar 29 15:48:08 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F0AAE3A6AA2 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 15:48:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.514
X-Spam-Level: 
X-Spam-Status: No, score=-2.514 tagged_above=-999 required=5 tests=[AWL=0.083,  BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6CelvYfTVy3R for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 15:48:05 -0700 (PDT)
Received: from web55806.mail.re3.yahoo.com (web55806.mail.re3.yahoo.com [216.252.110.52]) by core3.amsl.com (Postfix) with SMTP id 1D4983A6A7B for <oauth@ietf.org>; Tue, 29 Mar 2011 15:48:05 -0700 (PDT)
Received: (qmail 24924 invoked by uid 60001); 29 Mar 2011 22:49:41 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1301438981; bh=I+kuJtia4U4gHr1C8Ka1w96iP/s+ABCx4l5h7Dt5pXE=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=kOZAsfJ4SHpHFOOdbq1+qkZ1I9g0HIa0p8CKrr/3HIoOmTDJ9FDQnnj/LIOuWWX5eu57V7RcTwhGkmFgkKLtfGsIWf8ivm3BOnbODkqcrtfEslrfPRV5aZmwXe9mddqYwKE3Qk+yR2Xulks030abyxOOoMX5JeIe73gR8eOuzec=
Message-ID: <607231.23702.qm@web55806.mail.re3.yahoo.com>
X-YMail-OSG: jCa2IIoVM1ly2RA1iqFhxDr90Q.Q5ShfilYsFIv4RjZEE3c ONp7B0Q92nO4WvjqNyVYKxoHVTh9yFPBGBWT_JjfEBLsF..w6j2xM95pqbeB 9gbEhMkcFQrK518XufATymeDRn7bzO_P98pFjFXBcsF0pzIPrKySnG.Hr7ey ZOV7NhFpIEkWNu5jFSaMNJZdvSpI_gTJcQNLybqlnfR5eR0UPHVHcawfqVR9 MgLUcZnHCHRl3QBhmP6HMYh4D4ebCxIO9Xqtow3bbphJo76FWrA1Mh7tXsky g9MCH7iZOUWzgAoD3jMk7TZ4I3QMZfAUwL9Mjs9JdrMANHWYC6YXtPAjTj24 vaifE3X4CNvFUYhs6499UHne4O_hC2vDri0n51z.BoTXgCgwr7RuMjQ5teIC xuI7zmne40hoh
Received: from [67.91.91.101] by web55806.mail.re3.yahoo.com via HTTP; Tue, 29 Mar 2011 15:49:41 PDT
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/12.0.2 YahooMailWebService/0.8.109.295617
Date: Tue, 29 Mar 2011 15:49:41 -0700 (PDT)
From: Francisco Corella <fcorella@pomcor.com>
To: George Fletcher <gffletch@aol.com>, Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1209402284-1301438981=:23702"
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 22:48:08 -0000

--0-1209402284-1301438981=:23702
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

> As a matter of practicality, requiring all clients to deploy
> server-side TLS is absurd. If we mandate redirections URIs to use
> https, we are basically making everyone ignore it. It=E2=80=99s like a sp=
eed
> limit sign of 5mph.

Why is that?=C2=A0 Can you elaborate?=C2=A0 I'm very puzzled.=C2=A0 And did=
n't you
propose requiring TLS a few messages back?

Francisco

--- On Tue, 3/29/11, Eran Hammer-Lahav <eran@hueniverse.com> wrote:

From: Eran Hammer-Lahav <eran@hueniverse.com>
Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: "George Fletcher" <gffletch@aol.com>, "fcorella@pomcor.com" <fcorella@p=
omcor.com>
Cc: "Phil Hunt" <phil.hunt@oracle.com>, "Justin Richer" <jricher@mitre.org>=
, "OAuth WG" <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Date: Tuesday, March 29, 2011, 7:46 PM

As a matter of practicality, requiring all clients to deploy server-side TL=
S is absurd. If we mandate redirections URIs to use https, we are basically=
 making everyone ignore it. It=E2=80=99s like a speed limit sign of 5mph. =
=C2=A0EHL =C2=A0From: George Fletcher [mailto:gffletch@aol.com]=20
Sent: Tuesday, March 29, 2011 10:55 AM
To: fcorella@pomcor.com
Cc: Phil Hunt; Justin Richer; Eran Hammer-Lahav; OAuth WG; Karen P. Lewison
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt =C2=A0Hi Francis=
co,

So the examples that Justin gave were either localhost or non HTTP based sc=
hemes. If OAuth2 is to support these other schemes (often used in mobile cl=
ients) then I'm not sure how TLS can be a MUST unless it's qualified to app=
ly to HTTP based URLs only.

Is it sufficient to document this possible exposure in the security section=
 such that the spec doesn't preclude the use of OAuth2 with non HTTP based =
redirect_uri?

Thanks,
George

On 3/29/11 1:05 PM, Francisco Corella wrote: Eran,

It's not a reasonable compromise.=C2=A0 #2 MUST use tls UNLESS of course it=
 targets localhost.=C2=A0 If #2 is sent without TLS to a Web server, the au=
thorization code can be easily intercepted by an attacker.=C2=A0 The attack=
er can then use it to obtain protected resources by submitting the authoriz=
ation code to the client.=C2=A0 (This is independent of whether the client =
authenticates itself when exchanging the authorization code for an access t=
oken or not.) In the Facebook use case, the attacker can use the authorizat=
ion code to log in to the client using the user's Facebook identity.=C2=A0 =
I believe this vulnerability exists in many implementations of the Facebook=
 login button today.

Btw, I've pointed this out before three or four times on this mailing list,=
 including in a response to the WGLC that you never replied to.

Francisco

--- On Mon, 3/28/11, Eran Hammer-Lahav <eran@hueniverse.com> wrote:


From: Eran Hammer-Lahav <eran@hueniverse.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: "Phil Hunt" <phil.hunt@oracle.com>, "Justin Richer" <jricher@mitre.org>
Cc: "OAuth WG" <oauth@ietf.org>
Date: Monday, March 28, 2011, 10:28 PMThe code is returned in two steps:

1. The authorization server replies to the user-agent request (providing au=
thorization) with a redirection instruction typically using the Location re=
sponse header field.
2. The user-agent makes an HTTP GET request to the provided location (which=
 may be something other than an HTTP URI, or an HTTP URI to localhost).

#1 is an HTTP response to a user-agent request to the authorization endpoin=
t (or a subsequent one if the server implementation has multiple authorizat=
ion steps).

#2 is an HTTP request made by the user-agent.

In order for the code to be secure end-to-end, both steps must use TLS. The=
 arguments made against making TLS required are based on use cases for #2. =
We can make #1 (the authorization endpoint require TLS since it already has=
 to support it for the 'token' response type. We should make callbacks a SH=
OULD for TLS.

Does this sound like a reasonable compromise?

EHL

> -----Original Message-----
> From: Phil Hunt [mailto:phil.hunt@oracle.com]
> Sent: Monday, March 28, 2011 2:28 PM
> To: Justin Richer
> Cc: Eran Hammer-Lahav; OAuth WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> This was referring to section 2.1 that the authorization server must use =
TLS
> when returning an authorization code.
>=20
> If it doesn't use TLS then the code being returned to the client can be
> intercepted.
>=20
> Or did I miss something?
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> On 2011-03-28, at 1:37 PM, Justin Richer wrote:
>=20
> > Phil,
> >
> > The main difference is that it's a requirement on the *client* instead
> > of the *provider* side of the equation, and clients aren't always even
> > speaking HTTP. I agree that all client web servers SHOULD do it. A
> > particular provider can even REQUIRE it for their registered clients,
> > a step that is outside the scope of OAuth. But there are real, in-use
> > patterns that don't require the client to make an HTTP request to an
> > external service.
> >
> > I don't see how Firesheep is relevant to this discussion -- if your
> > browser is making a call to localhost to get the token, who outside of
> > your machine is going to do it? I'm not talking about convenience for
> > developers here (which I would argue should NOT be discounted, but
> > that's another argument), I'm talking about cases where the browser
> > isn't going outside of a trusted security boundary. There are also
> > instances where there may not even be an HTTP transaction involved,
> > let alone one that could support TLS.
> >
> > -- Justin
> >
> > On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:
> >> Justin, How is that so? Remember firesheep?=C2=A0 I wouldn't want the
> authorization code being exchanged without TLS in a cafe. Intercept is ju=
st
> too easy. And as I mentioned earlier, client credentials are already very=
 weak
> in many cases. In contrast, two web servers are hard to sniff unless you =
are
> able to gain access to their network communications path.
> >>
> >> As for testing, it seems more reasonable to put servers in temporary n=
on-
> compliance while testing rather then allow non-secure servers in producti=
on
> because of the SHOULD loophole.
> >>
> >> Also, while it does seem convenient for the developer not to have to u=
se
> TLS for authz codes, note that the developer still has to have TLS enable=
d
> when exchanging the code for an access token. So I'm not sure how relaxin=
g
> TLS for obtaining authorization actually simplifies the developer lifecyc=
le since
> they still have to set it up to test the other parts.=C2=A0 In my view, i=
t would be ok
> for a developer to temporarily disable TLS everywhere during development =
-
> - which places operation outside RFC compliance while developing -- but
> forces compliance once they go into production.
> >>
> >> It seems like I had to give a pretty substantial justification and we =
backed
> off because TLS is seen as inconvenient. I think we need more evidence th=
at
> there are safe cases that don't need TLS.
> >>
> >> Sorry for pushing hard on this one, but TLS is the backbone of OAuth
> security at present.
> >>
> >> Phil
> >> phil.hunt@oracle.com
> >>
> >>
> >>
> >>
> >> On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:
> >>
> >>> No change then. But the security considerations section must reflect
> this.
> >>>
> >>> EHL
> >>>
> >>>> -----Original Message-----
> >>>> From: Justin Richer [mailto:jricher@mitre.org]
> >>>> Sent: Monday, March 28, 2011 10:05 AM
> >>>> To: Eran Hammer-Lahav
> >>>> Cc: Phil Hunt; OAuth WG
> >>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>>
> >>>> What about non-http return uri's, or client-localhost, such as
> >>>>
> >>>> someapp://app/?code=3Dfoo
> >>>>
> >>>> http://localhost:87345/?code=3Dfoo
> >>>>
> >>>> HTTPS makes sense when you're talking between two web servers, but
> >>>> it seems to fall apart otherwise. I think SHOULD is appropriate here=
.
> >>>>
> >>>> -- Justin
> >>>>
> >>>>
> >>>> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
> >>>>> Unless someone has an objection, I'll make the change from SHOULD
> >>>>> to
> >>>> MUST.
> >>>>>
> >>>>> EHL
> >>>>>
> >>>>>> -----Original Message-----
> >>>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
> >>>>>> Sent: Friday, March 25, 2011 12:42 PM
> >>>>>> To: Eran Hammer-Lahav
> >>>>>> Cc: OAuth WG; Chuck & Mara Mortimore
> >>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>>>>
> >>>>>> Regarding the message: http://www.ietf.org/mail-
> >>>>>> archive/web/oauth/current/msg05762.html=C2=A0 (sorry I somehow los=
t
> >>>>>> the message in my email).
> >>>>>>
> >>>>>> This issue is theft of the authorization code during the redirect.
> >>>>>> Authenticating the client is an important feature and goes a long
> >>>>>> way, but it is not sufficient since in many cases, the
> >>>>>> client_id/client_secret will likely be hard coded and relatively
> >>>>>> easy to deduce (e.g. mobile client apps).=C2=A0 Of course a strong
> >>>>>> client authentication won't have this issue. This makes many
> >>>>>> consumer situations very susceptible to an attack where the
> >>>>>> authorization code is
> >>>> intercepted.
> >>>>>>
> >>>>>> For more information look at the SAML Artifact issues in section
> >>>>>> 6.5 (specifically stolen artifact, replay, etc) of this document:
> >>>>>> http://docs.oasis-
> >>>>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
> >>>>>>
> >>>>>> There are a number of remediations suggested (small lifetime,
> >>>>>> single use), but the foundational one is confidentiality of the
> >>>>>> exchange (TLS). Hence the recommendation that the return of an
> >>>>>> authorization code be kept secure with a MUST for TLS.
> >>>>>>
> >>>>>> Phil
> >>>>>> phil.hunt@oracle.com
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
> >>>>>>
> >>>>>>>
> >>>>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
> >>>>>> <eran@hueniverse.com> wrote:
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> -----Original Message-----
> >>>>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-
> bounces@ietf.org]
> >>>>>>>>> On Behalf Of Chuck Mortimore
> >>>>>>>>> Sent: Monday, March 14, 2011 6:10 PM
> >>>>>>>>
> >>>>>>>>> 1) I'd vote for dropping the following from 1.4.2.=C2=A0=C2=A0=
=C2=A0In turn I'd
> discuss
> >>>> some
> >>>>>> of
> >>>>>>>>> the security considerations, such as difficulty of protecting
> >>>>>>>>> a client_secret in almost all use-cases of this profile.
> >>>>>>>>>
> >>>>>>>>>=C2=A0 "Implicit grants improve the responsiveness and efficienc=
y of
> >>>>>>>>> some clients (such as a client implemented as an in-browser
> >>>>>>>>> application) since it reduces the number of round trips
> >>>>>>>>> required to obtain an access token."
> >>>>>>>>
> >>>>>>>> Why drop it? What about it isn't accurate?
> >>>>>>>
> >>>>>>> It's accurate, but my opinion is it sends the wrong message.=C2=
=A0=C2=A0=C2=A0It's
> clearly
> >>>> the
> >>>>>> less secure of the response types.=C2=A0 By positioning it as the =
most
> >>>>>> performant people may find that attractive and make the wrong
> >>>>>> security
> >>>> decision.
> >>>>>>>
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
> >>>>>>>>
> >>>>>>>> Why? What's the attack vector?
> >>>>>>>
> >>>>>>> See Phils comment on past experience with artifact bindings.
> >>>>>>> Spec should
> >>>>>> default for security always on, and let deployments that don't
> >>>>>> want to use HTTPs simply be non-conformant.
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is
> >>>>>>>>> REQUIRED since in 4.1.1 it's "REQUIRED unless"
> >>>>>>>>
> >>>>>>>> The client should always confirm where the code was sent to. It
> >>>>>>>> can omit
> >>>>>> the redirection is one was provided but should tell the server
> >>>>>> where it went to. This is more consistent on the verification
> >>>>>> side, but if the original flow designers want to chime in (Dick,
> >>>>>> Brian, etc.?), I'm open
> >>>> to change this.
> >>>>>>>>
> >>>>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?=C2=A0 =C2=A0=
=C2=A0=C2=A0I assume
> this
> >>>> goes
> >>>>>>>>> back to disagreement on how best to handle native clients. I'd
> >>>>>>>>> prefer it to simply reference 5.1 and leave what is issued up
> >>>>>>>>> to the security profile of the particular deployment as to what=
 is
> issued.
> >>>>>>>>
> >>>>>>>> -08 June 2010.
> >>>>>>>>
> >>>>>>>> This has been decided for a long time. I'm not eager to change i=
t.
> >>>>>>>
> >>>>>>> Thanks - I can live with it.=C2=A0 Unfortunately we still seem to=
 be
> >>>>>>> fragmenting on
> >>>>>> the native client approach.=C2=A0=C2=A0=C2=A0Good topic for IIW I =
suspect
> >>>>>>>
> >>>>>>> -cmort
> >>>>>>>
> >>>>>>>>
> >>>>>>>> EHL
> >>>>>>>>
> >>>>>>>>
> >>>>>>> _______________________________________________
> >>>>>>> OAuth mailing list
> >>>>>>> OAuth@ietf.org
> >>>>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>>
> >>>>> _______________________________________________
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>
> >>>
> >>
> >
> >

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth =C2=A0 =C2=A0__________________=
_____________________________OAuth mailing listOAuth@ietf.orghttps://www.ie=
tf.org/mailman/listinfo/oauth
--0-1209402284-1301438981=:23702
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">&gt; As a matter of practicality, requiring a=
ll clients to deploy<br>&gt; server-side TLS is absurd. If we mandate redir=
ections URIs to use<br>&gt; https, we are basically making everyone ignore =
it. It=E2=80=99s like a speed<br>&gt; limit sign of 5mph.<br><br>Why is tha=
t?&nbsp; Can you elaborate?&nbsp; I'm very puzzled.&nbsp; And didn't you<br=
>propose requiring TLS a few messages back?<br><br>Francisco<br><br>--- On =
<b>Tue, 3/29/11, Eran Hammer-Lahav <i>&lt;eran@hueniverse.com&gt;</i></b> w=
rote:<br><blockquote style=3D"border-left: 2px solid rgb(16, 16, 255); marg=
in-left: 5px; padding-left: 5px;"><br>From: Eran Hammer-Lahav &lt;eran@huen=
iverse.com&gt;<br>Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.tx=
t<br>To: "George Fletcher" &lt;gffletch@aol.com&gt;, "fcorella@pomcor.com" =
&lt;fcorella@pomcor.com&gt;<br>Cc: "Phil Hunt" &lt;phil.hunt@oracle.com&gt;=
, "Justin
 Richer" &lt;jricher@mitre.org&gt;, "OAuth WG" &lt;oauth@ietf.org&gt;, "Kar=
en P. Lewison" &lt;kplewison@pomcor.com&gt;<br>Date: Tuesday, March 29, 201=
1, 7:46 PM<br><br><div id=3D"yiv1581059102"><style><!--=0A#yiv1581059102  =
=0A _filtered #yiv1581059102 {font-family:Helvetica;=0Apanose-1:2 11 6 4 2 =
2 2 2 2 4;}=0A _filtered #yiv1581059102 {font-family:Helvetica;=0Apanose-1:=
2 11 6 4 2 2 2 2 2 4;}=0A _filtered #yiv1581059102 {font-family:Calibri;=0A=
panose-1:2 15 5 2 2 2 4 3 2 4;}=0A _filtered #yiv1581059102 {font-family:Ta=
homa;=0Apanose-1:2 11 6 4 3 5 4 4 2 4;}=0A _filtered #yiv1581059102 {font-f=
amily:Consolas;=0Apanose-1:2 11 6 9 2 2 4 3 2 4;}=0A#yiv1581059102  =0A#yiv=
1581059102 p.yiv1581059102MsoNormal, #yiv1581059102 li.yiv1581059102MsoNorm=
al, #yiv1581059102 div.yiv1581059102MsoNormal=0A=09{margin:0in;=0Amargin-bo=
ttom:.0001pt;=0Afont-size:12.0pt;=0Afont-family:"serif";=0Acolor:black;}=0A=
#yiv1581059102 a:link, #yiv1581059102 span.yiv1581059102MsoHyperlink=0A=09{=
=0Acolor:blue;=0Atext-decoration:underline;}=0A#yiv1581059102 a:visited, #y=
iv1581059102 span.yiv1581059102MsoHyperlinkFollowed=0A=09{=0Acolor:purple;=
=0Atext-decoration:underline;}=0A#yiv1581059102 pre=0A=09{=0A=0Amargin:0in;=
=0Amargin-bottom:.0001pt;=0Afont-size:10.0pt;=0Afont-family:"Courier New";=
=0Acolor:black;}=0A#yiv1581059102 span.yiv1581059102HTMLPreformattedChar=0A=
=09{=0A=0A=0Afont-family:Consolas;=0Acolor:black;}=0A#yiv1581059102 span.yi=
v1581059102EmailStyle19=0A=09{=0Afont-family:"sans-serif";=0Acolor:#1F497D;=
}=0A#yiv1581059102 .yiv1581059102MsoChpDefault=0A=09{=0Afont-size:10.0pt;}=
=0A _filtered #yiv1581059102 {=0Amargin:1.0in 1.0in 1.0in 1.0in;}=0A#yiv158=
1059102 div.yiv1581059102WordSection1=0A=09{}=0A--></style><div class=3D"yi=
v1581059102WordSection1"><p class=3D"yiv1581059102MsoNormal"><span style=3D=
"font-size: 11pt; font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 1=
25);">As a matter of practicality, requiring all clients to deploy server-s=
ide TLS is absurd. If we mandate redirections URIs to use https, we are bas=
ically making everyone ignore it. It=E2=80=99s like a speed limit sign of 5=
mph.</span></p><p class=3D"yiv1581059102MsoNormal"><span style=3D"font-size=
: 11pt; font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 125);"> &nb=
sp;</span></p><p class=3D"yiv1581059102MsoNormal"><span style=3D"font-size:=
 11pt; font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 125);">EHL</=
span></p><p class=3D"yiv1581059102MsoNormal"><span style=3D"font-size: 11pt=
; font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 125);"> &nbsp;</s=
pan></p><div style=3D"border-width: medium medium medium 1.5pt; border-styl=
e: none none none solid; border-color: -moz-use-text-color
 -moz-use-text-color -moz-use-text-color blue; padding: 0in 0in 0in 4pt;"><=
div><div style=3D"border-right: medium none; border-width: 1pt medium mediu=
m; border-style: solid none none; border-color: rgb(181, 196, 223) -moz-use=
-text-color -moz-use-text-color; padding: 3pt 0in 0in;"><p class=3D"yiv1581=
059102MsoNormal"><b><span style=3D"font-size: 10pt; font-family: &quot;sans=
-serif&quot;; color: windowtext;">From:</span></b><span style=3D"font-size:=
 10pt; font-family: &quot;sans-serif&quot;; color: windowtext;"> George Fle=
tcher [mailto:gffletch@aol.com] <br><b>Sent:</b> Tuesday, March 29, 2011 10=
:55 AM<br><b>To:</b> fcorella@pomcor.com<br><b>Cc:</b> Phil Hunt; Justin Ri=
cher; Eran Hammer-Lahav; OAuth WG; Karen P. Lewison<br><b>Subject:</b> Re: =
[OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt</span></p></div></div><p clas=
s=3D"yiv1581059102MsoNormal"> &nbsp;</p><p class=3D"yiv1581059102MsoNormal"=
><span style=3D"font-family: &quot;sans-serif&quot;;">Hi Francisco,<br><br>=
So the
 examples that Justin gave were either localhost or non HTTP based schemes.=
 If OAuth2 is to support these other schemes (often used in mobile clients)=
 then I'm not sure how TLS can be a MUST unless it's qualified to apply to =
HTTP based URLs only.<br><br>Is it sufficient to document this possible exp=
osure in the security section such that the spec doesn't preclude the use o=
f OAuth2 with non HTTP based redirect_uri?<br><br>Thanks,<br>George<br></sp=
an><br>On 3/29/11 1:05 PM, Francisco Corella wrote: </p><table class=3D"yiv=
1581059102MsoNormalTable" border=3D"0" cellpadding=3D"0" cellspacing=3D"0">=
<tbody><tr><td style=3D"padding: 0in;" valign=3D"top"><p class=3D"yiv158105=
9102MsoNormal">Eran,<br><br>It's not a reasonable compromise.&nbsp; #2 MUST=
 use tls UNLESS of course it targets localhost.&nbsp; If #2 is sent without=
 TLS to a Web server, the authorization code can be easily intercepted by a=
n attacker.&nbsp; The attacker can then use it to obtain protected resource=
s by
 submitting the authorization code to the client.&nbsp; (This is independen=
t of whether the client authenticates itself when exchanging the authorizat=
ion code for an access token or not.) In the Facebook use case, the attacke=
r can use the authorization code to log in to the client using the user's F=
acebook identity.&nbsp; I believe this vulnerability exists in many impleme=
ntations of the Facebook login button today.<br><br>Btw, I've pointed this =
out before three or four times on this mailing list, including in a respons=
e to the WGLC that you never replied to.<br><br>Francisco<br><br>--- On <b>=
Mon, 3/28/11, Eran Hammer-Lahav <i><a rel=3D"nofollow" ymailto=3D"mailto:er=
an@hueniverse.com" target=3D"_blank" href=3D"/mc/compose?to=3Deran@hueniver=
se.com">&lt;eran@hueniverse.com&gt;</a></i></b> wrote:<br><br></p><p class=
=3D"yiv1581059102MsoNormal" style=3D"margin-bottom: 12pt;"><br>From: Eran H=
ammer-Lahav <a rel=3D"nofollow" ymailto=3D"mailto:eran@hueniverse.com" targ=
et=3D"_blank"
 href=3D"/mc/compose?to=3Deran@hueniverse.com">&lt;eran@hueniverse.com&gt;<=
/a><br>Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<br>To: "P=
hil Hunt" <a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" targe=
t=3D"_blank" href=3D"/mc/compose?to=3Dphil.hunt@oracle.com">&lt;phil.hunt@o=
racle.com&gt;</a>, "Justin Richer" <a rel=3D"nofollow" ymailto=3D"mailto:jr=
icher@mitre.org" target=3D"_blank" href=3D"/mc/compose?to=3Djricher@mitre.o=
rg">&lt;jricher@mitre.org&gt;</a><br>Cc: "OAuth WG" <a rel=3D"nofollow" yma=
ilto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"/mc/compose?to=3Do=
auth@ietf.org">&lt;oauth@ietf.org&gt;</a><br>Date: Monday, March 28, 2011, =
10:28 PM</p><div><p class=3D"yiv1581059102MsoNormal">The code is returned i=
n two steps:<br><br>1. The authorization server replies to the user-agent r=
equest (providing authorization) with a redirection instruction typically u=
sing the Location response header field.<br>2. The user-agent makes an HTTP=
 GET request to the provided
 location (which may be something other than an HTTP URI, or an HTTP URI to=
 localhost).<br><br>#1 is an HTTP response to a user-agent request to the a=
uthorization endpoint (or a subsequent one if the server implementation has=
 multiple authorization steps).<br><br>#2 is an HTTP request made by the us=
er-agent.<br><br>In order for the code to be secure end-to-end, both steps =
must use TLS. The arguments made against making TLS required are based on u=
se cases for #2. We can make #1 (the authorization endpoint require TLS sin=
ce it already has to support it for the 'token' response type. We should ma=
ke callbacks a SHOULD for TLS.<br><br>Does this sound like a reasonable com=
promise?<br><br>EHL<br><br>&gt; -----Original Message-----<br>&gt; From: Ph=
il Hunt [mailto:<a rel=3D"nofollow">phil.hunt@oracle.com</a>]<br>&gt; Sent:=
 Monday, March 28, 2011 2:28 PM<br>&gt; To: Justin Richer<br>&gt; Cc: Eran =
Hammer-Lahav; OAuth WG<br>&gt; Subject: Re: [OAUTH-WG] WGLC on
 draft-ietf-oauth-v2-13.txt<br>&gt; <br>&gt; This was referring to section =
2.1 that the authorization server must use TLS<br>&gt; when returning an au=
thorization code.<br>&gt; <br>&gt; If it doesn't use TLS then the code bein=
g returned to the client can be<br>&gt; intercepted.<br>&gt; <br>&gt; Or di=
d I miss something?<br>&gt; <br>&gt; Phil<br>&gt; <a rel=3D"nofollow">phil.=
hunt@oracle.com</a><br>&gt; <br>&gt; <br>&gt; <br>&gt; <br>&gt; On 2011-03-=
28, at 1:37 PM, Justin Richer wrote:<br>&gt; <br>&gt; &gt; Phil,<br>&gt; &g=
t;<br>&gt; &gt; The main difference is that it's a requirement on the *clie=
nt* instead<br>&gt; &gt; of the *provider* side of the equation, and client=
s aren't always even<br>&gt; &gt; speaking HTTP. I agree that all client we=
b servers SHOULD do it. A<br>&gt; &gt; particular provider can even REQUIRE=
 it for their registered clients,<br>&gt; &gt; a step that is outside the s=
cope of OAuth. But there are real, in-use<br>&gt; &gt; patterns that
 don't require the client to make an HTTP request to an<br>&gt; &gt; extern=
al service.<br>&gt; &gt;<br>&gt; &gt; I don't see how Firesheep is relevant=
 to this discussion -- if your<br>&gt; &gt; browser is making a call to loc=
alhost to get the token, who outside of<br>&gt; &gt; your machine is going =
to do it? I'm not talking about convenience for<br>&gt; &gt; developers her=
e (which I would argue should NOT be discounted, but<br>&gt; &gt; that's an=
other argument), I'm talking about cases where the browser<br>&gt; &gt; isn=
't going outside of a trusted security boundary. There are also<br>&gt; &gt=
; instances where there may not even be an HTTP transaction involved,<br>&g=
t; &gt; let alone one that could support TLS.<br>&gt; &gt;<br>&gt; &gt; -- =
Justin<br>&gt; &gt;<br>&gt; &gt; On Mon, 2011-03-28 at 16:25 -0400, Phil Hu=
nt wrote:<br>&gt; &gt;&gt; Justin, How is that so? Remember firesheep?&nbsp=
; I wouldn't want the<br>&gt; authorization code being exchanged
 without TLS in a cafe. Intercept is just<br>&gt; too easy. And as I mentio=
ned earlier, client credentials are already very weak<br>&gt; in many cases=
. In contrast, two web servers are hard to sniff unless you are<br>&gt; abl=
e to gain access to their network communications path.<br>&gt; &gt;&gt;<br>=
&gt; &gt;&gt; As for testing, it seems more reasonable to put servers in te=
mporary non-<br>&gt; compliance while testing rather then allow non-secure =
servers in production<br>&gt; because of the SHOULD loophole.<br>&gt; &gt;&=
gt;<br>&gt; &gt;&gt; Also, while it does seem convenient for the developer =
not to have to use<br>&gt; TLS for authz codes, note that the developer sti=
ll has to have TLS enabled<br>&gt; when exchanging the code for an access t=
oken. So I'm not sure how relaxing<br>&gt; TLS for obtaining authorization =
actually simplifies the developer lifecycle since<br>&gt; they still have t=
o set it up to test the other parts.&nbsp; In my view, it would be
 ok<br>&gt; for a developer to temporarily disable TLS everywhere during de=
velopment -<br>&gt; - which places operation outside RFC compliance while d=
eveloping -- but<br>&gt; forces compliance once they go into production.<br=
>&gt; &gt;&gt;<br>&gt; &gt;&gt; It seems like I had to give a pretty substa=
ntial justification and we backed<br>&gt; off because TLS is seen as inconv=
enient. I think we need more evidence that<br>&gt; there are safe cases tha=
t don't need TLS.<br>&gt; &gt;&gt;<br>&gt; &gt;&gt; Sorry for pushing hard =
on this one, but TLS is the backbone of OAuth<br>&gt; security at present.<=
br>&gt; &gt;&gt;<br>&gt; &gt;&gt; Phil<br>&gt; &gt;&gt; <a rel=3D"nofollow"=
>phil.hunt@oracle.com</a><br>&gt; &gt;&gt;<br>&gt; &gt;&gt;<br>&gt; &gt;&gt=
;<br>&gt; &gt;&gt;<br>&gt; &gt;&gt; On 2011-03-28, at 12:52 PM, Eran Hammer=
-Lahav wrote:<br>&gt; &gt;&gt;<br>&gt; &gt;&gt;&gt; No change then. But the=
 security considerations section must reflect<br>&gt; this.<br>&gt;
 &gt;&gt;&gt;<br>&gt; &gt;&gt;&gt; EHL<br>&gt; &gt;&gt;&gt;<br>&gt; &gt;&gt=
;&gt;&gt; -----Original Message-----<br>&gt; &gt;&gt;&gt;&gt; From: Justin =
Richer [mailto:<a rel=3D"nofollow">jricher@mitre.org</a>]<br>&gt; &gt;&gt;&=
gt;&gt; Sent: Monday, March 28, 2011 10:05 AM<br>&gt; &gt;&gt;&gt;&gt; To: =
Eran Hammer-Lahav<br>&gt; &gt;&gt;&gt;&gt; Cc: Phil Hunt; OAuth WG<br>&gt; =
&gt;&gt;&gt;&gt; Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt=
<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; What about non-http retu=
rn uri's, or client-localhost, such as<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt=
;&gt;&gt;&gt; someapp://app/?code=3Dfoo<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &g=
t;&gt;&gt;&gt; <a rel=3D"nofollow" target=3D"_blank"  href=3D"http://localh=
ost:87345/?code=3Dfoo">http://localhost:87345/?code=3Dfoo</a><br>&gt; &gt;&=
gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; HTTPS makes sense when you're talking =
between two web servers, but<br>&gt; &gt;&gt;&gt;&gt; it seems to fall apar=
t
 otherwise. I think SHOULD is appropriate here.<br>&gt; &gt;&gt;&gt;&gt;<br=
>&gt; &gt;&gt;&gt;&gt; -- Justin<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&=
gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; On Fri, 2011-03-25 at 16:03 -0400, Eran Ha=
mmer-Lahav wrote:<br>&gt; &gt;&gt;&gt;&gt;&gt; Unless someone has an object=
ion, I'll make the change from SHOULD<br>&gt; &gt;&gt;&gt;&gt;&gt; to<br>&g=
t; &gt;&gt;&gt;&gt; MUST.<br>&gt; &gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;=
&gt;&gt; EHL<br>&gt; &gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; =
-----Original Message-----<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; From: Phil Hunt=
 [mailto:<a rel=3D"nofollow">phil.hunt@oracle.com</a>]<br>&gt; &gt;&gt;&gt;=
&gt;&gt;&gt; Sent: Friday, March 25, 2011 12:42 PM<br>&gt; &gt;&gt;&gt;&gt;=
&gt;&gt; To: Eran Hammer-Lahav<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Cc: OAuth W=
G; Chuck &amp; Mara Mortimore<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Subject: Re:=
 [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Regarding the me=
ssage: <a rel=3D"nofollow" target=3D"_blank" href=3D"http://www.ietf.org/ma=
il-">http://www.ietf.org/mail-</a><br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; archive=
/web/oauth/current/msg05762.html&nbsp; (sorry I somehow lost<br>&gt; &gt;&g=
t;&gt;&gt;&gt;&gt; the message in my email).<br>&gt; &gt;&gt;&gt;&gt;&gt;&g=
t;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; This issue is theft of the authorizatio=
n code during the redirect.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Authenticating=
 the client is an important feature and goes a long<br>&gt; &gt;&gt;&gt;&gt=
;&gt;&gt; way, but it is not sufficient since in many cases, the<br>&gt; &g=
t;&gt;&gt;&gt;&gt;&gt; client_id/client_secret will likely be hard coded an=
d relatively<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; easy to deduce (e.g. mobile c=
lient apps).&nbsp; Of course a strong<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; clie=
nt authentication won't have this issue. This makes many<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt; consumer situations very susceptible to an attack=
 where the<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code is<br>&gt; &=
gt;&gt;&gt;&gt; intercepted.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&=
gt;&gt;&gt;&gt;&gt; For more information look at the SAML Artifact issues i=
n section<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; 6.5 (specifically stolen artifac=
t, replay, etc) of this document:<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; <a rel=
=3D"nofollow" target=3D"_blank" href=3D"http://docs.oasis-">http://docs.oas=
is-</a><br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; open.org/security/saml/v2.0/saml-s=
ec-consider-2.0-os.pdf<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt=
;&gt;&gt;&gt; There are a number of remediations suggested (small lifetime,=
<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; single use), but the foundational one is =
confidentiality of the<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; exchange (TLS). Hen=
ce the recommendation that the return of an<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt=
;
 authorization code be kept secure with a MUST for TLS.<br>&gt; &gt;&gt;&gt=
;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Phil<br>&gt; &gt;&gt;&gt;&gt=
;&gt;&gt; <a rel=3D"nofollow">phil.hunt@oracle.com</a><br>&gt; &gt;&gt;&gt;=
&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&=
gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; On 20=
11-03-24, at 7:22 PM, Chuck Mortimore wrote:<br>&gt; &gt;&gt;&gt;&gt;&gt;&g=
t;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt=
; On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"<br>&gt; &gt;&gt;&gt;&gt;=
&gt;&gt; &lt;<a rel=3D"nofollow">eran@hueniverse.com</a>&gt; wrote:<br>&gt;=
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&=
gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; -----Original Message-----<br>&gt;=
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; From: <a rel=3D"nofollow">oauth-bounc=
es@ietf.org</a> [<a rel=3D"nofollow" ymailto=3D"mailto:oauth" target=3D"_bl=
ank"
 href=3D"/mc/compose?to=3Doauth">mailto:oauth</a>-<br>&gt; <a rel=3D"nofoll=
ow">bounces@ietf.org</a>]<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; On B=
ehalf Of Chuck Mortimore<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Sent:=
 Monday, March 14, 2011 6:10 PM<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br=
>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 1) I'd vote for dropping the fol=
lowing from 1.4.2.&nbsp;&nbsp;&nbsp;In turn I'd<br>&gt; discuss<br>&gt; &gt=
;&gt;&gt;&gt; some<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; of<br>&gt; &gt;&gt;&gt;=
&gt;&gt;&gt;&gt;&gt;&gt; the security considerations, such as difficulty of=
 protecting<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; a client_secret in=
 almost all use-cases of this profile.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;=
&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&nbsp; "Implicit grant=
s improve the responsiveness and efficiency of<br>&gt; &gt;&gt;&gt;&gt;&gt;=
&gt;&gt;&gt;&gt; some clients (such as a client implemented as an
 in-browser<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; application) since=
 it reduces the number of round trips<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&=
gt;&gt; required to obtain an access token."<br>&gt; &gt;&gt;&gt;&gt;&gt;&g=
t;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why drop it? What about=
 it isn't accurate?<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&g=
t;&gt;&gt;&gt;&gt; It's accurate, but my opinion is it sends the wrong mess=
age.&nbsp;&nbsp;&nbsp;It's<br>&gt; clearly<br>&gt; &gt;&gt;&gt;&gt; the<br>=
&gt; &gt;&gt;&gt;&gt;&gt;&gt; less secure of the response types.&nbsp; By p=
ositioning it as the most<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; performant peopl=
e may find that attractive and make the wrong<br>&gt; &gt;&gt;&gt;&gt;&gt;&=
gt; security<br>&gt; &gt;&gt;&gt;&gt; decision.<br>&gt; &gt;&gt;&gt;&gt;&gt=
;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;=
&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 2) Section
 2.1, we should MUST TLS even for Authorization Code.<br>&gt; &gt;&gt;&gt;&=
gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why? What's th=
e attack vector?<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&=
gt;&gt;&gt;&gt; See Phils comment on past experience with artifact bindings=
.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Spec should<br>&gt; &gt;&gt;&gt;&gt;=
&gt;&gt; default for security always on, and let deployments that don't<br>=
&gt; &gt;&gt;&gt;&gt;&gt;&gt; want to use HTTPs simply be non-conformant.<b=
r>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt=
;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 3) Section 4.1.3 - not clear=
 to me why redirect_uri is<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; REQ=
UIRED since in 4.1.1 it's "REQUIRED unless"<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt=
;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; The client should always=
 confirm where the code was sent to. It<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; can omit<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;=
 the redirection is one was provided but should tell the server<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt; where it went to. This is more consistent on the veri=
fication<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; side, but if the original flow de=
signers want to chime in (Dick,<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Brian, etc=
.?), I'm open<br>&gt; &gt;&gt;&gt;&gt; to change this.<br>&gt; &gt;&gt;&gt;=
&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 4) Sectio=
n 4.2.2 - when did we drop refresh_token?&nbsp; &nbsp;&nbsp;&nbsp;I assume<=
br>&gt; this<br>&gt; &gt;&gt;&gt;&gt; goes<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;=
&gt;&gt;&gt; back to disagreement on how best to handle native clients. I'd=
<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; prefer it to simply reference=
 5.1 and leave what is issued up<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&g=
t; to the security profile of the particular deployment as to what
 is<br>&gt; issued.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&g=
t;&gt;&gt;&gt;&gt;&gt;&gt; -08 June 2010.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&=
gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; This has been decided for =
a long time. I'm not eager to change it.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&g=
t;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Thanks - I can live with it.&nbsp; =
Unfortunately we still seem to be<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; frag=
menting on<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; the native client approach.&nbs=
p;&nbsp;&nbsp;Good topic for IIW I suspect<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;=
&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; -cmort<br>&gt; &gt;&gt;&gt;&gt;&g=
t;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt=
;&gt;&gt;&gt;&gt; EHL<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;=
&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; _________=
______________________________________<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>&gt; &gt;&gt;&gt;&gt;&g=
t;&gt;&gt; <a rel=3D"nofollow">OAuth@ietf.org</a><br>&gt; &gt;&gt;&gt;&gt;&=
gt;&gt;&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.=
org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>=
<br>&gt; &gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt; ________________=
_______________________________<br>&gt; &gt;&gt;&gt;&gt;&gt; OAuth mailing =
list<br>&gt; &gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow">OAuth@ietf.org</a><br=
>&gt; &gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow" target=3D"_blank" href=3D"ht=
tps://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/lis=
tinfo/oauth</a><br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;<br>&gt; &gt;&=
gt;<br>&gt; &gt;<br>&gt; &gt;<br><br>______________________________________=
_________<br>OAuth mailing list<br><a rel=3D"nofollow">OAuth@ietf.org</a><b=
r><a rel=3D"nofollow" target=3D"_blank"
 href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a></p></div></td></tr></tbody></table><pre> &nbsp;<=
/pre><pre> &nbsp;</pre><pre>_______________________________________________=
</pre><pre>OAuth mailing list</pre><pre><a rel=3D"nofollow" ymailto=3D"mail=
to:OAuth@ietf.org" target=3D"_blank" href=3D"/mc/compose?to=3DOAuth@ietf.or=
g">OAuth@ietf.org</a></pre><pre><a rel=3D"nofollow" target=3D"_blank" href=
=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailm=
an/listinfo/oauth</a></pre></div></div></div></blockquote></td></tr></table=
>
--0-1209402284-1301438981=:23702--

From James.H.Manger@team.telstra.com  Tue Mar 29 15:55:46 2011
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6E3163A6ACC for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 15:55:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.644
X-Spam-Level: 
X-Spam-Status: No, score=-0.644 tagged_above=-999 required=5 tests=[AWL=0.256,  BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, HTML_MESSAGE=0.001, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JtKLXow0iDk8 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 15:55:41 -0700 (PDT)
Received: from ipxcno.tcif.telstra.com.au (ipxcno.tcif.telstra.com.au [203.35.82.208]) by core3.amsl.com (Postfix) with ESMTP id 2BA043A6AC5 for <oauth@ietf.org>; Tue, 29 Mar 2011 15:55:40 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.63,265,1299416400"; d="scan'208,217";a="28940096"
Received: from unknown (HELO ipcdni.tcif.telstra.com.au) ([10.97.216.212]) by ipocni.tcif.telstra.com.au with ESMTP; 30 Mar 2011 09:57:18 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6300"; a="22686815"
Received: from wsmsg3706.srv.dir.telstra.com ([172.49.40.80]) by ipcdni.tcif.telstra.com.au with ESMTP; 30 Mar 2011 09:57:18 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by wsmsg3706.srv.dir.telstra.com ([172.49.40.80]) with mapi; Wed, 30 Mar 2011 09:57:17 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: Anthony Nadalin <tonynad@microsoft.com>, OAuth Mailing List <oauth@ietf.org>
Date: Wed, 30 Mar 2011 09:57:15 +1100
Thread-Topic: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF
Thread-Index: AQHL7PG+zA1yVvIVsUGXmm0sw6AyUJREJj2AgADBtYA=
Message-ID: <255B9BB34FB7D647A506DC292726F6E11281721F22@WSMSG3153V.srv.dir.telstra.com>
References: <255B9BB34FB7D647A506DC292726F6E1127DCD2142@WSMSG3153V.srv.dir.telstra.com> <90C41DD21FB7C64BB94121FBBC2E7234465642FE30@P3PW5EX1MB01.EX1.SECURESERVER.NET> <255B9BB34FB7D647A506DC292726F6E11280EBEBC8@WSMSG3153V.srv.dir.telstra.com> <B26C1EF377CB694EAB6BDDC8E624B6E71095FCDF@SN1PRD0302MB097.namprd03.prod.outlook.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E71095FCDF@SN1PRD0302MB097.namprd03.prod.outlook.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: multipart/alternative; boundary="_000_255B9BB34FB7D647A506DC292726F6E11281721F22WSMSG3153Vsrv_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 22:55:46 -0000

--_000_255B9BB34FB7D647A506DC292726F6E11281721F22WSMSG3153Vsrv_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

>> OAuth issues security tokens without indicating where they can be safely=
 used. While that fatal flaw remains, it is pointless to specify the use of=
 the Origin header.



> I don't think anything should be in the base as the different token profi=
les can stipulate the audience.



But they don't. Neither the BEARER nor MAC specs stipulate where not to sen=
d a token.

Indicating where it is safe to use a security token seems to me to be a gen=
eric requirement whenever any type of token is issued. Hence, the base spec=
 seems to be the appropriate place to specify it.



[It is far less dangerous to use a MAC token (than a BEARER token) at the w=
rong site as the secret key will not be revealed. However, it is still a si=
tuation you want to avoid (at best the unexpected authentication will be ig=
nored; often it will causes errors; and it leaks some privacy).]





The BEARER spec [draft-ietf-oauth-v2-bearer-03] does say, in its Security C=
onsiderations [3.2], "it is important for the authorization server to inclu=
de the identity of the intended recipients". However this is talking about =
a resource server checking that a token was meant for it. It doesn't in any=
 way prevent a client app sending the token to the wrong site (tokens can b=
e opaque to clients so they cannot check things inside them).



--

James Manger


--_000_255B9BB34FB7D647A506DC292726F6E11281721F22WSMSG3153Vsrv_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
 /* List Definitions */
 @list l0
	{mso-list-id:254755050;
	mso-list-type:hybrid;
	mso-list-template-ids:844671880 -21312622 201916419 201916421 201916417 20=
1916419 201916421 201916417 201916419 201916421;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0D8;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";
	color:#1F497D;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
-->
</style><!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-AU" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">&gt;</s=
pan><span lang=3D"EN-US" style=3D"color:#1F497D">&gt;
</span><span style=3D"color:#1F497D">OAuth issues security tokens without i=
ndicating where they can be safely used.</span><span style=3D"color:#1F497D=
">
</span><span style=3D"color:#1F497D">While that fatal flaw remains, it is p=
ointless to specify the use of the Origin header.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&gt; </span><span styl=
e=3D"color:#1F497D">I don&#8217;t think anything should be in the base as t=
he different token profiles can stipulate the audience.</span><span lang=3D=
"EN-US" style=3D"color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">But the=
y don&#8217;t. Neither the BEARER nor MAC specs stipulate where not to send=
 a token.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">Indicat=
ing where it is safe to use a security token seems to me to be a generic re=
quirement whenever any type of token is issued. Hence, the base spec seems =
to be the appropriate place to specify
 it.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[It is =
far less dangerous to use a MAC token (than a BEARER token) at the wrong si=
te as the secret key will not be revealed. However, it is still a situation=
 you want to avoid (at best the unexpected
 authentication will be ignored; often it will causes errors; and it leaks =
some privacy).]<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">The BEA=
RER spec [draft-ietf-oauth-v2-bearer-03] does say, in its Security Consider=
ations [3.2], &#8220;it is important for the authorization server to includ=
e the identity of the intended recipients&#8221;.
 However this is talking about a resource server checking that a token was =
meant for it. It doesn&#8217;t in any way prevent a client app sending the =
token to the wrong site (tokens can be opaque to clients so they cannot che=
ck things inside them).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">&nbsp;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">--<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">James M=
anger<o:p></o:p></span></p>
</div>
</body>
</html>

--_000_255B9BB34FB7D647A506DC292726F6E11281721F22WSMSG3153Vsrv_--

From eran@hueniverse.com  Tue Mar 29 16:00:28 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B568A28C0EC for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:00:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.64
X-Spam-Level: 
X-Spam-Status: No, score=-2.64 tagged_above=-999 required=5 tests=[AWL=-0.041,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZZglMLCDbKZt for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:00:27 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id B91EB3A6ACC for <oauth@ietf.org>; Tue, 29 Mar 2011 16:00:27 -0700 (PDT)
Received: (qmail 26489 invoked from network); 29 Mar 2011 23:02:06 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 29 Mar 2011 23:02:06 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Tue, 29 Mar 2011 16:01:57 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Tue, 29 Mar 2011 16:01:51 -0700
Thread-Topic: Error extensibility proposal
Thread-Index: AcvuWqe3yWo/PW+8SwCPaTggrIuHzw==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 23:00:28 -0000

*** Requirements

The following proposal is based on two requirements:

1. Provide a way to return an OAuth error response for error situations oth=
er then 400 and 401. For example, if the server is temporarily unavailable,=
 it will return an HTTP 503 status. However, it is often desirable to still=
 return a response body using the same format as any other error. This make=
s client development easier, having to always check for a single error code=
.

2. Allow extensions modifying the behavior of the authorization and token e=
ndpoints via additional request/response parameters to define additional er=
ror codes to go along with the new functionality. For example, the UX exten=
sion defines the 'display' parameter. It could define a matching 'unsupport=
ed_display' error response.

No other use cases were identified for error extensibility. Note that this =
proposal is strictly limited to error resulting from the authorization and =
token endpoints. No other endpoints are included (in particular, protected =
resources are not covered by this proposal).

*** Design goals

The proposal was specifically designed to be minimalistic, tailored to the =
specific use cases defined, and as effortless as possible. This avoids defi=
ning error codes identical to existing HTTP status codes, as well as bind n=
ew errors to specific extension parameters. Since the error is useless with=
out understanding the extension, this method guarantees that those developi=
ng and implementing extensions will present it as a complete unit.

*** Proposal

- Non 400/401 responses

If the HTTP response status code is 4xx (other than 400/401) or 5xx, the 'e=
rror' parameter SHOULD be set to the HTTP status code. For example:

     HTTP/1.1 503 Service Unavailable
     Content-Type: application/json
     Cache-Control: no-store

     {
       "error":"503"
     }

This will also enable passing HTTP status codes such as 503 via the redirec=
tion response which is currently not possible. It will allow the authorizat=
ion server to indicate a 503 situation without defining another error code =
that has the exact same meaning.

- Extension errors

Instead of defining an additional error registry, I propose we add a single=
 field to the 'OAuth parameters registry' template:

    Additional error codes:
        Additional error codes related to the parameter usage. Error codes =
SHOULD begin with the parameter name
        when possible (e.g. 'example_invalid' error code for use with the '=
example' parameter).

Error collisions are unlikely because when a new extension is authored, the=
 registry is reviewed for potential conflicts. Since the errors are extensi=
on-specific, collisions only matter if two extensions are to be used togeth=
er. In that case, the review process will identify any potential problems. =
And since the errors are meaningless without understanding the extension, a=
 registry with a random list of errors is not very helpful.

*** Feedback

Please send any feedback, comments, support, and objections by 3/1 (so it c=
an be included or not in -14).

EHL



From eran@hueniverse.com  Tue Mar 29 16:12:11 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EF6F33A6AA2 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:12:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.639
X-Spam-Level: 
X-Spam-Status: No, score=-2.639 tagged_above=-999 required=5 tests=[AWL=-0.041, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SJPUP8GBVd8w for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:12:08 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 4C7653A6992 for <oauth@ietf.org>; Tue, 29 Mar 2011 16:12:08 -0700 (PDT)
Received: (qmail 22897 invoked from network); 29 Mar 2011 23:13:46 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Mar 2011 23:13:45 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Tue, 29 Mar 2011 16:13:45 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Tue, 29 Mar 2011 16:13:37 -0700
Thread-Topic: Proposed change to OAuth parameters registry
Thread-Index: AcvuZWCSoakTm8gYS4ikjcIwP5PMZg==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564305DE@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E723446564305DEP3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: [OAUTH-WG] Proposed change to OAuth parameters registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 23:12:12 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E723446564305DEP3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I would like to make the following change to section 8.2:


   New request or response parameters for use with the authorization

   endpoint or the token endpoint are defined and registered in the

   parameters registry following the procedure in Section 10.2<http://tools=
.ietf.org/html/draft-ietf-oauth-v2-13#section-10.2>.



   Parameter names MUST conform to the param-name ABNF and parameter

   values syntax MUST be well-defined (e.g., using ABNF, or a reference

   to the syntax of an existing parameter).



   Unregistered vendor-specific parameter extensions that are not commonly

   applicable, and are specific to the implementation details of the

   authorization server where they are used SHOULD utilize a

   vendor-specific prefix that is not likely to conflict with other

   registered values (e.g. begin with 'companyname_').

This is a more pragmatic (and less ugly) solution to vendor specific parame=
ters. Instead of using the 'x_' prefix, vendors (have and) will use somethi=
ng else that is unique to them. For example Facebook uses 'fb_' for many of=
 their parameters.

Feedback requested by 4/1 for inclusion in -14.

EHL

--_000_90C41DD21FB7C64BB94121FBBC2E723446564305DEP3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>I would like to =
make the following change to section 8.2:<o:p></o:p></p><p class=3DMsoNorma=
l><o:p>&nbsp;</o:p></p><pre style=3D'page-break-before:always'><span style=
=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp; New request or response para=
meters for use with the authorization<o:p></o:p></span></pre><pre style=3D'=
page-break-before:always'><span style=3D'font-size:12.0pt;color:black'>&nbs=
p;&nbsp; endpoint or the token endpoint are defined and registered in the<o=
:p></o:p></span></pre><pre style=3D'page-break-before:always'><span style=
=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp; parameters registry followin=
g the procedure in <a href=3D"http://tools.ietf.org/html/draft-ietf-oauth-v=
2-13#section-10.2">Section 10.2</a>.<o:p></o:p></span></pre><pre style=3D'p=
age-break-before:always'><span style=3D'font-size:12.0pt;color:black'><o:p>=
&nbsp;</o:p></span></pre><pre style=3D'page-break-before:always'><span styl=
e=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp; Parameter names MUST confor=
m to the param-name ABNF and parameter<o:p></o:p></span></pre><pre style=3D=
'page-break-before:always'><span style=3D'font-size:12.0pt;color:black'>&nb=
sp; &nbsp;values syntax MUST be well-defined (e.g., using ABNF, or a refere=
nce<o:p></o:p></span></pre><pre style=3D'page-break-before:always'><span st=
yle=3D'font-size:12.0pt;color:black'>&nbsp; &nbsp;to the syntax of an exist=
ing parameter).<o:p></o:p></span></pre><pre style=3D'page-break-before:alwa=
ys'><span style=3D'font-size:12.0pt;color:black'><o:p>&nbsp;</o:p></span></=
pre><pre style=3D'page-break-before:always'><span style=3D'font-size:12.0pt=
;color:black'>&nbsp;&nbsp; Unregistered vendor-specific parameter extension=
s that are not commonly<o:p></o:p></span></pre><pre style=3D'page-break-bef=
ore:always'><span style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp; appli=
cable, and are specific to the implementation details of the<o:p></o:p></sp=
an></pre><pre style=3D'page-break-before:always'><span style=3D'font-size:1=
2.0pt;color:black'>&nbsp;&nbsp; authorization server where they are used SH=
OULD utilize a<o:p></o:p></span></pre><pre style=3D'page-break-before:alway=
s'><span style=3D'font-size:12.0pt;color:black'>&nbsp;&nbsp; vendor-specifi=
c prefix that is not likely to conflict with other <o:p></o:p></span></pre>=
<pre style=3D'page-break-before:always'><span style=3D'font-size:12.0pt;col=
or:black'>&nbsp;&nbsp;&nbsp;registered values (e.g. begin with 'companyname=
_').<o:p></o:p></span></pre><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p cl=
ass=3DMsoNormal>This is a more pragmatic (and less ugly) solution to vendor=
 specific parameters. Instead of using the &#8216;x_&#8217; prefix, vendors=
 (have and) will use something else that is unique to them. For example Fac=
ebook uses &#8216;fb_&#8217; for many of their parameters.<o:p></o:p></p><p=
 class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Feedback reque=
sted by 4/1 for inclusion in -14.<o:p></o:p></p><p class=3DMsoNormal><o:p>&=
nbsp;</o:p></p><p class=3DMsoNormal>EHL<o:p></o:p></p></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E723446564305DEP3PW5EX1MB01E_--

From eran@hueniverse.com  Tue Mar 29 16:15:52 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C426A3A6AA2 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:15:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.639
X-Spam-Level: 
X-Spam-Status: No, score=-2.639 tagged_above=-999 required=5 tests=[AWL=-0.040, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3oPzprNR53U3 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:15:52 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 0B0483A6992 for <oauth@ietf.org>; Tue, 29 Mar 2011 16:15:52 -0700 (PDT)
Received: (qmail 30152 invoked from network); 29 Mar 2011 23:17:30 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Mar 2011 23:17:30 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Tue, 29 Mar 2011 16:17:27 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Brian Campbell <bcampbell@pingidentity.com>, oauth <oauth@ietf.org>
Date: Tue, 29 Mar 2011 16:16:02 -0700
Thread-Topic: [OAUTH-WG] Question on scope when refreshing an access token
Thread-Index: AcvuYS16V5Wc0y9ZRRS+/YX+rBktGQABdeOA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564305DF@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <AANLkTimY+d+i3HAWmw=zM02orfocnwWfmK4D3NNfwZLm@mail.gmail.com>
In-Reply-To: <AANLkTimY+d+i3HAWmw=zM02orfocnwWfmK4D3NNfwZLm@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Question on scope when refreshing an access token
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 23:15:52 -0000

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Brian Campbell
> Sent: Tuesday, March 29, 2011 3:32 PM
> To: oauth
> Subject: [OAUTH-WG] Question on scope when refreshing an access token
>=20
> I'm a bit confused by the text at the end of the definition of the scope
> parameter in section 6 on Refreshing an Access Token[1].  It says,
>=20
>         "...  The requested scope MUST be equal or lesser
>          than the scope originally granted by the resource owner, and if
>          omitted is treated as equal to the previously approved scope."
>=20
> In particular, what is the 'previously approved scope'?  Is it the same a=
s the
> originally granted scope?  Or is it the most recent scope successfully
> requested when refreshing? If the latter, does this imply that an AS
> implementation must store both the original scope and the previously
> requested scope? Or is it something else?
>=20
> Perhaps a better question is what is the use case behind this text?  I as=
sume
> it's some kind of down-scoping (& I apologize if this has been discussed
> before and I missed it) but the intent isn't clear to me nor is it clear =
what
> exactly is required by the spec.

Yep, just down-scoping. It is there to make sure that whatever the resource=
 owner approved is always the most permissive scope granted. Do I need to m=
ake it clearer?

EHL

From eran@hueniverse.com  Tue Mar 29 16:27:51 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2980C3A6A3C for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:27:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.638
X-Spam-Level: 
X-Spam-Status: No, score=-2.638 tagged_above=-999 required=5 tests=[AWL=-0.041, BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h9WEUeVVpHXh for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:27:47 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 9D1653A6992 for <oauth@ietf.org>; Tue, 29 Mar 2011 16:27:47 -0700 (PDT)
Received: (qmail 17624 invoked from network); 29 Mar 2011 23:29:26 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Mar 2011 23:29:25 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Tue, 29 Mar 2011 16:29:19 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "fcorella@pomcor.com" <fcorella@pomcor.com>, George Fletcher <gffletch@aol.com>
Date: Tue, 29 Mar 2011 16:29:19 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvuY5mjOcMUL3P3Rf+3yeQl38AergABCX5A
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com>
In-Reply-To: <607231.23702.qm@web55806.mail.re3.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E723446564305E6P3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: OAuth, "Karen P. Lewison" <kplewison@pomcor.com>, WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 23:27:51 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E723446564305E6P3PW5EX1MB01E_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

VHdpdHRlciBhbmQgRmFjZWJvb2sgY2Fu4oCZdCByZXF1aXJlIGFsbCB0aGVpciBhcHBsaWNhdGlv
biBkZXZlbG9wZXJzIHRvIGRlcGxveSBUTFMuIEp1c3Qgbm90IGdvaW5nIHRvIGhhcHBlbi4gSG93
IG1hbnkgY2xpZW50cyB0b2RheSB1c2UgVExTIGZvciB0aGVpciBjYWxsYmFja3M/IEnigJltIGd1
ZXNzaW5nIGxlc3MgdGhhbiBoYWxmLg0KDQpJIGFtIGFkdm9jYXRpbmcgVExTIG9uIHRoZSBzZXJ2
ZXIgc2lkZSwgYmVjYXVzZSBpdCBpcyBhbHJlYWR5IHJlcXVpcmVkIHRoZXJlIGZvciBvdGhlciBl
bmRwb2ludHMuIEJ1dCBvbiB0aGUgY2xpZW50IHRoZXJlIGlzIGN1cnJlbnRseSBubyBzdWNoIHJl
cXVpcmVtZW50cy4gTWFraW5nIHRoZSBjYWxsYmFjayBhIE1VU1QgdXNlIFRMUyBpcyBhIGh1Z2Ug
Y2hhbmdlLg0KDQpFSEwNCg0KRnJvbTogRnJhbmNpc2NvIENvcmVsbGEgW21haWx0bzpmY29yZWxs
YUBwb21jb3IuY29tXQ0KU2VudDogVHVlc2RheSwgTWFyY2ggMjksIDIwMTEgMzo1MCBQTQ0KVG86
IEdlb3JnZSBGbGV0Y2hlcjsgRXJhbiBIYW1tZXItTGFoYXYNCkNjOiBQaGlsIEh1bnQ7IEp1c3Rp
biBSaWNoZXI7IE9BdXRoIFdHOyBLYXJlbiBQLiBMZXdpc29uDQpTdWJqZWN0OiBSRTogW09BVVRI
LVdHXSBXR0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgtdjItMTMudHh0DQoNCj4gQXMgYSBtYXR0ZXIg
b2YgcHJhY3RpY2FsaXR5LCByZXF1aXJpbmcgYWxsIGNsaWVudHMgdG8gZGVwbG95DQo+IHNlcnZl
ci1zaWRlIFRMUyBpcyBhYnN1cmQuIElmIHdlIG1hbmRhdGUgcmVkaXJlY3Rpb25zIFVSSXMgdG8g
dXNlDQo+IGh0dHBzLCB3ZSBhcmUgYmFzaWNhbGx5IG1ha2luZyBldmVyeW9uZSBpZ25vcmUgaXQu
IEl04oCZcyBsaWtlIGEgc3BlZWQNCj4gbGltaXQgc2lnbiBvZiA1bXBoLg0KDQpXaHkgaXMgdGhh
dD8gIENhbiB5b3UgZWxhYm9yYXRlPyAgSSdtIHZlcnkgcHV6emxlZC4gIEFuZCBkaWRuJ3QgeW91
DQpwcm9wb3NlIHJlcXVpcmluZyBUTFMgYSBmZXcgbWVzc2FnZXMgYmFjaz8NCg0KRnJhbmNpc2Nv
DQoNCi0tLSBPbiBUdWUsIDMvMjkvMTEsIEVyYW4gSGFtbWVyLUxhaGF2IDxlcmFuQGh1ZW5pdmVy
c2UuY29tPG1haWx0bzplcmFuQGh1ZW5pdmVyc2UuY29tPj4gd3JvdGU6DQoNCkZyb206IEVyYW4g
SGFtbWVyLUxhaGF2IDxlcmFuQGh1ZW5pdmVyc2UuY29tPG1haWx0bzplcmFuQGh1ZW5pdmVyc2Uu
Y29tPj4NClN1YmplY3Q6IFJFOiBbT0FVVEgtV0ddIFdHTEMgb24gZHJhZnQtaWV0Zi1vYXV0aC12
Mi0xMy50eHQNClRvOiAiR2VvcmdlIEZsZXRjaGVyIiA8Z2ZmbGV0Y2hAYW9sLmNvbTxtYWlsdG86
Z2ZmbGV0Y2hAYW9sLmNvbT4+LCAiZmNvcmVsbGFAcG9tY29yLmNvbTxtYWlsdG86ZmNvcmVsbGFA
cG9tY29yLmNvbT4iIDxmY29yZWxsYUBwb21jb3IuY29tPG1haWx0bzpmY29yZWxsYUBwb21jb3Iu
Y29tPj4NCkNjOiAiUGhpbCBIdW50IiA8cGhpbC5odW50QG9yYWNsZS5jb208bWFpbHRvOnBoaWwu
aHVudEBvcmFjbGUuY29tPj4sICJKdXN0aW4gUmljaGVyIiA8anJpY2hlckBtaXRyZS5vcmc8bWFp
bHRvOmpyaWNoZXJAbWl0cmUub3JnPj4sICJPQXV0aCBXRyIgPG9hdXRoQGlldGYub3JnPG1haWx0
bzpvYXV0aEBpZXRmLm9yZz4+LCAiS2FyZW4gUC4gTGV3aXNvbiIgPGtwbGV3aXNvbkBwb21jb3Iu
Y29tPG1haWx0bzprcGxld2lzb25AcG9tY29yLmNvbT4+DQpEYXRlOiBUdWVzZGF5LCBNYXJjaCAy
OSwgMjAxMSwgNzo0NiBQTQ0KDQpBcyBhIG1hdHRlciBvZiBwcmFjdGljYWxpdHksIHJlcXVpcmlu
ZyBhbGwgY2xpZW50cyB0byBkZXBsb3kgc2VydmVyLXNpZGUgVExTIGlzIGFic3VyZC4gSWYgd2Ug
bWFuZGF0ZSByZWRpcmVjdGlvbnMgVVJJcyB0byB1c2UgaHR0cHMsIHdlIGFyZSBiYXNpY2FsbHkg
bWFraW5nIGV2ZXJ5b25lIGlnbm9yZSBpdC4gSXTigJlzIGxpa2UgYSBzcGVlZCBsaW1pdCBzaWdu
IG9mIDVtcGguDQoNCg0KDQpFSEwNCg0KDQoNCkZyb206IEdlb3JnZSBGbGV0Y2hlciBbbWFpbHRv
OmdmZmxldGNoQGFvbC5jb21dDQpTZW50OiBUdWVzZGF5LCBNYXJjaCAyOSwgMjAxMSAxMDo1NSBB
TQ0KVG86IGZjb3JlbGxhQHBvbWNvci5jb20NCkNjOiBQaGlsIEh1bnQ7IEp1c3RpbiBSaWNoZXI7
IEVyYW4gSGFtbWVyLUxhaGF2OyBPQXV0aCBXRzsgS2FyZW4gUC4gTGV3aXNvbg0KU3ViamVjdDog
UmU6IFtPQVVUSC1XR10gV0dMQyBvbiBkcmFmdC1pZXRmLW9hdXRoLXYyLTEzLnR4dA0KDQoNCg0K
SGkgRnJhbmNpc2NvLA0KDQpTbyB0aGUgZXhhbXBsZXMgdGhhdCBKdXN0aW4gZ2F2ZSB3ZXJlIGVp
dGhlciBsb2NhbGhvc3Qgb3Igbm9uIEhUVFAgYmFzZWQgc2NoZW1lcy4gSWYgT0F1dGgyIGlzIHRv
IHN1cHBvcnQgdGhlc2Ugb3RoZXIgc2NoZW1lcyAob2Z0ZW4gdXNlZCBpbiBtb2JpbGUgY2xpZW50
cykgdGhlbiBJJ20gbm90IHN1cmUgaG93IFRMUyBjYW4gYmUgYSBNVVNUIHVubGVzcyBpdCdzIHF1
YWxpZmllZCB0byBhcHBseSB0byBIVFRQIGJhc2VkIFVSTHMgb25seS4NCg0KSXMgaXQgc3VmZmlj
aWVudCB0byBkb2N1bWVudCB0aGlzIHBvc3NpYmxlIGV4cG9zdXJlIGluIHRoZSBzZWN1cml0eSBz
ZWN0aW9uIHN1Y2ggdGhhdCB0aGUgc3BlYyBkb2Vzbid0IHByZWNsdWRlIHRoZSB1c2Ugb2YgT0F1
dGgyIHdpdGggbm9uIEhUVFAgYmFzZWQgcmVkaXJlY3RfdXJpPw0KDQpUaGFua3MsDQpHZW9yZ2UN
Cg0KT24gMy8yOS8xMSAxOjA1IFBNLCBGcmFuY2lzY28gQ29yZWxsYSB3cm90ZToNCg0KRXJhbiwN
Cg0KSXQncyBub3QgYSByZWFzb25hYmxlIGNvbXByb21pc2UuICAjMiBNVVNUIHVzZSB0bHMgVU5M
RVNTIG9mIGNvdXJzZSBpdCB0YXJnZXRzIGxvY2FsaG9zdC4gIElmICMyIGlzIHNlbnQgd2l0aG91
dCBUTFMgdG8gYSBXZWIgc2VydmVyLCB0aGUgYXV0aG9yaXphdGlvbiBjb2RlIGNhbiBiZSBlYXNp
bHkgaW50ZXJjZXB0ZWQgYnkgYW4gYXR0YWNrZXIuICBUaGUgYXR0YWNrZXIgY2FuIHRoZW4gdXNl
IGl0IHRvIG9idGFpbiBwcm90ZWN0ZWQgcmVzb3VyY2VzIGJ5IHN1Ym1pdHRpbmcgdGhlIGF1dGhv
cml6YXRpb24gY29kZSB0byB0aGUgY2xpZW50LiAgKFRoaXMgaXMgaW5kZXBlbmRlbnQgb2Ygd2hl
dGhlciB0aGUgY2xpZW50IGF1dGhlbnRpY2F0ZXMgaXRzZWxmIHdoZW4gZXhjaGFuZ2luZyB0aGUg
YXV0aG9yaXphdGlvbiBjb2RlIGZvciBhbiBhY2Nlc3MgdG9rZW4gb3Igbm90LikgSW4gdGhlIEZh
Y2Vib29rIHVzZSBjYXNlLCB0aGUgYXR0YWNrZXIgY2FuIHVzZSB0aGUgYXV0aG9yaXphdGlvbiBj
b2RlIHRvIGxvZyBpbiB0byB0aGUgY2xpZW50IHVzaW5nIHRoZSB1c2VyJ3MgRmFjZWJvb2sgaWRl
bnRpdHkuICBJIGJlbGlldmUgdGhpcyB2dWxuZXJhYmlsaXR5IGV4aXN0cyBpbiBtYW55IGltcGxl
bWVudGF0aW9ucyBvZiB0aGUgRmFjZWJvb2sgbG9naW4gYnV0dG9uIHRvZGF5Lg0KDQpCdHcsIEkn
dmUgcG9pbnRlZCB0aGlzIG91dCBiZWZvcmUgdGhyZWUgb3IgZm91ciB0aW1lcyBvbiB0aGlzIG1h
aWxpbmcgbGlzdCwgaW5jbHVkaW5nIGluIGEgcmVzcG9uc2UgdG8gdGhlIFdHTEMgdGhhdCB5b3Ug
bmV2ZXIgcmVwbGllZCB0by4NCg0KRnJhbmNpc2NvDQoNCi0tLSBPbiBNb24sIDMvMjgvMTEsIEVy
YW4gSGFtbWVyLUxhaGF2IDxlcmFuQGh1ZW5pdmVyc2UuY29tPjwvbWMvY29tcG9zZT90bz1lcmFu
QGh1ZW5pdmVyc2UuY29tPiB3cm90ZToNCg0KRnJvbTogRXJhbiBIYW1tZXItTGFoYXYgPGVyYW5A
aHVlbml2ZXJzZS5jb20+PC9tYy9jb21wb3NlP3RvPWVyYW5AaHVlbml2ZXJzZS5jb20+DQpTdWJq
ZWN0OiBSZTogW09BVVRILVdHXSBXR0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgtdjItMTMudHh0DQpU
bzogIlBoaWwgSHVudCIgPHBoaWwuaHVudEBvcmFjbGUuY29tPjwvbWMvY29tcG9zZT90bz1waGls
Lmh1bnRAb3JhY2xlLmNvbT4sICJKdXN0aW4gUmljaGVyIiA8anJpY2hlckBtaXRyZS5vcmc+PC9t
Yy9jb21wb3NlP3RvPWpyaWNoZXJAbWl0cmUub3JnPg0KQ2M6ICJPQXV0aCBXRyIgPG9hdXRoQGll
dGYub3JnPjwvbWMvY29tcG9zZT90bz1vYXV0aEBpZXRmLm9yZz4NCkRhdGU6IE1vbmRheSwgTWFy
Y2ggMjgsIDIwMTEsIDEwOjI4IFBNDQoNClRoZSBjb2RlIGlzIHJldHVybmVkIGluIHR3byBzdGVw
czoNCg0KMS4gVGhlIGF1dGhvcml6YXRpb24gc2VydmVyIHJlcGxpZXMgdG8gdGhlIHVzZXItYWdl
bnQgcmVxdWVzdCAocHJvdmlkaW5nIGF1dGhvcml6YXRpb24pIHdpdGggYSByZWRpcmVjdGlvbiBp
bnN0cnVjdGlvbiB0eXBpY2FsbHkgdXNpbmcgdGhlIExvY2F0aW9uIHJlc3BvbnNlIGhlYWRlciBm
aWVsZC4NCjIuIFRoZSB1c2VyLWFnZW50IG1ha2VzIGFuIEhUVFAgR0VUIHJlcXVlc3QgdG8gdGhl
IHByb3ZpZGVkIGxvY2F0aW9uICh3aGljaCBtYXkgYmUgc29tZXRoaW5nIG90aGVyIHRoYW4gYW4g
SFRUUCBVUkksIG9yIGFuIEhUVFAgVVJJIHRvIGxvY2FsaG9zdCkuDQoNCiMxIGlzIGFuIEhUVFAg
cmVzcG9uc2UgdG8gYSB1c2VyLWFnZW50IHJlcXVlc3QgdG8gdGhlIGF1dGhvcml6YXRpb24gZW5k
cG9pbnQgKG9yIGEgc3Vic2VxdWVudCBvbmUgaWYgdGhlIHNlcnZlciBpbXBsZW1lbnRhdGlvbiBo
YXMgbXVsdGlwbGUgYXV0aG9yaXphdGlvbiBzdGVwcykuDQoNCiMyIGlzIGFuIEhUVFAgcmVxdWVz
dCBtYWRlIGJ5IHRoZSB1c2VyLWFnZW50Lg0KDQpJbiBvcmRlciBmb3IgdGhlIGNvZGUgdG8gYmUg
c2VjdXJlIGVuZC10by1lbmQsIGJvdGggc3RlcHMgbXVzdCB1c2UgVExTLiBUaGUgYXJndW1lbnRz
IG1hZGUgYWdhaW5zdCBtYWtpbmcgVExTIHJlcXVpcmVkIGFyZSBiYXNlZCBvbiB1c2UgY2FzZXMg
Zm9yICMyLiBXZSBjYW4gbWFrZSAjMSAodGhlIGF1dGhvcml6YXRpb24gZW5kcG9pbnQgcmVxdWly
ZSBUTFMgc2luY2UgaXQgYWxyZWFkeSBoYXMgdG8gc3VwcG9ydCBpdCBmb3IgdGhlICd0b2tlbicg
cmVzcG9uc2UgdHlwZS4gV2Ugc2hvdWxkIG1ha2UgY2FsbGJhY2tzIGEgU0hPVUxEIGZvciBUTFMu
DQoNCkRvZXMgdGhpcyBzb3VuZCBsaWtlIGEgcmVhc29uYWJsZSBjb21wcm9taXNlPw0KDQpFSEwN
Cg0KPiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPiBGcm9tOiBQaGlsIEh1bnQgW21haWx0
bzpwaGlsLmh1bnRAb3JhY2xlLmNvbV08bWFpbHRvOlttYWlsdG86cGhpbC5odW50QG9yYWNsZS5j
b21dPg0KPiBTZW50OiBNb25kYXksIE1hcmNoIDI4LCAyMDExIDI6MjggUE0NCj4gVG86IEp1c3Rp
biBSaWNoZXINCj4gQ2M6IEVyYW4gSGFtbWVyLUxhaGF2OyBPQXV0aCBXRw0KPiBTdWJqZWN0OiBS
ZTogW09BVVRILVdHXSBXR0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgtdjItMTMudHh0DQo+DQo+IFRo
aXMgd2FzIHJlZmVycmluZyB0byBzZWN0aW9uIDIuMSB0aGF0IHRoZSBhdXRob3JpemF0aW9uIHNl
cnZlciBtdXN0IHVzZSBUTFMNCj4gd2hlbiByZXR1cm5pbmcgYW4gYXV0aG9yaXphdGlvbiBjb2Rl
Lg0KPg0KPiBJZiBpdCBkb2Vzbid0IHVzZSBUTFMgdGhlbiB0aGUgY29kZSBiZWluZyByZXR1cm5l
ZCB0byB0aGUgY2xpZW50IGNhbiBiZQ0KPiBpbnRlcmNlcHRlZC4NCj4NCj4gT3IgZGlkIEkgbWlz
cyBzb21ldGhpbmc/DQo+DQo+IFBoaWwNCj4gcGhpbC5odW50QG9yYWNsZS5jb208bWFpbHRvOnBo
aWwuaHVudEBvcmFjbGUuY29tPg0KPg0KPg0KPg0KPg0KPiBPbiAyMDExLTAzLTI4LCBhdCAxOjM3
IFBNLCBKdXN0aW4gUmljaGVyIHdyb3RlOg0KPg0KPiA+IFBoaWwsDQo+ID4NCj4gPiBUaGUgbWFp
biBkaWZmZXJlbmNlIGlzIHRoYXQgaXQncyBhIHJlcXVpcmVtZW50IG9uIHRoZSAqY2xpZW50KiBp
bnN0ZWFkDQo+ID4gb2YgdGhlICpwcm92aWRlciogc2lkZSBvZiB0aGUgZXF1YXRpb24sIGFuZCBj
bGllbnRzIGFyZW4ndCBhbHdheXMgZXZlbg0KPiA+IHNwZWFraW5nIEhUVFAuIEkgYWdyZWUgdGhh
dCBhbGwgY2xpZW50IHdlYiBzZXJ2ZXJzIFNIT1VMRCBkbyBpdC4gQQ0KPiA+IHBhcnRpY3VsYXIg
cHJvdmlkZXIgY2FuIGV2ZW4gUkVRVUlSRSBpdCBmb3IgdGhlaXIgcmVnaXN0ZXJlZCBjbGllbnRz
LA0KPiA+IGEgc3RlcCB0aGF0IGlzIG91dHNpZGUgdGhlIHNjb3BlIG9mIE9BdXRoLiBCdXQgdGhl
cmUgYXJlIHJlYWwsIGluLXVzZQ0KPiA+IHBhdHRlcm5zIHRoYXQgZG9uJ3QgcmVxdWlyZSB0aGUg
Y2xpZW50IHRvIG1ha2UgYW4gSFRUUCByZXF1ZXN0IHRvIGFuDQo+ID4gZXh0ZXJuYWwgc2Vydmlj
ZS4NCj4gPg0KPiA+IEkgZG9uJ3Qgc2VlIGhvdyBGaXJlc2hlZXAgaXMgcmVsZXZhbnQgdG8gdGhp
cyBkaXNjdXNzaW9uIC0tIGlmIHlvdXINCj4gPiBicm93c2VyIGlzIG1ha2luZyBhIGNhbGwgdG8g
bG9jYWxob3N0IHRvIGdldCB0aGUgdG9rZW4sIHdobyBvdXRzaWRlIG9mDQo+ID4geW91ciBtYWNo
aW5lIGlzIGdvaW5nIHRvIGRvIGl0PyBJJ20gbm90IHRhbGtpbmcgYWJvdXQgY29udmVuaWVuY2Ug
Zm9yDQo+ID4gZGV2ZWxvcGVycyBoZXJlICh3aGljaCBJIHdvdWxkIGFyZ3VlIHNob3VsZCBOT1Qg
YmUgZGlzY291bnRlZCwgYnV0DQo+ID4gdGhhdCdzIGFub3RoZXIgYXJndW1lbnQpLCBJJ20gdGFs
a2luZyBhYm91dCBjYXNlcyB3aGVyZSB0aGUgYnJvd3Nlcg0KPiA+IGlzbid0IGdvaW5nIG91dHNp
ZGUgb2YgYSB0cnVzdGVkIHNlY3VyaXR5IGJvdW5kYXJ5LiBUaGVyZSBhcmUgYWxzbw0KPiA+IGlu
c3RhbmNlcyB3aGVyZSB0aGVyZSBtYXkgbm90IGV2ZW4gYmUgYW4gSFRUUCB0cmFuc2FjdGlvbiBp
bnZvbHZlZCwNCj4gPiBsZXQgYWxvbmUgb25lIHRoYXQgY291bGQgc3VwcG9ydCBUTFMuDQo+ID4N
Cj4gPiAtLSBKdXN0aW4NCj4gPg0KPiA+IE9uIE1vbiwgMjAxMS0wMy0yOCBhdCAxNjoyNSAtMDQw
MCwgUGhpbCBIdW50IHdyb3RlOg0KPiA+PiBKdXN0aW4sIEhvdyBpcyB0aGF0IHNvPyBSZW1lbWJl
ciBmaXJlc2hlZXA/ICBJIHdvdWxkbid0IHdhbnQgdGhlDQo+IGF1dGhvcml6YXRpb24gY29kZSBi
ZWluZyBleGNoYW5nZWQgd2l0aG91dCBUTFMgaW4gYSBjYWZlLiBJbnRlcmNlcHQgaXMganVzdA0K
PiB0b28gZWFzeS4gQW5kIGFzIEkgbWVudGlvbmVkIGVhcmxpZXIsIGNsaWVudCBjcmVkZW50aWFs
cyBhcmUgYWxyZWFkeSB2ZXJ5IHdlYWsNCj4gaW4gbWFueSBjYXNlcy4gSW4gY29udHJhc3QsIHR3
byB3ZWIgc2VydmVycyBhcmUgaGFyZCB0byBzbmlmZiB1bmxlc3MgeW91IGFyZQ0KPiBhYmxlIHRv
IGdhaW4gYWNjZXNzIHRvIHRoZWlyIG5ldHdvcmsgY29tbXVuaWNhdGlvbnMgcGF0aC4NCj4gPj4N
Cj4gPj4gQXMgZm9yIHRlc3RpbmcsIGl0IHNlZW1zIG1vcmUgcmVhc29uYWJsZSB0byBwdXQgc2Vy
dmVycyBpbiB0ZW1wb3Jhcnkgbm9uLQ0KPiBjb21wbGlhbmNlIHdoaWxlIHRlc3RpbmcgcmF0aGVy
IHRoZW4gYWxsb3cgbm9uLXNlY3VyZSBzZXJ2ZXJzIGluIHByb2R1Y3Rpb24NCj4gYmVjYXVzZSBv
ZiB0aGUgU0hPVUxEIGxvb3Bob2xlLg0KPiA+Pg0KPiA+PiBBbHNvLCB3aGlsZSBpdCBkb2VzIHNl
ZW0gY29udmVuaWVudCBmb3IgdGhlIGRldmVsb3BlciBub3QgdG8gaGF2ZSB0byB1c2UNCj4gVExT
IGZvciBhdXRoeiBjb2Rlcywgbm90ZSB0aGF0IHRoZSBkZXZlbG9wZXIgc3RpbGwgaGFzIHRvIGhh
dmUgVExTIGVuYWJsZWQNCj4gd2hlbiBleGNoYW5naW5nIHRoZSBjb2RlIGZvciBhbiBhY2Nlc3Mg
dG9rZW4uIFNvIEknbSBub3Qgc3VyZSBob3cgcmVsYXhpbmcNCj4gVExTIGZvciBvYnRhaW5pbmcg
YXV0aG9yaXphdGlvbiBhY3R1YWxseSBzaW1wbGlmaWVzIHRoZSBkZXZlbG9wZXIgbGlmZWN5Y2xl
IHNpbmNlDQo+IHRoZXkgc3RpbGwgaGF2ZSB0byBzZXQgaXQgdXAgdG8gdGVzdCB0aGUgb3RoZXIg
cGFydHMuICBJbiBteSB2aWV3LCBpdCB3b3VsZCBiZSBvaw0KPiBmb3IgYSBkZXZlbG9wZXIgdG8g
dGVtcG9yYXJpbHkgZGlzYWJsZSBUTFMgZXZlcnl3aGVyZSBkdXJpbmcgZGV2ZWxvcG1lbnQgLQ0K
PiAtIHdoaWNoIHBsYWNlcyBvcGVyYXRpb24gb3V0c2lkZSBSRkMgY29tcGxpYW5jZSB3aGlsZSBk
ZXZlbG9waW5nIC0tIGJ1dA0KPiBmb3JjZXMgY29tcGxpYW5jZSBvbmNlIHRoZXkgZ28gaW50byBw
cm9kdWN0aW9uLg0KPiA+Pg0KPiA+PiBJdCBzZWVtcyBsaWtlIEkgaGFkIHRvIGdpdmUgYSBwcmV0
dHkgc3Vic3RhbnRpYWwganVzdGlmaWNhdGlvbiBhbmQgd2UgYmFja2VkDQo+IG9mZiBiZWNhdXNl
IFRMUyBpcyBzZWVuIGFzIGluY29udmVuaWVudC4gSSB0aGluayB3ZSBuZWVkIG1vcmUgZXZpZGVu
Y2UgdGhhdA0KPiB0aGVyZSBhcmUgc2FmZSBjYXNlcyB0aGF0IGRvbid0IG5lZWQgVExTLg0KPiA+
Pg0KPiA+PiBTb3JyeSBmb3IgcHVzaGluZyBoYXJkIG9uIHRoaXMgb25lLCBidXQgVExTIGlzIHRo
ZSBiYWNrYm9uZSBvZiBPQXV0aA0KPiBzZWN1cml0eSBhdCBwcmVzZW50Lg0KPiA+Pg0KPiA+PiBQ
aGlsDQo+ID4+IHBoaWwuaHVudEBvcmFjbGUuY29tPG1haWx0bzpwaGlsLmh1bnRAb3JhY2xlLmNv
bT4NCj4gPj4NCj4gPj4NCj4gPj4NCj4gPj4NCj4gPj4gT24gMjAxMS0wMy0yOCwgYXQgMTI6NTIg
UE0sIEVyYW4gSGFtbWVyLUxhaGF2IHdyb3RlOg0KPiA+Pg0KPiA+Pj4gTm8gY2hhbmdlIHRoZW4u
IEJ1dCB0aGUgc2VjdXJpdHkgY29uc2lkZXJhdGlvbnMgc2VjdGlvbiBtdXN0IHJlZmxlY3QNCj4g
dGhpcy4NCj4gPj4+DQo+ID4+PiBFSEwNCj4gPj4+DQo+ID4+Pj4gLS0tLS1PcmlnaW5hbCBNZXNz
YWdlLS0tLS0NCj4gPj4+PiBGcm9tOiBKdXN0aW4gUmljaGVyIFttYWlsdG86anJpY2hlckBtaXRy
ZS5vcmddPG1haWx0bzpbbWFpbHRvOmpyaWNoZXJAbWl0cmUub3JnXT4NCj4gPj4+PiBTZW50OiBN
b25kYXksIE1hcmNoIDI4LCAyMDExIDEwOjA1IEFNDQo+ID4+Pj4gVG86IEVyYW4gSGFtbWVyLUxh
aGF2DQo+ID4+Pj4gQ2M6IFBoaWwgSHVudDsgT0F1dGggV0cNCj4gPj4+PiBTdWJqZWN0OiBSZTog
W09BVVRILVdHXSBXR0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgtdjItMTMudHh0DQo+ID4+Pj4NCj4g
Pj4+PiBXaGF0IGFib3V0IG5vbi1odHRwIHJldHVybiB1cmkncywgb3IgY2xpZW50LWxvY2FsaG9z
dCwgc3VjaCBhcw0KPiA+Pj4+DQo+ID4+Pj4gc29tZWFwcDovL2FwcC8/Y29kZT1mb28NCj4gPj4+
Pg0KPiA+Pj4+IGh0dHA6Ly9sb2NhbGhvc3Q6ODczNDUvP2NvZGU9Zm9vDQo+ID4+Pj4NCj4gPj4+
PiBIVFRQUyBtYWtlcyBzZW5zZSB3aGVuIHlvdSdyZSB0YWxraW5nIGJldHdlZW4gdHdvIHdlYiBz
ZXJ2ZXJzLCBidXQNCj4gPj4+PiBpdCBzZWVtcyB0byBmYWxsIGFwYXJ0IG90aGVyd2lzZS4gSSB0
aGluayBTSE9VTEQgaXMgYXBwcm9wcmlhdGUgaGVyZS4NCj4gPj4+Pg0KPiA+Pj4+IC0tIEp1c3Rp
bg0KPiA+Pj4+DQo+ID4+Pj4NCj4gPj4+PiBPbiBGcmksIDIwMTEtMDMtMjUgYXQgMTY6MDMgLTA0
MDAsIEVyYW4gSGFtbWVyLUxhaGF2IHdyb3RlOg0KPiA+Pj4+PiBVbmxlc3Mgc29tZW9uZSBoYXMg
YW4gb2JqZWN0aW9uLCBJJ2xsIG1ha2UgdGhlIGNoYW5nZSBmcm9tIFNIT1VMRA0KPiA+Pj4+PiB0
bw0KPiA+Pj4+IE1VU1QuDQo+ID4+Pj4+DQo+ID4+Pj4+IEVITA0KPiA+Pj4+Pg0KPiA+Pj4+Pj4g
LS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCj4gPj4+Pj4+IEZyb206IFBoaWwgSHVudCBbbWFp
bHRvOnBoaWwuaHVudEBvcmFjbGUuY29tXTxtYWlsdG86W21haWx0bzpwaGlsLmh1bnRAb3JhY2xl
LmNvbV0+DQo+ID4+Pj4+PiBTZW50OiBGcmlkYXksIE1hcmNoIDI1LCAyMDExIDEyOjQyIFBNDQo+
ID4+Pj4+PiBUbzogRXJhbiBIYW1tZXItTGFoYXYNCj4gPj4+Pj4+IENjOiBPQXV0aCBXRzsgQ2h1
Y2sgJiBNYXJhIE1vcnRpbW9yZQ0KPiA+Pj4+Pj4gU3ViamVjdDogUmU6IFtPQVVUSC1XR10gV0dM
QyBvbiBkcmFmdC1pZXRmLW9hdXRoLXYyLTEzLnR4dA0KPiA+Pj4+Pj4NCj4gPj4+Pj4+IFJlZ2Fy
ZGluZyB0aGUgbWVzc2FnZTogaHR0cDovL3d3dy5pZXRmLm9yZy9tYWlsLQ0KPiA+Pj4+Pj4gYXJj
aGl2ZS93ZWIvb2F1dGgvY3VycmVudC9tc2cwNTc2Mi5odG1sICAoc29ycnkgSSBzb21laG93IGxv
c3QNCj4gPj4+Pj4+IHRoZSBtZXNzYWdlIGluIG15IGVtYWlsKS4NCj4gPj4+Pj4+DQo+ID4+Pj4+
PiBUaGlzIGlzc3VlIGlzIHRoZWZ0IG9mIHRoZSBhdXRob3JpemF0aW9uIGNvZGUgZHVyaW5nIHRo
ZSByZWRpcmVjdC4NCj4gPj4+Pj4+IEF1dGhlbnRpY2F0aW5nIHRoZSBjbGllbnQgaXMgYW4gaW1w
b3J0YW50IGZlYXR1cmUgYW5kIGdvZXMgYSBsb25nDQo+ID4+Pj4+PiB3YXksIGJ1dCBpdCBpcyBu
b3Qgc3VmZmljaWVudCBzaW5jZSBpbiBtYW55IGNhc2VzLCB0aGUNCj4gPj4+Pj4+IGNsaWVudF9p
ZC9jbGllbnRfc2VjcmV0IHdpbGwgbGlrZWx5IGJlIGhhcmQgY29kZWQgYW5kIHJlbGF0aXZlbHkN
Cj4gPj4+Pj4+IGVhc3kgdG8gZGVkdWNlIChlLmcuIG1vYmlsZSBjbGllbnQgYXBwcykuICBPZiBj
b3Vyc2UgYSBzdHJvbmcNCj4gPj4+Pj4+IGNsaWVudCBhdXRoZW50aWNhdGlvbiB3b24ndCBoYXZl
IHRoaXMgaXNzdWUuIFRoaXMgbWFrZXMgbWFueQ0KPiA+Pj4+Pj4gY29uc3VtZXIgc2l0dWF0aW9u
cyB2ZXJ5IHN1c2NlcHRpYmxlIHRvIGFuIGF0dGFjayB3aGVyZSB0aGUNCj4gPj4+Pj4+IGF1dGhv
cml6YXRpb24gY29kZSBpcw0KPiA+Pj4+IGludGVyY2VwdGVkLg0KPiA+Pj4+Pj4NCj4gPj4+Pj4+
IEZvciBtb3JlIGluZm9ybWF0aW9uIGxvb2sgYXQgdGhlIFNBTUwgQXJ0aWZhY3QgaXNzdWVzIGlu
IHNlY3Rpb24NCj4gPj4+Pj4+IDYuNSAoc3BlY2lmaWNhbGx5IHN0b2xlbiBhcnRpZmFjdCwgcmVw
bGF5LCBldGMpIG9mIHRoaXMgZG9jdW1lbnQ6DQo+ID4+Pj4+PiBodHRwOi8vZG9jcy5vYXNpcy0N
Cj4gPj4+Pj4+IG9wZW4ub3JnL3NlY3VyaXR5L3NhbWwvdjIuMC9zYW1sLXNlYy1jb25zaWRlci0y
LjAtb3MucGRmDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gVGhlcmUgYXJlIGEgbnVtYmVyIG9mIHJlbWVk
aWF0aW9ucyBzdWdnZXN0ZWQgKHNtYWxsIGxpZmV0aW1lLA0KPiA+Pj4+Pj4gc2luZ2xlIHVzZSks
IGJ1dCB0aGUgZm91bmRhdGlvbmFsIG9uZSBpcyBjb25maWRlbnRpYWxpdHkgb2YgdGhlDQo+ID4+
Pj4+PiBleGNoYW5nZSAoVExTKS4gSGVuY2UgdGhlIHJlY29tbWVuZGF0aW9uIHRoYXQgdGhlIHJl
dHVybiBvZiBhbg0KPiA+Pj4+Pj4gYXV0aG9yaXphdGlvbiBjb2RlIGJlIGtlcHQgc2VjdXJlIHdp
dGggYSBNVVNUIGZvciBUTFMuDQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4gUGhpbA0KPiA+Pj4+Pj4gcGhp
bC5odW50QG9yYWNsZS5jb208bWFpbHRvOnBoaWwuaHVudEBvcmFjbGUuY29tPg0KPiA+Pj4+Pj4N
Cj4gPj4+Pj4+DQo+ID4+Pj4+Pg0KPiA+Pj4+Pj4NCj4gPj4+Pj4+IE9uIDIwMTEtMDMtMjQsIGF0
IDc6MjIgUE0sIENodWNrIE1vcnRpbW9yZSB3cm90ZToNCj4gPj4+Pj4+DQo+ID4+Pj4+Pj4NCj4g
Pj4+Pj4+PiBPbiBNYXIgMjQsIDIwMTEsIGF0IDY6MzYgUE0sICJFcmFuIEhhbW1lci1MYWhhdiIN
Cj4gPj4+Pj4+IDxlcmFuQGh1ZW5pdmVyc2UuY29tPG1haWx0bzplcmFuQGh1ZW5pdmVyc2UuY29t
Pj4gd3JvdGU6DQo+ID4+Pj4+Pj4NCj4gPj4+Pj4+Pj4NCj4gPj4+Pj4+Pj4+IC0tLS0tT3JpZ2lu
YWwgTWVzc2FnZS0tLS0tDQo+ID4+Pj4+Pj4+PiBGcm9tOiBvYXV0aC1ib3VuY2VzQGlldGYub3Jn
PG1haWx0bzpvYXV0aC1ib3VuY2VzQGlldGYub3JnPiBbbWFpbHRvOm9hdXRoPC9tYy9jb21wb3Nl
P3RvPW9hdXRoPi0NCj4gYm91bmNlc0BpZXRmLm9yZzxtYWlsdG86Ym91bmNlc0BpZXRmLm9yZz5d
DQo+ID4+Pj4+Pj4+PiBPbiBCZWhhbGYgT2YgQ2h1Y2sgTW9ydGltb3JlDQo+ID4+Pj4+Pj4+PiBT
ZW50OiBNb25kYXksIE1hcmNoIDE0LCAyMDExIDY6MTAgUE0NCj4gPj4+Pj4+Pj4NCj4gPj4+Pj4+
Pj4+IDEpIEknZCB2b3RlIGZvciBkcm9wcGluZyB0aGUgZm9sbG93aW5nIGZyb20gMS40LjIuICAg
SW4gdHVybiBJJ2QNCj4gZGlzY3Vzcw0KPiA+Pj4+IHNvbWUNCj4gPj4+Pj4+IG9mDQo+ID4+Pj4+
Pj4+PiB0aGUgc2VjdXJpdHkgY29uc2lkZXJhdGlvbnMsIHN1Y2ggYXMgZGlmZmljdWx0eSBvZiBw
cm90ZWN0aW5nDQo+ID4+Pj4+Pj4+PiBhIGNsaWVudF9zZWNyZXQgaW4gYWxtb3N0IGFsbCB1c2Ut
Y2FzZXMgb2YgdGhpcyBwcm9maWxlLg0KPiA+Pj4+Pj4+Pj4NCj4gPj4+Pj4+Pj4+ICAiSW1wbGlj
aXQgZ3JhbnRzIGltcHJvdmUgdGhlIHJlc3BvbnNpdmVuZXNzIGFuZCBlZmZpY2llbmN5IG9mDQo+
ID4+Pj4+Pj4+PiBzb21lIGNsaWVudHMgKHN1Y2ggYXMgYSBjbGllbnQgaW1wbGVtZW50ZWQgYXMg
YW4gaW4tYnJvd3Nlcg0KPiA+Pj4+Pj4+Pj4gYXBwbGljYXRpb24pIHNpbmNlIGl0IHJlZHVjZXMg
dGhlIG51bWJlciBvZiByb3VuZCB0cmlwcw0KPiA+Pj4+Pj4+Pj4gcmVxdWlyZWQgdG8gb2J0YWlu
IGFuIGFjY2VzcyB0b2tlbi4iDQo+ID4+Pj4+Pj4+DQo+ID4+Pj4+Pj4+IFdoeSBkcm9wIGl0PyBX
aGF0IGFib3V0IGl0IGlzbid0IGFjY3VyYXRlPw0KPiA+Pj4+Pj4+DQo+ID4+Pj4+Pj4gSXQncyBh
Y2N1cmF0ZSwgYnV0IG15IG9waW5pb24gaXMgaXQgc2VuZHMgdGhlIHdyb25nIG1lc3NhZ2UuICAg
SXQncw0KPiBjbGVhcmx5DQo+ID4+Pj4gdGhlDQo+ID4+Pj4+PiBsZXNzIHNlY3VyZSBvZiB0aGUg
cmVzcG9uc2UgdHlwZXMuICBCeSBwb3NpdGlvbmluZyBpdCBhcyB0aGUgbW9zdA0KPiA+Pj4+Pj4g
cGVyZm9ybWFudCBwZW9wbGUgbWF5IGZpbmQgdGhhdCBhdHRyYWN0aXZlIGFuZCBtYWtlIHRoZSB3
cm9uZw0KPiA+Pj4+Pj4gc2VjdXJpdHkNCj4gPj4+PiBkZWNpc2lvbi4NCj4gPj4+Pj4+Pg0KPiA+
Pj4+Pj4+DQo+ID4+Pj4+Pj4+DQo+ID4+Pj4+Pj4+PiAyKSBTZWN0aW9uIDIuMSwgd2Ugc2hvdWxk
IE1VU1QgVExTIGV2ZW4gZm9yIEF1dGhvcml6YXRpb24gQ29kZS4NCj4gPj4+Pj4+Pj4NCj4gPj4+
Pj4+Pj4gV2h5PyBXaGF0J3MgdGhlIGF0dGFjayB2ZWN0b3I/DQo+ID4+Pj4+Pj4NCj4gPj4+Pj4+
PiBTZWUgUGhpbHMgY29tbWVudCBvbiBwYXN0IGV4cGVyaWVuY2Ugd2l0aCBhcnRpZmFjdCBiaW5k
aW5ncy4NCj4gPj4+Pj4+PiBTcGVjIHNob3VsZA0KPiA+Pj4+Pj4gZGVmYXVsdCBmb3Igc2VjdXJp
dHkgYWx3YXlzIG9uLCBhbmQgbGV0IGRlcGxveW1lbnRzIHRoYXQgZG9uJ3QNCj4gPj4+Pj4+IHdh
bnQgdG8gdXNlIEhUVFBzIHNpbXBseSBiZSBub24tY29uZm9ybWFudC4NCj4gPj4+Pj4+Pg0KPiA+
Pj4+Pj4+Pg0KPiA+Pj4+Pj4+Pj4gMykgU2VjdGlvbiA0LjEuMyAtIG5vdCBjbGVhciB0byBtZSB3
aHkgcmVkaXJlY3RfdXJpIGlzDQo+ID4+Pj4+Pj4+PiBSRVFVSVJFRCBzaW5jZSBpbiA0LjEuMSBp
dCdzICJSRVFVSVJFRCB1bmxlc3MiDQo+ID4+Pj4+Pj4+DQo+ID4+Pj4+Pj4+IFRoZSBjbGllbnQg
c2hvdWxkIGFsd2F5cyBjb25maXJtIHdoZXJlIHRoZSBjb2RlIHdhcyBzZW50IHRvLiBJdA0KPiA+
Pj4+Pj4+PiBjYW4gb21pdA0KPiA+Pj4+Pj4gdGhlIHJlZGlyZWN0aW9uIGlzIG9uZSB3YXMgcHJv
dmlkZWQgYnV0IHNob3VsZCB0ZWxsIHRoZSBzZXJ2ZXINCj4gPj4+Pj4+IHdoZXJlIGl0IHdlbnQg
dG8uIFRoaXMgaXMgbW9yZSBjb25zaXN0ZW50IG9uIHRoZSB2ZXJpZmljYXRpb24NCj4gPj4+Pj4+
IHNpZGUsIGJ1dCBpZiB0aGUgb3JpZ2luYWwgZmxvdyBkZXNpZ25lcnMgd2FudCB0byBjaGltZSBp
biAoRGljaywNCj4gPj4+Pj4+IEJyaWFuLCBldGMuPyksIEknbSBvcGVuDQo+ID4+Pj4gdG8gY2hh
bmdlIHRoaXMuDQo+ID4+Pj4+Pj4+DQo+ID4+Pj4+Pj4+PiA0KSBTZWN0aW9uIDQuMi4yIC0gd2hl
biBkaWQgd2UgZHJvcCByZWZyZXNoX3Rva2VuPyAgICAgSSBhc3N1bWUNCj4gdGhpcw0KPiA+Pj4+
IGdvZXMNCj4gPj4+Pj4+Pj4+IGJhY2sgdG8gZGlzYWdyZWVtZW50IG9uIGhvdyBiZXN0IHRvIGhh
bmRsZSBuYXRpdmUgY2xpZW50cy4gSSdkDQo+ID4+Pj4+Pj4+PiBwcmVmZXIgaXQgdG8gc2ltcGx5
IHJlZmVyZW5jZSA1LjEgYW5kIGxlYXZlIHdoYXQgaXMgaXNzdWVkIHVwDQo+ID4+Pj4+Pj4+PiB0
byB0aGUgc2VjdXJpdHkgcHJvZmlsZSBvZiB0aGUgcGFydGljdWxhciBkZXBsb3ltZW50IGFzIHRv
IHdoYXQgaXMNCj4gaXNzdWVkLg0KPiA+Pj4+Pj4+Pg0KPiA+Pj4+Pj4+PiAtMDggSnVuZSAyMDEw
Lg0KPiA+Pj4+Pj4+Pg0KPiA+Pj4+Pj4+PiBUaGlzIGhhcyBiZWVuIGRlY2lkZWQgZm9yIGEgbG9u
ZyB0aW1lLiBJJ20gbm90IGVhZ2VyIHRvIGNoYW5nZSBpdC4NCj4gPj4+Pj4+Pg0KPiA+Pj4+Pj4+
IFRoYW5rcyAtIEkgY2FuIGxpdmUgd2l0aCBpdC4gIFVuZm9ydHVuYXRlbHkgd2Ugc3RpbGwgc2Vl
bSB0byBiZQ0KPiA+Pj4+Pj4+IGZyYWdtZW50aW5nIG9uDQo+ID4+Pj4+PiB0aGUgbmF0aXZlIGNs
aWVudCBhcHByb2FjaC4gICBHb29kIHRvcGljIGZvciBJSVcgSSBzdXNwZWN0DQo+ID4+Pj4+Pj4N
Cj4gPj4+Pj4+PiAtY21vcnQNCj4gPj4+Pj4+Pg0KPiA+Pj4+Pj4+Pg0KPiA+Pj4+Pj4+PiBFSEwN
Cj4gPj4+Pj4+Pj4NCj4gPj4+Pj4+Pj4NCj4gPj4+Pj4+PiBfX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fXw0KPiA+Pj4+Pj4+IE9BdXRoIG1haWxpbmcgbGlzdA0K
PiA+Pj4+Pj4+IE9BdXRoQGlldGYub3JnPG1haWx0bzpPQXV0aEBpZXRmLm9yZz4NCj4gPj4+Pj4+
PiBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoDQo+ID4+Pj4+DQo+
ID4+Pj4+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQo+
ID4+Pj4+IE9BdXRoIG1haWxpbmcgbGlzdA0KPiA+Pj4+PiBPQXV0aEBpZXRmLm9yZzxtYWlsdG86
T0F1dGhAaWV0Zi5vcmc+DQo+ID4+Pj4+IGh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlz
dGluZm8vb2F1dGgNCj4gPj4+Pg0KPiA+Pj4NCj4gPj4NCj4gPg0KPiA+DQoNCl9fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQpPQXV0aCBtYWlsaW5nIGxpc3QN
Ck9BdXRoQGlldGYub3JnPG1haWx0bzpPQXV0aEBpZXRmLm9yZz4NCmh0dHBzOi8vd3d3LmlldGYu
b3JnL21haWxtYW4vbGlzdGluZm8vb2F1dGgNCg0KDQoNCg0KDQoNCl9fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQoNCk9BdXRoIG1haWxpbmcgbGlzdA0KDQpP
QXV0aEBpZXRmLm9yZzwvbWMvY29tcG9zZT90bz1PQXV0aEBpZXRmLm9yZz4NCg0KaHR0cHM6Ly93
d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9vYXV0aA0KDQoNCg==

--_000_90C41DD21FB7C64BB94121FBBC2E723446564305E6P3PW5EX1MB01E_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_90C41DD21FB7C64BB94121FBBC2E723446564305E6P3PW5EX1MB01E_--

From James.H.Manger@team.telstra.com  Tue Mar 29 16:35:54 2011
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4DC7B3A6ADB for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:35:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.653
X-Spam-Level: 
X-Spam-Status: No, score=-0.653 tagged_above=-999 required=5 tests=[AWL=0.247,  BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, HTML_MESSAGE=0.001, RELAY_IS_203=0.994]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uwkaqlvfnSCv for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:35:52 -0700 (PDT)
Received: from ipxavo.tcif.telstra.com.au (ipxavo.tcif.telstra.com.au [203.35.135.200]) by core3.amsl.com (Postfix) with ESMTP id B2AFE3A6A8F for <oauth@ietf.org>; Tue, 29 Mar 2011 16:35:51 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.63,265,1299416400"; d="scan'208,217";a="28710647"
Received: from unknown (HELO ipcavi.tcif.telstra.com.au) ([10.97.217.200]) by ipoavi.tcif.telstra.com.au with ESMTP; 30 Mar 2011 10:37:28 +1100
X-IronPort-AV: E=McAfee;i="5400,1158,6300"; a="22570144"
Received: from wsmsg3707.srv.dir.telstra.com ([172.49.40.81]) by ipcavi.tcif.telstra.com.au with ESMTP; 30 Mar 2011 10:37:28 +1100
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by wsmsg3707.srv.dir.telstra.com ([172.49.40.81]) with mapi; Wed, 30 Mar 2011 10:37:27 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: WG <oauth@ietf.org>
Date: Wed, 30 Mar 2011 10:37:26 +1100
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvuOpeza7hXgU0gRMSn9xR6XbyXWAADzMBAAAc24VA=
Message-ID: <255B9BB34FB7D647A506DC292726F6E1128172205D@WSMSG3153V.srv.dir.telstra.com>
References: <835237.54303.qm@web55808.mail.re3.yahoo.com> <4D921D0F.1080303@aol.com> <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US, en-AU
Content-Type: multipart/alternative; boundary="_000_255B9BB34FB7D647A506DC292726F6E1128172205DWSMSG3153Vsrv_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 23:35:54 -0000

--_000_255B9BB34FB7D647A506DC292726F6E1128172205DWSMSG3153Vsrv_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_255B9BB34FB7D647A506DC292726F6E1128172205DWSMSG3153Vsrv_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_255B9BB34FB7D647A506DC292726F6E1128172205DWSMSG3153Vsrv_--

From eran@hueniverse.com  Tue Mar 29 16:40:00 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 117AE3A6ADA for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:40:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.637
X-Spam-Level: 
X-Spam-Status: No, score=-2.637 tagged_above=-999 required=5 tests=[AWL=-0.040, BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AXw88D7vL1t4 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:39:55 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 8FED03A6A8F for <oauth@ietf.org>; Tue, 29 Mar 2011 16:39:54 -0700 (PDT)
Received: (qmail 5419 invoked from network); 29 Mar 2011 23:41:32 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Mar 2011 23:41:32 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Tue, 29 Mar 2011 16:41:20 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: WG <oauth@ietf.org>
Date: Tue, 29 Mar 2011 16:40:27 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvuY5mjOcMUL3P3Rf+3yeQl38AergABCX5AAACamWA=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E723446564305EAP3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 23:40:00 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E723446564305EAP3PW5EX1MB01E_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_90C41DD21FB7C64BB94121FBBC2E723446564305EAP3PW5EX1MB01E_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj1Db250ZW50LVR5cGUgY29udGVu
dD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij48bWV0YSBuYW1lPUdlbmVyYXRvciBjb250ZW50
PSJNaWNyb3NvZnQgV29yZCAxNCAoZmlsdGVyZWQgbWVkaXVtKSI+PHN0eWxlPjwhLS0NCi8qIEZv
bnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglw
YW5vc2UtMToyIDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5
OlRhaG9tYTsNCglwYW5vc2UtMToyIDExIDYgNCAzIDUgNCA0IDIgNDt9DQpAZm9udC1mYWNlDQoJ
e2ZvbnQtZmFtaWx5OkNvbnNvbGFzOw0KCXBhbm9zZS0xOjIgMTEgNiA5IDIgMiA0IDMgMiA0O30N
Ci8qIFN0eWxlIERlZmluaXRpb25zICovDQpwLk1zb05vcm1hbCwgbGkuTXNvTm9ybWFsLCBkaXYu
TXNvTm9ybWFsDQoJe21hcmdpbjowaW47DQoJbWFyZ2luLWJvdHRvbTouMDAwMXB0Ow0KCWZvbnQt
c2l6ZToxMi4wcHQ7DQoJZm9udC1mYW1pbHk6IlRpbWVzIE5ldyBSb21hbiIsInNlcmlmIjt9DQph
OmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xv
cjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFuLk1z
b0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpwdXJw
bGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwcmUNCgl7bXNvLXN0eWxlLXByaW9y
aXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCBDaGFyIjsNCgltYXJn
aW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTAuMHB0Ow0KCWZv
bnQtZmFtaWx5OiJDb3VyaWVyIE5ldyI7fQ0KcC5Nc29BY2V0YXRlLCBsaS5Nc29BY2V0YXRlLCBk
aXYuTXNvQWNldGF0ZQ0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0eWxlLWxpbms6
IkJhbGxvb24gVGV4dCBDaGFyIjsNCgltYXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFw
dDsNCglmb250LXNpemU6OC4wcHQ7DQoJZm9udC1mYW1pbHk6IlRhaG9tYSIsInNhbnMtc2VyaWYi
O30NCnNwYW4uSFRNTFByZWZvcm1hdHRlZENoYXINCgl7bXNvLXN0eWxlLW5hbWU6IkhUTUwgUHJl
Zm9ybWF0dGVkIENoYXIiOw0KCW1zby1zdHlsZS1wcmlvcml0eTo5OTsNCgltc28tc3R5bGUtbGlu
azoiSFRNTCBQcmVmb3JtYXR0ZWQiOw0KCWZvbnQtZmFtaWx5OkNvbnNvbGFzO30NCnAueWl2MTU4
MTA1OTEwMm1zb25vcm1hbCwgbGkueWl2MTU4MTA1OTEwMm1zb25vcm1hbCwgZGl2LnlpdjE1ODEw
NTkxMDJtc29ub3JtYWwNCgl7bXNvLXN0eWxlLW5hbWU6eWl2MTU4MTA1OTEwMm1zb25vcm1hbDsN
Cgltc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6MGluOw0KCW1zby1tYXJn
aW4tYm90dG9tLWFsdDphdXRvOw0KCW1hcmdpbi1sZWZ0OjBpbjsNCglmb250LXNpemU6MTIuMHB0
Ow0KCWZvbnQtZmFtaWx5OiJUaW1lcyBOZXcgUm9tYW4iLCJzZXJpZiI7fQ0KcC55aXYxNTgxMDU5
MTAybXNvY2hwZGVmYXVsdCwgbGkueWl2MTU4MTA1OTEwMm1zb2NocGRlZmF1bHQsIGRpdi55aXYx
NTgxMDU5MTAybXNvY2hwZGVmYXVsdA0KCXttc28tc3R5bGUtbmFtZTp5aXYxNTgxMDU5MTAybXNv
Y2hwZGVmYXVsdDsNCgltc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6MGlu
Ow0KCW1zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvOw0KCW1hcmdpbi1sZWZ0OjBpbjsNCglmb250
LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJUaW1lcyBOZXcgUm9tYW4iLCJzZXJpZiI7fQ0K
cC55aXYxNTgxMDU5MTAybXNvbm9ybWFsMSwgbGkueWl2MTU4MTA1OTEwMm1zb25vcm1hbDEsIGRp
di55aXYxNTgxMDU5MTAybXNvbm9ybWFsMQ0KCXttc28tc3R5bGUtbmFtZTp5aXYxNTgxMDU5MTAy
bXNvbm9ybWFsMTsNCgltYXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250
LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJUaW1lcyBOZXcgUm9tYW4iLCJzZXJpZiI7DQoJ
Y29sb3I6YmxhY2s7fQ0KcC55aXYxNTgxMDU5MTAybXNvY2hwZGVmYXVsdDEsIGxpLnlpdjE1ODEw
NTkxMDJtc29jaHBkZWZhdWx0MSwgZGl2LnlpdjE1ODEwNTkxMDJtc29jaHBkZWZhdWx0MQ0KCXtt
c28tc3R5bGUtbmFtZTp5aXYxNTgxMDU5MTAybXNvY2hwZGVmYXVsdDE7DQoJbXNvLW1hcmdpbi10
b3AtYWx0OmF1dG87DQoJbWFyZ2luLXJpZ2h0OjBpbjsNCgltc28tbWFyZ2luLWJvdHRvbS1hbHQ6
YXV0bzsNCgltYXJnaW4tbGVmdDowaW47DQoJZm9udC1zaXplOjEwLjBwdDsNCglmb250LWZhbWls
eToiVGltZXMgTmV3IFJvbWFuIiwic2VyaWYiO30NCnNwYW4ueWl2MTU4MTA1OTEwMm1zb2h5cGVy
bGluaw0KCXttc28tc3R5bGUtbmFtZTp5aXYxNTgxMDU5MTAybXNvaHlwZXJsaW5rO30NCnNwYW4u
eWl2MTU4MTA1OTEwMm1zb2h5cGVybGlua2ZvbGxvd2VkDQoJe21zby1zdHlsZS1uYW1lOnlpdjE1
ODEwNTkxMDJtc29oeXBlcmxpbmtmb2xsb3dlZDt9DQpzcGFuLnlpdjE1ODEwNTkxMDJodG1scHJl
Zm9ybWF0dGVkY2hhcg0KCXttc28tc3R5bGUtbmFtZTp5aXYxNTgxMDU5MTAyaHRtbHByZWZvcm1h
dHRlZGNoYXI7fQ0Kc3Bhbi55aXYxNTgxMDU5MTAyZW1haWxzdHlsZTE5DQoJe21zby1zdHlsZS1u
YW1lOnlpdjE1ODEwNTkxMDJlbWFpbHN0eWxlMTk7fQ0Kc3Bhbi55aXYxNTgxMDU5MTAybXNvaHlw
ZXJsaW5rMQ0KCXttc28tc3R5bGUtbmFtZTp5aXYxNTgxMDU5MTAybXNvaHlwZXJsaW5rMTsNCglj
b2xvcjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0Kc3Bhbi55aXYxNTgxMDU5
MTAybXNvaHlwZXJsaW5rZm9sbG93ZWQxDQoJe21zby1zdHlsZS1uYW1lOnlpdjE1ODEwNTkxMDJt
c29oeXBlcmxpbmtmb2xsb3dlZDE7DQoJY29sb3I6cHVycGxlOw0KCXRleHQtZGVjb3JhdGlvbjp1
bmRlcmxpbmU7fQ0Kc3Bhbi55aXYxNTgxMDU5MTAyaHRtbHByZWZvcm1hdHRlZGNoYXIxDQoJe21z
by1zdHlsZS1uYW1lOnlpdjE1ODEwNTkxMDJodG1scHJlZm9ybWF0dGVkY2hhcjE7DQoJZm9udC1m
YW1pbHk6Q29uc29sYXM7DQoJY29sb3I6YmxhY2s7fQ0Kc3Bhbi55aXYxNTgxMDU5MTAyZW1haWxz
dHlsZTE5MQ0KCXttc28tc3R5bGUtbmFtZTp5aXYxNTgxMDU5MTAyZW1haWxzdHlsZTE5MTsNCglm
b250LWZhbWlseToiQXJpYWwiLCJzYW5zLXNlcmlmIjsNCgljb2xvcjojMUY0OTdEO30NCnNwYW4u
RW1haWxTdHlsZTMxDQoJe21zby1zdHlsZS10eXBlOnBlcnNvbmFsOw0KCWZvbnQtZmFtaWx5OiJD
YWxpYnJpIiwic2Fucy1zZXJpZiI7DQoJY29sb3I6IzFGNDk3RDt9DQpzcGFuLkVtYWlsU3R5bGUz
Mg0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbC1yZXBseTsNCglmb250LWZhbWlseToiQ2FsaWJy
aSIsInNhbnMtc2VyaWYiOw0KCWNvbG9yOiMxRjQ5N0Q7fQ0Kc3Bhbi5CYWxsb29uVGV4dENoYXIN
Cgl7bXNvLXN0eWxlLW5hbWU6IkJhbGxvb24gVGV4dCBDaGFyIjsNCgltc28tc3R5bGUtcHJpb3Jp
dHk6OTk7DQoJbXNvLXN0eWxlLWxpbms6IkJhbGxvb24gVGV4dCI7DQoJZm9udC1mYW1pbHk6IlRh
aG9tYSIsInNhbnMtc2VyaWYiO30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10eXBlOmV4
cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3Np
emU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBpbiAxLjBpbiAxLjBpbiAxLjBpbjt9DQpkaXYu
V29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+PCEtLVtpZiBn
dGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWRlZmF1bHRzIHY6ZXh0PSJlZGl0IiBzcGlkbWF4PSIx
MDI2IiAvPg0KPC94bWw+PCFbZW5kaWZdLS0+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpz
aGFwZWxheW91dCB2OmV4dD0iZWRpdCI+DQo8bzppZG1hcCB2OmV4dD0iZWRpdCIgZGF0YT0iMSIg
Lz4NCjwvbzpzaGFwZWxheW91dD48L3htbD48IVtlbmRpZl0tLT48L2hlYWQ+PGJvZHkgbGFuZz1F
Ti1VUyBsaW5rPWJsdWUgdmxpbms9cHVycGxlPjxkaXYgY2xhc3M9V29yZFNlY3Rpb24xPjxwIGNs
YXNzPU1zb05vcm1hbD48c3BhbiBzdHlsZT0nZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseToi
Q2FsaWJyaSIsInNhbnMtc2VyaWYiO2NvbG9yOiMxRjQ5N0QnPlRvIGNsYXJpZnksIEkgYW0gbm90
IG9wcG9zZWQgdG8gbWFuZGF0aW5nIFRMUyBvbiB0aGUgY2FsbGJhY2ssIGp1c3QgdGhhdCBpZiB3
ZSBkbywgd2UgY2Fu4oCZdCBzaGlwIHRoZSBwcm90b2NvbCB0aGUgd2F5IGl0IGlzIHdpdGhvdXQg
Y29taW5nIHVwIHdpdGggc29tZSBvdGhlciBhbHRlcm5hdGl2ZSB0aGF0IGRvZXMgbm90IHJlcXVp
cmUgVExTIGRlcGxveW1lbnQgb24gdGhlIGNsaWVudCBzaWRlLiBPQXV0aCAxLjAgaGFzIG5vIHN1
Y2ggcmVxdWlyZW1lbnQgYW5kIGFkZGluZyBpdCBpbiAyLjAgaXMgY29tcGxldGVseSB1bmV4cGVj
dGVkIGJ5IHRoZSBjb21tdW5pdHkgYXQgbGFyZ2UuPG86cD48L286cD48L3NwYW4+PC9wPjxwIGNs
YXNzPU1zb05vcm1hbD48c3BhbiBzdHlsZT0nZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseToi
Q2FsaWJyaSIsInNhbnMtc2VyaWYiO2NvbG9yOiMxRjQ5N0QnPjxvOnA+Jm5ic3A7PC9vOnA+PC9z
cGFuPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMS4wcHQ7
Zm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjtjb2xvcjojMUY0OTdEJz5JdCB3b3Vs
ZCBiZSBoZWxwZnVsIHRvIGhlYXIgZnJvbSBzb21lIGNvbXBhbmllcyB3aXRoIGxhcmdlIDEuMCBv
ciAyLjAgZGVwbG95bWVudCBvbiB0aGlzIG1hdHRlcj8gQW55b25lIGZyb20gR29vZ2xlLCBGYWNl
Ym9vaywgWWFob28sIFR3aXR0ZXIsIGV0Yy4/IDxvOnA+PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFz
cz1Nc29Ob3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6IkNh
bGlicmkiLCJzYW5zLXNlcmlmIjtjb2xvcjojMUY0OTdEJz48bzpwPiZuYnNwOzwvbzpwPjwvc3Bh
bj48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTEuMHB0O2Zv
bnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+RUhMPG86cD48
L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48c3BhbiBzdHlsZT0nZm9udC1zaXpl
OjExLjBwdDtmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO2NvbG9yOiMxRjQ5N0Qn
PjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD48ZGl2IHN0eWxlPSdib3JkZXI6bm9uZTtib3Jk
ZXItbGVmdDpzb2xpZCBibHVlIDEuNXB0O3BhZGRpbmc6MGluIDBpbiAwaW4gNC4wcHQnPjxkaXY+
PGRpdiBzdHlsZT0nYm9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpzb2xpZCAjQjVDNERGIDEuMHB0O3Bh
ZGRpbmc6My4wcHQgMGluIDBpbiAwaW4nPjxwIGNsYXNzPU1zb05vcm1hbD48Yj48c3BhbiBzdHls
ZT0nZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseToiVGFob21hIiwic2Fucy1zZXJpZiInPkZy
b206PC9zcGFuPjwvYj48c3BhbiBzdHlsZT0nZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseToi
VGFob21hIiwic2Fucy1zZXJpZiInPiBvYXV0aC1ib3VuY2VzQGlldGYub3JnIFttYWlsdG86b2F1
dGgtYm91bmNlc0BpZXRmLm9yZ10gPGI+T24gQmVoYWxmIE9mIDwvYj5FcmFuIEhhbW1lci1MYWhh
djxicj48Yj5TZW50OjwvYj4gVHVlc2RheSwgTWFyY2ggMjksIDIwMTEgNDoyOSBQTTxicj48Yj5U
bzo8L2I+IGZjb3JlbGxhQHBvbWNvci5jb207IEdlb3JnZSBGbGV0Y2hlcjxicj48Yj5DYzo8L2I+
IE9BdXRoQGNvcmUzLmFtc2wuY29tOyBLYXJlbiBQLiBMZXdpc29uOyBXRzxicj48Yj5TdWJqZWN0
OjwvYj4gUmU6IFtPQVVUSC1XR10gV0dMQyBvbiBkcmFmdC1pZXRmLW9hdXRoLXYyLTEzLnR4dDxv
OnA+PC9vOnA+PC9zcGFuPjwvcD48L2Rpdj48L2Rpdj48cCBjbGFzcz1Nc29Ob3JtYWw+PG86cD4m
bmJzcDs8L286cD48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6
MTEuMHB0O2ZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+
VHdpdHRlciBhbmQgRmFjZWJvb2sgY2Fu4oCZdCByZXF1aXJlIGFsbCB0aGVpciBhcHBsaWNhdGlv
biBkZXZlbG9wZXJzIHRvIGRlcGxveSBUTFMuIEp1c3Qgbm90IGdvaW5nIHRvIGhhcHBlbi4gSG93
IG1hbnkgY2xpZW50cyB0b2RheSB1c2UgVExTIGZvciB0aGVpciBjYWxsYmFja3M/IEnigJltIGd1
ZXNzaW5nIGxlc3MgdGhhbiBoYWxmLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFzcz1Nc29O
b3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6IkNhbGlicmki
LCJzYW5zLXNlcmlmIjtjb2xvcjojMUY0OTdEJz48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+
PHAgY2xhc3M9TXNvTm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFt
aWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+SSBhbSBhZHZvY2F0aW5n
IFRMUyBvbiB0aGUgc2VydmVyIHNpZGUsIGJlY2F1c2UgaXQgaXMgYWxyZWFkeSByZXF1aXJlZCB0
aGVyZSBmb3Igb3RoZXIgZW5kcG9pbnRzLiBCdXQgb24gdGhlIGNsaWVudCB0aGVyZSBpcyBjdXJy
ZW50bHkgbm8gc3VjaCByZXF1aXJlbWVudHMuIE1ha2luZyB0aGUgY2FsbGJhY2sgYSBNVVNUIHVz
ZSBUTFMgaXMgYSBodWdlIGNoYW5nZS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9TXNv
Tm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiJDYWxpYnJp
Iiwic2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9w
PjxwIGNsYXNzPU1zb05vcm1hbD48c3BhbiBzdHlsZT0nZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO2NvbG9yOiMxRjQ5N0QnPkVITDxvOnA+PC9vOnA+
PC9zcGFuPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjtjb2xvcjojMUY0OTdEJz48bzpw
PiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PGRpdiBzdHlsZT0nYm9yZGVyOm5vbmU7Ym9yZGVyLWxl
ZnQ6c29saWQgYmx1ZSAxLjVwdDtwYWRkaW5nOjBpbiAwaW4gMGluIDQuMHB0Jz48ZGl2PjxkaXYg
c3R5bGU9J2JvcmRlcjpub25lO2JvcmRlci10b3A6c29saWQgI0I1QzRERiAxLjBwdDtwYWRkaW5n
OjMuMHB0IDBpbiAwaW4gMGluJz48cCBjbGFzcz1Nc29Ob3JtYWw+PGI+PHNwYW4gc3R5bGU9J2Zv
bnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6IlRhaG9tYSIsInNhbnMtc2VyaWYiJz5Gcm9tOjwv
c3Bhbj48L2I+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6IlRhaG9t
YSIsInNhbnMtc2VyaWYiJz4gRnJhbmNpc2NvIENvcmVsbGEgW21haWx0bzpmY29yZWxsYUBwb21j
b3IuY29tXSA8YnI+PGI+U2VudDo8L2I+IFR1ZXNkYXksIE1hcmNoIDI5LCAyMDExIDM6NTAgUE08
YnI+PGI+VG86PC9iPiBHZW9yZ2UgRmxldGNoZXI7IEVyYW4gSGFtbWVyLUxhaGF2PGJyPjxiPkNj
OjwvYj4gUGhpbCBIdW50OyBKdXN0aW4gUmljaGVyOyBPQXV0aCBXRzsgS2FyZW4gUC4gTGV3aXNv
bjxicj48Yj5TdWJqZWN0OjwvYj4gUkU6IFtPQVVUSC1XR10gV0dMQyBvbiBkcmFmdC1pZXRmLW9h
dXRoLXYyLTEzLnR4dDxvOnA+PC9vOnA+PC9zcGFuPjwvcD48L2Rpdj48L2Rpdj48cCBjbGFzcz1N
c29Ob3JtYWw+PG86cD4mbmJzcDs8L286cD48L3A+PHRhYmxlIGNsYXNzPU1zb05vcm1hbFRhYmxl
IGJvcmRlcj0wIGNlbGxzcGFjaW5nPTAgY2VsbHBhZGRpbmc9MD48dHI+PHRkIHZhbGlnbj10b3Ag
c3R5bGU9J3BhZGRpbmc6MGluIDBpbiAwaW4gMGluJz48cCBjbGFzcz1Nc29Ob3JtYWw+Jmd0OyBB
cyBhIG1hdHRlciBvZiBwcmFjdGljYWxpdHksIHJlcXVpcmluZyBhbGwgY2xpZW50cyB0byBkZXBs
b3k8YnI+Jmd0OyBzZXJ2ZXItc2lkZSBUTFMgaXMgYWJzdXJkLiBJZiB3ZSBtYW5kYXRlIHJlZGly
ZWN0aW9ucyBVUklzIHRvIHVzZTxicj4mZ3Q7IGh0dHBzLCB3ZSBhcmUgYmFzaWNhbGx5IG1ha2lu
ZyBldmVyeW9uZSBpZ25vcmUgaXQuIEl04oCZcyBsaWtlIGEgc3BlZWQ8YnI+Jmd0OyBsaW1pdCBz
aWduIG9mIDVtcGguPGJyPjxicj5XaHkgaXMgdGhhdD8mbmJzcDsgQ2FuIHlvdSBlbGFib3JhdGU/
Jm5ic3A7IEknbSB2ZXJ5IHB1enpsZWQuJm5ic3A7IEFuZCBkaWRuJ3QgeW91PGJyPnByb3Bvc2Ug
cmVxdWlyaW5nIFRMUyBhIGZldyBtZXNzYWdlcyBiYWNrPzxicj48YnI+RnJhbmNpc2NvPGJyPjxi
cj4tLS0gT24gPGI+VHVlLCAzLzI5LzExLCBFcmFuIEhhbW1lci1MYWhhdiA8aT4mbHQ7PGEgaHJl
Zj0ibWFpbHRvOmVyYW5AaHVlbml2ZXJzZS5jb20iPmVyYW5AaHVlbml2ZXJzZS5jb208L2E+Jmd0
OzwvaT48L2I+IHdyb3RlOjxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPU1zb05vcm1hbCBzdHlsZT0n
bWFyZ2luLWJvdHRvbToxMi4wcHQnPjxicj5Gcm9tOiBFcmFuIEhhbW1lci1MYWhhdiAmbHQ7PGEg
aHJlZj0ibWFpbHRvOmVyYW5AaHVlbml2ZXJzZS5jb20iPmVyYW5AaHVlbml2ZXJzZS5jb208L2E+
Jmd0Ozxicj5TdWJqZWN0OiBSRTogW09BVVRILVdHXSBXR0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgt
djItMTMudHh0PGJyPlRvOiAmcXVvdDtHZW9yZ2UgRmxldGNoZXImcXVvdDsgJmx0OzxhIGhyZWY9
Im1haWx0bzpnZmZsZXRjaEBhb2wuY29tIj5nZmZsZXRjaEBhb2wuY29tPC9hPiZndDssICZxdW90
OzxhIGhyZWY9Im1haWx0bzpmY29yZWxsYUBwb21jb3IuY29tIj5mY29yZWxsYUBwb21jb3IuY29t
PC9hPiZxdW90OyAmbHQ7PGEgaHJlZj0ibWFpbHRvOmZjb3JlbGxhQHBvbWNvci5jb20iPmZjb3Jl
bGxhQHBvbWNvci5jb208L2E+Jmd0Ozxicj5DYzogJnF1b3Q7UGhpbCBIdW50JnF1b3Q7ICZsdDs8
YSBocmVmPSJtYWlsdG86cGhpbC5odW50QG9yYWNsZS5jb20iPnBoaWwuaHVudEBvcmFjbGUuY29t
PC9hPiZndDssICZxdW90O0p1c3RpbiBSaWNoZXImcXVvdDsgJmx0OzxhIGhyZWY9Im1haWx0bzpq
cmljaGVyQG1pdHJlLm9yZyI+anJpY2hlckBtaXRyZS5vcmc8L2E+Jmd0OywgJnF1b3Q7T0F1dGgg
V0cmcXVvdDsgJmx0OzxhIGhyZWY9Im1haWx0bzpvYXV0aEBpZXRmLm9yZyI+b2F1dGhAaWV0Zi5v
cmc8L2E+Jmd0OywgJnF1b3Q7S2FyZW4gUC4gTGV3aXNvbiZxdW90OyAmbHQ7PGEgaHJlZj0ibWFp
bHRvOmtwbGV3aXNvbkBwb21jb3IuY29tIj5rcGxld2lzb25AcG9tY29yLmNvbTwvYT4mZ3Q7PGJy
PkRhdGU6IFR1ZXNkYXksIE1hcmNoIDI5LCAyMDExLCA3OjQ2IFBNPG86cD48L286cD48L3A+PGRp
diBpZD15aXYxNTgxMDU5MTAyPjxkaXY+PHAgY2xhc3M9eWl2MTU4MTA1OTEwMm1zb25vcm1hbD48
c3BhbiBzdHlsZT0nZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseToiQXJpYWwiLCJzYW5zLXNl
cmlmIjtjb2xvcjojMUY0OTdEJz5BcyBhIG1hdHRlciBvZiBwcmFjdGljYWxpdHksIHJlcXVpcmlu
ZyBhbGwgY2xpZW50cyB0byBkZXBsb3kgc2VydmVyLXNpZGUgVExTIGlzIGFic3VyZC4gSWYgd2Ug
bWFuZGF0ZSByZWRpcmVjdGlvbnMgVVJJcyB0byB1c2UgaHR0cHMsIHdlIGFyZSBiYXNpY2FsbHkg
bWFraW5nIGV2ZXJ5b25lIGlnbm9yZSBpdC4gSXTigJlzIGxpa2UgYSBzcGVlZCBsaW1pdCBzaWdu
IG9mIDVtcGguPC9zcGFuPjxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPXlpdjE1ODEwNTkxMDJtc29u
b3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6IkFyaWFsIiwi
c2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPjxw
IGNsYXNzPXlpdjE1ODEwNTkxMDJtc29ub3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6IkFyaWFsIiwic2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+RUhMPC9z
cGFuPjxvOnA+PC9vOnA+PC9wPjxwIGNsYXNzPXlpdjE1ODEwNTkxMDJtc29ub3JtYWw+PHNwYW4g
c3R5bGU9J2ZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6IkFyaWFsIiwic2Fucy1zZXJpZiI7
Y29sb3I6IzFGNDk3RCc+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPjxkaXYgc3R5bGU9J2Jv
cmRlcjpub25lO2JvcmRlci1sZWZ0OnNvbGlkIHdpbmRvd3RleHQgMS41cHQ7cGFkZGluZzowaW4g
MGluIDBpbiA0LjBwdDtib3JkZXItY29sb3I6LW1vei11c2UtdGV4dC1jb2xvciYjMTM7JiMxMDsg
LW1vei11c2UtdGV4dC1jb2xvciAtbW96LXVzZS10ZXh0LWNvbG9yIGJsdWUnPjxkaXY+PGRpdiBz
dHlsZT0nYm9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpzb2xpZCB3aW5kb3d0ZXh0IDEuMHB0O3BhZGRp
bmc6My4wcHQgMGluIDBpbiAwaW47Ym9yZGVyLWNvbG9yOi1tb3otdXNlLXRleHQtY29sb3IgLW1v
ei11c2UtdGV4dC1jb2xvcic+PHAgY2xhc3M9eWl2MTU4MTA1OTEwMm1zb25vcm1hbD48Yj48c3Bh
biBzdHlsZT0nZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseToiQXJpYWwiLCJzYW5zLXNlcmlm
Iic+RnJvbTo8L3NwYW4+PC9iPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFt
aWx5OiJBcmlhbCIsInNhbnMtc2VyaWYiJz4gR2VvcmdlIEZsZXRjaGVyIFttYWlsdG86Z2ZmbGV0
Y2hAYW9sLmNvbV0gPGJyPjxiPlNlbnQ6PC9iPiBUdWVzZGF5LCBNYXJjaCAyOSwgMjAxMSAxMDo1
NSBBTTxicj48Yj5Ubzo8L2I+IGZjb3JlbGxhQHBvbWNvci5jb208YnI+PGI+Q2M6PC9iPiBQaGls
IEh1bnQ7IEp1c3RpbiBSaWNoZXI7IEVyYW4gSGFtbWVyLUxhaGF2OyBPQXV0aCBXRzsgS2FyZW4g
UC4gTGV3aXNvbjxicj48Yj5TdWJqZWN0OjwvYj4gUmU6IFtPQVVUSC1XR10gV0dMQyBvbiBkcmFm
dC1pZXRmLW9hdXRoLXYyLTEzLnR4dDwvc3Bhbj48bzpwPjwvbzpwPjwvcD48L2Rpdj48L2Rpdj48
cCBjbGFzcz15aXYxNTgxMDU5MTAybXNvbm9ybWFsPiZuYnNwOzxvOnA+PC9vOnA+PC9wPjxwIGNs
YXNzPXlpdjE1ODEwNTkxMDJtc29ub3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtZmFtaWx5OiJBcmlh
bCIsInNhbnMtc2VyaWYiJz5IaSBGcmFuY2lzY28sPGJyPjxicj5TbyB0aGUgZXhhbXBsZXMgdGhh
dCBKdXN0aW4gZ2F2ZSB3ZXJlIGVpdGhlciBsb2NhbGhvc3Qgb3Igbm9uIEhUVFAgYmFzZWQgc2No
ZW1lcy4gSWYgT0F1dGgyIGlzIHRvIHN1cHBvcnQgdGhlc2Ugb3RoZXIgc2NoZW1lcyAob2Z0ZW4g
dXNlZCBpbiBtb2JpbGUgY2xpZW50cykgdGhlbiBJJ20gbm90IHN1cmUgaG93IFRMUyBjYW4gYmUg
YSBNVVNUIHVubGVzcyBpdCdzIHF1YWxpZmllZCB0byBhcHBseSB0byBIVFRQIGJhc2VkIFVSTHMg
b25seS48YnI+PGJyPklzIGl0IHN1ZmZpY2llbnQgdG8gZG9jdW1lbnQgdGhpcyBwb3NzaWJsZSBl
eHBvc3VyZSBpbiB0aGUgc2VjdXJpdHkgc2VjdGlvbiBzdWNoIHRoYXQgdGhlIHNwZWMgZG9lc24n
dCBwcmVjbHVkZSB0aGUgdXNlIG9mIE9BdXRoMiB3aXRoIG5vbiBIVFRQIGJhc2VkIHJlZGlyZWN0
X3VyaT88YnI+PGJyPlRoYW5rcyw8YnI+R2VvcmdlPGJyPjwvc3Bhbj48YnI+T24gMy8yOS8xMSAx
OjA1IFBNLCBGcmFuY2lzY28gQ29yZWxsYSB3cm90ZTogPG86cD48L286cD48L3A+PHRhYmxlIGNs
YXNzPU1zb05vcm1hbFRhYmxlIGJvcmRlcj0wIGNlbGxzcGFjaW5nPTAgY2VsbHBhZGRpbmc9MD48
dHI+PHRkIHZhbGlnbj10b3Agc3R5bGU9J3BhZGRpbmc6MGluIDBpbiAwaW4gMGluJz48cCBjbGFz
cz15aXYxNTgxMDU5MTAybXNvbm9ybWFsIHN0eWxlPSdtYXJnaW4tYm90dG9tOjEyLjBwdCc+RXJh
biw8YnI+PGJyPkl0J3Mgbm90IGEgcmVhc29uYWJsZSBjb21wcm9taXNlLiZuYnNwOyAjMiBNVVNU
IHVzZSB0bHMgVU5MRVNTIG9mIGNvdXJzZSBpdCB0YXJnZXRzIGxvY2FsaG9zdC4mbmJzcDsgSWYg
IzIgaXMgc2VudCB3aXRob3V0IFRMUyB0byBhIFdlYiBzZXJ2ZXIsIHRoZSBhdXRob3JpemF0aW9u
IGNvZGUgY2FuIGJlIGVhc2lseSBpbnRlcmNlcHRlZCBieSBhbiBhdHRhY2tlci4mbmJzcDsgVGhl
IGF0dGFja2VyIGNhbiB0aGVuIHVzZSBpdCB0byBvYnRhaW4gcHJvdGVjdGVkIHJlc291cmNlcyBi
eSBzdWJtaXR0aW5nIHRoZSBhdXRob3JpemF0aW9uIGNvZGUgdG8gdGhlIGNsaWVudC4mbmJzcDsg
KFRoaXMgaXMgaW5kZXBlbmRlbnQgb2Ygd2hldGhlciB0aGUgY2xpZW50IGF1dGhlbnRpY2F0ZXMg
aXRzZWxmIHdoZW4gZXhjaGFuZ2luZyB0aGUgYXV0aG9yaXphdGlvbiBjb2RlIGZvciBhbiBhY2Nl
c3MgdG9rZW4gb3Igbm90LikgSW4gdGhlIEZhY2Vib29rIHVzZSBjYXNlLCB0aGUgYXR0YWNrZXIg
Y2FuIHVzZSB0aGUgYXV0aG9yaXphdGlvbiBjb2RlIHRvIGxvZyBpbiB0byB0aGUgY2xpZW50IHVz
aW5nIHRoZSB1c2VyJ3MgRmFjZWJvb2sgaWRlbnRpdHkuJm5ic3A7IEkgYmVsaWV2ZSB0aGlzIHZ1
bG5lcmFiaWxpdHkgZXhpc3RzIGluIG1hbnkgaW1wbGVtZW50YXRpb25zIG9mIHRoZSBGYWNlYm9v
ayBsb2dpbiBidXR0b24gdG9kYXkuPGJyPjxicj5CdHcsIEkndmUgcG9pbnRlZCB0aGlzIG91dCBi
ZWZvcmUgdGhyZWUgb3IgZm91ciB0aW1lcyBvbiB0aGlzIG1haWxpbmcgbGlzdCwgaW5jbHVkaW5n
IGluIGEgcmVzcG9uc2UgdG8gdGhlIFdHTEMgdGhhdCB5b3UgbmV2ZXIgcmVwbGllZCB0by48YnI+
PGJyPkZyYW5jaXNjbzxicj48YnI+LS0tIE9uIDxiPk1vbiwgMy8yOC8xMSwgRXJhbiBIYW1tZXIt
TGFoYXYgPGk+PGEgaHJlZj0iL21jL2NvbXBvc2U/dG89ZXJhbkBodWVuaXZlcnNlLmNvbSIgdGFy
Z2V0PSJfYmxhbmsiPiZsdDtlcmFuQGh1ZW5pdmVyc2UuY29tJmd0OzwvYT48L2k+PC9iPiB3cm90
ZTo8bzpwPjwvbzpwPjwvcD48cCBjbGFzcz15aXYxNTgxMDU5MTAybXNvbm9ybWFsIHN0eWxlPSdt
YXJnaW4tYm90dG9tOjEyLjBwdCc+PGJyPkZyb206IEVyYW4gSGFtbWVyLUxhaGF2IDxhIGhyZWY9
Ii9tYy9jb21wb3NlP3RvPWVyYW5AaHVlbml2ZXJzZS5jb20iIHRhcmdldD0iX2JsYW5rIj4mbHQ7
ZXJhbkBodWVuaXZlcnNlLmNvbSZndDs8L2E+PGJyPlN1YmplY3Q6IFJlOiBbT0FVVEgtV0ddIFdH
TEMgb24gZHJhZnQtaWV0Zi1vYXV0aC12Mi0xMy50eHQ8YnI+VG86ICZxdW90O1BoaWwgSHVudCZx
dW90OyA8YSBocmVmPSIvbWMvY29tcG9zZT90bz1waGlsLmh1bnRAb3JhY2xlLmNvbSIgdGFyZ2V0
PSJfYmxhbmsiPiZsdDtwaGlsLmh1bnRAb3JhY2xlLmNvbSZndDs8L2E+LCAmcXVvdDtKdXN0aW4g
UmljaGVyJnF1b3Q7IDxhIGhyZWY9Ii9tYy9jb21wb3NlP3RvPWpyaWNoZXJAbWl0cmUub3JnIiB0
YXJnZXQ9Il9ibGFuayI+Jmx0O2pyaWNoZXJAbWl0cmUub3JnJmd0OzwvYT48YnI+Q2M6ICZxdW90
O09BdXRoIFdHJnF1b3Q7IDxhIGhyZWY9Ii9tYy9jb21wb3NlP3RvPW9hdXRoQGlldGYub3JnIiB0
YXJnZXQ9Il9ibGFuayI+Jmx0O29hdXRoQGlldGYub3JnJmd0OzwvYT48YnI+RGF0ZTogTW9uZGF5
LCBNYXJjaCAyOCwgMjAxMSwgMTA6MjggUE08bzpwPjwvbzpwPjwvcD48ZGl2PjxwIGNsYXNzPXlp
djE1ODEwNTkxMDJtc29ub3JtYWw+VGhlIGNvZGUgaXMgcmV0dXJuZWQgaW4gdHdvIHN0ZXBzOjxi
cj48YnI+MS4gVGhlIGF1dGhvcml6YXRpb24gc2VydmVyIHJlcGxpZXMgdG8gdGhlIHVzZXItYWdl
bnQgcmVxdWVzdCAocHJvdmlkaW5nIGF1dGhvcml6YXRpb24pIHdpdGggYSByZWRpcmVjdGlvbiBp
bnN0cnVjdGlvbiB0eXBpY2FsbHkgdXNpbmcgdGhlIExvY2F0aW9uIHJlc3BvbnNlIGhlYWRlciBm
aWVsZC48YnI+Mi4gVGhlIHVzZXItYWdlbnQgbWFrZXMgYW4gSFRUUCBHRVQgcmVxdWVzdCB0byB0
aGUgcHJvdmlkZWQgbG9jYXRpb24gKHdoaWNoIG1heSBiZSBzb21ldGhpbmcgb3RoZXIgdGhhbiBh
biBIVFRQIFVSSSwgb3IgYW4gSFRUUCBVUkkgdG8gbG9jYWxob3N0KS48YnI+PGJyPiMxIGlzIGFu
IEhUVFAgcmVzcG9uc2UgdG8gYSB1c2VyLWFnZW50IHJlcXVlc3QgdG8gdGhlIGF1dGhvcml6YXRp
b24gZW5kcG9pbnQgKG9yIGEgc3Vic2VxdWVudCBvbmUgaWYgdGhlIHNlcnZlciBpbXBsZW1lbnRh
dGlvbiBoYXMgbXVsdGlwbGUgYXV0aG9yaXphdGlvbiBzdGVwcykuPGJyPjxicj4jMiBpcyBhbiBI
VFRQIHJlcXVlc3QgbWFkZSBieSB0aGUgdXNlci1hZ2VudC48YnI+PGJyPkluIG9yZGVyIGZvciB0
aGUgY29kZSB0byBiZSBzZWN1cmUgZW5kLXRvLWVuZCwgYm90aCBzdGVwcyBtdXN0IHVzZSBUTFMu
IFRoZSBhcmd1bWVudHMgbWFkZSBhZ2FpbnN0IG1ha2luZyBUTFMgcmVxdWlyZWQgYXJlIGJhc2Vk
IG9uIHVzZSBjYXNlcyBmb3IgIzIuIFdlIGNhbiBtYWtlICMxICh0aGUgYXV0aG9yaXphdGlvbiBl
bmRwb2ludCByZXF1aXJlIFRMUyBzaW5jZSBpdCBhbHJlYWR5IGhhcyB0byBzdXBwb3J0IGl0IGZv
ciB0aGUgJ3Rva2VuJyByZXNwb25zZSB0eXBlLiBXZSBzaG91bGQgbWFrZSBjYWxsYmFja3MgYSBT
SE9VTEQgZm9yIFRMUy48YnI+PGJyPkRvZXMgdGhpcyBzb3VuZCBsaWtlIGEgcmVhc29uYWJsZSBj
b21wcm9taXNlPzxicj48YnI+RUhMPGJyPjxicj4mZ3Q7IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0t
LS0tPGJyPiZndDsgRnJvbTogUGhpbCBIdW50IDxhIGhyZWY9Im1haWx0bzpbbWFpbHRvOnBoaWwu
aHVudEBvcmFjbGUuY29tXSI+W21haWx0bzpwaGlsLmh1bnRAb3JhY2xlLmNvbV08L2E+PGJyPiZn
dDsgU2VudDogTW9uZGF5LCBNYXJjaCAyOCwgMjAxMSAyOjI4IFBNPGJyPiZndDsgVG86IEp1c3Rp
biBSaWNoZXI8YnI+Jmd0OyBDYzogRXJhbiBIYW1tZXItTGFoYXY7IE9BdXRoIFdHPGJyPiZndDsg
U3ViamVjdDogUmU6IFtPQVVUSC1XR10gV0dMQyBvbiBkcmFmdC1pZXRmLW9hdXRoLXYyLTEzLnR4
dDxicj4mZ3Q7IDxicj4mZ3Q7IFRoaXMgd2FzIHJlZmVycmluZyB0byBzZWN0aW9uIDIuMSB0aGF0
IHRoZSBhdXRob3JpemF0aW9uIHNlcnZlciBtdXN0IHVzZSBUTFM8YnI+Jmd0OyB3aGVuIHJldHVy
bmluZyBhbiBhdXRob3JpemF0aW9uIGNvZGUuPGJyPiZndDsgPGJyPiZndDsgSWYgaXQgZG9lc24n
dCB1c2UgVExTIHRoZW4gdGhlIGNvZGUgYmVpbmcgcmV0dXJuZWQgdG8gdGhlIGNsaWVudCBjYW4g
YmU8YnI+Jmd0OyBpbnRlcmNlcHRlZC48YnI+Jmd0OyA8YnI+Jmd0OyBPciBkaWQgSSBtaXNzIHNv
bWV0aGluZz88YnI+Jmd0OyA8YnI+Jmd0OyBQaGlsPGJyPiZndDsgPGEgaHJlZj0ibWFpbHRvOnBo
aWwuaHVudEBvcmFjbGUuY29tIj5waGlsLmh1bnRAb3JhY2xlLmNvbTwvYT48YnI+Jmd0OyA8YnI+
Jmd0OyA8YnI+Jmd0OyA8YnI+Jmd0OyA8YnI+Jmd0OyBPbiAyMDExLTAzLTI4LCBhdCAxOjM3IFBN
LCBKdXN0aW4gUmljaGVyIHdyb3RlOjxicj4mZ3Q7IDxicj4mZ3Q7ICZndDsgUGhpbCw8YnI+Jmd0
OyAmZ3Q7PGJyPiZndDsgJmd0OyBUaGUgbWFpbiBkaWZmZXJlbmNlIGlzIHRoYXQgaXQncyBhIHJl
cXVpcmVtZW50IG9uIHRoZSAqY2xpZW50KiBpbnN0ZWFkPGJyPiZndDsgJmd0OyBvZiB0aGUgKnBy
b3ZpZGVyKiBzaWRlIG9mIHRoZSBlcXVhdGlvbiwgYW5kIGNsaWVudHMgYXJlbid0IGFsd2F5cyBl
dmVuPGJyPiZndDsgJmd0OyBzcGVha2luZyBIVFRQLiBJIGFncmVlIHRoYXQgYWxsIGNsaWVudCB3
ZWIgc2VydmVycyBTSE9VTEQgZG8gaXQuIEE8YnI+Jmd0OyAmZ3Q7IHBhcnRpY3VsYXIgcHJvdmlk
ZXIgY2FuIGV2ZW4gUkVRVUlSRSBpdCBmb3IgdGhlaXIgcmVnaXN0ZXJlZCBjbGllbnRzLDxicj4m
Z3Q7ICZndDsgYSBzdGVwIHRoYXQgaXMgb3V0c2lkZSB0aGUgc2NvcGUgb2YgT0F1dGguIEJ1dCB0
aGVyZSBhcmUgcmVhbCwgaW4tdXNlPGJyPiZndDsgJmd0OyBwYXR0ZXJucyB0aGF0IGRvbid0IHJl
cXVpcmUgdGhlIGNsaWVudCB0byBtYWtlIGFuIEhUVFAgcmVxdWVzdCB0byBhbjxicj4mZ3Q7ICZn
dDsgZXh0ZXJuYWwgc2VydmljZS48YnI+Jmd0OyAmZ3Q7PGJyPiZndDsgJmd0OyBJIGRvbid0IHNl
ZSBob3cgRmlyZXNoZWVwIGlzIHJlbGV2YW50IHRvIHRoaXMgZGlzY3Vzc2lvbiAtLSBpZiB5b3Vy
PGJyPiZndDsgJmd0OyBicm93c2VyIGlzIG1ha2luZyBhIGNhbGwgdG8gbG9jYWxob3N0IHRvIGdl
dCB0aGUgdG9rZW4sIHdobyBvdXRzaWRlIG9mPGJyPiZndDsgJmd0OyB5b3VyIG1hY2hpbmUgaXMg
Z29pbmcgdG8gZG8gaXQ/IEknbSBub3QgdGFsa2luZyBhYm91dCBjb252ZW5pZW5jZSBmb3I8YnI+
Jmd0OyAmZ3Q7IGRldmVsb3BlcnMgaGVyZSAod2hpY2ggSSB3b3VsZCBhcmd1ZSBzaG91bGQgTk9U
IGJlIGRpc2NvdW50ZWQsIGJ1dDxicj4mZ3Q7ICZndDsgdGhhdCdzIGFub3RoZXIgYXJndW1lbnQp
LCBJJ20gdGFsa2luZyBhYm91dCBjYXNlcyB3aGVyZSB0aGUgYnJvd3Nlcjxicj4mZ3Q7ICZndDsg
aXNuJ3QgZ29pbmcgb3V0c2lkZSBvZiBhIHRydXN0ZWQgc2VjdXJpdHkgYm91bmRhcnkuIFRoZXJl
IGFyZSBhbHNvPGJyPiZndDsgJmd0OyBpbnN0YW5jZXMgd2hlcmUgdGhlcmUgbWF5IG5vdCBldmVu
IGJlIGFuIEhUVFAgdHJhbnNhY3Rpb24gaW52b2x2ZWQsPGJyPiZndDsgJmd0OyBsZXQgYWxvbmUg
b25lIHRoYXQgY291bGQgc3VwcG9ydCBUTFMuPGJyPiZndDsgJmd0Ozxicj4mZ3Q7ICZndDsgLS0g
SnVzdGluPGJyPiZndDsgJmd0Ozxicj4mZ3Q7ICZndDsgT24gTW9uLCAyMDExLTAzLTI4IGF0IDE2
OjI1IC0wNDAwLCBQaGlsIEh1bnQgd3JvdGU6PGJyPiZndDsgJmd0OyZndDsgSnVzdGluLCBIb3cg
aXMgdGhhdCBzbz8gUmVtZW1iZXIgZmlyZXNoZWVwPyZuYnNwOyBJIHdvdWxkbid0IHdhbnQgdGhl
PGJyPiZndDsgYXV0aG9yaXphdGlvbiBjb2RlIGJlaW5nIGV4Y2hhbmdlZCB3aXRob3V0IFRMUyBp
biBhIGNhZmUuIEludGVyY2VwdCBpcyBqdXN0PGJyPiZndDsgdG9vIGVhc3kuIEFuZCBhcyBJIG1l
bnRpb25lZCBlYXJsaWVyLCBjbGllbnQgY3JlZGVudGlhbHMgYXJlIGFscmVhZHkgdmVyeSB3ZWFr
PGJyPiZndDsgaW4gbWFueSBjYXNlcy4gSW4gY29udHJhc3QsIHR3byB3ZWIgc2VydmVycyBhcmUg
aGFyZCB0byBzbmlmZiB1bmxlc3MgeW91IGFyZTxicj4mZ3Q7IGFibGUgdG8gZ2FpbiBhY2Nlc3Mg
dG8gdGhlaXIgbmV0d29yayBjb21tdW5pY2F0aW9ucyBwYXRoLjxicj4mZ3Q7ICZndDsmZ3Q7PGJy
PiZndDsgJmd0OyZndDsgQXMgZm9yIHRlc3RpbmcsIGl0IHNlZW1zIG1vcmUgcmVhc29uYWJsZSB0
byBwdXQgc2VydmVycyBpbiB0ZW1wb3Jhcnkgbm9uLTxicj4mZ3Q7IGNvbXBsaWFuY2Ugd2hpbGUg
dGVzdGluZyByYXRoZXIgdGhlbiBhbGxvdyBub24tc2VjdXJlIHNlcnZlcnMgaW4gcHJvZHVjdGlv
bjxicj4mZ3Q7IGJlY2F1c2Ugb2YgdGhlIFNIT1VMRCBsb29waG9sZS48YnI+Jmd0OyAmZ3Q7Jmd0
Ozxicj4mZ3Q7ICZndDsmZ3Q7IEFsc28sIHdoaWxlIGl0IGRvZXMgc2VlbSBjb252ZW5pZW50IGZv
ciB0aGUgZGV2ZWxvcGVyIG5vdCB0byBoYXZlIHRvIHVzZTxicj4mZ3Q7IFRMUyBmb3IgYXV0aHog
Y29kZXMsIG5vdGUgdGhhdCB0aGUgZGV2ZWxvcGVyIHN0aWxsIGhhcyB0byBoYXZlIFRMUyBlbmFi
bGVkPGJyPiZndDsgd2hlbiBleGNoYW5naW5nIHRoZSBjb2RlIGZvciBhbiBhY2Nlc3MgdG9rZW4u
IFNvIEknbSBub3Qgc3VyZSBob3cgcmVsYXhpbmc8YnI+Jmd0OyBUTFMgZm9yIG9idGFpbmluZyBh
dXRob3JpemF0aW9uIGFjdHVhbGx5IHNpbXBsaWZpZXMgdGhlIGRldmVsb3BlciBsaWZlY3ljbGUg
c2luY2U8YnI+Jmd0OyB0aGV5IHN0aWxsIGhhdmUgdG8gc2V0IGl0IHVwIHRvIHRlc3QgdGhlIG90
aGVyIHBhcnRzLiZuYnNwOyBJbiBteSB2aWV3LCBpdCB3b3VsZCBiZSBvazxicj4mZ3Q7IGZvciBh
IGRldmVsb3BlciB0byB0ZW1wb3JhcmlseSBkaXNhYmxlIFRMUyBldmVyeXdoZXJlIGR1cmluZyBk
ZXZlbG9wbWVudCAtPGJyPiZndDsgLSB3aGljaCBwbGFjZXMgb3BlcmF0aW9uIG91dHNpZGUgUkZD
IGNvbXBsaWFuY2Ugd2hpbGUgZGV2ZWxvcGluZyAtLSBidXQ8YnI+Jmd0OyBmb3JjZXMgY29tcGxp
YW5jZSBvbmNlIHRoZXkgZ28gaW50byBwcm9kdWN0aW9uLjxicj4mZ3Q7ICZndDsmZ3Q7PGJyPiZn
dDsgJmd0OyZndDsgSXQgc2VlbXMgbGlrZSBJIGhhZCB0byBnaXZlIGEgcHJldHR5IHN1YnN0YW50
aWFsIGp1c3RpZmljYXRpb24gYW5kIHdlIGJhY2tlZDxicj4mZ3Q7IG9mZiBiZWNhdXNlIFRMUyBp
cyBzZWVuIGFzIGluY29udmVuaWVudC4gSSB0aGluayB3ZSBuZWVkIG1vcmUgZXZpZGVuY2UgdGhh
dDxicj4mZ3Q7IHRoZXJlIGFyZSBzYWZlIGNhc2VzIHRoYXQgZG9uJ3QgbmVlZCBUTFMuPGJyPiZn
dDsgJmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyBTb3JyeSBmb3IgcHVzaGluZyBoYXJkIG9uIHRo
aXMgb25lLCBidXQgVExTIGlzIHRoZSBiYWNrYm9uZSBvZiBPQXV0aDxicj4mZ3Q7IHNlY3VyaXR5
IGF0IHByZXNlbnQuPGJyPiZndDsgJmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyBQaGlsPGJyPiZn
dDsgJmd0OyZndDsgPGEgaHJlZj0ibWFpbHRvOnBoaWwuaHVudEBvcmFjbGUuY29tIj5waGlsLmh1
bnRAb3JhY2xlLmNvbTwvYT48YnI+Jmd0OyAmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7PGJyPiZn
dDsgJmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7IE9uIDIwMTEtMDMt
MjgsIGF0IDEyOjUyIFBNLCBFcmFuIEhhbW1lci1MYWhhdiB3cm90ZTo8YnI+Jmd0OyAmZ3Q7Jmd0
Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyBObyBjaGFuZ2UgdGhlbi4gQnV0IHRoZSBzZWN1cml0eSBj
b25zaWRlcmF0aW9ucyBzZWN0aW9uIG11c3QgcmVmbGVjdDxicj4mZ3Q7IHRoaXMuPGJyPiZndDsg
Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7IEVITDxicj4mZ3Q7ICZndDsmZ3Q7Jmd0
Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsgLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS08YnI+
Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7IEZyb206IEp1c3RpbiBSaWNoZXIgPGEgaHJlZj0ibWFpbHRv
OlttYWlsdG86anJpY2hlckBtaXRyZS5vcmddIj5bbWFpbHRvOmpyaWNoZXJAbWl0cmUub3JnXTwv
YT48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7IFNlbnQ6IE1vbmRheSwgTWFyY2ggMjgsIDIwMTEg
MTA6MDUgQU08YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7IFRvOiBFcmFuIEhhbW1lci1MYWhhdjxi
cj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsgQ2M6IFBoaWwgSHVudDsgT0F1dGggV0c8YnI+Jmd0OyAm
Z3Q7Jmd0OyZndDsmZ3Q7IFN1YmplY3Q6IFJlOiBbT0FVVEgtV0ddIFdHTEMgb24gZHJhZnQtaWV0
Zi1vYXV0aC12Mi0xMy50eHQ8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZn
dDsmZ3Q7Jmd0OyBXaGF0IGFib3V0IG5vbi1odHRwIHJldHVybiB1cmkncywgb3IgY2xpZW50LWxv
Y2FsaG9zdCwgc3VjaCBhczxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0
OyZndDsmZ3Q7IHNvbWVhcHA6Ly9hcHAvP2NvZGU9Zm9vPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0
Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsgPGEgaHJlZj0iaHR0cDovL2xvY2FsaG9zdDo4NzM0
NS8/Y29kZT1mb28iIHRhcmdldD0iX2JsYW5rIj5odHRwOi8vbG9jYWxob3N0Ojg3MzQ1Lz9jb2Rl
PWZvbzwvYT48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0
OyBIVFRQUyBtYWtlcyBzZW5zZSB3aGVuIHlvdSdyZSB0YWxraW5nIGJldHdlZW4gdHdvIHdlYiBz
ZXJ2ZXJzLCBidXQ8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7IGl0IHNlZW1zIHRvIGZhbGwgYXBh
cnQgb3RoZXJ3aXNlLiBJIHRoaW5rIFNIT1VMRCBpcyBhcHByb3ByaWF0ZSBoZXJlLjxicj4mZ3Q7
ICZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7IC0tIEp1c3Rpbjxicj4m
Z3Q7ICZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0
OyZndDsmZ3Q7Jmd0OyBPbiBGcmksIDIwMTEtMDMtMjUgYXQgMTY6MDMgLTA0MDAsIEVyYW4gSGFt
bWVyLUxhaGF2IHdyb3RlOjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IFVubGVzcyBzb21l
b25lIGhhcyBhbiBvYmplY3Rpb24sIEknbGwgbWFrZSB0aGUgY2hhbmdlIGZyb20gU0hPVUxEPGJy
PiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsgdG88YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7IE1V
U1QuPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0OyBFSEw8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLTxicj4mZ3Q7ICZndDsmZ3Q7
Jmd0OyZndDsmZ3Q7Jmd0OyBGcm9tOiBQaGlsIEh1bnQgPGEgaHJlZj0ibWFpbHRvOlttYWlsdG86
cGhpbC5odW50QG9yYWNsZS5jb21dIj5bbWFpbHRvOnBoaWwuaHVudEBvcmFjbGUuY29tXTwvYT48
YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgU2VudDogRnJpZGF5LCBNYXJjaCAyNSwg
MjAxMSAxMjo0MiBQTTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBUbzogRXJhbiBI
YW1tZXItTGFoYXY8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgQ2M6IE9BdXRoIFdH
OyBDaHVjayAmYW1wOyBNYXJhIE1vcnRpbW9yZTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0OyBTdWJqZWN0OiBSZTogW09BVVRILVdHXSBXR0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgtdjIt
MTMudHh0PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsm
Z3Q7Jmd0OyZndDsmZ3Q7IFJlZ2FyZGluZyB0aGUgbWVzc2FnZTogPGEgaHJlZj0iaHR0cDovL3d3
dy5pZXRmLm9yZy9tYWlsLSIgdGFyZ2V0PSJfYmxhbmsiPmh0dHA6Ly93d3cuaWV0Zi5vcmcvbWFp
bC08L2E+PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IGFyY2hpdmUvd2ViL29hdXRo
L2N1cnJlbnQvbXNnMDU3NjIuaHRtbCZuYnNwOyAoc29ycnkgSSBzb21laG93IGxvc3Q8YnI+Jmd0
OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgdGhlIG1lc3NhZ2UgaW4gbXkgZW1haWwpLjxicj4m
Z3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0OyBUaGlzIGlzc3VlIGlzIHRoZWZ0IG9mIHRoZSBhdXRob3JpemF0aW9uIGNvZGUgZHVyaW5n
IHRoZSByZWRpcmVjdC48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgQXV0aGVudGlj
YXRpbmcgdGhlIGNsaWVudCBpcyBhbiBpbXBvcnRhbnQgZmVhdHVyZSBhbmQgZ29lcyBhIGxvbmc8
YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgd2F5LCBidXQgaXQgaXMgbm90IHN1ZmZp
Y2llbnQgc2luY2UgaW4gbWFueSBjYXNlcywgdGhlPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7IGNsaWVudF9pZC9jbGllbnRfc2VjcmV0IHdpbGwgbGlrZWx5IGJlIGhhcmQgY29kZWQg
YW5kIHJlbGF0aXZlbHk8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgZWFzeSB0byBk
ZWR1Y2UgKGUuZy4gbW9iaWxlIGNsaWVudCBhcHBzKS4mbmJzcDsgT2YgY291cnNlIGEgc3Ryb25n
PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IGNsaWVudCBhdXRoZW50aWNhdGlvbiB3
b24ndCBoYXZlIHRoaXMgaXNzdWUuIFRoaXMgbWFrZXMgbWFueTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyBjb25zdW1lciBzaXR1YXRpb25zIHZlcnkgc3VzY2VwdGlibGUgdG8gYW4g
YXR0YWNrIHdoZXJlIHRoZTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBhdXRob3Jp
emF0aW9uIGNvZGUgaXM8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7IGludGVyY2VwdGVkLjxicj4m
Z3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0OyBGb3IgbW9yZSBpbmZvcm1hdGlvbiBsb29rIGF0IHRoZSBTQU1MIEFydGlmYWN0IGlzc3Vl
cyBpbiBzZWN0aW9uPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IDYuNSAoc3BlY2lm
aWNhbGx5IHN0b2xlbiBhcnRpZmFjdCwgcmVwbGF5LCBldGMpIG9mIHRoaXMgZG9jdW1lbnQ6PGJy
PiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IDxhIGhyZWY9Imh0dHA6Ly9kb2NzLm9hc2lz
LSIgdGFyZ2V0PSJfYmxhbmsiPmh0dHA6Ly9kb2NzLm9hc2lzLTwvYT48YnI+Jmd0OyAmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyZndDsgb3Blbi5vcmcvc2VjdXJpdHkvc2FtbC92Mi4wL3NhbWwtc2VjLWNv
bnNpZGVyLTIuMC1vcy5wZGY8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0
OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgVGhlcmUgYXJlIGEgbnVtYmVyIG9mIHJlbWVkaWF0
aW9ucyBzdWdnZXN0ZWQgKHNtYWxsIGxpZmV0aW1lLDxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7Jmd0OyBzaW5nbGUgdXNlKSwgYnV0IHRoZSBmb3VuZGF0aW9uYWwgb25lIGlzIGNvbmZpZGVu
dGlhbGl0eSBvZiB0aGU8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgZXhjaGFuZ2Ug
KFRMUykuIEhlbmNlIHRoZSByZWNvbW1lbmRhdGlvbiB0aGF0IHRoZSByZXR1cm4gb2YgYW48YnI+
Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgYXV0aG9yaXphdGlvbiBjb2RlIGJlIGtlcHQg
c2VjdXJlIHdpdGggYSBNVVNUIGZvciBUTFMuPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IFBoaWw8YnI+Jmd0OyAmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyZndDsgPGEgaHJlZj0ibWFpbHRvOnBoaWwuaHVudEBvcmFjbGUuY29tIj5w
aGlsLmh1bnRAb3JhY2xlLmNvbTwvYT48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8
YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyZndDsgT24gMjAxMS0wMy0yNCwgYXQgNzoyMiBQTSwgQ2h1Y2sgTW9ydGlt
b3JlIHdyb3RlOjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsm
Z3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7IE9uIE1hciAyNCwgMjAxMSwgYXQgNjozNiBQTSwgJnF1b3Q7RXJhbiBIYW1tZXItTGFoYXYm
cXVvdDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgJmx0OzxhIGhyZWY9Im1haWx0
bzplcmFuQGh1ZW5pdmVyc2UuY29tIj5lcmFuQGh1ZW5pdmVyc2UuY29tPC9hPiZndDsgd3JvdGU6
PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tPGJyPiZndDsgJmd0OyZndDsmZ3Q7
Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IEZyb206IDxhIGhyZWY9Im1haWx0bzpvYXV0aC1ib3Vu
Y2VzQGlldGYub3JnIj5vYXV0aC1ib3VuY2VzQGlldGYub3JnPC9hPiBbPGEgaHJlZj0iL21jL2Nv
bXBvc2U/dG89b2F1dGgiIHRhcmdldD0iX2JsYW5rIj5tYWlsdG86b2F1dGg8L2E+LTxicj4mZ3Q7
IDxhIGhyZWY9Im1haWx0bzpib3VuY2VzQGlldGYub3JnIj5ib3VuY2VzQGlldGYub3JnPC9hPl08
YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgT24gQmVoYWxmIE9m
IENodWNrIE1vcnRpbW9yZTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0OyBTZW50OiBNb25kYXksIE1hcmNoIDE0LCAyMDExIDY6MTAgUE08YnI+Jmd0OyAmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyAxKSBJJ2Qgdm90ZSBmb3IgZHJvcHBpbmcgdGhlIGZvbGxvd2luZyBmcm9t
IDEuNC4yLiZuYnNwOyZuYnNwOyZuYnNwO0luIHR1cm4gSSdkPGJyPiZndDsgZGlzY3Vzczxicj4m
Z3Q7ICZndDsmZ3Q7Jmd0OyZndDsgc29tZTxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
OyBvZjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyB0aGUgc2Vj
dXJpdHkgY29uc2lkZXJhdGlvbnMsIHN1Y2ggYXMgZGlmZmljdWx0eSBvZiBwcm90ZWN0aW5nPGJy
PiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IGEgY2xpZW50X3NlY3Jl
dCBpbiBhbG1vc3QgYWxsIHVzZS1jYXNlcyBvZiB0aGlzIHByb2ZpbGUuPGJyPiZndDsgJmd0OyZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jm5ic3A7ICZxdW90O0ltcGxpY2l0IGdyYW50cyBpbXByb3ZlIHRo
ZSByZXNwb25zaXZlbmVzcyBhbmQgZWZmaWNpZW5jeSBvZjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBzb21lIGNsaWVudHMgKHN1Y2ggYXMgYSBjbGllbnQgaW1w
bGVtZW50ZWQgYXMgYW4gaW4tYnJvd3Nlcjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyBhcHBsaWNhdGlvbikgc2luY2UgaXQgcmVkdWNlcyB0aGUgbnVtYmVyIG9m
IHJvdW5kIHRyaXBzPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
IHJlcXVpcmVkIHRvIG9idGFpbiBhbiBhY2Nlc3MgdG9rZW4uJnF1b3Q7PGJyPiZndDsgJmd0OyZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7Jmd0OyBXaHkgZHJvcCBpdD8gV2hhdCBhYm91dCBpdCBpc24ndCBhY2N1cmF0ZT88YnI+
Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyBJdCdzIGFjY3VyYXRlLCBidXQgbXkgb3BpbmlvbiBpcyBpdCBzZW5kcyB0
aGUgd3JvbmcgbWVzc2FnZS4mbmJzcDsmbmJzcDsmbmJzcDtJdCdzPGJyPiZndDsgY2xlYXJseTxi
cj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsgdGhlPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7IGxlc3Mgc2VjdXJlIG9mIHRoZSByZXNwb25zZSB0eXBlcy4mbmJzcDsgQnkgcG9zaXRpb25p
bmcgaXQgYXMgdGhlIG1vc3Q8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgcGVyZm9y
bWFudCBwZW9wbGUgbWF5IGZpbmQgdGhhdCBhdHRyYWN0aXZlIGFuZCBtYWtlIHRoZSB3cm9uZzxi
cj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBzZWN1cml0eTxicj4mZ3Q7ICZndDsmZ3Q7
Jmd0OyZndDsgZGVjaXNpb24uPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxi
cj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsm
Z3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7Jmd0OyAyKSBTZWN0aW9uIDIuMSwgd2Ugc2hvdWxkIE1VU1QgVExTIGV2ZW4gZm9yIEF1dGhv
cml6YXRpb24gQ29kZS48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxi
cj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IFdoeT8gV2hhdCdzIHRoZSBh
dHRhY2sgdmVjdG9yPzxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0
OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IFNlZSBQaGlscyBjb21tZW50IG9uIHBhc3Qg
ZXhwZXJpZW5jZSB3aXRoIGFydGlmYWN0IGJpbmRpbmdzLjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7Jmd0OyZndDsgU3BlYyBzaG91bGQ8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZn
dDsgZGVmYXVsdCBmb3Igc2VjdXJpdHkgYWx3YXlzIG9uLCBhbmQgbGV0IGRlcGxveW1lbnRzIHRo
YXQgZG9uJ3Q8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgd2FudCB0byB1c2UgSFRU
UHMgc2ltcGx5IGJlIG5vbi1jb25mb3JtYW50Ljxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7
ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyAzKSBTZWN0aW9uIDQuMS4zIC0g
bm90IGNsZWFyIHRvIG1lIHdoeSByZWRpcmVjdF91cmkgaXM8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsm
Z3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgUkVRVUlSRUQgc2luY2UgaW4gNC4xLjEgaXQncyAmcXVv
dDtSRVFVSVJFRCB1bmxlc3MmcXVvdDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IFRoZSBjbGll
bnQgc2hvdWxkIGFsd2F5cyBjb25maXJtIHdoZXJlIHRoZSBjb2RlIHdhcyBzZW50IHRvLiBJdDxi
cj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IGNhbiBvbWl0PGJyPiZndDsg
Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IHRoZSByZWRpcmVjdGlvbiBpcyBvbmUgd2FzIHByb3Zp
ZGVkIGJ1dCBzaG91bGQgdGVsbCB0aGUgc2VydmVyPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7IHdoZXJlIGl0IHdlbnQgdG8uIFRoaXMgaXMgbW9yZSBjb25zaXN0ZW50IG9uIHRoZSB2
ZXJpZmljYXRpb248YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgc2lkZSwgYnV0IGlm
IHRoZSBvcmlnaW5hbCBmbG93IGRlc2lnbmVycyB3YW50IHRvIGNoaW1lIGluIChEaWNrLDxicj4m
Z3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBCcmlhbiwgZXRjLj8pLCBJJ20gb3Blbjxicj4m
Z3Q7ICZndDsmZ3Q7Jmd0OyZndDsgdG8gY2hhbmdlIHRoaXMuPGJyPiZndDsgJmd0OyZndDsmZ3Q7
Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0OyZndDsgNCkgU2VjdGlvbiA0LjIuMiAtIHdoZW4gZGlkIHdlIGRyb3AgcmVmcmVzaF90b2tl
bj8mbmJzcDsgJm5ic3A7Jm5ic3A7Jm5ic3A7SSBhc3N1bWU8YnI+Jmd0OyB0aGlzPGJyPiZndDsg
Jmd0OyZndDsmZ3Q7Jmd0OyBnb2VzPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7IGJhY2sgdG8gZGlzYWdyZWVtZW50IG9uIGhvdyBiZXN0IHRvIGhhbmRsZSBuYXRp
dmUgY2xpZW50cy4gSSdkPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsm
Z3Q7IHByZWZlciBpdCB0byBzaW1wbHkgcmVmZXJlbmNlIDUuMSBhbmQgbGVhdmUgd2hhdCBpcyBp
c3N1ZWQgdXA8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgdG8g
dGhlIHNlY3VyaXR5IHByb2ZpbGUgb2YgdGhlIHBhcnRpY3VsYXIgZGVwbG95bWVudCBhcyB0byB3
aGF0IGlzPGJyPiZndDsgaXNzdWVkLjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZn
dDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgLTA4IEp1bmUg
MjAxMC48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZn
dDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IFRoaXMgaGFzIGJlZW4gZGVjaWRlZCBmb3Ig
YSBsb25nIHRpbWUuIEknbSBub3QgZWFnZXIgdG8gY2hhbmdlIGl0Ljxicj4mZ3Q7ICZndDsmZ3Q7
Jmd0OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
IFRoYW5rcyAtIEkgY2FuIGxpdmUgd2l0aCBpdC4mbmJzcDsgVW5mb3J0dW5hdGVseSB3ZSBzdGls
bCBzZWVtIHRvIGJlPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyBmcmFnbWVu
dGluZyBvbjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyB0aGUgbmF0aXZlIGNsaWVu
dCBhcHByb2FjaC4mbmJzcDsmbmJzcDsmbmJzcDtHb29kIHRvcGljIGZvciBJSVcgSSBzdXNwZWN0
PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyZndDsgLWNtb3J0PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0
OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgRUhMPGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
Ozxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsgX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX188YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0
OyZndDsmZ3Q7IE9BdXRoIG1haWxpbmcgbGlzdDxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7
Jmd0OyZndDsgPGEgaHJlZj0ibWFpbHRvOk9BdXRoQGlldGYub3JnIj5PQXV0aEBpZXRmLm9yZzwv
YT48YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IDxhIGhyZWY9Imh0dHBzOi8v
d3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vb2F1dGgiIHRhcmdldD0iX2JsYW5rIj5odHRw
czovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoPC9hPjxicj4mZ3Q7ICZndDsm
Z3Q7Jmd0OyZndDsmZ3Q7PGJyPiZndDsgJmd0OyZndDsmZ3Q7Jmd0OyZndDsgX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX188YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsm
Z3Q7Jmd0OyBPQXV0aCBtYWlsaW5nIGxpc3Q8YnI+Jmd0OyAmZ3Q7Jmd0OyZndDsmZ3Q7Jmd0OyA8
YSBocmVmPSJtYWlsdG86T0F1dGhAaWV0Zi5vcmciPk9BdXRoQGlldGYub3JnPC9hPjxicj4mZ3Q7
ICZndDsmZ3Q7Jmd0OyZndDsmZ3Q7IDxhIGhyZWY9Imh0dHBzOi8vd3d3LmlldGYub3JnL21haWxt
YW4vbGlzdGluZm8vb2F1dGgiIHRhcmdldD0iX2JsYW5rIj5odHRwczovL3d3dy5pZXRmLm9yZy9t
YWlsbWFuL2xpc3RpbmZvL29hdXRoPC9hPjxicj4mZ3Q7ICZndDsmZ3Q7Jmd0OyZndDs8YnI+Jmd0
OyAmZ3Q7Jmd0OyZndDs8YnI+Jmd0OyAmZ3Q7Jmd0Ozxicj4mZ3Q7ICZndDs8YnI+Jmd0OyAmZ3Q7
PGJyPjxicj5fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxi
cj5PQXV0aCBtYWlsaW5nIGxpc3Q8YnI+PGEgaHJlZj0ibWFpbHRvOk9BdXRoQGlldGYub3JnIj5P
QXV0aEBpZXRmLm9yZzwvYT48YnI+PGEgaHJlZj0iaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1h
bi9saXN0aW5mby9vYXV0aCIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vd3d3LmlldGYub3JnL21h
aWxtYW4vbGlzdGluZm8vb2F1dGg8L2E+PG86cD48L286cD48L3A+PC9kaXY+PC90ZD48L3RyPjwv
dGFibGU+PHByZT4gJm5ic3A7PG86cD48L286cD48L3ByZT48cHJlPiAmbmJzcDs8bzpwPjwvbzpw
PjwvcHJlPjxwcmU+X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X188bzpwPjwvbzpwPjwvcHJlPjxwcmU+T0F1dGggbWFpbGluZyBsaXN0PG86cD48L286cD48L3By
ZT48cHJlPjxhIGhyZWY9Ii9tYy9jb21wb3NlP3RvPU9BdXRoQGlldGYub3JnIiB0YXJnZXQ9Il9i
bGFuayI+T0F1dGhAaWV0Zi5vcmc8L2E+PG86cD48L286cD48L3ByZT48cHJlPjxhIGhyZWY9Imh0
dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vb2F1dGgiIHRhcmdldD0iX2JsYW5r
Ij5odHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoPC9hPjxvOnA+PC9v
OnA+PC9wcmU+PC9kaXY+PC9kaXY+PC9kaXY+PC90ZD48L3RyPjwvdGFibGU+PHAgY2xhc3M9TXNv
Tm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiJDYWxpYnJp
Iiwic2Fucy1zZXJpZiInPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD48L2Rpdj48L2Rpdj48
L2Rpdj48L2JvZHk+PC9odG1sPg==

--_000_90C41DD21FB7C64BB94121FBBC2E723446564305EAP3PW5EX1MB01E_--

From fcorella@pomcor.com  Tue Mar 29 16:41:26 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D7CB028C0EC for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:41:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.52
X-Spam-Level: 
X-Spam-Status: No, score=-2.52 tagged_above=-999 required=5 tests=[AWL=0.077,  BAYES_00=-2.599, HTML_MESSAGE=0.001, WEIRD_PORT=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fiTiwePLhnPq for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 16:41:24 -0700 (PDT)
Received: from web55802.mail.re3.yahoo.com (web55802.mail.re3.yahoo.com [216.252.110.48]) by core3.amsl.com (Postfix) with SMTP id EAD4D3A6A8F for <oauth@ietf.org>; Tue, 29 Mar 2011 16:41:23 -0700 (PDT)
Received: (qmail 87098 invoked by uid 60001); 29 Mar 2011 23:43:00 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1301442180; bh=81YYJa3WEGfxgWbyMkueKWzU+Qzl70x+qoYDrNhCgtc=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=dhKH7wB/biwf18ozRUed2i/agryUvbLqL3VdlMlCEme7Ka5eUjM/y2wHY1LRhkjzdJxrjltssT2oLfIkCRX3bihU2dNTED1jWAyIf2d8T8E/aYWGHhp5qAk1VnoEu836I9DYTZD9T5NA3UdkZtLdpNErzFpUf6Udyi0k2dBniUs=
Message-ID: <442968.76031.qm@web55802.mail.re3.yahoo.com>
X-YMail-OSG: fXSEdvYVM1nvA9cGoyhL9Rn.KDrGaAuw14okSyS.9CQjPSq ipX97mwVG2uwfI5tlV5PVTInF1AJoKN.6e3J97cjnigh6HGIrv5qt7xYkeYg BUY_SI0yCN558.eHCvPGgfYHNRx6pl93Ta.gDJ1gKBbNOvegUUOWRsf3RyVZ q68SWjoS3UzscpW4RRMcDHZAHpUAlVNzl_uPOoacyzashoDGzygWdXRFXFXt zn57d8Ms85XQmDfr6Vd4_WmXDd8OL.MG2lI_APdZyDFg4KM_iRvNoDw3FRhG Mk7zJ1JPNvroYO47pbgB9OryyRVPcx_XbLzyXMOzp5nGV0Ik.MMooW9ect8F 5Z8ft.tYQC.eg7xq9P2ToPizY.zVehPgskIAMm7NzWmWC3rLK1dwZqx_SQZl mOxraUrUyUa8.
Received: from [67.91.91.101] by web55802.mail.re3.yahoo.com via HTTP; Tue, 29 Mar 2011 16:43:00 PDT
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/12.0.2 YahooMailWebService/0.8.109.295617
Date: Tue, 29 Mar 2011 16:43:00 -0700 (PDT)
From: Francisco Corella <fcorella@pomcor.com>
To: George Fletcher <gffletch@aol.com>, Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-162668874-1301442180=:76031"
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2011 23:41:27 -0000

--0-162668874-1301442180=:76031
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

They don't use it because they don't know it's needed.=C2=A0 If they knew t=
hat not using it is as dangerous to their users as sending passwords in the=
 clear they would use it.=C2=A0 And I doubt the IETF is going to endorse a =
protocol that sends credentials in the clear.

Francisco

--- On Tue, 3/29/11, Eran Hammer-Lahav <eran@hueniverse.com> wrote:

From: Eran Hammer-Lahav <eran@hueniverse.com>
Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: "fcorella@pomcor.com" <fcorella@pomcor.com>, "George Fletcher" <gffletc=
h@aol.com>
Cc: "Phil Hunt" <phil.hunt@oracle.com>, "Justin Richer" <jricher@mitre.org>=
, "OAuth WG" <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Date: Tuesday, March 29, 2011, 11:29 PM

Twitter and Facebook can=E2=80=99t require all their application developers=
 to deploy TLS. Just not going to happen. How many clients today use TLS fo=
r their callbacks? I=E2=80=99m guessing less than half. =C2=A0I am advocati=
ng TLS on the server side, because it is already required there for other e=
ndpoints. But on the client there is currently no such requirements. Making=
 the callback a MUST use TLS is a huge change. =C2=A0EHL =C2=A0From: Franci=
sco Corella [mailto:fcorella@pomcor.com]=20
Sent: Tuesday, March 29, 2011 3:50 PM
To: George Fletcher; Eran Hammer-Lahav
Cc: Phil Hunt; Justin Richer; OAuth WG; Karen P. Lewison
Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt =C2=A0> As a mat=
ter of practicality, requiring all clients to deploy
> server-side TLS is absurd. If we mandate redirections URIs to use
> https, we are basically making everyone ignore it. It=E2=80=99s like a sp=
eed
> limit sign of 5mph.

Why is that?=C2=A0 Can you elaborate?=C2=A0 I'm very puzzled.=C2=A0 And did=
n't you
propose requiring TLS a few messages back?

Francisco

--- On Tue, 3/29/11, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
From: Eran Hammer-Lahav <eran@hueniverse.com>
Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: "George Fletcher" <gffletch@aol.com>, "fcorella@pomcor.com" <fcorella@p=
omcor.com>
Cc: "Phil Hunt" <phil.hunt@oracle.com>, "Justin Richer" <jricher@mitre.org>=
, "OAuth WG" <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Date: Tuesday, March 29, 2011, 7:46 PMAs a matter of practicality, requirin=
g all clients to deploy server-side TLS is absurd. If we mandate redirectio=
ns URIs to use https, we are basically making everyone ignore it. It=E2=80=
=99s like a speed limit sign of 5mph.=C2=A0EHL=C2=A0From: George Fletcher [=
mailto:gffletch@aol.com]=20
Sent: Tuesday, March 29, 2011 10:55 AM
To: fcorella@pomcor.com
Cc: Phil Hunt; Justin Richer; Eran Hammer-Lahav; OAuth WG; Karen P. Lewison
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt=C2=A0Hi Francisc=
o,

So the examples that Justin gave were either localhost or non HTTP based sc=
hemes. If OAuth2 is to support these other schemes (often used in mobile cl=
ients) then I'm not sure how TLS can be a MUST unless it's qualified to app=
ly to HTTP based URLs only.

Is it sufficient to document this possible exposure in the security section=
 such that the spec doesn't preclude the use of OAuth2 with non HTTP based =
redirect_uri?

Thanks,
George

On 3/29/11 1:05 PM, Francisco Corella wrote: Eran,

It's not a reasonable compromise.=C2=A0 #2 MUST use tls UNLESS of course it=
 targets localhost.=C2=A0 If #2 is sent without TLS to a Web server, the au=
thorization code can be easily intercepted by an attacker.=C2=A0 The attack=
er can then use it to obtain protected resources by submitting the authoriz=
ation code to the client.=C2=A0 (This is independent of whether the client =
authenticates itself when exchanging the authorization code for an access t=
oken or not.) In the Facebook use case, the attacker can use the authorizat=
ion code to log in to the client using the user's Facebook identity.=C2=A0 =
I believe this vulnerability exists in many implementations of the Facebook=
 login button today.

Btw, I've pointed this out before three or four times on this mailing list,=
 including in a response to the WGLC that you never replied to.

Francisco

--- On Mon, 3/28/11, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
From: Eran Hammer-Lahav <eran@hueniverse.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: "Phil Hunt" <phil.hunt@oracle.com>, "Justin Richer" <jricher@mitre.org>
Cc: "OAuth WG" <oauth@ietf.org>
Date: Monday, March 28, 2011, 10:28 PMThe code is returned in two steps:

1. The authorization server replies to the user-agent request (providing au=
thorization) with a redirection instruction typically using the Location re=
sponse header field.
2. The user-agent makes an HTTP GET request to the provided location (which=
 may be something other than an HTTP URI, or an HTTP URI to localhost).

#1 is an HTTP response to a user-agent request to the authorization endpoin=
t (or a subsequent one if the server implementation has multiple authorizat=
ion steps).

#2 is an HTTP request made by the user-agent.

In order for the code to be secure end-to-end, both steps must use TLS. The=
 arguments made against making TLS required are based on use cases for #2. =
We can make #1 (the authorization endpoint require TLS since it already has=
 to support it for the 'token' response type. We should make callbacks a SH=
OULD for TLS.

Does this sound like a reasonable compromise?

EHL

> -----Original Message-----
> From: Phil Hunt [mailto:phil.hunt@oracle.com]
> Sent: Monday, March 28, 2011 2:28 PM
> To: Justin Richer
> Cc: Eran Hammer-Lahav; OAuth WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> This was referring to section 2.1 that the authorization server must use =
TLS
> when returning an authorization code.
>=20
> If it doesn't use TLS then the code being returned to the client can be
> intercepted.
>=20
> Or did I miss something?
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> On 2011-03-28, at 1:37 PM, Justin Richer wrote:
>=20
> > Phil,
> >
> > The main difference is that it's a requirement on the *client* instead
> > of the *provider* side of the equation, and clients aren't always even
> > speaking HTTP. I agree that all client web servers SHOULD do it. A
> > particular provider can even REQUIRE it for their registered clients,
> > a step that is outside the scope of OAuth. But there are real, in-use
> > patterns that don't require the client to make an HTTP request to an
> > external service.
> >
> > I don't see how Firesheep is relevant to this discussion -- if your
> > browser is making a call to localhost to get the token, who outside of
> > your machine is going to do it? I'm not talking about convenience for
> > developers here (which I would argue should NOT be discounted, but
> > that's another argument), I'm talking about cases where the browser
> > isn't going outside of a trusted security boundary. There are also
> > instances where there may not even be an HTTP transaction involved,
> > let alone one that could support TLS.
> >
> > -- Justin
> >
> > On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:
> >> Justin, How is that so? Remember firesheep?=C2=A0 I wouldn't want the
> authorization code being exchanged without TLS in a cafe. Intercept is ju=
st
> too easy. And as I mentioned earlier, client credentials are already very=
 weak
> in many cases. In contrast, two web servers are hard to sniff unless you =
are
> able to gain access to their network communications path.
> >>
> >> As for testing, it seems more reasonable to put servers in temporary n=
on-
> compliance while testing rather then allow non-secure servers in producti=
on
> because of the SHOULD loophole.
> >>
> >> Also, while it does seem convenient for the developer not to have to u=
se
> TLS for authz codes, note that the developer still has to have TLS enable=
d
> when exchanging the code for an access token. So I'm not sure how relaxin=
g
> TLS for obtaining authorization actually simplifies the developer lifecyc=
le since
> they still have to set it up to test the other parts.=C2=A0 In my view, i=
t would be ok
> for a developer to temporarily disable TLS everywhere during development =
-
> - which places operation outside RFC compliance while developing -- but
> forces compliance once they go into production.
> >>
> >> It seems like I had to give a pretty substantial justification and we =
backed
> off because TLS is seen as inconvenient. I think we need more evidence th=
at
> there are safe cases that don't need TLS.
> >>
> >> Sorry for pushing hard on this one, but TLS is the backbone of OAuth
> security at present.
> >>
> >> Phil
> >> phil.hunt@oracle.com
> >>
> >>
> >>
> >>
> >> On 2011-03-28, at 12:52 PM, Eran Hammer-Lahav wrote:
> >>
> >>> No change then. But the security considerations section must reflect
> this.
> >>>
> >>> EHL
> >>>
> >>>> -----Original Message-----
> >>>> From: Justin Richer [mailto:jricher@mitre.org]
> >>>> Sent: Monday, March 28, 2011 10:05 AM
> >>>> To: Eran Hammer-Lahav
> >>>> Cc: Phil Hunt; OAuth WG
> >>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>>
> >>>> What about non-http return uri's, or client-localhost, such as
> >>>>
> >>>> someapp://app/?code=3Dfoo
> >>>>
> >>>> http://localhost:87345/?code=3Dfoo
> >>>>
> >>>> HTTPS makes sense when you're talking between two web servers, but
> >>>> it seems to fall apart otherwise. I think SHOULD is appropriate here=
.
> >>>>
> >>>> -- Justin
> >>>>
> >>>>
> >>>> On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote:
> >>>>> Unless someone has an objection, I'll make the change from SHOULD
> >>>>> to
> >>>> MUST.
> >>>>>
> >>>>> EHL
> >>>>>
> >>>>>> -----Original Message-----
> >>>>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
> >>>>>> Sent: Friday, March 25, 2011 12:42 PM
> >>>>>> To: Eran Hammer-Lahav
> >>>>>> Cc: OAuth WG; Chuck & Mara Mortimore
> >>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>>>>
> >>>>>> Regarding the message: http://www.ietf.org/mail-
> >>>>>> archive/web/oauth/current/msg05762.html=C2=A0 (sorry I somehow los=
t
> >>>>>> the message in my email).
> >>>>>>
> >>>>>> This issue is theft of the authorization code during the redirect.
> >>>>>> Authenticating the client is an important feature and goes a long
> >>>>>> way, but it is not sufficient since in many cases, the
> >>>>>> client_id/client_secret will likely be hard coded and relatively
> >>>>>> easy to deduce (e.g. mobile client apps).=C2=A0 Of course a strong
> >>>>>> client authentication won't have this issue. This makes many
> >>>>>> consumer situations very susceptible to an attack where the
> >>>>>> authorization code is
> >>>> intercepted.
> >>>>>>
> >>>>>> For more information look at the SAML Artifact issues in section
> >>>>>> 6.5 (specifically stolen artifact, replay, etc) of this document:
> >>>>>> http://docs.oasis-
> >>>>>> open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
> >>>>>>
> >>>>>> There are a number of remediations suggested (small lifetime,
> >>>>>> single use), but the foundational one is confidentiality of the
> >>>>>> exchange (TLS). Hence the recommendation that the return of an
> >>>>>> authorization code be kept secure with a MUST for TLS.
> >>>>>>
> >>>>>> Phil
> >>>>>> phil.hunt@oracle.com
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:
> >>>>>>
> >>>>>>>
> >>>>>>> On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"
> >>>>>> <eran@hueniverse.com> wrote:
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> -----Original Message-----
> >>>>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-
> bounces@ietf.org]
> >>>>>>>>> On Behalf Of Chuck Mortimore
> >>>>>>>>> Sent: Monday, March 14, 2011 6:10 PM
> >>>>>>>>
> >>>>>>>>> 1) I'd vote for dropping the following from 1.4.2.=C2=A0=C2=A0=
=C2=A0In turn I'd
> discuss
> >>>> some
> >>>>>> of
> >>>>>>>>> the security considerations, such as difficulty of protecting
> >>>>>>>>> a client_secret in almost all use-cases of this profile.
> >>>>>>>>>
> >>>>>>>>>=C2=A0 "Implicit grants improve the responsiveness and efficienc=
y of
> >>>>>>>>> some clients (such as a client implemented as an in-browser
> >>>>>>>>> application) since it reduces the number of round trips
> >>>>>>>>> required to obtain an access token."
> >>>>>>>>
> >>>>>>>> Why drop it? What about it isn't accurate?
> >>>>>>>
> >>>>>>> It's accurate, but my opinion is it sends the wrong message.=C2=
=A0=C2=A0=C2=A0It's
> clearly
> >>>> the
> >>>>>> less secure of the response types.=C2=A0 By positioning it as the =
most
> >>>>>> performant people may find that attractive and make the wrong
> >>>>>> security
> >>>> decision.
> >>>>>>>
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> 2) Section 2.1, we should MUST TLS even for Authorization Code.
> >>>>>>>>
> >>>>>>>> Why? What's the attack vector?
> >>>>>>>
> >>>>>>> See Phils comment on past experience with artifact bindings.
> >>>>>>> Spec should
> >>>>>> default for security always on, and let deployments that don't
> >>>>>> want to use HTTPs simply be non-conformant.
> >>>>>>>
> >>>>>>>>
> >>>>>>>>> 3) Section 4.1.3 - not clear to me why redirect_uri is
> >>>>>>>>> REQUIRED since in 4.1.1 it's "REQUIRED unless"
> >>>>>>>>
> >>>>>>>> The client should always confirm where the code was sent to. It
> >>>>>>>> can omit
> >>>>>> the redirection is one was provided but should tell the server
> >>>>>> where it went to. This is more consistent on the verification
> >>>>>> side, but if the original flow designers want to chime in (Dick,
> >>>>>> Brian, etc.?), I'm open
> >>>> to change this.
> >>>>>>>>
> >>>>>>>>> 4) Section 4.2.2 - when did we drop refresh_token?=C2=A0 =C2=A0=
=C2=A0=C2=A0I assume
> this
> >>>> goes
> >>>>>>>>> back to disagreement on how best to handle native clients. I'd
> >>>>>>>>> prefer it to simply reference 5.1 and leave what is issued up
> >>>>>>>>> to the security profile of the particular deployment as to what=
 is
> issued.
> >>>>>>>>
> >>>>>>>> -08 June 2010.
> >>>>>>>>
> >>>>>>>> This has been decided for a long time. I'm not eager to change i=
t.
> >>>>>>>
> >>>>>>> Thanks - I can live with it.=C2=A0 Unfortunately we still seem to=
 be
> >>>>>>> fragmenting on
> >>>>>> the native client approach.=C2=A0=C2=A0=C2=A0Good topic for IIW I =
suspect
> >>>>>>>
> >>>>>>> -cmort
> >>>>>>>
> >>>>>>>>
> >>>>>>>> EHL
> >>>>>>>>
> >>>>>>>>
> >>>>>>> _______________________________________________
> >>>>>>> OAuth mailing list
> >>>>>>> OAuth@ietf.org
> >>>>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>>
> >>>>> _______________________________________________
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>>
> >>>
> >>
> >
> >

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth =C2=A0 =C2=A0__________________=
_____________________________OAuth mailing listOAuth@ietf.orghttps://www.ie=
tf.org/mailman/listinfo/oauth =C2=A0
--0-162668874-1301442180=:76031
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">They don't use it because they don't know it'=
s needed.&nbsp; If they knew that not using it is as dangerous to their use=
rs as sending passwords in the clear they would use it.&nbsp; And I doubt t=
he IETF is going to endorse a protocol that sends credentials in the clear.=
<br><br>Francisco<br><br>--- On <b>Tue, 3/29/11, Eran Hammer-Lahav <i>&lt;e=
ran@hueniverse.com&gt;</i></b> wrote:<br><blockquote style=3D"border-left: =
2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"><br>From:=
 Eran Hammer-Lahav &lt;eran@hueniverse.com&gt;<br>Subject: RE: [OAUTH-WG] W=
GLC on draft-ietf-oauth-v2-13.txt<br>To: "fcorella@pomcor.com" &lt;fcorella=
@pomcor.com&gt;, "George Fletcher" &lt;gffletch@aol.com&gt;<br>Cc: "Phil Hu=
nt" &lt;phil.hunt@oracle.com&gt;, "Justin Richer" &lt;jricher@mitre.org&gt;=
, "OAuth WG" &lt;oauth@ietf.org&gt;, "Karen P. Lewison"
 &lt;kplewison@pomcor.com&gt;<br>Date: Tuesday, March 29, 2011, 11:29 PM<br=
><br><div id=3D"yiv262702292"><style><!--=0A#yiv262702292  =0A _filtered #y=
iv262702292 {font-family:Calibri;=0Apanose-1:2 15 5 2 2 2 4 3 2 4;}=0A _fil=
tered #yiv262702292 {font-family:Tahoma;=0Apanose-1:2 11 6 4 3 5 4 4 2 4;}=
=0A _filtered #yiv262702292 {font-family:Consolas;=0Apanose-1:2 11 6 9 2 2 =
4 3 2 4;}=0A#yiv262702292  =0A#yiv262702292 p.yiv262702292MsoNormal, #yiv26=
2702292 li.yiv262702292MsoNormal, #yiv262702292 div.yiv262702292MsoNormal=
=0A=09{margin:0in;=0Amargin-bottom:.0001pt;=0Afont-size:12.0pt;=0Afont-fami=
ly:"serif";}=0A#yiv262702292 a:link, #yiv262702292 span.yiv262702292MsoHype=
rlink=0A=09{=0Acolor:blue;=0Atext-decoration:underline;}=0A#yiv262702292 a:=
visited, #yiv262702292 span.yiv262702292MsoHyperlinkFollowed=0A=09{=0Acolor=
:purple;=0Atext-decoration:underline;}=0A#yiv262702292 pre=0A=09{=0A=0Amarg=
in:0in;=0Amargin-bottom:.0001pt;=0Afont-size:10.0pt;=0Afont-family:"Courier=
 New";}=0A#yiv262702292 span.yiv262702292HTMLPreformattedChar=0A=09{=0A=0A=
=0Afont-family:Consolas;}=0A#yiv262702292 p.yiv262702292msonormal, #yiv2627=
02292 li.yiv262702292msonormal, #yiv262702292 div.yiv262702292msonormal=0A=
=09{=0A=0Amargin-right:0in;=0A=0Amargin-left:0in;=0Afont-size:12.0pt;=0Afon=
t-family:"serif";}=0A#yiv262702292 p.yiv262702292msochpdefault, #yiv2627022=
92 li.yiv262702292msochpdefault, #yiv262702292 div.yiv262702292msochpdefaul=
t=0A=09{=0A=0Amargin-right:0in;=0A=0Amargin-left:0in;=0Afont-size:12.0pt;=
=0Afont-family:"serif";}=0A#yiv262702292 span.yiv262702292msohyperlink=0A=
=09{}=0A#yiv262702292 span.yiv262702292msohyperlinkfollowed=0A=09{}=0A#yiv2=
62702292 span.yiv262702292htmlpreformattedchar=0A=09{}=0A#yiv262702292 span=
.yiv262702292emailstyle19=0A=09{}=0A#yiv262702292 p.yiv262702292msonormal1,=
 #yiv262702292 li.yiv262702292msonormal1, #yiv262702292 div.yiv262702292mso=
normal1=0A=09{=0Amargin:0in;=0Amargin-bottom:.0001pt;=0Afont-size:12.0pt;=
=0Afont-family:"serif";=0Acolor:black;}=0A#yiv262702292 span.yiv262702292ms=
ohyperlink1=0A=09{=0Acolor:blue;=0Atext-decoration:underline;}=0A#yiv262702=
292 span.yiv262702292msohyperlinkfollowed1=0A=09{=0Acolor:purple;=0Atext-de=
coration:underline;}=0A#yiv262702292 span.yiv262702292htmlpreformattedchar1=
=0A=09{=0Afont-family:Consolas;=0Acolor:black;}=0A#yiv262702292 span.yiv262=
702292emailstyle191=0A=09{=0Afont-family:"sans-serif";=0Acolor:#1F497D;}=0A=
#yiv262702292 p.yiv262702292msochpdefault1, #yiv262702292 li.yiv262702292ms=
ochpdefault1, #yiv262702292 div.yiv262702292msochpdefault1=0A=09{=0A=0Amarg=
in-right:0in;=0A=0Amargin-left:0in;=0Afont-size:10.0pt;=0Afont-family:"seri=
f";}=0A#yiv262702292 span.yiv262702292EmailStyle31=0A=09{=0Afont-family:"sa=
ns-serif";=0Acolor:#1F497D;}=0A#yiv262702292 .yiv262702292MsoChpDefault=0A=
=09{=0Afont-family:"sans-serif";}=0A _filtered #yiv262702292 {=0Amargin:1.0=
in 1.0in 1.0in 1.0in;}=0A#yiv262702292 div.yiv262702292WordSection1=0A=09{}=
=0A--></style><div class=3D"yiv262702292WordSection1"><p class=3D"yiv262702=
292MsoNormal"><span style=3D"font-size: 11pt; font-family: &quot;sans-serif=
&quot;; color: rgb(31, 73, 125);">Twitter and Facebook can=E2=80=99t requir=
e all their application developers to deploy TLS. Just not going to happen.=
 How many clients today use TLS for their callbacks? I=E2=80=99m guessing l=
ess than half.</span></p><p class=3D"yiv262702292MsoNormal"><span style=3D"=
font-size: 11pt; font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 12=
5);"> &nbsp;</span></p><p class=3D"yiv262702292MsoNormal"><span style=3D"fo=
nt-size: 11pt; font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 125)=
;">I am advocating TLS on the server side, because it is already required t=
here for other endpoints. But on the client there is currently no such requ=
irements. Making the callback a MUST use TLS is a huge change.</span></p><p=
 class=3D"yiv262702292MsoNormal"><span style=3D"font-size: 11pt; font-famil=
y: &quot;sans-serif&quot;;
 color: rgb(31, 73, 125);"> &nbsp;</span></p><p class=3D"yiv262702292MsoNor=
mal"><span style=3D"font-size: 11pt; font-family: &quot;sans-serif&quot;; c=
olor: rgb(31, 73, 125);">EHL</span></p><p class=3D"yiv262702292MsoNormal"><=
span style=3D"font-size: 11pt; font-family: &quot;sans-serif&quot;; color: =
rgb(31, 73, 125);"> &nbsp;</span></p><div style=3D"border-width: medium med=
ium medium 1.5pt; border-style: none none none solid; border-color: -moz-us=
e-text-color -moz-use-text-color -moz-use-text-color blue; padding: 0in 0in=
 0in 4pt;"><div><div style=3D"border-right: medium none; border-width: 1pt =
medium medium; border-style: solid none none; border-color: rgb(181, 196, 2=
23) -moz-use-text-color -moz-use-text-color; padding: 3pt 0in 0in;"><p clas=
s=3D"yiv262702292MsoNormal"><b><span style=3D"font-size: 10pt; font-family:=
 &quot;sans-serif&quot;;">From:</span></b><span style=3D"font-size: 10pt; f=
ont-family: &quot;sans-serif&quot;;"> Francisco Corella [mailto:fcorella@po=
mcor.com]
 <br><b>Sent:</b> Tuesday, March 29, 2011 3:50 PM<br><b>To:</b> George Flet=
cher; Eran Hammer-Lahav<br><b>Cc:</b> Phil Hunt; Justin Richer; OAuth WG; K=
aren P. Lewison<br><b>Subject:</b> RE: [OAUTH-WG] WGLC on draft-ietf-oauth-=
v2-13.txt</span></p></div></div><p class=3D"yiv262702292MsoNormal"> &nbsp;<=
/p><table class=3D"yiv262702292MsoNormalTable" border=3D"0" cellpadding=3D"=
0" cellspacing=3D"0"><tbody><tr><td style=3D"padding: 0in;" valign=3D"top">=
<p class=3D"yiv262702292MsoNormal">&gt; As a matter of practicality, requir=
ing all clients to deploy<br>&gt; server-side TLS is absurd. If we mandate =
redirections URIs to use<br>&gt; https, we are basically making everyone ig=
nore it. It=E2=80=99s like a speed<br>&gt; limit sign of 5mph.<br><br>Why i=
s that?&nbsp; Can you elaborate?&nbsp; I'm very puzzled.&nbsp; And didn't y=
ou<br>propose requiring TLS a few messages back?<br><br>Francisco<br><br>--=
- On <b>Tue, 3/29/11, Eran Hammer-Lahav <i>&lt;<a rel=3D"nofollow"
 ymailto=3D"mailto:eran@hueniverse.com" target=3D"_blank" href=3D"/mc/compo=
se?to=3Deran@hueniverse.com">eran@hueniverse.com</a>&gt;</i></b> wrote:</p>=
<p class=3D"yiv262702292MsoNormal" style=3D"margin-bottom: 12pt;"><br>From:=
 Eran Hammer-Lahav &lt;<a rel=3D"nofollow" ymailto=3D"mailto:eran@huenivers=
e.com" target=3D"_blank" href=3D"/mc/compose?to=3Deran@hueniverse.com">eran=
@hueniverse.com</a>&gt;<br>Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth=
-v2-13.txt<br>To: "George Fletcher" &lt;<a rel=3D"nofollow" ymailto=3D"mail=
to:gffletch@aol.com" target=3D"_blank" href=3D"/mc/compose?to=3Dgffletch@ao=
l.com">gffletch@aol.com</a>&gt;, "<a rel=3D"nofollow" ymailto=3D"mailto:fco=
rella@pomcor.com" target=3D"_blank" href=3D"/mc/compose?to=3Dfcorella@pomco=
r.com">fcorella@pomcor.com</a>" &lt;<a rel=3D"nofollow" ymailto=3D"mailto:f=
corella@pomcor.com" target=3D"_blank" href=3D"/mc/compose?to=3Dfcorella@pom=
cor.com">fcorella@pomcor.com</a>&gt;<br>Cc: "Phil Hunt" &lt;<a rel=3D"nofol=
low" ymailto=3D"mailto:phil.hunt@oracle.com"
 target=3D"_blank" href=3D"/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt=
@oracle.com</a>&gt;, "Justin Richer" &lt;<a rel=3D"nofollow" ymailto=3D"mai=
lto:jricher@mitre.org" target=3D"_blank" href=3D"/mc/compose?to=3Djricher@m=
itre.org">jricher@mitre.org</a>&gt;, "OAuth WG" &lt;<a rel=3D"nofollow" yma=
ilto=3D"mailto:oauth@ietf.org" target=3D"_blank" href=3D"/mc/compose?to=3Do=
auth@ietf.org">oauth@ietf.org</a>&gt;, "Karen P. Lewison" &lt;<a rel=3D"nof=
ollow" ymailto=3D"mailto:kplewison@pomcor.com" target=3D"_blank" href=3D"/m=
c/compose?to=3Dkplewison@pomcor.com">kplewison@pomcor.com</a>&gt;<br>Date: =
Tuesday, March 29, 2011, 7:46 PM</p><div id=3D"yiv262702292"><div><p class=
=3D"yiv262702292msonormal"><span style=3D"font-size: 11pt; font-family: &qu=
ot;sans-serif&quot;; color: rgb(31, 73, 125);">As a matter of practicality,=
 requiring all clients to deploy server-side TLS is absurd. If we mandate r=
edirections URIs to use https, we are basically making everyone ignore it. =
It=E2=80=99s like a speed limit sign of
 5mph.</span></p><p class=3D"yiv262702292msonormal"><span style=3D"font-siz=
e: 11pt; font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 125);">&nb=
sp;</span></p><p class=3D"yiv262702292msonormal"><span style=3D"font-size: =
11pt; font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 125);">EHL</s=
pan></p><p class=3D"yiv262702292msonormal"><span style=3D"font-size: 11pt; =
font-family: &quot;sans-serif&quot;; color: rgb(31, 73, 125);">&nbsp;</span=
></p><div style=3D"border-width: medium medium medium 1.5pt; border-style: =
none none none solid; border-color: -moz-use-text-color -moz-use-text-color=
 -moz-use-text-color windowtext; padding: 0in 0in 0in 4pt;"><div><div style=
=3D"border-right: medium none; border-width: 1pt medium medium; border-styl=
e: solid none none; border-color: windowtext -moz-use-text-color -moz-use-t=
ext-color; padding: 3pt 0in 0in;"><p class=3D"yiv262702292msonormal"><b><sp=
an style=3D"font-size: 10pt; font-family: &quot;sans-serif&quot;;">From:</s=
pan></b><span
 style=3D"font-size: 10pt; font-family: &quot;sans-serif&quot;;"> George Fl=
etcher [mailto:gffletch@aol.com] <br><b>Sent:</b> Tuesday, March 29, 2011 1=
0:55 AM<br><b>To:</b> fcorella@pomcor.com<br><b>Cc:</b> Phil Hunt; Justin R=
icher; Eran Hammer-Lahav; OAuth WG; Karen P. Lewison<br><b>Subject:</b> Re:=
 [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt</span></p></div></div><p cla=
ss=3D"yiv262702292msonormal">&nbsp;</p><p class=3D"yiv262702292msonormal"><=
span style=3D"font-family: &quot;sans-serif&quot;;">Hi Francisco,<br><br>So=
 the examples that Justin gave were either localhost or non HTTP based sche=
mes. If OAuth2 is to support these other schemes (often used in mobile clie=
nts) then I'm not sure how TLS can be a MUST unless it's qualified to apply=
 to HTTP based URLs only.<br><br>Is it sufficient to document this possible=
 exposure in the security section such that the spec doesn't preclude the u=
se of OAuth2 with non HTTP based
 redirect_uri?<br><br>Thanks,<br>George<br></span><br>On 3/29/11 1:05 PM, F=
rancisco Corella wrote: </p><table class=3D"yiv262702292MsoNormalTable" bor=
der=3D"0" cellpadding=3D"0" cellspacing=3D"0"><tbody><tr><td style=3D"paddi=
ng: 0in;" valign=3D"top"><p class=3D"yiv262702292msonormal" style=3D"margin=
-bottom: 12pt;">Eran,<br><br>It's not a reasonable compromise.&nbsp; #2 MUS=
T use tls UNLESS of course it targets localhost.&nbsp; If #2 is sent withou=
t TLS to a Web server, the authorization code can be easily intercepted by =
an attacker.&nbsp; The attacker can then use it to obtain protected resourc=
es by submitting the authorization code to the client.&nbsp; (This is indep=
endent of whether the client authenticates itself when exchanging the autho=
rization code for an access token or not.) In the Facebook use case, the at=
tacker can use the authorization code to log in to the client using the use=
r's Facebook identity.&nbsp; I believe this vulnerability exists in many
 implementations of the Facebook login button today.<br><br>Btw, I've point=
ed this out before three or four times on this mailing list, including in a=
 response to the WGLC that you never replied to.<br><br>Francisco<br><br>--=
- On <b>Mon, 3/28/11, Eran Hammer-Lahav <i><a rel=3D"nofollow">&lt;eran@hue=
niverse.com&gt;</a></i></b> wrote:</p><p class=3D"yiv262702292msonormal" st=
yle=3D"margin-bottom: 12pt;"><br>From: Eran Hammer-Lahav <a rel=3D"nofollow=
">&lt;eran@hueniverse.com&gt;</a><br>Subject: Re: [OAUTH-WG] WGLC on draft-=
ietf-oauth-v2-13.txt<br>To: "Phil Hunt" <a rel=3D"nofollow">&lt;phil.hunt@o=
racle.com&gt;</a>, "Justin Richer" <a rel=3D"nofollow">&lt;jricher@mitre.or=
g&gt;</a><br>Cc: "OAuth WG" <a rel=3D"nofollow">&lt;oauth@ietf.org&gt;</a><=
br>Date: Monday, March 28, 2011, 10:28 PM</p><div><p class=3D"yiv262702292m=
sonormal">The code is returned in two steps:<br><br>1. The authorization se=
rver replies to the user-agent request (providing authorization) with a red=
irection
 instruction typically using the Location response header field.<br>2. The =
user-agent makes an HTTP GET request to the provided location (which may be=
 something other than an HTTP URI, or an HTTP URI to localhost).<br><br>#1 =
is an HTTP response to a user-agent request to the authorization endpoint (=
or a subsequent one if the server implementation has multiple authorization=
 steps).<br><br>#2 is an HTTP request made by the user-agent.<br><br>In ord=
er for the code to be secure end-to-end, both steps must use TLS. The argum=
ents made against making TLS required are based on use cases for #2. We can=
 make #1 (the authorization endpoint require TLS since it already has to su=
pport it for the 'token' response type. We should make callbacks a SHOULD f=
or TLS.<br><br>Does this sound like a reasonable compromise?<br><br>EHL<br>=
<br>&gt; -----Original Message-----<br>&gt; From: Phil Hunt <a rel=3D"nofol=
low" ymailto=3D"mailto:[mailto:phil.hunt@oracle.com]" target=3D"_blank"
 href=3D"/mc/compose?to=3D[mailto:phil.hunt@oracle.com]">[mailto:phil.hunt@=
oracle.com]</a><br>&gt; Sent: Monday, March 28, 2011 2:28 PM<br>&gt; To: Ju=
stin Richer<br>&gt; Cc: Eran Hammer-Lahav; OAuth WG<br>&gt; Subject: Re: [O=
AUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<br>&gt; <br>&gt; This was refer=
ring to section 2.1 that the authorization server must use TLS<br>&gt; when=
 returning an authorization code.<br>&gt; <br>&gt; If it doesn't use TLS th=
en the code being returned to the client can be<br>&gt; intercepted.<br>&gt=
; <br>&gt; Or did I miss something?<br>&gt; <br>&gt; Phil<br>&gt; <a rel=3D=
"nofollow" ymailto=3D"mailto:phil.hunt@oracle.com" target=3D"_blank" href=
=3D"/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.com</a><br>&gt;=
 <br>&gt; <br>&gt; <br>&gt; <br>&gt; On 2011-03-28, at 1:37 PM, Justin Rich=
er wrote:<br>&gt; <br>&gt; &gt; Phil,<br>&gt; &gt;<br>&gt; &gt; The main di=
fference is that it's a requirement on the *client* instead<br>&gt; &gt; of=
 the
 *provider* side of the equation, and clients aren't always even<br>&gt; &g=
t; speaking HTTP. I agree that all client web servers SHOULD do it. A<br>&g=
t; &gt; particular provider can even REQUIRE it for their registered client=
s,<br>&gt; &gt; a step that is outside the scope of OAuth. But there are re=
al, in-use<br>&gt; &gt; patterns that don't require the client to make an H=
TTP request to an<br>&gt; &gt; external service.<br>&gt; &gt;<br>&gt; &gt; =
I don't see how Firesheep is relevant to this discussion -- if your<br>&gt;=
 &gt; browser is making a call to localhost to get the token, who outside o=
f<br>&gt; &gt; your machine is going to do it? I'm not talking about conven=
ience for<br>&gt; &gt; developers here (which I would argue should NOT be d=
iscounted, but<br>&gt; &gt; that's another argument), I'm talking about cas=
es where the browser<br>&gt; &gt; isn't going outside of a trusted security=
 boundary. There are also<br>&gt; &gt; instances where there may not
 even be an HTTP transaction involved,<br>&gt; &gt; let alone one that coul=
d support TLS.<br>&gt; &gt;<br>&gt; &gt; -- Justin<br>&gt; &gt;<br>&gt; &gt=
; On Mon, 2011-03-28 at 16:25 -0400, Phil Hunt wrote:<br>&gt; &gt;&gt; Just=
in, How is that so? Remember firesheep?&nbsp; I wouldn't want the<br>&gt; a=
uthorization code being exchanged without TLS in a cafe. Intercept is just<=
br>&gt; too easy. And as I mentioned earlier, client credentials are alread=
y very weak<br>&gt; in many cases. In contrast, two web servers are hard to=
 sniff unless you are<br>&gt; able to gain access to their network communic=
ations path.<br>&gt; &gt;&gt;<br>&gt; &gt;&gt; As for testing, it seems mor=
e reasonable to put servers in temporary non-<br>&gt; compliance while test=
ing rather then allow non-secure servers in production<br>&gt; because of t=
he SHOULD loophole.<br>&gt; &gt;&gt;<br>&gt; &gt;&gt; Also, while it does s=
eem convenient for the developer not to have to use<br>&gt; TLS for
 authz codes, note that the developer still has to have TLS enabled<br>&gt;=
 when exchanging the code for an access token. So I'm not sure how relaxing=
<br>&gt; TLS for obtaining authorization actually simplifies the developer =
lifecycle since<br>&gt; they still have to set it up to test the other part=
s.&nbsp; In my view, it would be ok<br>&gt; for a developer to temporarily =
disable TLS everywhere during development -<br>&gt; - which places operatio=
n outside RFC compliance while developing -- but<br>&gt; forces compliance =
once they go into production.<br>&gt; &gt;&gt;<br>&gt; &gt;&gt; It seems li=
ke I had to give a pretty substantial justification and we backed<br>&gt; o=
ff because TLS is seen as inconvenient. I think we need more evidence that<=
br>&gt; there are safe cases that don't need TLS.<br>&gt; &gt;&gt;<br>&gt; =
&gt;&gt; Sorry for pushing hard on this one, but TLS is the backbone of OAu=
th<br>&gt; security at present.<br>&gt; &gt;&gt;<br>&gt; &gt;&gt;
 Phil<br>&gt; &gt;&gt; <a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@orac=
le.com" target=3D"_blank" href=3D"/mc/compose?to=3Dphil.hunt@oracle.com">ph=
il.hunt@oracle.com</a><br>&gt; &gt;&gt;<br>&gt; &gt;&gt;<br>&gt; &gt;&gt;<b=
r>&gt; &gt;&gt;<br>&gt; &gt;&gt; On 2011-03-28, at 12:52 PM, Eran Hammer-La=
hav wrote:<br>&gt; &gt;&gt;<br>&gt; &gt;&gt;&gt; No change then. But the se=
curity considerations section must reflect<br>&gt; this.<br>&gt; &gt;&gt;&g=
t;<br>&gt; &gt;&gt;&gt; EHL<br>&gt; &gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; -=
----Original Message-----<br>&gt; &gt;&gt;&gt;&gt; From: Justin Richer <a r=
el=3D"nofollow" ymailto=3D"mailto:[mailto:jricher@mitre.org]" target=3D"_bl=
ank" href=3D"/mc/compose?to=3D[mailto:jricher@mitre.org]">[mailto:jricher@m=
itre.org]</a><br>&gt; &gt;&gt;&gt;&gt; Sent: Monday, March 28, 2011 10:05 A=
M<br>&gt; &gt;&gt;&gt;&gt; To: Eran Hammer-Lahav<br>&gt; &gt;&gt;&gt;&gt; C=
c: Phil Hunt; OAuth WG<br>&gt; &gt;&gt;&gt;&gt; Subject: Re: [OAUTH-WG] WGL=
C on
 draft-ietf-oauth-v2-13.txt<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&g=
t; What about non-http return uri's, or client-localhost, such as<br>&gt; &=
gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; someapp://app/?code=3Dfoo<br>&gt; =
&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; <a rel=3D"nofollow" target=3D"_bl=
ank"  href=3D"http://localhost:87345/?code=3Dfoo">http://localhost:87345/?c=
ode=3Dfoo</a><br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; HTTPS makes=
 sense when you're talking between two web servers, but<br>&gt; &gt;&gt;&gt=
;&gt; it seems to fall apart otherwise. I think SHOULD is appropriate here.=
<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; -- Justin<br>&gt; &gt;&g=
t;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt; On Fri, 2011-0=
3-25 at 16:03 -0400, Eran Hammer-Lahav wrote:<br>&gt; &gt;&gt;&gt;&gt;&gt; =
Unless someone has an objection, I'll make the change from SHOULD<br>&gt; &=
gt;&gt;&gt;&gt;&gt; to<br>&gt; &gt;&gt;&gt;&gt; MUST.<br>&gt;
 &gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt; EHL<br>&gt; &gt;&gt;&gt;=
&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; -----Original Message-----<br>&gt=
; &gt;&gt;&gt;&gt;&gt;&gt; From: Phil Hunt <a rel=3D"nofollow" ymailto=3D"m=
ailto:[mailto:phil.hunt@oracle.com]" target=3D"_blank" href=3D"/mc/compose?=
to=3D[mailto:phil.hunt@oracle.com]">[mailto:phil.hunt@oracle.com]</a><br>&g=
t; &gt;&gt;&gt;&gt;&gt;&gt; Sent: Friday, March 25, 2011 12:42 PM<br>&gt; &=
gt;&gt;&gt;&gt;&gt;&gt; To: Eran Hammer-Lahav<br>&gt; &gt;&gt;&gt;&gt;&gt;&=
gt; Cc: OAuth WG; Chuck &amp; Mara Mortimore<br>&gt; &gt;&gt;&gt;&gt;&gt;&g=
t; Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<br>&gt; &gt;&=
gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Regarding the message:=
 <a rel=3D"nofollow" target=3D"_blank" href=3D"http://www.ietf.org/mail-">h=
ttp://www.ietf.org/mail-</a><br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; archive/web/o=
auth/current/msg05762.html&nbsp; (sorry I somehow lost<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt; the message in my email).<br>&gt; &gt;&gt;&gt;&gt=
;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; This issue is theft of the autho=
rization code during the redirect.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Authent=
icating the client is an important feature and goes a long<br>&gt; &gt;&gt;=
&gt;&gt;&gt;&gt; way, but it is not sufficient since in many cases, the<br>=
&gt; &gt;&gt;&gt;&gt;&gt;&gt; client_id/client_secret will likely be hard c=
oded and relatively<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; easy to deduce (e.g. m=
obile client apps).&nbsp; Of course a strong<br>&gt; &gt;&gt;&gt;&gt;&gt;&g=
t; client authentication won't have this issue. This makes many<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt; consumer situations very susceptible to an attack whe=
re the<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; authorization code is<br>&gt; &gt;&=
gt;&gt;&gt; intercepted.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&=
gt;&gt;&gt;&gt; For more information look at the SAML Artifact
 issues in section<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; 6.5 (specifically stole=
n artifact, replay, etc) of this document:<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;=
 <a rel=3D"nofollow" target=3D"_blank" href=3D"http://docs.oasis-">http://d=
ocs.oasis-</a><br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; open.org/security/saml/v2.0=
/saml-sec-consider-2.0-os.pdf<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;=
&gt;&gt;&gt;&gt;&gt; There are a number of remediations suggested (small li=
fetime,<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; single use), but the foundational =
one is confidentiality of the<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; exchange (TL=
S). Hence the recommendation that the return of an<br>&gt; &gt;&gt;&gt;&gt;=
&gt;&gt; authorization code be kept secure with a MUST for TLS.<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Phil<br>&gt; &gt;&gt=
;&gt;&gt;&gt;&gt; <a rel=3D"nofollow" ymailto=3D"mailto:phil.hunt@oracle.co=
m" target=3D"_blank"
 href=3D"/mc/compose?to=3Dphil.hunt@oracle.com">phil.hunt@oracle.com</a><br=
>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;=
&gt;&gt;&gt; On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote:<br>&gt; &gt;=
&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&=
gt;&gt;&gt;&gt;&gt; On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav"<br>&gt=
; &gt;&gt;&gt;&gt;&gt;&gt; &lt;<a rel=3D"nofollow" ymailto=3D"mailto:eran@h=
ueniverse.com" target=3D"_blank" href=3D"/mc/compose?to=3Deran@hueniverse.c=
om">eran@hueniverse.com</a>&gt; wrote:<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;=
<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&=
gt;&gt;&gt; -----Original Message-----<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;=
&gt;&gt; From: <a rel=3D"nofollow" ymailto=3D"mailto:oauth-bounces@ietf.org=
" target=3D"_blank"
 href=3D"/mc/compose?to=3Doauth-bounces@ietf.org">oauth-bounces@ietf.org</a=
> [<a rel=3D"nofollow">mailto:oauth</a>-<br>&gt; <a rel=3D"nofollow" ymailt=
o=3D"mailto:bounces@ietf.org" target=3D"_blank" href=3D"/mc/compose?to=3Dbo=
unces@ietf.org">bounces@ietf.org</a>]<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&=
gt;&gt; On Behalf Of Chuck Mortimore<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&g=
t;&gt; Sent: Monday, March 14, 2011 6:10 PM<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt=
;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 1) I'd vote for drop=
ping the following from 1.4.2.&nbsp;&nbsp;&nbsp;In turn I'd<br>&gt; discuss=
<br>&gt; &gt;&gt;&gt;&gt; some<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; of<br>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; the security considerations, such as d=
ifficulty of protecting<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; a clie=
nt_secret in almost all use-cases of this profile.<br>&gt; &gt;&gt;&gt;&gt;=
&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&nbsp; "Im=
plicit
 grants improve the responsiveness and efficiency of<br>&gt; &gt;&gt;&gt;&g=
t;&gt;&gt;&gt;&gt;&gt; some clients (such as a client implemented as an in-=
browser<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; application) since it =
reduces the number of round trips<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&=
gt; required to obtain an access token."<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&g=
t;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why drop it? What about it =
isn't accurate?<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&g=
t;&gt;&gt;&gt; It's accurate, but my opinion is it sends the wrong message.=
&nbsp;&nbsp;&nbsp;It's<br>&gt; clearly<br>&gt; &gt;&gt;&gt;&gt; the<br>&gt;=
 &gt;&gt;&gt;&gt;&gt;&gt; less secure of the response types.&nbsp; By posit=
ioning it as the most<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; performant people ma=
y find that attractive and make the wrong<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; =
security<br>&gt; &gt;&gt;&gt;&gt; decision.<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&g=
t; 2) Section 2.1, we should MUST TLS even for Authorization Code.<br>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; W=
hy? What's the attack vector?<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;&gt; See Phils comment on past experience with arti=
fact bindings.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Spec should<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt; default for security always on, and let deployments t=
hat don't<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; want to use HTTPs simply be non-=
conformant.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&g=
t;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 3) Section 4.1.=
3 - not clear to me why redirect_uri is<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt=
;&gt;&gt; REQUIRED since in 4.1.1 it's "REQUIRED unless"<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; =
The client should always confirm where the code was sent to. It<br>&gt; &gt=
;&gt;&gt;&gt;&gt;&gt;&gt;&gt; can omit<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; the=
 redirection is one was provided but should tell the server<br>&gt; &gt;&gt=
;&gt;&gt;&gt;&gt; where it went to. This is more consistent on the verifica=
tion<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; side, but if the original flow design=
ers want to chime in (Dick,<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; Brian, etc.?),=
 I'm open<br>&gt; &gt;&gt;&gt;&gt; to change this.<br>&gt; &gt;&gt;&gt;&gt;=
&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; 4) Section 4.=
2.2 - when did we drop refresh_token?&nbsp; &nbsp;&nbsp;&nbsp;I assume<br>&=
gt; this<br>&gt; &gt;&gt;&gt;&gt; goes<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;=
&gt;&gt; back to disagreement on how best to handle native clients. I'd<br>=
&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; prefer it to simply
 reference 5.1 and leave what is issued up<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;=
&gt;&gt;&gt; to the security profile of the particular deployment as to wha=
t is<br>&gt; issued.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&=
gt;&gt;&gt;&gt;&gt;&gt;&gt; -08 June 2010.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;=
&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; This has been decided for=
 a long time. I'm not eager to change it.<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&=
gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; Thanks - I can live with it.&nbsp;=
 Unfortunately we still seem to be<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; fra=
gmenting on<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt; the native client approach.&nb=
sp;&nbsp;&nbsp;Good topic for IIW I suspect<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt=
;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; -cmort<br>&gt; &gt;&gt;&gt;&gt;&=
gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&g=
t;&gt;&gt;&gt;&gt; EHL<br>&gt;
 &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<=
br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; ______________________________________=
_________<br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>&gt; &=
gt;&gt;&gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow" ymailto=3D"mailto:OAuth@iet=
f.org" target=3D"_blank" href=3D"/mc/compose?to=3DOAuth@ietf.org">OAuth@iet=
f.org</a><br>&gt; &gt;&gt;&gt;&gt;&gt;&gt;&gt; <a rel=3D"nofollow" target=
=3D"_blank" href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://ww=
w.ietf.org/mailman/listinfo/oauth</a><br>&gt; &gt;&gt;&gt;&gt;&gt;<br>&gt; =
&gt;&gt;&gt;&gt;&gt; _______________________________________________<br>&gt=
; &gt;&gt;&gt;&gt;&gt; OAuth mailing list<br>&gt; &gt;&gt;&gt;&gt;&gt; <a r=
el=3D"nofollow" ymailto=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D=
"/mc/compose?to=3DOAuth@ietf.org">OAuth@ietf.org</a><br>&gt; &gt;&gt;&gt;&g=
t;&gt; <a rel=3D"nofollow" target=3D"_blank"
 href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a><br>&gt; &gt;&gt;&gt;&gt;<br>&gt; &gt;&gt;&gt;<br=
>&gt; &gt;&gt;<br>&gt; &gt;<br>&gt; &gt;<br><br>___________________________=
____________________<br>OAuth mailing list<br><a rel=3D"nofollow" ymailto=
=3D"mailto:OAuth@ietf.org" target=3D"_blank" href=3D"/mc/compose?to=3DOAuth=
@ietf.org">OAuth@ietf.org</a><br><a rel=3D"nofollow" target=3D"_blank" href=
=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailm=
an/listinfo/oauth</a></p></div></td></tr></tbody></table><pre> &nbsp;</pre>=
<pre> &nbsp;</pre><pre>_______________________________________________</pre=
><pre>OAuth mailing list</pre><pre><a rel=3D"nofollow">OAuth@ietf.org</a></=
pre><pre><a rel=3D"nofollow" target=3D"_blank" href=3D"https://www.ietf.org=
/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a></p=
re></div></div></div></td></tr></tbody></table><p class=3D"yiv262702292MsoN=
ormal"><span
 style=3D"font-size: 10pt; font-family: &quot;sans-serif&quot;;"> &nbsp;</s=
pan></p></div></div></div></blockquote></td></tr></table>
--0-162668874-1301442180=:76031--

From dick.hardt@gmail.com  Tue Mar 29 21:00:50 2011
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 258C63A6A28 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 21:00:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.515
X-Spam-Level: 
X-Spam-Status: No, score=-3.515 tagged_above=-999 required=5 tests=[AWL=0.083,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KmJY3PJKU8H7 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 21:00:49 -0700 (PDT)
Received: from mail-pw0-f44.google.com (mail-pw0-f44.google.com [209.85.160.44]) by core3.amsl.com (Postfix) with ESMTP id B492D3A6996 for <oauth@ietf.org>; Tue, 29 Mar 2011 21:00:48 -0700 (PDT)
Received: by pwi5 with SMTP id 5so183497pwi.31 for <oauth@ietf.org>; Tue, 29 Mar 2011 21:02:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:subject:mime-version:content-type:from :in-reply-to:date:cc:message-id:references:to:x-mailer; bh=nx5Je0N6no1erxA1uvNqdJmtjTAlSswC+SU/j9bT1Dg=; b=SFKUvtABNvDAP4gvhkrDHZ7P8jZa60i7q0Lwka7bzlnihDzwM4f0Zv5n16A3nYY6Kt kxQEPMUhE85iXsG10aiRKUes3nhJlz0URGjcuAFGVvQd/AmEeloYnJNtDi/L0Oif92QW CCXQf/xZgt4QzoPGf8U/AB396UbIN5YbkTWjs=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :message-id:references:to:x-mailer; b=nXakMOnBspSXpFhEbVHf4AOXcA/ejSqmPe2vEH9oNd8gWn05OCu/yLB+wJdrUDKZT1 B7Z23yecLYWaAN4Lh4OvO3PCTB0ddRZjC+YJfSEXdf9d2LlP5S0IugTGDbvBauuG3oRw qDeMqJWbuuT1ZzCHbW2kGW1o0WrdJOR8Y8Jhw=
Received: by 10.142.174.12 with SMTP id w12mr532203wfe.158.1301457747356; Tue, 29 Mar 2011 21:02:27 -0700 (PDT)
Received: from [192.168.1.16] (c-69-181-71-149.hsd1.ca.comcast.net [69.181.71.149]) by mx.google.com with ESMTPS id 25sm8120959wfb.10.2011.03.29.21.02.24 (version=TLSv1/SSLv3 cipher=OTHER); Tue, 29 Mar 2011 21:02:25 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-32-1027995841
From: Dick Hardt <dick.hardt@gmail.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Tue, 29 Mar 2011 21:02:22 -0700
Message-Id: <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
Cc: WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 04:00:50 -0000

--Apple-Mail-32-1027995841
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252


On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:

> To clarify, I am not opposed to mandating TLS on the callback, just =
that if we do, we can=92t ship the protocol the way it is without coming =
up with some other alternative that does not require TLS deployment on =
the client side. OAuth 1.0 has no such requirement and adding it in 2.0 =
is completely unexpected by the community at large.

I only recall the concern with TLS to be on the server side, not the =
client side -- and I don't think that it is unexpected at all.

> =20
> It would be helpful to hear from some companies with large 1.0 or 2.0 =
deployment on this matter? Anyone from Google, Facebook, Yahoo, Twitter, =
etc.?


When working on OAuth-WRAP, I talked to all of those companies about =
using TLS, and only Facebook said that they wanted an option to be able =
to not require TLS. Since then, all Facebook's new APIs which are =
essentially using OAuth 2.0 run on TLS.




--Apple-Mail-32-1027995841
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><base href=3D"x-msg://362/"></head><body style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><br><div><div>On 2011-03-29, at 4:40 PM, Eran =
Hammer-Lahav wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">To =
clarify, I am not opposed to mandating TLS on the callback, just that if =
we do, we can=92t ship the protocol the way it is without coming up with =
some other alternative that does not require TLS deployment on the =
client side. OAuth 1.0 has no such requirement and adding it in 2.0 is =
completely unexpected by the community at =
large.</span></div></div></div></span></blockquote><div><br></div><div>I =
only recall the concern with TLS to be on the server side, not the =
client side -- and I don't think that it is unexpected at =
all.</div><br><blockquote type=3D"cite"><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; orphans: 2; text-indent: 0px; =
text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p></o:p></span></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif; "><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">It =
would be helpful to hear from some companies with large 1.0 or 2.0 =
deployment on this matter? Anyone from Google, Facebook, Yahoo, Twitter, =
etc.?</span></div></div></div></span></blockquote></div><div><br></div><di=
v>When working on OAuth-WRAP, I talked to all of those companies about =
using TLS, and only Facebook said that they wanted an option to be able =
to not require TLS. Since then, all Facebook's new APIs which are =
essentially using OAuth 2.0 run on =
TLS.</div><div><br></div><div><br></div><div><br></div></body></html>=

--Apple-Mail-32-1027995841--

From eran@hueniverse.com  Tue Mar 29 22:06:31 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CA54D3A6AAE for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 22:06:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.637
X-Spam-Level: 
X-Spam-Status: No, score=-2.637 tagged_above=-999 required=5 tests=[AWL=-0.039, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CBg4f1t0y9Pl for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 22:06:26 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id EF17F3A6AAF for <oauth@ietf.org>; Tue, 29 Mar 2011 22:06:25 -0700 (PDT)
Received: (qmail 27054 invoked from network); 30 Mar 2011 05:08:03 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 30 Mar 2011 05:08:03 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Tue, 29 Mar 2011 22:07:20 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Dick Hardt <dick.hardt@gmail.com>
Date: Tue, 29 Mar 2011 22:07:13 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: Acvuj0lBc7IT5UP5RzqEJ9ugQrBrGQACNPOw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com>
In-Reply-To: <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E723446564305FFP3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 05:06:31 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E723446564305FFP3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I think you got this backwards. We're talking about forcing developers usin=
g the Facebook (or any other service) API to deploy their own TLS endpoint =
for the incoming callback (via redirection). Every developer will need to g=
et a cert and deploy an HTTPS endpoint.

That's has never been discussed.

EHL

From: Dick Hardt [mailto:dick.hardt@gmail.com]
Sent: Tuesday, March 29, 2011 9:02 PM
To: Eran Hammer-Lahav
Cc: WG
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt


On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:


To clarify, I am not opposed to mandating TLS on the callback, just that if=
 we do, we can't ship the protocol the way it is without coming up with som=
e other alternative that does not require TLS deployment on the client side=
. OAuth 1.0 has no such requirement and adding it in 2.0 is completely unex=
pected by the community at large.

I only recall the concern with TLS to be on the server side, not the client=
 side -- and I don't think that it is unexpected at all.



It would be helpful to hear from some companies with large 1.0 or 2.0 deplo=
yment on this matter? Anyone from Google, Facebook, Yahoo, Twitter, etc.?

When working on OAuth-WRAP, I talked to all of those companies about using =
TLS, and only Facebook said that they wanted an option to be able to not re=
quire TLS. Since then, all Facebook's new APIs which are essentially using =
OAuth 2.0 run on TLS.




--_000_90C41DD21FB7C64BB94121FBBC2E723446564305FFP3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><base href=3D"x-msg://362/"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>I think y=
ou got this backwards. We&#8217;re talking about forcing developers using t=
he Facebook (or any other service) API to deploy their own TLS endpoint for=
 the incoming callback (via redirection). Every developer will need to get =
a cert and deploy an HTTPS endpoint.<o:p></o:p></span></p><p class=3DMsoNor=
mal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";colo=
r:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'=
font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>That&#82=
17;s has never been discussed.<o:p></o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F4=
97D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-s=
ize:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>EHL<o:p></o:p>=
</span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family=
:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><div sty=
le=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><=
div><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt =
0in 0in 0in'><p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-f=
amily:"Tahoma","sans-serif"'>From:</span></b><span style=3D'font-size:10.0p=
t;font-family:"Tahoma","sans-serif"'> Dick Hardt [mailto:dick.hardt@gmail.c=
om] <br><b>Sent:</b> Tuesday, March 29, 2011 9:02 PM<br><b>To:</b> Eran Ham=
mer-Lahav<br><b>Cc:</b> WG<br><b>Subject:</b> Re: [OAUTH-WG] WGLC on draft-=
ietf-oauth-v2-13.txt<o:p></o:p></span></p></div></div><p class=3DMsoNormal>=
<o:p>&nbsp;</o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p=
 class=3DMsoNormal>On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:<o:p>=
</o:p></p></div><p class=3DMsoNormal><br><br><o:p></o:p></p><div><div><p cl=
ass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans=
-serif";color:#1F497D'>To clarify, I am not opposed to mandating TLS on the=
 callback, just that if we do, we can&#8217;t ship the protocol the way it =
is without coming up with some other alternative that does not require TLS =
deployment on the client side. OAuth 1.0 has no such requirement and adding=
 it in 2.0 is completely unexpected by the community at large.</span><o:p><=
/o:p></p></div></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><=
div><p class=3DMsoNormal>I only recall the concern with TLS to be on the se=
rver side, not the client side -- and I don't think that it is unexpected a=
t all.<o:p></o:p></p></div><p class=3DMsoNormal><br><br><o:p></o:p></p><div=
><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Cal=
ibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p=
 class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","s=
ans-serif";color:#1F497D'>It would be helpful to hear from some companies w=
ith large 1.0 or 2.0 deployment on this matter? Anyone from Google, Faceboo=
k, Yahoo, Twitter, etc.?</span><o:p></o:p></p></div></div></div><div><p cla=
ss=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>When wo=
rking on OAuth-WRAP, I talked to all of those companies about using TLS, an=
d only Facebook said that they wanted an option to be able to not require T=
LS. Since then, all Facebook's new APIs which are essentially using OAuth 2=
.0 run on TLS.<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o=
:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p c=
lass=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E723446564305FFP3PW5EX1MB01E_--

From eran@hueniverse.com  Tue Mar 29 22:48:03 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EF8513A6A9A for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 22:48:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.637
X-Spam-Level: 
X-Spam-Status: No, score=-2.637 tagged_above=-999 required=5 tests=[AWL=-0.039, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0HhZ3NkD-BWk for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 22:47:44 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id D1B2F3A6AAF for <oauth@ietf.org>; Tue, 29 Mar 2011 22:47:15 -0700 (PDT)
Received: (qmail 11781 invoked from network); 30 Mar 2011 05:48:54 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 30 Mar 2011 05:48:54 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Tue, 29 Mar 2011 22:48:53 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "fcorella@pomcor.com" <fcorella@pomcor.com>, Phil Hunt <phil.hunt@oracle.com>, Justin Richer <jricher@mitre.org>
Date: Tue, 29 Mar 2011 22:48:47 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvuYj+6c5wjqFWzQcmVwRCOjqOq6QAOLv7w
Message-ID: <90C41DD21FB7C64BB94121FBBC2E72344656430603@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET> <92655.18400.qm@web55806.mail.re3.yahoo.com>
In-Reply-To: <92655.18400.qm@web55806.mail.re3.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E72344656430603P3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 05:48:03 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E72344656430603P3PW5EX1MB01E_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_90C41DD21FB7C64BB94121FBBC2E72344656430603P3PW5EX1MB01E_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+PGhlYWQ+PG1ldGEgaHR0cC1lcXVpdj1Db250ZW50LVR5cGUgY29udGVu
dD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij48bWV0YSBuYW1lPUdlbmVyYXRvciBjb250ZW50
PSJNaWNyb3NvZnQgV29yZCAxNCAoZmlsdGVyZWQgbWVkaXVtKSI+PHN0eWxlPjwhLS0NCi8qIEZv
bnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglw
YW5vc2UtMToyIDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5
OlRhaG9tYTsNCglwYW5vc2UtMToyIDExIDYgNCAzIDUgNCA0IDIgNDt9DQovKiBTdHlsZSBEZWZp
bml0aW9ucyAqLw0KcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0KCXtt
YXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTIuMHB0Ow0K
CWZvbnQtZmFtaWx5OiJUaW1lcyBOZXcgUm9tYW4iLCJzZXJpZiI7fQ0KYTpsaW5rLCBzcGFuLk1z
b0h5cGVybGluaw0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6Ymx1ZTsNCgl0ZXh0
LWRlY29yYXRpb246dW5kZXJsaW5lO30NCmE6dmlzaXRlZCwgc3Bhbi5Nc29IeXBlcmxpbmtGb2xs
b3dlZA0KCXttc28tc3R5bGUtcHJpb3JpdHk6OTk7DQoJY29sb3I6cHVycGxlOw0KCXRleHQtZGVj
b3JhdGlvbjp1bmRlcmxpbmU7fQ0KcC55aXYxNTUyMDMxNTc3bXNvbm9ybWFsLCBsaS55aXYxNTUy
MDMxNTc3bXNvbm9ybWFsLCBkaXYueWl2MTU1MjAzMTU3N21zb25vcm1hbA0KCXttc28tc3R5bGUt
bmFtZTp5aXYxNTUyMDMxNTc3bXNvbm9ybWFsOw0KCW1zby1tYXJnaW4tdG9wLWFsdDphdXRvOw0K
CW1hcmdpbi1yaWdodDowaW47DQoJbXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG87DQoJbWFyZ2lu
LWxlZnQ6MGluOw0KCWZvbnQtc2l6ZToxMi4wcHQ7DQoJZm9udC1mYW1pbHk6IlRpbWVzIE5ldyBS
b21hbiIsInNlcmlmIjt9DQpwLnlpdjE1NTIwMzE1Nzdtc29jaHBkZWZhdWx0LCBsaS55aXYxNTUy
MDMxNTc3bXNvY2hwZGVmYXVsdCwgZGl2LnlpdjE1NTIwMzE1Nzdtc29jaHBkZWZhdWx0DQoJe21z
by1zdHlsZS1uYW1lOnlpdjE1NTIwMzE1Nzdtc29jaHBkZWZhdWx0Ow0KCW1zby1tYXJnaW4tdG9w
LWFsdDphdXRvOw0KCW1hcmdpbi1yaWdodDowaW47DQoJbXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1
dG87DQoJbWFyZ2luLWxlZnQ6MGluOw0KCWZvbnQtc2l6ZToxMi4wcHQ7DQoJZm9udC1mYW1pbHk6
IlRpbWVzIE5ldyBSb21hbiIsInNlcmlmIjt9DQpzcGFuLnlpdjE1NTIwMzE1Nzdtc29oeXBlcmxp
bmsNCgl7bXNvLXN0eWxlLW5hbWU6eWl2MTU1MjAzMTU3N21zb2h5cGVybGluazt9DQpzcGFuLnlp
djE1NTIwMzE1Nzdtc29oeXBlcmxpbmtmb2xsb3dlZA0KCXttc28tc3R5bGUtbmFtZTp5aXYxNTUy
MDMxNTc3bXNvaHlwZXJsaW5rZm9sbG93ZWQ7fQ0Kc3Bhbi55aXYxNTUyMDMxNTc3ZW1haWxzdHls
ZTE3DQoJe21zby1zdHlsZS1uYW1lOnlpdjE1NTIwMzE1NzdlbWFpbHN0eWxlMTc7fQ0KcC55aXYx
NTUyMDMxNTc3bXNvbm9ybWFsMSwgbGkueWl2MTU1MjAzMTU3N21zb25vcm1hbDEsIGRpdi55aXYx
NTUyMDMxNTc3bXNvbm9ybWFsMQ0KCXttc28tc3R5bGUtbmFtZTp5aXYxNTUyMDMxNTc3bXNvbm9y
bWFsMTsNCgltYXJnaW46MGluOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6
MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OiJUaW1lcyBOZXcgUm9tYW4iLCJzZXJpZiI7fQ0Kc3Bhbi55
aXYxNTUyMDMxNTc3bXNvaHlwZXJsaW5rMQ0KCXttc28tc3R5bGUtbmFtZTp5aXYxNTUyMDMxNTc3
bXNvaHlwZXJsaW5rMTsNCgljb2xvcjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7
fQ0Kc3Bhbi55aXYxNTUyMDMxNTc3bXNvaHlwZXJsaW5rZm9sbG93ZWQxDQoJe21zby1zdHlsZS1u
YW1lOnlpdjE1NTIwMzE1Nzdtc29oeXBlcmxpbmtmb2xsb3dlZDE7DQoJY29sb3I6cHVycGxlOw0K
CXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0Kc3Bhbi55aXYxNTUyMDMxNTc3ZW1haWxzdHls
ZTE3MQ0KCXttc28tc3R5bGUtbmFtZTp5aXYxNTUyMDMxNTc3ZW1haWxzdHlsZTE3MTsNCglmb250
LWZhbWlseToiQXJpYWwiLCJzYW5zLXNlcmlmIjsNCgljb2xvcjojMUY0OTdEO30NCnAueWl2MTU1
MjAzMTU3N21zb2NocGRlZmF1bHQxLCBsaS55aXYxNTUyMDMxNTc3bXNvY2hwZGVmYXVsdDEsIGRp
di55aXYxNTUyMDMxNTc3bXNvY2hwZGVmYXVsdDENCgl7bXNvLXN0eWxlLW5hbWU6eWl2MTU1MjAz
MTU3N21zb2NocGRlZmF1bHQxOw0KCW1zby1tYXJnaW4tdG9wLWFsdDphdXRvOw0KCW1hcmdpbi1y
aWdodDowaW47DQoJbXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG87DQoJbWFyZ2luLWxlZnQ6MGlu
Ow0KCWZvbnQtc2l6ZToxMi4wcHQ7DQoJZm9udC1mYW1pbHk6IkFyaWFsIiwic2Fucy1zZXJpZiI7
fQ0Kc3Bhbi5FbWFpbFN0eWxlMjcNCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWwtcmVwbHk7DQoJ
Zm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjsNCgljb2xvcjojMUY0OTdEO30NCi5N
c29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtZmFtaWx5
OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3NpemU6OC41
aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBpbiAxLjBpbiAxLjBpbiAxLjBpbjt9DQpkaXYuV29yZFNl
Y3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwvc3R5bGU+PCEtLVtpZiBndGUgbXNv
IDldPjx4bWw+DQo8bzpzaGFwZWRlZmF1bHRzIHY6ZXh0PSJlZGl0IiBzcGlkbWF4PSIxMDI2IiAv
Pg0KPC94bWw+PCFbZW5kaWZdLS0+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWxh
eW91dCB2OmV4dD0iZWRpdCI+DQo8bzppZG1hcCB2OmV4dD0iZWRpdCIgZGF0YT0iMSIgLz4NCjwv
bzpzaGFwZWxheW91dD48L3htbD48IVtlbmRpZl0tLT48L2hlYWQ+PGJvZHkgbGFuZz1FTi1VUyBs
aW5rPWJsdWUgdmxpbms9cHVycGxlPjxkaXYgY2xhc3M9V29yZFNlY3Rpb24xPjxwIGNsYXNzPU1z
b05vcm1hbD48c3BhbiBzdHlsZT0nZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseToiQ2FsaWJy
aSIsInNhbnMtc2VyaWYiO2NvbG9yOiMxRjQ5N0QnPkZyYW5jaXNjbyDigJMgdGhhbmtzIGZvciBi
ZWluZyBwZXJzaXN0ZW50LjxvOnA+PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+
PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5z
LXNlcmlmIjtjb2xvcjojMUY0OTdEJz48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PHAgY2xh
c3M9TXNvTm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiJD
YWxpYnJpIiwic2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+U291bmRzIGxpa2UgdGhlIHNhbWUg
cHJvYmxlbSBleGlzdHMgaW4gT0F1dGggMS4wLiBCYXNpY2FsbHksIHRoZSBvbmx5IHdheSB0aGUg
Y2xpZW50IGtub3dzIHRoYXQgdGhlIHNhbWUgdXNlciB3aG8gZ3JhbnRlZCBhdXRob3JpemF0aW9u
IGlzIHRoZSBvbmUgY29taW5nIGJhY2ssIGlzIHZpYSB0aGUgYXV0aG9yaXphdGlvbiBjb2RlLiBB
bnlvbmUgd2hvIGhhcyB0aGF0IGNvZGUgaXMgYmFzaWNhbGx5IGFzc3VtZWQgdG8gYmUgdGhlIG9u
ZSBncmFudGluZyBhY2Nlc3MuIElmIHRoZSBjb2RlIGlzIGludGVyY2VwdGVkLCB3aG9ldmVyIGdl
dHMgaXQgY2FuIHByZXRlbmQgdG8gYmUgaXRzIGxlZ2l0aW1hdGUgaG9sZGVyLjxvOnA+PC9vOnA+
PC9zcGFuPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjtjb2xvcjojMUY0OTdEJz48bzpw
PiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxzcGFuIHN0eWxlPSdm
b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7Y29sb3I6
IzFGNDk3RCc+SSBhZ3JlZSB0aGlzIGlzIGFuIGlzc3VlLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD48
cCBjbGFzcz1Nc29Ob3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p
bHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjtjb2xvcjojMUY0OTdEJz48bzpwPiZuYnNwOzwvbzpw
Pjwvc3Bhbj48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTEu
MHB0O2ZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+UmVx
dWlyaW5nIGNhbGxiYWNrcyB0byB1c2UgVExTIGlzIGEgYmlnIGNoYW5nZS48bzpwPjwvbzpwPjwv
c3Bhbj48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTEuMHB0
O2ZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+PG86cD4m
bmJzcDs8L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48c3BhbiBzdHlsZT0nZm9u
dC1zaXplOjExLjBwdDtmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO2NvbG9yOiMx
RjQ5N0QnPlRoZXJlIGFyZSBzb21lIGNhc2VzIHdoZXJlIGl0IGlzIG5vdCBuZWVkZWQg4oCTIG5h
bWVseSwgd2hlbiB0aGUgY2xpZW50IHVzZXMgdGhlIGFjY2VzcyB0b2tlbiBvYnRhaW5lZCB0aHJv
dWdoIHRoaXMgdHJhbnNhY3Rpb24gdG8gZG8gc29tZXRoaW5nIG9uIHRoZSBiYWNrZW5kIHdpdGhv
dXQgYWN0dWFsbHkgZXhwb3NpbmcgYW55dGhpbmcgdG8gdGhlIHVzZXIgd2hvIGRlbGl2ZXJlZCB0
aGUgYXV0aG9yaXphdGlvbiBjb2RlLiBGb3IgZXhhbXBsZSwgYW4gYXBwbGljYXRpb24gc2Nhbm5p
bmcgeW91ciBUd2l0dGVyIGFjY291bnQgaW4gdGhlIGJhY2tncm91bmQsIHNlbmRpbmcgeW91IGVt
YWlscyB3aGVuIHNvbWVvbmUgaXMgbm8gbG9uZ2VyIGZvbGxvd2luZyB5b3UuIFN1Y2ggYSBjbGll
bnQgZG9lcyBub3QgbmVlZCBUTFMgYmVjYXVzZSB0aGUgYXV0aG9yaXphdGlvbiBjb2RlIHJlcHJl
c2VudHMgYSB2YWxpZCBncmFudCwgYW5kIHRoZSBNSVRNIGRvZXNu4oCZdCBnZXQgYW55IGJlbmVm
aXQgZnJvbSBoaWphY2tpbmcgdGhlIGNhbGxiYWNrLiBObyBkYXRhIGlzIGV4cG9zZWQuPG86cD48
L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48c3BhbiBzdHlsZT0nZm9udC1zaXpl
OjExLjBwdDtmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO2NvbG9yOiMxRjQ5N0Qn
PjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+PHNwYW4gc3R5
bGU9J2ZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjtj
b2xvcjojMUY0OTdEJz5Ib3dldmVyLCB0aGlzIGlzIG5vdCB0aGUgdHlwaWNhbCB1c2UgY2FzZS48
bzpwPjwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxzcGFuIHN0eWxlPSdmb250
LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7Y29sb3I6IzFG
NDk3RCc+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48c3Bh
biBzdHlsZT0nZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2Vy
aWYiO2NvbG9yOiMxRjQ5N0QnPkFzIGxvbmcgYXMgdGhlIHNlY3VyaXR5IGNvbnNpZGVyYXRpb25z
IGFyZSBjbGVhcmx5IHN0YXRlZCwgd2UgY2FuIG1vdmUgZm9yd2FyZCB3aXRoIGVpdGhlciBhIE1V
U1Qgb3IgYSBTSE9VTEQuIFdlIGNhbiBlYXNpbHkgZXhlbXB0cyBhbnkgaW50ZXJuYWwgY2FsbGJh
Y2tzIGZyb20gdGhpcyByZXF1aXJlbWVudCAobG9jYWxob3N0LCBhcHBsaWNhdGlvbiBzY2hlbWUg
aGFuZGxlciwgZXRjLikuPG86cD48L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48
c3BhbiBzdHlsZT0nZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMt
c2VyaWYiO2NvbG9yOiMxRjQ5N0QnPiA8bzpwPjwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9TXNv
Tm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiJDYWxpYnJp
Iiwic2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+SSBkb27igJl0IHdhbnQgdG8gd3JpdGUgYSBz
cGVjaWZpY2F0aW9uIHRoYXQgZXZlcnlvbmUga25vd2luZ2x5IGlnbm9yZXMuIE9uY2UgcGVvcGxl
IGlnbm9yZSBvbmUgc2VjdXJpdHkgcmVxdWlyZW1lbnQsIHdoYXTigJlzIHRvIHN0b3AgdGhlbSBm
cm9tIGlnbm9yaW5nIG90aGVycy4gU28gdGhlIG1vc3QgaW1wb3J0YW50IGlucHV0IHRvIHRoaXMg
ZGlzY3Vzc2lvbiBpcyB3aGF0IHRoZSB2ZW5kb3JzIGFyZSBnb2luZyB0byBkbyAocmVnYXJkbGVz
cyBvZiB3aGF0IHRoZSBkb2N1bWVudCBzYXlzKT88bzpwPjwvbzpwPjwvc3Bhbj48L3A+PHAgY2xh
c3M9TXNvTm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiJD
YWxpYnJpIiwic2Fucy1zZXJpZiI7Y29sb3I6IzFGNDk3RCc+PG86cD4mbmJzcDs8L286cD48L3Nw
YW4+PC9wPjxwIGNsYXNzPU1zb05vcm1hbD48c3BhbiBzdHlsZT0nZm9udC1zaXplOjExLjBwdDtm
b250LWZhbWlseToiQ2FsaWJyaSIsInNhbnMtc2VyaWYiO2NvbG9yOiMxRjQ5N0QnPkVITDxvOnA+
PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6
ZToxMS4wcHQ7Zm9udC1mYW1pbHk6IkNhbGlicmkiLCJzYW5zLXNlcmlmIjtjb2xvcjojMUY0OTdE
Jz48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9TXNvTm9ybWFsPjxzcGFuIHN0
eWxlPSdmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiJDYWxpYnJpIiwic2Fucy1zZXJpZiI7
Y29sb3I6IzFGNDk3RCc+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPjxkaXYgc3R5bGU9J2Jv
cmRlcjpub25lO2JvcmRlci1sZWZ0OnNvbGlkIGJsdWUgMS41cHQ7cGFkZGluZzowaW4gMGluIDBp
biA0LjBwdCc+PGRpdj48ZGl2IHN0eWxlPSdib3JkZXI6bm9uZTtib3JkZXItdG9wOnNvbGlkICNC
NUM0REYgMS4wcHQ7cGFkZGluZzozLjBwdCAwaW4gMGluIDBpbic+PHAgY2xhc3M9TXNvTm9ybWFs
PjxiPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiJUYWhvbWEiLCJz
YW5zLXNlcmlmIic+RnJvbTo8L3NwYW4+PC9iPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTAuMHB0
O2ZvbnQtZmFtaWx5OiJUYWhvbWEiLCJzYW5zLXNlcmlmIic+IEZyYW5jaXNjbyBDb3JlbGxhIFtt
YWlsdG86ZmNvcmVsbGFAcG9tY29yLmNvbV0gPGJyPjxiPlNlbnQ6PC9iPiBUdWVzZGF5LCBNYXJj
aCAyOSwgMjAxMSAzOjQwIFBNPGJyPjxiPlRvOjwvYj4gUGhpbCBIdW50OyBKdXN0aW4gUmljaGVy
OyBFcmFuIEhhbW1lci1MYWhhdjxicj48Yj5DYzo8L2I+IE9BdXRoIFdHOyBLYXJlbiBQLiBMZXdp
c29uOyBQYXVsIFRhcmphbiAocHRAZmIuY29tKTxicj48Yj5TdWJqZWN0OjwvYj4gUkU6IFtPQVVU
SC1XR10gV0dMQyBvbiBkcmFmdC1pZXRmLW9hdXRoLXYyLTEzLnR4dDxvOnA+PC9vOnA+PC9zcGFu
PjwvcD48L2Rpdj48L2Rpdj48cCBjbGFzcz1Nc29Ob3JtYWw+PG86cD4mbmJzcDs8L286cD48L3A+
PHRhYmxlIGNsYXNzPU1zb05vcm1hbFRhYmxlIGJvcmRlcj0wIGNlbGxzcGFjaW5nPTAgY2VsbHBh
ZGRpbmc9MD48dHI+PHRkIHZhbGlnbj10b3Agc3R5bGU9J3BhZGRpbmc6MGluIDBpbiAwaW4gMGlu
Jz48cCBjbGFzcz1Nc29Ob3JtYWw+Jmd0OyBJc27igJl0IGFsbCB0aGlzIGp1c3QgZGlmZmVyZW50
IGZsYXZvcnMgb2YgYSBzZXNzaW9uIGZpeGF0aW9uIGF0dGFja3M/PGJyPiZndDsgVGhlIGNsaWVu
dCBzaG91bGQgdXNlIGNvb2tpZXMgYW5kIHRoZSBzdGF0ZSBwYXJhbWV0ZXIgdG8gZW5zdXJlIHRo
ZTxicj4mZ3Q7IHNhbWUgdXNlci1hZ2VudCBpdCByZWRpcmVjdGVkIHRvIHRoZSBhdXRob3JpemF0
aW9uIHNlcnZlciBpcyB0aGUgb25lPGJyPiZndDsgY29taW5nIGJhY2suPGJyPjxicj5JdCdzIG5v
dCBhIHNlc3Npb24gZml4YXRpb24gYXR0YWNrLiZuYnNwOyBJdCdzIGp1c3QgYW4gaW50ZXJjZXB0
aW9uIG9mIGE8YnI+Y3JlZGVudGlhbC4mbmJzcDsgVGhlIGF1dGhvcml6YXRpb24gY29kZSBpcyBh
IGNyZWRlbnRpYWwgdGhhdCBwcm92aWRlczxicj5hY2Nlc3MgdG8gdGhlIHByb3RlY3RlZCByZXNv
dXJjZXMuJm5ic3A7IElmIHRoZSBhdHRhY2tlciBjYW4gZ2V0IGl0LCB0aGU8YnI+YXR0YWNrZXIg
Y2FuIGdldCB0aGUgcHJvdGVjdGVkIHJlc291cmNlcyAodXNpbmcgdGhlIGNsaWVudCBhcyBhbjxi
cj5hZ2VudCwgc28gdG8gc3BlYWspLjxicj48YnI+QSBjb29raWUgd29uJ3QgaGVscCwgc2luY2Ug
aXQgd291bGQgYmUgc2VudCBmcm9tIHRoZSBicm93c2VyIHRvIHRoZSBjbGllbnQ8YnI+YWxvbmcg
d2l0aCB0aGUgYXV0aG9yaXphdGlvbiBjb2RlLiZuYnNwOyBJZiB0aGUgYXR0YWNrZXIgY2FuIG9i
c2VydmUgb3I8YnI+aW50ZXJjZXB0IHRoZSBhdXRob3JpemF0aW9uIGNvZGUsIHRoZSBhdHRhY2tl
ciBhbmQgb2JzZXJ2ZSBvcjxicj5pbnRlcmNlcHQgdGhlIGNvb2tpZS48YnI+PGJyPkZyYW5jaXNj
bzxicj48YnI+LS0tIE9uIDxiPlR1ZSwgMy8yOS8xMSwgRXJhbiBIYW1tZXItTGFoYXYgPGk+Jmx0
OzxhIGhyZWY9Im1haWx0bzplcmFuQGh1ZW5pdmVyc2UuY29tIj5lcmFuQGh1ZW5pdmVyc2UuY29t
PC9hPiZndDs8L2k+PC9iPiB3cm90ZTo8bzpwPjwvbzpwPjwvcD48cCBjbGFzcz1Nc29Ob3JtYWwg
c3R5bGU9J21hcmdpbi1ib3R0b206MTIuMHB0Jz48YnI+RnJvbTogRXJhbiBIYW1tZXItTGFoYXYg
Jmx0OzxhIGhyZWY9Im1haWx0bzplcmFuQGh1ZW5pdmVyc2UuY29tIj5lcmFuQGh1ZW5pdmVyc2Uu
Y29tPC9hPiZndDs8YnI+U3ViamVjdDogUkU6IFtPQVVUSC1XR10gV0dMQyBvbiBkcmFmdC1pZXRm
LW9hdXRoLXYyLTEzLnR4dDxicj5UbzogJnF1b3Q7PGEgaHJlZj0ibWFpbHRvOmZjb3JlbGxhQHBv
bWNvci5jb20iPmZjb3JlbGxhQHBvbWNvci5jb208L2E+JnF1b3Q7ICZsdDs8YSBocmVmPSJtYWls
dG86ZmNvcmVsbGFAcG9tY29yLmNvbSI+ZmNvcmVsbGFAcG9tY29yLmNvbTwvYT4mZ3Q7LCAmcXVv
dDtQaGlsIEh1bnQmcXVvdDsgJmx0OzxhIGhyZWY9Im1haWx0bzpwaGlsLmh1bnRAb3JhY2xlLmNv
bSI+cGhpbC5odW50QG9yYWNsZS5jb208L2E+Jmd0OywgJnF1b3Q7SnVzdGluIFJpY2hlciZxdW90
OyAmbHQ7PGEgaHJlZj0ibWFpbHRvOmpyaWNoZXJAbWl0cmUub3JnIj5qcmljaGVyQG1pdHJlLm9y
ZzwvYT4mZ3Q7PGJyPkNjOiAmcXVvdDtPQXV0aCBXRyZxdW90OyAmbHQ7PGEgaHJlZj0ibWFpbHRv
Om9hdXRoQGlldGYub3JnIj5vYXV0aEBpZXRmLm9yZzwvYT4mZ3Q7LCAmcXVvdDtLYXJlbiBQLiBM
ZXdpc29uJnF1b3Q7ICZsdDs8YSBocmVmPSJtYWlsdG86a3BsZXdpc29uQHBvbWNvci5jb20iPmtw
bGV3aXNvbkBwb21jb3IuY29tPC9hPiZndDssICZxdW90O1BhdWwgVGFyamFuICg8YSBocmVmPSJt
YWlsdG86cHRAZmIuY29tIj5wdEBmYi5jb208L2E+KSZxdW90OyAmbHQ7PGEgaHJlZj0ibWFpbHRv
OnB0QGZiLmNvbSI+cHRAZmIuY29tPC9hPiZndDs8YnI+RGF0ZTogVHVlc2RheSwgTWFyY2ggMjks
IDIwMTEsIDc6NTAgUE08bzpwPjwvbzpwPjwvcD48ZGl2IGlkPXlpdjE1NTIwMzE1Nzc+PGRpdj48
cCBjbGFzcz15aXYxNTUyMDMxNTc3bXNvbm9ybWFsPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTEu
MHB0O2ZvbnQtZmFtaWx5OiJBcmlhbCIsInNhbnMtc2VyaWYiO2NvbG9yOiMxRjQ5N0QnPklzbuKA
mXQgYWxsIHRoaXMganVzdCBkaWZmZXJlbnQgZmxhdm9ycyBvZiBhIHNlc3Npb24gZml4YXRpb24g
YXR0YWNrcz8gVGhlIGNsaWVudCBzaG91bGQgdXNlIGNvb2tpZXMgYW5kIHRoZSBzdGF0ZSBwYXJh
bWV0ZXIgdG8gZW5zdXJlIHRoZSBzYW1lIHVzZXItYWdlbnQgaXQgcmVkaXJlY3RlZCB0byB0aGUg
YXV0aG9yaXphdGlvbiBzZXJ2ZXIgaXMgdGhlIG9uZSBjb21pbmcgYmFjay48L3NwYW4+PG86cD48
L286cD48L3A+PHAgY2xhc3M9eWl2MTU1MjAzMTU3N21zb25vcm1hbD48c3BhbiBzdHlsZT0nZm9u
dC1zaXplOjExLjBwdDtmb250LWZhbWlseToiQXJpYWwiLCJzYW5zLXNlcmlmIjtjb2xvcjojMUY0
OTdEJz4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+PHAgY2xhc3M9eWl2MTU1MjAzMTU3N21z
b25vcm1hbD48c3BhbiBzdHlsZT0nZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseToiQXJpYWwi
LCJzYW5zLXNlcmlmIjtjb2xvcjojMUY0OTdEJz5FSEw8L3NwYW4+PG86cD48L286cD48L3A+PHAg
Y2xhc3M9eWl2MTU1MjAzMTU3N21zb25vcm1hbD48c3BhbiBzdHlsZT0nZm9udC1zaXplOjExLjBw
dDtmb250LWZhbWlseToiQXJpYWwiLCJzYW5zLXNlcmlmIjtjb2xvcjojMUY0OTdEJz4mbmJzcDs8
L3NwYW4+PG86cD48L286cD48L3A+PGRpdiBzdHlsZT0nYm9yZGVyOm5vbmU7Ym9yZGVyLWxlZnQ6
c29saWQgd2luZG93dGV4dCAxLjVwdDtwYWRkaW5nOjBpbiAwaW4gMGluIDQuMHB0O2JvcmRlci1j
b2xvcjotbW96LXVzZS10ZXh0LWNvbG9yJiMxMzsmIzEwOyAtbW96LXVzZS10ZXh0LWNvbG9yIC1t
b3otdXNlLXRleHQtY29sb3IgYmx1ZSc+PGRpdj48ZGl2IHN0eWxlPSdib3JkZXI6bm9uZTtib3Jk
ZXItdG9wOnNvbGlkIHdpbmRvd3RleHQgMS4wcHQ7cGFkZGluZzozLjBwdCAwaW4gMGluIDBpbjti
b3JkZXItY29sb3I6LW1vei11c2UtdGV4dC1jb2xvciAtbW96LXVzZS10ZXh0LWNvbG9yJz48cCBj
bGFzcz15aXYxNTUyMDMxNTc3bXNvbm9ybWFsPjxiPjxzcGFuIHN0eWxlPSdmb250LXNpemU6MTAu
MHB0O2ZvbnQtZmFtaWx5OiJBcmlhbCIsInNhbnMtc2VyaWYiJz5Gcm9tOjwvc3Bhbj48L2I+PHNw
YW4gc3R5bGU9J2ZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6IkFyaWFsIiwic2Fucy1zZXJp
ZiInPiBGcmFuY2lzY28gQ29yZWxsYSBbbWFpbHRvOmZjb3JlbGxhQHBvbWNvci5jb21dIDxicj48
Yj5TZW50OjwvYj4gVHVlc2RheSwgTWFyY2ggMjksIDIwMTEgMTE6NDYgQU08YnI+PGI+VG86PC9i
PiBQaGlsIEh1bnQ7IEp1c3RpbiBSaWNoZXI7IEVyYW4gSGFtbWVyLUxhaGF2PGJyPjxiPkNjOjwv
Yj4gT0F1dGggV0c7IEthcmVuIFAuIExld2lzb247IFBhdWwgVGFyamFuIChwdEBmYi5jb20pPGJy
PjxiPlN1YmplY3Q6PC9iPiBSRTogW09BVVRILVdHXSBXR0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgt
djItMTMudHh0PC9zcGFuPjxvOnA+PC9vOnA+PC9wPjwvZGl2PjwvZGl2PjxwIGNsYXNzPXlpdjE1
NTIwMzE1Nzdtc29ub3JtYWw+Jm5ic3A7PG86cD48L286cD48L3A+PHRhYmxlIGNsYXNzPU1zb05v
cm1hbFRhYmxlIGJvcmRlcj0wIGNlbGxzcGFjaW5nPTAgY2VsbHBhZGRpbmc9MD48dHI+PHRkIHZh
bGlnbj10b3Agc3R5bGU9J3BhZGRpbmc6MGluIDBpbiAwaW4gMGluJz48cCBjbGFzcz15aXYxNTUy
MDMxNTc3bXNvbm9ybWFsIHN0eWxlPSdtYXJnaW4tYm90dG9tOjEyLjBwdCc+Jmd0OyBDYW4geW91
IGV4cGxhaW4gaG93IGludGVyY2VwdGluZyB0aGUgYXV0aG9yaXphdGlvbiBjb2RlPGJyPiZndDsg
d2l0aG91dCBoYXZpbmcgYWNjZXNzIHRvIHRoZSBjbGllbnQgY3JlZGVudGlhbHMgaXMgYTxicj4m
Z3Q7IHByb2JsZW0/IEZvciB0aGUgc2FrZSBvZiBkaXNjdXNzaW9uLCBhc3N1bWUgdGhhdCB0aGUg
Y2xpZW50PGJyPiZndDsgaGFzIHZhbGlkIGFuZCBzZWN1cmUgY3JlZGVudGlhbHMgdGhhdCBhbiBh
dHRhY2tlciBjYW5ub3Q8YnI+Jmd0OyBhY2Nlc3MuIEFsc28gYXNzdW1lIHRoYXQgdGhlIGNsaWVu
dCBoYXMgaW1wbGVtZW50ZWQgc29tZTxicj4mZ3Q7IGZvcm0gb2YgY3Jvc3Mtc2l0ZSBwcm90ZWN0
aW9uLjxicj48YnI+T25lIHdheTogbWFuLWluLXRoZS1taWRkbGUgYXR0YWNrLiZuYnNwOyBUaGUg
dHJhZmZpYyBiZXR3ZWVuIHRoZSBsZWdpdGltYXRlPGJyPnVzZXIncyBicm93c2VyIGFuZCB0aGUg
Y2xpZW50IGdvZXMgdGhyb3VnaCB0aGUgYXR0YWNrZXIncyBtYWNoaW5lPGJyPihlYXN5IHRvIHNl
dCB1cCB3aXRoIGEgcm9ndWUgV2lGaSBhY2Nlc3MgcG9pbnQpLiZuYnNwOyBUaGUgdXNlcidzIGJy
b3dzZXI8YnI+c2VuZHMgYW4gaHR0cCByZXF1ZXN0IHRvIHRoZSBjbGllbnQsIHRhcmdldGluZyB0
aGUgcmVkaXJlY3QgVVJJLiZuYnNwOyBUaGU8YnI+YXR0YWNrZXIncyBtYWNoaW5lIGRvZXNuJ3Qg
bGV0IHRoYXQgcmVxdWVzdCBnbyB0aHJvdWdoLiZuYnNwOyBUaGUgYXR0YWNrZXI8YnI+dGhlbiBz
ZW5kcyB0aGUgc2FtZSBpZGVudGljYWwgcmVxdWVzdCBmcm9tIHRoZSBhdHRhY2tlcidzIG93biBi
cm93c2VyLjxicj5XaGVuIHRoZSBjbGllbnQgcmVjZWl2ZXMgdGhlIHJlcXVlc3QsIGl0IGhhcyBu
byB3YXkgdG8gdGVsbCB0aGF0IGl0IGlzPGJyPmNvbWluZyBmcm9tIHRoZSBhdHRhY2tlcidzIGJy
b3dzZXIgcmF0aGVyIHRoYW4gZnJvbSB0aGUgdXNlcidzPGJyPmJyb3dzZXIuJm5ic3A7IFRoZSBj
bGllbnQgZXhjaGFuZ2VzIHRoZSBhdXRob3JpemF0aW9uIGNvZGUgZm9yIGFuIGFjY2Vzczxicj50
b2tlbiwgdXNlcyB0aGUgYWNjZXNzIHRva2VuIHRvIG9idGFpbiBwcm90ZWN0ZWQgcmVzb3VyY2Vz
IGJlbG9uZ2luZzxicj50byB0aGUgdXNlciwgYW5kIGRlbGl2ZXJzIHRob3NlIHJlc291cmNlcyB0
byB0aGUgYXR0YWNrZXIncyBicm93c2VyLjxicj4oT3IgbWFuaXB1bGF0ZXMgdGhvc2UgcmVzb3Vy
Y2VzIGFzIGRpcmVjdGVkIGJ5IHRoZSBhdHRhY2tlcidzPGJyPmJyb3dzZXIuKSZuYnNwOyBJbiB0
aGUgRmFjZWJvb2sgdXNlIGNhc2UsIHRoZSBjbGllbnQgbG9ncyB0aGUgdXNlciBpbiB1cG9uPGJy
PnZlcmlmeWluZyB0aGF0IHRoZSBhdXRob3JpemF0aW9uIGNvZGUgaXMgdmFsaWQgYnkgZXhjaGFu
Z2luZyBpdDxicj5zdWNjZXNzZnVsbHkgZm9yIGFuIGFjY2VzcyB0b2tlbi48YnI+PGJyPkFub3Ro
ZXIgd2F5IChwYXNzaXZlIGF0dGFjayk6IFRoZSBhdHRhY2tlciBvYnNlcnZlcyB0aGUgcmVxdWVz
dCBmcm9tPGJyPnRoZSB1c2VyJ3MgYnJvd3NlciB0byB0aGUgY2xpZW50LiZuYnNwOyBUaGUgYXR0
YWNrZXIgZG9lcyBub3Qgc3RvcCB0aGU8YnI+cmVxdWVzdC4mbmJzcDsgVGhlIGNsaWVudCByZWNl
aXZlcyB0aGUgcmVxdWVzdCB3aXRoIHRoZSBhdXRob3JpemF0aW9uIGNvZGU8YnI+YW5kIGV4Y2hh
bmdlcyB0aGUgYXV0aG9yaXphdGlvbiBjb2RlIGZvciB0aGUgYWNjZXNzIHRva2VuLiZuYnNwOyBO
b3cgdGhlPGJyPmF0dGFja2VyIHNlbmRzIHRoZSBzYW1lIHJlcXVlc3QgZnJvbSB0aGUgYXR0YWNr
ZXIncyBvd24gYnJvd3Nlci4mbmJzcDsgVGhlPGJyPmNsaWVudCByZWNlaXZlcyB0aGUgc2Vjb25k
IHJlcXVlc3QgYW5kIGV4Y2hhbmdlcyB0aGUgYXV0aG9yaXphdGlvbjxicj5jb2RlIGZvciBhbm90
aGVyIGFjY2VzcyB0b2tlbi4mbmJzcDsgVXBvbiByZWNlaXZpbmcgdGhlIHNlY29uZCByZXF1ZXN0
IGZvcjxicj50aGUgc2FtZSBhdXRob3JpemF0aW9uIGNvZGUsIHRoZSBhdXRob3JpemF0aW9uIHNl
cnZlciByZXZva2VzIHRoZTxicj5maXJzdCBhY2Nlc3MgdG9rZW4sIGFzIHN1Z2dlc3RlZCBpbiBz
ZWN0aW9uIDQuMS4yIG9mIHRoZTxicj5zcGVjaWZpY2F0aW9uOiAmcXVvdDtJZiBhbiBhdXRob3Jp
emF0aW9uIGNvZGUgaXMgdXNlZCBtb3JlIHRoYW4gb25jZSwgdGhlPGJyPmF1aG9yaXphdGlvbiBz
ZXJ2ZXIgTUFZIHJldm9rZSBhbGwgdG9rZW5zIHByZXZpb3VzbHkgaXNzdWVkIGJhc2VkIG9uPGJy
PnRoYXQgYXV0aG9yaXphdGlvbiBjb2RlJnF1b3Q7LiZuYnNwOyBUaGUgY2xpZW50IHRoZW4gdXNl
cyB0aGUgc2Vjb25kIGFjY2Vzczxicj50b2tlbiB0byBhY2Nlc3MgcHJvdGVjdGVkIHJlc291cmNl
cyBmb3IgdGhlIGJlbmVmaXQgb2YgdGhlIGF0dGFja2VyLjxicj5JbiB0aGUgRmFjZWJvb2sgdXNl
IGNhc2UsIHRoZSBhdHRhY2tlciBpcyBsb2dnZWQgaW4gYXMgdGhlIGxlZ2l0aW1hdGU8YnI+dXNl
ci48YnI+PGJyPiZndDsgSSBkb27igJrDhMO0dCBrbm93IG11Y2ggYWJvdXQgRkLigJrDhMO0cyBp
bXBsZW1lbnRhdGlvbiBidXQgaWYgdGhleTxicj4mZ3Q7IGFsbG93IHRoZSBhdXRob3JpemF0aW9u
IGNvZGUgdG8gYmUgdXNlZCBmb3IgYW55dGhpbmcgb3RoZXI8YnI+Jmd0OyB0aGFuIGV4Y2hhbmdl
ZCBmb3IgYW4gYWNjZXNzIHRva2VuIHVzaW5nIHNlY3VyZSBjbGllbnQ8YnI+Jmd0OyBjcmVkZW50
aWFscywgdGhlbiB0aGV5IGFyZSBub3QgaW1wbGVtZW50aW5nIHRoZSBwcm90b2NvbCBhczxicj4m
Z3Q7IHNwZWNpZmllZC48YnI+PGJyPkZhY2Vib29rIHVzZXMgdGhlIHByb3RvY29sIGNvcnJlY3Rs
eSwgYnV0IHRoZSBleGFtcGxlcyBpbiB0aGUgRmFjZWJvb2s8YnI+ZG9jdW1lbnRhdGlvbiB1c2Ug
aHR0cCByYXRoZXIgdGhhbiBodHRwcyBmb3IgcmVkaXJlY3QgVVJJcywgc288YnI+aW1wbGVtZW50
YXRpb25zIHRoYXQgZm9sbG93IHRoZSBleGFtcGxlcyB1c2UgaHR0cCByYXRoZXIgdGhhbiBodHRw
cy48YnI+PGJyPkZyYW5jaXNjbzxvOnA+PC9vOnA+PC9wPjwvdGQ+PC90cj48L3RhYmxlPjxwIGNs
YXNzPXlpdjE1NTIwMzE1Nzdtc29ub3JtYWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMC4wcHQ7
Zm9udC1mYW1pbHk6IkFyaWFsIiwic2Fucy1zZXJpZiInPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpw
PjwvcD48L2Rpdj48L2Rpdj48L2Rpdj48L3RkPjwvdHI+PC90YWJsZT48cCBjbGFzcz1Nc29Ob3Jt
YWw+PHNwYW4gc3R5bGU9J2ZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6IkNhbGlicmkiLCJz
YW5zLXNlcmlmIic+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPjwvZGl2PjwvZGl2PjwvYm9k
eT48L2h0bWw+

--_000_90C41DD21FB7C64BB94121FBBC2E72344656430603P3PW5EX1MB01E_--

From phil.hunt@oracle.com  Tue Mar 29 22:53:51 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AD9E93A6ADA for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 22:53:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.868
X-Spam-Level: 
X-Spam-Status: No, score=-5.868 tagged_above=-999 required=5 tests=[AWL=-0.666, BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X5fo+LfmtXn1 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 22:53:48 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 78E863A6AD5 for <oauth@ietf.org>; Tue, 29 Mar 2011 22:53:47 -0700 (PDT)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2U5tKAC004150 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 30 Mar 2011 05:55:21 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by rcsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2U5tIr7002058 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 30 Mar 2011 05:55:19 GMT
Received: from abhmt002.oracle.com (abhmt002.oracle.com [141.146.116.11]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2U5tIO6020765; Wed, 30 Mar 2011 00:55:18 -0500
Received: from [192.168.1.71] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 29 Mar 2011 22:55:17 -0700
References: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET> <92655.18400.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E72344656430603@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E72344656430603@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Mime-Version: 1.0 (iPhone Mail 8G4)
Content-Type: multipart/alternative; boundary=Apple-Mail-1-1034768326
Message-Id: <393421E2-C734-48D9-B0D1-A94FC3C1BDC7@oracle.com>
Content-Transfer-Encoding: 7bit
X-Mailer: iPhone Mail (8G4)
From: Phillip Hunt <phil.hunt@oracle.com>
Date: Tue, 29 Mar 2011 22:55:12 -0700
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090207.4D92C5C7.01B1,ss=1,fgs=0
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 05:53:52 -0000

--Apple-Mail-1-1034768326
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Why can't TLS be a must except when the token cannot be exposed. Eg because t=
he redirect is local?=20

Phil

Sent from my phone.=20

On 2011-03-29, at 22:48, Eran Hammer-Lahav <eran@hueniverse.com> wrote:

> Francisco =E2=80=93 thanks for being persistent.
>=20
> =20
>=20
> Sounds like the same problem exists in OAuth 1.0. Basically, the only way t=
he client knows that the same user who granted authorization is the one comi=
ng back, is via the authorization code. Anyone who has that code is basicall=
y assumed to be the one granting access. If the code is intercepted, whoever=
 gets it can pretend to be its legitimate holder.
>=20
> =20
>=20
> I agree this is an issue.
>=20
> =20
>=20
> Requiring callbacks to use TLS is a big change.
>=20
> =20
>=20
> There are some cases where it is not needed =E2=80=93 namely, when the cli=
ent uses the access token obtained through this transaction to do something o=
n the backend without actually exposing anything to the user who delivered t=
he authorization code. For example, an application scanning your Twitter acc=
ount in the background, sending you emails when someone is no longer followi=
ng you. Such a client does not need TLS because the authorization code repre=
sents a valid grant, and the MITM doesn=E2=80=99t get any benefit from hijac=
king the callback. No data is exposed.
>=20
> =20
>=20
> However, this is not the typical use case.
>=20
> =20
>=20
> As long as the security considerations are clearly stated, we can move for=
ward with either a MUST or a SHOULD. We can easily exempts any internal call=
backs from this requirement (localhost, application scheme handler, etc.).
>=20
>=20
> I don=E2=80=99t want to write a specification that everyone knowingly igno=
res. Once people ignore one security requirement, what=E2=80=99s to stop the=
m from ignoring others. So the most important input to this discussion is wh=
at the vendors are going to do (regardless of what the document says)?
>=20
> =20
>=20
> EHL
>=20
> =20
>=20
> =20
>=20
> From: Francisco Corella [mailto:fcorella@pomcor.com]=20
> Sent: Tuesday, March 29, 2011 3:40 PM
> To: Phil Hunt; Justin Richer; Eran Hammer-Lahav
> Cc: OAuth WG; Karen P. Lewison; Paul Tarjan (pt@fb.com)
> Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> =20
>=20
> > Isn=E2=80=99t all this just different flavors of a session fixation atta=
cks?
> > The client should use cookies and the state parameter to ensure the
> > same user-agent it redirected to the authorization server is the one
> > coming back.
>=20
> It's not a session fixation attack.  It's just an interception of a
> credential.  The authorization code is a credential that provides
> access to the protected resources.  If the attacker can get it, the
> attacker can get the protected resources (using the client as an
> agent, so to speak).
>=20
> A cookie won't help, since it would be sent from the browser to the client=

> along with the authorization code.  If the attacker can observe or
> intercept the authorization code, the attacker and observe or
> intercept the cookie.
>=20
> Francisco
>=20
> --- On Tue, 3/29/11, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
>=20
>=20
> From: Eran Hammer-Lahav <eran@hueniverse.com>
> Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> To: "fcorella@pomcor.com" <fcorella@pomcor.com>, "Phil Hunt" <phil.hunt@or=
acle.com>, "Justin Richer" <jricher@mitre.org>
> Cc: "OAuth WG" <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>=
, "Paul Tarjan (pt@fb.com)" <pt@fb.com>
> Date: Tuesday, March 29, 2011, 7:50 PM
>=20
> Isn=E2=80=99t all this just different flavors of a session fixation attack=
s? The client should use cookies and the state parameter to ensure the same u=
ser-agent it redirected to the authorization server is the one coming back.
>=20
> =20
>=20
> EHL
>=20
> =20
>=20
> From: Francisco Corella [mailto:fcorella@pomcor.com]=20
> Sent: Tuesday, March 29, 2011 11:46 AM
> To: Phil Hunt; Justin Richer; Eran Hammer-Lahav
> Cc: OAuth WG; Karen P. Lewison; Paul Tarjan (pt@fb.com)
> Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> =20
>=20
> > Can you explain how intercepting the authorization code
> > without having access to the client credentials is a
> > problem? For the sake of discussion, assume that the client
> > has valid and secure credentials that an attacker cannot
> > access. Also assume that the client has implemented some
> > form of cross-site protection.
>=20
> One way: man-in-the-middle attack.  The traffic between the legitimate
> user's browser and the client goes through the attacker's machine
> (easy to set up with a rogue WiFi access point).  The user's browser
> sends an http request to the client, targeting the redirect URI.  The
> attacker's machine doesn't let that request go through.  The attacker
> then sends the same identical request from the attacker's own browser.
> When the client receives the request, it has no way to tell that it is
> coming from the attacker's browser rather than from the user's
> browser.  The client exchanges the authorization code for an access
> token, uses the access token to obtain protected resources belonging
> to the user, and delivers those resources to the attacker's browser.
> (Or manipulates those resources as directed by the attacker's
> browser.)  In the Facebook use case, the client logs the user in upon
> verifying that the authorization code is valid by exchanging it
> successfully for an access token.
>=20
> Another way (passive attack): The attacker observes the request from
> the user's browser to the client.  The attacker does not stop the
> request.  The client receives the request with the authorization code
> and exchanges the authorization code for the access token.  Now the
> attacker sends the same request from the attacker's own browser.  The
> client receives the second request and exchanges the authorization
> code for another access token.  Upon receiving the second request for
> the same authorization code, the authorization server revokes the
> first access token, as suggested in section 4.1.2 of the
> specification: "If an authorization code is used more than once, the
> auhorization server MAY revoke all tokens previously issued based on
> that authorization code".  The client then uses the second access
> token to access protected resources for the benefit of the attacker.
> In the Facebook use case, the attacker is logged in as the legitimate
> user.
>=20
> > I don=E2=80=9A=C3=84=C3=B4t know much about FB=E2=80=9A=C3=84=C3=B4s imp=
lementation but if they
> > allow the authorization code to be used for anything other
> > than exchanged for an access token using secure client
> > credentials, then they are not implementing the protocol as
> > specified.
>=20
> Facebook uses the protocol correctly, but the examples in the Facebook
> documentation use http rather than https for redirect URIs, so
> implementations that follow the examples use http rather than https.
>=20
> Francisco
>=20
> =20
>=20
> =20

--Apple-Mail-1-1034768326
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><body bgcolor=3D"#FFFFFF"><div>Why can't TLS be a must except when the=
 token cannot be exposed. Eg because the redirect is local?&nbsp;</div><div>=
<br></div><div>Phil<div><br></div><div>Sent from my phone.&nbsp;</div></div>=
<div><br>On 2011-03-29, at 22:48, Eran Hammer-Lahav &lt;<a href=3D"mailto:er=
an@hueniverse.com">eran@hueniverse.com</a>&gt; wrote:<br><br></div><div></di=
v><blockquote type=3D"cite"><div><div class=3D"WordSection1"><p class=3D"Mso=
Normal"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quo=
t;sans-serif&quot;;color:#1F497D">Francisco =E2=80=93 thanks for being persi=
stent.<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:=
11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"=
><o:p>&nbsp;</o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size=
:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D=
">Sounds like the same problem exists in OAuth 1.0. Basically, the only way t=
he client knows that the same user who granted authorization is the one comi=
ng back, is via the authorization code. Anyone who has that code is basicall=
y assumed to be the one granting access. If the code is intercepted, whoever=
 gets it can pretend to be its legitimate holder.<o:p></o:p></span></p><p cl=
ass=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&=
quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p><p c=
lass=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri=
&quot;,&quot;sans-serif&quot;;color:#1F497D">I agree this is an issue.<o:p><=
/o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;=
</o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font=
-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Requiring c=
allbacks to use TLS is a big change.<o:p></o:p></span></p><p class=3D"MsoNor=
mal"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;s=
ans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p><p class=3D"MsoNo=
rmal"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;=
sans-serif&quot;;color:#1F497D">There are some cases where it is not needed =E2=
=80=93 namely, when the client uses the access token obtained through this t=
ransaction to do something on the backend without actually exposing anything=
 to the user who delivered the authorization code. For example, an applicati=
on scanning your Twitter account in the background, sending you emails when s=
omeone is no longer following you. Such a client does not need TLS because t=
he authorization code represents a valid grant, and the MITM doesn=E2=80=99t=
 get any benefit from hijacking the callback. No data is exposed.<o:p></o:p>=
</span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-famil=
y:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p=
></span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-fami=
ly:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">However, this i=
s not the typical use case.<o:p></o:p></span></p><p class=3D"MsoNormal"><spa=
n style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p><p class=3D"MsoNormal"><sp=
an style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-seri=
f&quot;;color:#1F497D">As long as the security considerations are clearly st=
ated, we can move forward with either a MUST or a SHOULD. We can easily exem=
pts any internal callbacks from this requirement (localhost, application sch=
eme handler, etc.).<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D=
"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;col=
or:#1F497D"> <o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"fon=
t-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#=
1F497D">I don=E2=80=99t want to write a specification that everyone knowingl=
y ignores. Once people ignore one security requirement, what=E2=80=99s to st=
op them from ignoring others. So the most important input to this discussion=
 is what the vendors are going to do (regardless of what the document says)?=
<o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt=
;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0p=
t;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">EHL<=
o:p></o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;=
font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&=
nbsp;</o:p></span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt=
;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>=
&nbsp;</o:p></span></p><div style=3D"border:none;border-left:solid blue 1.5p=
t;padding:0in 0in 0in 4.0pt"><div><div style=3D"border:none;border-top:solid=
 #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in"><p class=3D"MsoNormal"><b><span st=
yle=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot=
;">From:</span></b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&=
quot;,&quot;sans-serif&quot;"> Francisco Corella [mailto:fcorella@pomcor.com=
] <br><b>Sent:</b> Tuesday, March 29, 2011 3:40 PM<br><b>To:</b> Phil Hunt; J=
ustin Richer; Eran Hammer-Lahav<br><b>Cc:</b> OAuth WG; Karen P. Lewison; Pa=
ul Tarjan (<a href=3D"mailto:pt@fb.com">pt@fb.com</a>)<br><b>Subject:</b> RE=
: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<o:p></o:p></span></p></div><=
/div><p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p><table class=3D"MsoNormalTa=
ble" border=3D"0" cellspacing=3D"0" cellpadding=3D"0"><tbody><tr><td valign=3D=
"top" style=3D"padding:0in 0in 0in 0in"><p class=3D"MsoNormal">&gt; Isn=E2=80=
=99t all this just different flavors of a session fixation attacks?<br>&gt; T=
he client should use cookies and the state parameter to ensure the<br>&gt; s=
ame user-agent it redirected to the authorization server is the one<br>&gt; c=
oming back.<br><br>It's not a session fixation attack.&nbsp; It's just an in=
terception of a<br>credential.&nbsp; The authorization code is a credential t=
hat provides<br>access to the protected resources.&nbsp; If the attacker can=
 get it, the<br>attacker can get the protected resources (using the client a=
s an<br>agent, so to speak).<br><br>A cookie won't help, since it would be s=
ent from the browser to the client<br>along with the authorization code.&nbs=
p; If the attacker can observe or<br>intercept the authorization code, the a=
ttacker and observe or<br>intercept the cookie.<br><br>Francisco<br><br>--- O=
n <b>Tue, 3/29/11, Eran Hammer-Lahav <i>&lt;<a href=3D"mailto:eran@huenivers=
e.com"><a href=3D"mailto:eran@hueniverse.com">eran@hueniverse.com</a></a>&gt=
;</i></b> wrote:<o:p></o:p></p><p class=3D"MsoNormal" style=3D"margin-bottom=
:12.0pt"><br>From: Eran Hammer-Lahav &lt;<a href=3D"mailto:eran@hueniverse.c=
om"><a href=3D"mailto:eran@hueniverse.com">eran@hueniverse.com</a></a>&gt;<b=
r>Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<br>To: "<a href=
=3D"mailto:fcorella@pomcor.com"><a href=3D"mailto:fcorella@pomcor.com">fcore=
lla@pomcor.com</a></a>" &lt;<a href=3D"mailto:fcorella@pomcor.com"><a href=3D=
"mailto:fcorella@pomcor.com">fcorella@pomcor.com</a></a>&gt;, "Phil Hunt" &l=
t;<a href=3D"mailto:phil.hunt@oracle.com"><a href=3D"mailto:phil.hunt@oracle=
.com">phil.hunt@oracle.com</a></a>&gt;, "Justin Richer" &lt;<a href=3D"mailt=
o:jricher@mitre.org"><a href=3D"mailto:jricher@mitre.org">jricher@mitre.org<=
/a></a>&gt;<br>Cc: "OAuth WG" &lt;<a href=3D"mailto:oauth@ietf.org"><a href=3D=
"mailto:oauth@ietf.org">oauth@ietf.org</a></a>&gt;, "Karen P. Lewison" &lt;<=
a href=3D"mailto:kplewison@pomcor.com"><a href=3D"mailto:kplewison@pomcor.co=
m">kplewison@pomcor.com</a></a>&gt;, "Paul Tarjan (<a href=3D"mailto:pt@fb.c=
om"><a href=3D"mailto:pt@fb.com">pt@fb.com</a></a>)" &lt;<a href=3D"mailto:p=
t@fb.com"><a href=3D"mailto:pt@fb.com">pt@fb.com</a></a>&gt;<br>Date: Tuesda=
y, March 29, 2011, 7:50 PM<o:p></o:p></p><div id=3D"yiv1552031577"><div><p c=
lass=3D"yiv1552031577msonormal"><span style=3D"font-size:11.0pt;font-family:=
&quot;Arial&quot;,&quot;sans-serif&quot;;color:#1F497D">Isn=E2=80=99t all th=
is just different flavors of a session fixation attacks? The client should u=
se cookies and the state parameter to ensure the same user-agent it redirect=
ed to the authorization server is the one coming back.</span><o:p></o:p></p>=
<p class=3D"yiv1552031577msonormal"><span style=3D"font-size:11.0pt;font-fam=
ily:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:=
p></o:p></p><p class=3D"yiv1552031577msonormal"><span style=3D"font-size:11.=
0pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#1F497D">EHL<=
/span><o:p></o:p></p><p class=3D"yiv1552031577msonormal"><span style=3D"font=
-size:11.0pt;font-family:&quot;Arial&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;</span><o:p></o:p></p><div style=3D"border:none;border-left:solid=
 windowtext 1.5pt;padding:0in 0in 0in 4.0pt;border-color:-moz-use-text-color=
=0D
 -moz-use-text-color -moz-use-text-color blue"><div><div style=3D"border:non=
e;border-top:solid windowtext 1.0pt;padding:3.0pt 0in 0in 0in;border-color:-=
moz-use-text-color -moz-use-text-color"><p class=3D"yiv1552031577msonormal">=
<b><span style=3D"font-size:10.0pt;font-family:&quot;Arial&quot;,&quot;sans-=
serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;font-family:&qu=
ot;Arial&quot;,&quot;sans-serif&quot;"> Francisco Corella [mailto:fcorella@p=
omcor.com] <br><b>Sent:</b> Tuesday, March 29, 2011 11:46 AM<br><b>To:</b> P=
hil Hunt; Justin Richer; Eran Hammer-Lahav<br><b>Cc:</b> OAuth WG; Karen P. L=
ewison; Paul Tarjan (<a href=3D"mailto:pt@fb.com">pt@fb.com</a>)<br><b>Subje=
ct:</b> RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt</span><o:p></o:p><=
/p></div></div><p class=3D"yiv1552031577msonormal">&nbsp;<o:p></o:p></p><tab=
le class=3D"MsoNormalTable" border=3D"0" cellspacing=3D"0" cellpadding=3D"0"=
><tbody><tr><td valign=3D"top" style=3D"padding:0in 0in 0in 0in"><p class=3D=
"yiv1552031577msonormal" style=3D"margin-bottom:12.0pt">&gt; Can you explain=
 how intercepting the authorization code<br>&gt; without having access to th=
e client credentials is a<br>&gt; problem? For the sake of discussion, assum=
e that the client<br>&gt; has valid and secure credentials that an attacker c=
annot<br>&gt; access. Also assume that the client has implemented some<br>&g=
t; form of cross-site protection.<br><br>One way: man-in-the-middle attack.&=
nbsp; The traffic between the legitimate<br>user's browser and the client go=
es through the attacker's machine<br>(easy to set up with a rogue WiFi acces=
s point).&nbsp; The user's browser<br>sends an http request to the client, t=
argeting the redirect URI.&nbsp; The<br>attacker's machine doesn't let that r=
equest go through.&nbsp; The attacker<br>then sends the same identical reque=
st from the attacker's own browser.<br>When the client receives the request,=
 it has no way to tell that it is<br>coming from the attacker's browser rath=
er than from the user's<br>browser.&nbsp; The client exchanges the authoriza=
tion code for an access<br>token, uses the access token to obtain protected r=
esources belonging<br>to the user, and delivers those resources to the attac=
ker's browser.<br>(Or manipulates those resources as directed by the attacke=
r's<br>browser.)&nbsp; In the Facebook use case, the client logs the user in=
 upon<br>verifying that the authorization code is valid by exchanging it<br>=
successfully for an access token.<br><br>Another way (passive attack): The a=
ttacker observes the request from<br>the user's browser to the client.&nbsp;=
 The attacker does not stop the<br>request.&nbsp; The client receives the re=
quest with the authorization code<br>and exchanges the authorization code fo=
r the access token.&nbsp; Now the<br>attacker sends the same request from th=
e attacker's own browser.&nbsp; The<br>client receives the second request an=
d exchanges the authorization<br>code for another access token.&nbsp; Upon r=
eceiving the second request for<br>the same authorization code, the authoriz=
ation server revokes the<br>first access token, as suggested in section 4.1.=
2 of the<br>specification: "If an authorization code is used more than once,=
 the<br>auhorization server MAY revoke all tokens previously issued based on=
<br>that authorization code".&nbsp; The client then uses the second access<b=
r>token to access protected resources for the benefit of the attacker.<br>In=
 the Facebook use case, the attacker is logged in as the legitimate<br>user.=
<br><br>&gt; I don=E2=80=9A=C3=84=C3=B4t know much about FB=E2=80=9A=C3=84=C3=
=B4s implementation but if they<br>&gt; allow the authorization code to be u=
sed for anything other<br>&gt; than exchanged for an access token using secu=
re client<br>&gt; credentials, then they are not implementing the protocol a=
s<br>&gt; specified.<br><br>Facebook uses the protocol correctly, but the ex=
amples in the Facebook<br>documentation use http rather than https for redir=
ect URIs, so<br>implementations that follow the examples use http rather tha=
n https.<br><br>Francisco<o:p></o:p></p></td></tr></tbody></table><p class=3D=
"yiv1552031577msonormal"><span style=3D"font-size:10.0pt;font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p></div></div><=
/div></td></tr></tbody></table><p class=3D"MsoNormal"><span style=3D"font-si=
ze:10.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><o:p>&nbsp=
;</o:p></span></p></div></div></div></blockquote></body></html>=

--Apple-Mail-1-1034768326--

From cmortimore@salesforce.com  Tue Mar 29 23:17:48 2011
Return-Path: <cmortimore@salesforce.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 98F143A6B0D for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 23:17:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id loEB5iuu2wXM for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 23:17:45 -0700 (PDT)
Received: from exprod8og120.obsmtp.com (exprod8og120.obsmtp.com [64.18.3.40]) by core3.amsl.com (Postfix) with SMTP id C7BB53A6A9A for <oauth@ietf.org>; Tue, 29 Mar 2011 23:17:43 -0700 (PDT)
Received: from source ([204.14.239.239]) by exprod8ob120.postini.com ([64.18.7.12]) with SMTP ID DSNKTZLLaUbyaUkGhksR0ruGGFmqXSu9INZ4@postini.com; Tue, 29 Mar 2011 23:19:22 PDT
Received: from EXSFM-MB01.internal.salesforce.com ([10.1.127.46]) by exsfm-hub4.internal.salesforce.com ([10.1.127.8]) with mapi; Tue, 29 Mar 2011 23:19:21 -0700
From: Chuck Mortimore <cmortimore@salesforce.com>
To: Phillip Hunt <phil.hunt@oracle.com>
Date: Tue, 29 Mar 2011 23:18:59 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvuomgCa1hMplfDRQWVhNd7wczwSw==
Message-ID: <948E6CDC-BEF2-4078-B5EE-B89983B35874@salesforce.com>
References: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET> <92655.18400.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E72344656430603@P3PW5EX1MB01.EX1.SECURESERVER.NET> <393421E2-C734-48D9-B0D1-A94FC3C1BDC7@oracle.com>
In-Reply-To: <393421E2-C734-48D9-B0D1-A94FC3C1BDC7@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_948E6CDCBEF24078B5EEB89983B35874salesforcecom_"
MIME-Version: 1.0
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 06:17:48 -0000

--_000_948E6CDCBEF24078B5EEB89983B35874salesforcecom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_948E6CDCBEF24078B5EEB89983B35874salesforcecom_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_948E6CDCBEF24078B5EEB89983B35874salesforcecom_--

From eran@hueniverse.com  Tue Mar 29 23:33:28 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D81F63A6A9A for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 23:33:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.637
X-Spam-Level: 
X-Spam-Status: No, score=-2.637 tagged_above=-999 required=5 tests=[AWL=-0.039, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PqJ6LTvBmv9c for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 23:33:26 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id A74773A6A8C for <oauth@ietf.org>; Tue, 29 Mar 2011 23:33:26 -0700 (PDT)
Received: (qmail 1679 invoked from network); 30 Mar 2011 06:35:04 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 30 Mar 2011 06:35:03 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Tue, 29 Mar 2011 23:35:04 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Chuck Mortimore <cmortimore@salesforce.com>, Phillip Hunt <phil.hunt@oracle.com>
Date: Tue, 29 Mar 2011 23:34:57 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvuomgCa1hMplfDRQWVhNd7wczwSwAAEGNg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E72344656430604@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET> <92655.18400.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E72344656430603@P3PW5EX1MB01.EX1.SECURESERVER.NET> <393421E2-C734-48D9-B0D1-A94FC3C1BDC7@oracle.com> <948E6CDC-BEF2-4078-B5EE-B89983B35874@salesforce.com>
In-Reply-To: <948E6CDC-BEF2-4078-B5EE-B89983B35874@salesforce.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E72344656430604P3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 06:33:29 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E72344656430604P3PW5EX1MB01E_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_90C41DD21FB7C64BB94121FBBC2E72344656430604P3PW5EX1MB01E_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_90C41DD21FB7C64BB94121FBBC2E72344656430604P3PW5EX1MB01E_--

From torsten@lodderstedt.net  Tue Mar 29 23:54:35 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3F1343A6AB0 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 23:54:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.248
X-Spam-Level: 
X-Spam-Status: No, score=-2.248 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2nSg6qUHYhy5 for <oauth@core3.amsl.com>; Tue, 29 Mar 2011 23:54:31 -0700 (PDT)
Received: from smtprelay04.ispgateway.de (smtprelay04.ispgateway.de [80.67.18.16]) by core3.amsl.com (Postfix) with ESMTP id 91FD13A67F8 for <oauth@ietf.org>; Tue, 29 Mar 2011 23:54:30 -0700 (PDT)
Received: from [130.129.66.195] by smtprelay04.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Q4pK2-0002id-LV; Wed, 30 Mar 2011 08:56:06 +0200
Message-ID: <4D92D407.9010308@lodderstedt.net>
Date: Wed, 30 Mar 2011 08:56:07 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<92655.18400.qm@web55806.mail.re3.yahoo.com>	<90C41DD21FB7C64BB94121FBBC2E72344656430603@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<393421E2-C734-48D9-B0D1-A94FC3C1BDC7@oracle.com>	<948E6CDC-BEF2-4078-B5EE-B89983B35874@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E72344656430604@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E72344656430604@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: multipart/alternative; boundary="------------040806000403050507070207"
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 06:54:35 -0000

This is a multi-part message in MIME format.
--------------040806000403050507070207
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

We are discussing TLS right now as a mean to prevent impersonation of 
the end-user's session on the client site. Correct? It's definitely a 
good advice to protect session from being highjacked that way. But I'm 
wondering whether this really belongs into the scope of OAuth?

BTW: It's covered in 
http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.4.1.6.

regards,
Torsten.

Am 30.03.2011 08:34, schrieb Eran Hammer-Lahav:
>
> Iâ€™ve been doing this longer. Requiring TLS on the redirection endpoint 
> is a big change for OAuth deployments. This would have been 
> unthinkable for OAuth 1.0(a). One of the main goals of 2.0 was to make 
> it much easier for client developers. I donâ€™t think deploying HTTPS as 
> a prerequisite for playing with an OAuth endpoint is trivial for most 
> client developers.
>
> When we had the same debate over bearer token and TLS, many people 
> argued to keep it SHOULD, but no one said they will actually deploy it 
> without TLS. That was a very useful data point. We should take a 
> moment to find out what existing OAuth providers have to say about this.
>
> To clarify â€“ I am not objecting to making this a MUST. But I am 
> objecting and will delay this change until we gather more information 
> from actual deployments. Since this applies to OAuth 1.0, it would be 
> very relevant to ask existing providers if they will try and enforce 
> such a restriction for 1.0 as well.
>
> Specifications written in a bubble usually fail outright or fail to 
> reflect reality.
>
> Also, the attacks are different for the authorization code and 
> implicit grant types. Each can benefit from using TLS for the 
> redirection endpoint in different ways (one transmission of code from 
> user-agent to client, the other manipulation of scripts from client to 
> user-agent). Just want to make sure we donâ€™t just focus on one vector.
>
> EHL
>
> *From:*Chuck Mortimore [mailto:cmortimore@salesforce.com]
> *Sent:* Tuesday, March 29, 2011 11:19 PM
> *To:* Phillip Hunt
> *Cc:* Eran Hammer-Lahav; Karen P. Lewison; OAuth WG
> *Subject:* Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
> +1
>
> I disagree that to use TLS is a big change.  Rather I'd categorize 
> using TLS as a big inconvenience.
>
> We should define a secure profile.  If individual deployments choose 
> to relax the spec and determine HTTP acceptable for local host or 
> other convenience thats fine, but it shouldn't be compliant.
>
>
> - cmort
>
>
> On Mar 29, 2011, at 10:55 PM, "Phillip Hunt" <phil.hunt@oracle.com 
> <mailto:phil.hunt@oracle.com>> wrote:
>
>     Why can't TLS be a must except when the token cannot be exposed.
>     Eg because the redirect is local?
>
>     Phil
>
>     Sent from my phone.
>
>
>     On 2011-03-29, at 22:48, Eran Hammer-Lahav <eran@hueniverse.com
>     <mailto:eran@hueniverse.com>> wrote:
>
>         Francisco â€“ thanks for being persistent.
>
>         Sounds like the same problem exists in OAuth 1.0. Basically,
>         the only way the client knows that the same user who granted
>         authorization is the one coming back, is via the authorization
>         code. Anyone who has that code is basically assumed to be the
>         one granting access. If the code is intercepted, whoever gets
>         it can pretend to be its legitimate holder.
>
>         I agree this is an issue.
>
>         Requiring callbacks to use TLS is a big change.
>
>         There are some cases where it is not needed â€“ namely, when the
>         client uses the access token obtained through this transaction
>         to do something on the backend without actually exposing
>         anything to the user who delivered the authorization code. For
>         example, an application scanning your Twitter account in the
>         background, sending you emails when someone is no longer
>         following you. Such a client does not need TLS because the
>         authorization code represents a valid grant, and the MITM
>         doesnâ€™t get any benefit from hijacking the callback. No data
>         is exposed.
>
>         However, this is not the typical use case.
>
>         As long as the security considerations are clearly stated, we
>         can move forward with either a MUST or a SHOULD. We can easily
>         exempts any internal callbacks from this requirement
>         (localhost, application scheme handler, etc.).
>
>         I donâ€™t want to write a specification that everyone knowingly
>         ignores. Once people ignore one security requirement, whatâ€™s
>         to stop them from ignoring others. So the most important input
>         to this discussion is what the vendors are going to do
>         (regardless of what the document says)?
>
>         EHL
>
>         *From:*Francisco Corella [mailto:fcorella@pomcor.com]
>         *Sent:* Tuesday, March 29, 2011 3:40 PM
>         *To:* Phil Hunt; Justin Richer; Eran Hammer-Lahav
>         *Cc:* OAuth WG; Karen P. Lewison; Paul Tarjan (pt@fb.com
>         <mailto:pt@fb.com>)
>         *Subject:* RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
>         > Isnâ€™t all this just different flavors of a session fixation
>         attacks?
>         > The client should use cookies and the state parameter to
>         ensure the
>         > same user-agent it redirected to the authorization server is
>         the one
>         > coming back.
>
>         It's not a session fixation attack.  It's just an interception
>         of a
>         credential.  The authorization code is a credential that provides
>         access to the protected resources.  If the attacker can get
>         it, the
>         attacker can get the protected resources (using the client as an
>         agent, so to speak).
>
>         A cookie won't help, since it would be sent from the browser
>         to the client
>         along with the authorization code.  If the attacker can observe or
>         intercept the authorization code, the attacker and observe or
>         intercept the cookie.
>
>         Francisco
>
>         --- On *Tue, 3/29/11, Eran Hammer-Lahav /<eran@hueniverse.com
>         <mailto:eran@hueniverse.com>>/* wrote:
>
>
>         From: Eran Hammer-Lahav <eran@hueniverse.com
>         <mailto:eran@hueniverse.com>>
>         Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>         To: "fcorella@pomcor.com <mailto:fcorella@pomcor.com>"
>         <fcorella@pomcor.com <mailto:fcorella@pomcor.com>>, "Phil
>         Hunt" <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>,
>         "Justin Richer" <jricher@mitre.org <mailto:jricher@mitre.org>>
>         Cc: "OAuth WG" <oauth@ietf.org <mailto:oauth@ietf.org>>,
>         "Karen P. Lewison" <kplewison@pomcor.com
>         <mailto:kplewison@pomcor.com>>, "Paul Tarjan (pt@fb.com
>         <mailto:pt@fb.com>)" <pt@fb.com <mailto:pt@fb.com>>
>         Date: Tuesday, March 29, 2011, 7:50 PM
>
>         Isnâ€™t all this just different flavors of a session fixation
>         attacks? The client should use cookies and the state parameter
>         to ensure the same user-agent it redirected to the
>         authorization server is the one coming back.
>
>         EHL
>
>         *From:*Francisco Corella [mailto:fcorella@pomcor.com]
>         *Sent:* Tuesday, March 29, 2011 11:46 AM
>         *To:* Phil Hunt; Justin Richer; Eran Hammer-Lahav
>         *Cc:* OAuth WG; Karen P. Lewison; Paul Tarjan (pt@fb.com
>         <mailto:pt@fb.com>)
>         *Subject:* RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
>         > Can you explain how intercepting the authorization code
>         > without having access to the client credentials is a
>         > problem? For the sake of discussion, assume that the client
>         > has valid and secure credentials that an attacker cannot
>         > access. Also assume that the client has implemented some
>         > form of cross-site protection.
>
>         One way: man-in-the-middle attack.  The traffic between the
>         legitimate
>         user's browser and the client goes through the attacker's machine
>         (easy to set up with a rogue WiFi access point).  The user's
>         browser
>         sends an http request to the client, targeting the redirect
>         URI.  The
>         attacker's machine doesn't let that request go through.  The
>         attacker
>         then sends the same identical request from the attacker's own
>         browser.
>         When the client receives the request, it has no way to tell
>         that it is
>         coming from the attacker's browser rather than from the user's
>         browser.  The client exchanges the authorization code for an
>         access
>         token, uses the access token to obtain protected resources
>         belonging
>         to the user, and delivers those resources to the attacker's
>         browser.
>         (Or manipulates those resources as directed by the attacker's
>         browser.)  In the Facebook use case, the client logs the user
>         in upon
>         verifying that the authorization code is valid by exchanging it
>         successfully for an access token.
>
>         Another way (passive attack): The attacker observes the
>         request from
>         the user's browser to the client.  The attacker does not stop the
>         request.  The client receives the request with the
>         authorization code
>         and exchanges the authorization code for the access token. 
>         Now the
>         attacker sends the same request from the attacker's own
>         browser.  The
>         client receives the second request and exchanges the authorization
>         code for another access token.  Upon receiving the second
>         request for
>         the same authorization code, the authorization server revokes the
>         first access token, as suggested in section 4.1.2 of the
>         specification: "If an authorization code is used more than
>         once, the
>         auhorization server MAY revoke all tokens previously issued
>         based on
>         that authorization code".  The client then uses the second access
>         token to access protected resources for the benefit of the
>         attacker.
>         In the Facebook use case, the attacker is logged in as the
>         legitimate
>         user.
>
>         > I donâ€šÃ„Ã´t know much about FBâ€šÃ„Ã´s implementation but if they
>         > allow the authorization code to be used for anything other
>         > than exchanged for an access token using secure client
>         > credentials, then they are not implementing the protocol as
>         > specified.
>
>         Facebook uses the protocol correctly, but the examples in the
>         Facebook
>         documentation use http rather than https for redirect URIs, so
>         implementations that follow the examples use http rather than
>         https.
>
>         Francisco
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--------------040806000403050507070207
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 8bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#ffffff">
    We are discussing TLS right now as a mean to prevent impersonation
    of the end-user's session on the client site. Correct? It's
    definitely a good advice to protect session from being highjacked
    that way. But I'm wondering whether this really belongs into the
    scope of OAuth? <br>
    <br>
    BTW: It's covered in
<a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.4.1.6">http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.4.1.6</a>.<br>
    <br>
    regards,<br>
    Torsten.<br>
    <br>
    Am 30.03.2011 08:34, schrieb Eran Hammer-Lahav:
    <blockquote
cite="mid:90C41DD21FB7C64BB94121FBBC2E72344656430604@P3PW5EX1MB01.EX1.SECURESERVER.NET"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.yiv1552031577msonormal, li.yiv1552031577msonormal, div.yiv1552031577msonormal
	{mso-style-name:yiv1552031577msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">Iâ€™ve been doing this longer. Requiring TLS on the
            redirection endpoint is a big change for OAuth deployments.
            This would have been unthinkable for OAuth 1.0(a). One of
            the main goals of 2.0 was to make it much easier for client
            developers. I donâ€™t think deploying HTTPS as a prerequisite
            for playing with an OAuth endpoint is trivial for most
            client developers.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">When we had the same debate over bearer token and
            TLS, many people argued to keep it SHOULD, but no one said
            they will actually deploy it without TLS. That was a very
            useful data point. We should take a moment to find out what
            existing OAuth providers have to say about this. <o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">To clarify â€“ I am not objecting to making this a
            MUST. But I am objecting and will delay this change until we
            gather more information from actual deployments. Since this
            applies to OAuth 1.0, it would be very relevant to ask
            existing providers if they will try and enforce such a
            restriction for 1.0 as well.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">Specifications written in a bubble usually fail
            outright or fail to reflect reality.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">Also, the attacks are different for the
            authorization code and implicit grant types. Each can
            benefit from using TLS for the redirection endpoint in
            different ways (one transmission of code from user-agent to
            client, the other manipulation of scripts from client to
            user-agent). Just want to make sure we donâ€™t just focus on
            one vector.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">EHL<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <div style="border-width: medium medium medium 1.5pt;
          border-style: none none none solid; border-color:
          -moz-use-text-color -moz-use-text-color -moz-use-text-color
          blue; padding: 0in 0in 0in 4pt;">
          <div>
            <div style="border-right: medium none; border-width: 1pt
              medium medium; border-style: solid none none;
              border-color: rgb(181, 196, 223) -moz-use-text-color
              -moz-use-text-color; padding: 3pt 0in 0in;">
              <p class="MsoNormal"><b><span style="font-size: 10pt;
                    font-family:
                    &quot;Tahoma&quot;,&quot;sans-serif&quot;;">From:</span></b><span
                  style="font-size: 10pt; font-family:
                  &quot;Tahoma&quot;,&quot;sans-serif&quot;;"> Chuck
                  Mortimore [<a class="moz-txt-link-freetext" href="mailto:cmortimore@salesforce.com">mailto:cmortimore@salesforce.com</a>] <br>
                  <b>Sent:</b> Tuesday, March 29, 2011 11:19 PM<br>
                  <b>To:</b> Phillip Hunt<br>
                  <b>Cc:</b> Eran Hammer-Lahav; Karen P. Lewison; OAuth
                  WG<br>
                  <b>Subject:</b> Re: [OAUTH-WG] WGLC on
                  draft-ietf-oauth-v2-13.txt<o:p></o:p></span></p>
            </div>
          </div>
          <p class="MsoNormal"><o:p>Â </o:p></p>
          <div>
            <p class="MsoNormal">+1Â <o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">Â <o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">I disagree that to use TLS is a big
              change. Â Rather I'd categorize using TLS as a big
              inconvenience. Â <o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal"><o:p>Â </o:p></p>
          </div>
          <div>
            <p class="MsoNormal">We should define a secure profile. Â If
              individual deployments choose to relax the spec and
              determine HTTP acceptable for local host or other
              convenience thats fine, but it shouldn't be compliant. Â <o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal"><br>
              - cmort<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal" style="margin-bottom: 12pt;"><br>
              On Mar 29, 2011, at 10:55 PM, "Phillip Hunt" &lt;<a
                moz-do-not-send="true"
                href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;
              wrote:<o:p></o:p></p>
          </div>
          <blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
            <div>
              <div>
                <p class="MsoNormal">Why can't TLS be a must except when
                  the token cannot be exposed. Eg because the redirect
                  is local?Â <o:p></o:p></p>
              </div>
              <div>
                <p class="MsoNormal"><o:p>Â </o:p></p>
              </div>
              <div>
                <p class="MsoNormal">Phil<o:p></o:p></p>
                <div>
                  <p class="MsoNormal"><o:p>Â </o:p></p>
                </div>
                <div>
                  <p class="MsoNormal">Sent from my phone.Â <o:p></o:p></p>
                </div>
              </div>
              <div>
                <p class="MsoNormal" style="margin-bottom: 12pt;"><br>
                  On 2011-03-29, at 22:48, Eran Hammer-Lahav &lt;<a
                    moz-do-not-send="true"
                    href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;
                  wrote:<o:p></o:p></p>
              </div>
              <blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
                <div>
                  <div>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Francisco â€“ thanks for
                        being persistent.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Sounds like the same
                        problem exists in OAuth 1.0. Basically, the only
                        way the client knows that the same user who
                        granted authorization is the one coming back, is
                        via the authorization code. Anyone who has that
                        code is basically assumed to be the one granting
                        access. If the code is intercepted, whoever gets
                        it can pretend to be its legitimate holder.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">I agree this is an
                        issue.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Requiring callbacks to
                        use TLS is a big change.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">There are some cases
                        where it is not needed â€“ namely, when the client
                        uses the access token obtained through this
                        transaction to do something on the backend
                        without actually exposing anything to the user
                        who delivered the authorization code. For
                        example, an application scanning your Twitter
                        account in the background, sending you emails
                        when someone is no longer following you. Such a
                        client does not need TLS because the
                        authorization code represents a valid grant, and
                        the MITM doesnâ€™t get any benefit from hijacking
                        the callback. No data is exposed.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">However, this is not
                        the typical use case.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">As long as the
                        security considerations are clearly stated, we
                        can move forward with either a MUST or a SHOULD.
                        We can easily exempts any internal callbacks
                        from this requirement (localhost, application
                        scheme handler, etc.).</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">I donâ€™t want to write
                        a specification that everyone knowingly ignores.
                        Once people ignore one security requirement,
                        whatâ€™s to stop them from ignoring others. So the
                        most important input to this discussion is what
                        the vendors are going to do (regardless of what
                        the document says)?</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">EHL</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <div style="border-width: medium medium medium
                      1.5pt; border-style: none none none solid;
                      border-color: -moz-use-text-color
                      -moz-use-text-color -moz-use-text-color blue;
                      padding: 0in 0in 0in 4pt;">
                      <div>
                        <div style="border-right: medium none;
                          border-width: 1pt medium medium; border-style:
                          solid none none; border-color: rgb(181, 196,
                          223) -moz-use-text-color -moz-use-text-color;
                          padding: 3pt 0in 0in;">
                          <p class="MsoNormal" style=""><b><span
                                style="font-size: 10pt; font-family:
                                &quot;Tahoma&quot;,&quot;sans-serif&quot;;">From:</span></b><span
                              style="font-size: 10pt; font-family:
                              &quot;Tahoma&quot;,&quot;sans-serif&quot;;">
                              Francisco Corella
                              [<a class="moz-txt-link-freetext" href="mailto:fcorella@pomcor.com">mailto:fcorella@pomcor.com</a>] <br>
                              <b>Sent:</b> Tuesday, March 29, 2011 3:40
                              PM<br>
                              <b>To:</b> Phil Hunt; Justin Richer; Eran
                              Hammer-Lahav<br>
                              <b>Cc:</b> OAuth WG; Karen P. Lewison;
                              Paul Tarjan (<a moz-do-not-send="true"
                                href="mailto:pt@fb.com">pt@fb.com</a>)<br>
                              <b>Subject:</b> RE: [OAUTH-WG] WGLC on
                              draft-ietf-oauth-v2-13.txt</span><o:p></o:p></p>
                        </div>
                      </div>
                      <p class="MsoNormal" style="">Â <o:p></o:p></p>
                      <table class="MsoNormalTable" border="0"
                        cellpadding="0" cellspacing="0">
                        <tbody>
                          <tr>
                            <td style="padding: 0in;" valign="top">
                              <p class="MsoNormal" style="">&gt; Isnâ€™t
                                all this just different flavors of a
                                session fixation attacks?<br>
                                &gt; The client should use cookies and
                                the state parameter to ensure the<br>
                                &gt; same user-agent it redirected to
                                the authorization server is the one<br>
                                &gt; coming back.<br>
                                <br>
                                It's not a session fixation attack.Â 
                                It's just an interception of a<br>
                                credential.Â  The authorization code is a
                                credential that provides<br>
                                access to the protected resources.Â  If
                                the attacker can get it, the<br>
                                attacker can get the protected resources
                                (using the client as an<br>
                                agent, so to speak).<br>
                                <br>
                                A cookie won't help, since it would be
                                sent from the browser to the client<br>
                                along with the authorization code.Â  If
                                the attacker can observe or<br>
                                intercept the authorization code, the
                                attacker and observe or<br>
                                intercept the cookie.<br>
                                <br>
                                Francisco<br>
                                <br>
                                --- On <b>Tue, 3/29/11, Eran
                                  Hammer-Lahav <i>&lt;<a
                                      moz-do-not-send="true"
                                      href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;</i></b>
                                wrote:<o:p></o:p></p>
                              <p class="MsoNormal" style="margin-bottom:
                                12pt;"><br>
                                From: Eran Hammer-Lahav &lt;<a
                                  moz-do-not-send="true"
                                  href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;<br>
                                Subject: RE: [OAUTH-WG] WGLC on
                                draft-ietf-oauth-v2-13.txt<br>
                                To: "<a moz-do-not-send="true"
                                  href="mailto:fcorella@pomcor.com">fcorella@pomcor.com</a>"
                                &lt;<a moz-do-not-send="true"
                                  href="mailto:fcorella@pomcor.com">fcorella@pomcor.com</a>&gt;,
                                "Phil Hunt" &lt;<a
                                  moz-do-not-send="true"
                                  href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;,
                                "Justin Richer" &lt;<a
                                  moz-do-not-send="true"
                                  href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br>
                                Cc: "OAuth WG" &lt;<a
                                  moz-do-not-send="true"
                                  href="mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;,
                                "Karen P. Lewison" &lt;<a
                                  moz-do-not-send="true"
                                  href="mailto:kplewison@pomcor.com">kplewison@pomcor.com</a>&gt;,
                                "Paul Tarjan (<a moz-do-not-send="true"
                                  href="mailto:pt@fb.com">pt@fb.com</a>)"
                                &lt;<a moz-do-not-send="true"
                                  href="mailto:pt@fb.com">pt@fb.com</a>&gt;<br>
                                Date: Tuesday, March 29, 2011, 7:50 PM<o:p></o:p></p>
                              <div id="yiv1552031577">
                                <div>
                                  <p class="yiv1552031577msonormal"><span
                                      style="font-size: 11pt;
                                      font-family:
                                      &quot;Arial&quot;,&quot;sans-serif&quot;;
                                      color: rgb(31, 73, 125);">Isnâ€™t
                                      all this just different flavors of
                                      a session fixation attacks? The
                                      client should use cookies and the
                                      state parameter to ensure the same
                                      user-agent it redirected to the
                                      authorization server is the one
                                      coming back.</span><o:p></o:p></p>
                                  <p class="yiv1552031577msonormal"><span
                                      style="font-size: 11pt;
                                      font-family:
                                      &quot;Arial&quot;,&quot;sans-serif&quot;;
                                      color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                                  <p class="yiv1552031577msonormal"><span
                                      style="font-size: 11pt;
                                      font-family:
                                      &quot;Arial&quot;,&quot;sans-serif&quot;;
                                      color: rgb(31, 73, 125);">EHL</span><o:p></o:p></p>
                                  <p class="yiv1552031577msonormal"><span
                                      style="font-size: 11pt;
                                      font-family:
                                      &quot;Arial&quot;,&quot;sans-serif&quot;;
                                      color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                                  <div style="border-width: medium
                                    medium medium 1.5pt; border-style:
                                    none none none solid; padding: 0in
                                    0in 0in 4pt; border-color:
                                    -moz-use-text-color
                                    -moz-use-text-color
                                    -moz-use-text-color blue;">
                                    <div>
                                      <div style="border-right: medium
                                        none; border-width: 1pt medium
                                        medium; border-style: solid none
                                        none; padding: 3pt 0in 0in;
                                        border-color:
                                        -moz-use-text-color;">
                                        <p
                                          class="yiv1552031577msonormal"><b><span
                                              style="font-size: 10pt;
                                              font-family:
                                              &quot;Arial&quot;,&quot;sans-serif&quot;;">From:</span></b><span
                                            style="font-size: 10pt;
                                            font-family:
                                            &quot;Arial&quot;,&quot;sans-serif&quot;;">
                                            Francisco Corella
                                            [<a class="moz-txt-link-freetext" href="mailto:fcorella@pomcor.com">mailto:fcorella@pomcor.com</a>]
                                            <br>
                                            <b>Sent:</b> Tuesday, March
                                            29, 2011 11:46 AM<br>
                                            <b>To:</b> Phil Hunt; Justin
                                            Richer; Eran Hammer-Lahav<br>
                                            <b>Cc:</b> OAuth WG; Karen
                                            P. Lewison; Paul Tarjan (<a
                                              moz-do-not-send="true"
                                              href="mailto:pt@fb.com">pt@fb.com</a>)<br>
                                            <b>Subject:</b> RE:
                                            [OAUTH-WG] WGLC on
                                            draft-ietf-oauth-v2-13.txt</span><o:p></o:p></p>
                                      </div>
                                    </div>
                                    <p class="yiv1552031577msonormal">Â <o:p></o:p></p>
                                    <table class="MsoNormalTable"
                                      border="0" cellpadding="0"
                                      cellspacing="0">
                                      <tbody>
                                        <tr>
                                          <td style="padding: 0in;"
                                            valign="top">
                                            <p
                                              class="yiv1552031577msonormal"
                                              style="margin-bottom:
                                              12pt;">&gt; Can you
                                              explain how intercepting
                                              the authorization code<br>
                                              &gt; without having access
                                              to the client credentials
                                              is a<br>
                                              &gt; problem? For the sake
                                              of discussion, assume that
                                              the client<br>
                                              &gt; has valid and secure
                                              credentials that an
                                              attacker cannot<br>
                                              &gt; access. Also assume
                                              that the client has
                                              implemented some<br>
                                              &gt; form of cross-site
                                              protection.<br>
                                              <br>
                                              One way: man-in-the-middle
                                              attack.Â  The traffic
                                              between the legitimate<br>
                                              user's browser and the
                                              client goes through the
                                              attacker's machine<br>
                                              (easy to set up with a
                                              rogue WiFi access point).Â 
                                              The user's browser<br>
                                              sends an http request to
                                              the client, targeting the
                                              redirect URI.Â  The<br>
                                              attacker's machine doesn't
                                              let that request go
                                              through.Â  The attacker<br>
                                              then sends the same
                                              identical request from the
                                              attacker's own browser.<br>
                                              When the client receives
                                              the request, it has no way
                                              to tell that it is<br>
                                              coming from the attacker's
                                              browser rather than from
                                              the user's<br>
                                              browser.Â  The client
                                              exchanges the
                                              authorization code for an
                                              access<br>
                                              token, uses the access
                                              token to obtain protected
                                              resources belonging<br>
                                              to the user, and delivers
                                              those resources to the
                                              attacker's browser.<br>
                                              (Or manipulates those
                                              resources as directed by
                                              the attacker's<br>
                                              browser.)Â  In the Facebook
                                              use case, the client logs
                                              the user in upon<br>
                                              verifying that the
                                              authorization code is
                                              valid by exchanging it<br>
                                              successfully for an access
                                              token.<br>
                                              <br>
                                              Another way (passive
                                              attack): The attacker
                                              observes the request from<br>
                                              the user's browser to the
                                              client.Â  The attacker does
                                              not stop the<br>
                                              request.Â  The client
                                              receives the request with
                                              the authorization code<br>
                                              and exchanges the
                                              authorization code for the
                                              access token.Â  Now the<br>
                                              attacker sends the same
                                              request from the
                                              attacker's own browser.Â 
                                              The<br>
                                              client receives the second
                                              request and exchanges the
                                              authorization<br>
                                              code for another access
                                              token.Â  Upon receiving the
                                              second request for<br>
                                              the same authorization
                                              code, the authorization
                                              server revokes the<br>
                                              first access token, as
                                              suggested in section 4.1.2
                                              of the<br>
                                              specification: "If an
                                              authorization code is used
                                              more than once, the<br>
                                              auhorization server MAY
                                              revoke all tokens
                                              previously issued based on<br>
                                              that authorization code".Â 
                                              The client then uses the
                                              second access<br>
                                              token to access protected
                                              resources for the benefit
                                              of the attacker.<br>
                                              In the Facebook use case,
                                              the attacker is logged in
                                              as the legitimate<br>
                                              user.<br>
                                              <br>
                                              &gt; I donâ€šÃ„Ã´t know much
                                              about FBâ€šÃ„Ã´s
                                              implementation but if they<br>
                                              &gt; allow the
                                              authorization code to be
                                              used for anything other<br>
                                              &gt; than exchanged for an
                                              access token using secure
                                              client<br>
                                              &gt; credentials, then
                                              they are not implementing
                                              the protocol as<br>
                                              &gt; specified.<br>
                                              <br>
                                              Facebook uses the protocol
                                              correctly, but the
                                              examples in the Facebook<br>
                                              documentation use http
                                              rather than https for
                                              redirect URIs, so<br>
                                              implementations that
                                              follow the examples use
                                              http rather than https.<br>
                                              <br>
                                              Francisco<o:p></o:p></p>
                                          </td>
                                        </tr>
                                      </tbody>
                                    </table>
                                    <p class="yiv1552031577msonormal"><span
                                        style="font-size: 10pt;
                                        font-family:
                                        &quot;Arial&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
                                  </div>
                                </div>
                              </div>
                            </td>
                          </tr>
                        </tbody>
                      </table>
                      <p class="MsoNormal" style=""><span
                          style="font-size: 10pt; font-family:
                          &quot;Calibri&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
                    </div>
                  </div>
                </div>
              </blockquote>
            </div>
          </blockquote>
          <blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
            <div>
              <p class="MsoNormal">_______________________________________________<br>
                OAuth mailing list<br>
                <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
                <a moz-do-not-send="true"
                  href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
            </div>
          </blockquote>
        </div>
      </div>
      <pre wrap="">
<fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
  </body>
</html>

--------------040806000403050507070207--

From Michael.Jones@microsoft.com  Wed Mar 30 01:56:05 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ABEC328C116; Wed, 30 Mar 2011 01:56:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.578
X-Spam-Level: 
X-Spam-Status: No, score=-10.578 tagged_above=-999 required=5 tests=[AWL=0.020, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ek-C6i+ZAF1X; Wed, 30 Mar 2011 01:56:04 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 0874A28C115; Wed, 30 Mar 2011 01:56:03 -0700 (PDT)
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (157.54.79.174) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Wed, 30 Mar 2011 01:57:42 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.01.0270.002; Wed, 30 Mar 2011 01:57:42 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: "woes@ietf.org" <woes@ietf.org>, "oauth@ietf.org" <oauth@ietf.org>, "openid-specs-ab@lists.openid.net" <openid-specs-ab@lists.openid.net>
Thread-Topic: JSON Web Token (JWT) Draft -04
Thread-Index: AcvuuIVAmFKf4FToR3mJsYxJZdQlsg==
Date: Wed, 30 Mar 2011 08:57:41 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252B2BB6@TK5EX14MBXC203.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943252B2BB6TK5EX14MBXC203r_"
MIME-Version: 1.0
Cc: "openid-specs@lists.openid.net" <openid-specs@lists.openid.net>
Subject: [OAUTH-WG] JSON Web Token (JWT) Draft -04
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 08:56:05 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943252B2BB6TK5EX14MBXC203r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Draft -04 of the JSON Web Token (JWT)<http://self-issued.info/docs/draft-jo=
nes-json-web-token.html> specification is available.  It corrects a typo fo=
und by John Bradley in -03.

The draft is available at these locations:

*        http://www.ietf.org/internet-drafts/draft-jones-json-web-token-04.=
txt

*        http://www.ietf.org/internet-drafts/draft-jones-json-web-token-04.=
xml

*        http://self-issued.info/docs/draft-jones-json-web-token-04.html

*        http://self-issued.info/docs/draft-jones-json-web-token-04.txt

*        http://self-issued.info/docs/draft-jones-json-web-token-04.xml

*        http://self-issued.info/docs/draft-jones-json-web-token.html (will=
 point to new versions as they are posted)

*        http://self-issued.info/docs/draft-jones-json-web-token.txt (will =
point to new versions as they are posted)

*        http://self-issued.info/docs/draft-jones-json-web-token.xml (will =
point to new versions as they are posted)

*        http://svn.openid.net/repos/specifications/json_web_token/1.0/ (Su=
bversion repository, with html, txt, and html versions available)

                                                            -- Mike


--_000_4E1F6AAD24975D4BA5B1680429673943252B2BB6TK5EX14MBXC203r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:105664527;
	mso-list-type:hybrid;
	mso-list-template-ids:705074772 67698689 67698691 67698693 67698689 676986=
91 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Draft -04 of the <a href=3D"http://self-issued.info/=
docs/draft-jones-json-web-token.html">
JSON Web Token (JWT)</a> specification is available.&nbsp; It corrects a ty=
po found by John Bradley in -03.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The draft is available at these locations:<o:p></o:p=
></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"http://www.ietf.org/internet-draf=
ts/draft-jones-json-web-token-04.txt">http://www.ietf.org/internet-drafts/d=
raft-jones-json-web-token-04.txt</a><o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"http://www.ietf.org/internet-draf=
ts/draft-jones-json-web-token-04.xml">http://www.ietf.org/internet-drafts/d=
raft-jones-json-web-token-04.xml</a><o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"http://self-issued.info/docs/draf=
t-jones-json-web-token-04.html">http://self-issued.info/docs/draft-jones-js=
on-web-token-04.html</a><o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"http://self-issued.info/docs/draf=
t-jones-json-web-token-04.txt">http://self-issued.info/docs/draft-jones-jso=
n-web-token-04.txt</a><o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"http://self-issued.info/docs/draf=
t-jones-json-web-token-04.xml">http://self-issued.info/docs/draft-jones-jso=
n-web-token-04.xml</a><o:p></o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"http://self-issued.info/docs/draf=
t-jones-json-web-token.html">http://self-issued.info/docs/draft-jones-json-=
web-token.html</a> (will point to new versions as they are posted)<o:p></o:=
p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"http://self-issued.info/docs/draf=
t-jones-json-web-token.txt">http://self-issued.info/docs/draft-jones-json-w=
eb-token.txt</a> (will point to new versions as they are posted)<o:p></o:p>=
</p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"http://self-issued.info/docs/draf=
t-jones-json-web-token.xml">http://self-issued.info/docs/draft-jones-json-w=
eb-token.xml</a> (will point to new versions as they are posted)<o:p></o:p>=
</p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-family:Symbol"><span style=
=3D"mso-list:Ignore">&middot;<span style=3D"font:7.0pt &quot;Times New Roma=
n&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"http://svn.openid.net/repos/speci=
fications/json_web_token/1.0/">http://svn.openid.net/repos/specifications/j=
son_web_token/1.0/</a> (Subversion repository, with html, txt, and html ver=
sions available)<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; --=
 Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943252B2BB6TK5EX14MBXC203r_--

From bcampbell@pingidentity.com  Wed Mar 30 05:59:03 2011
Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 84D443A6B11 for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 05:59:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.533
X-Spam-Level: 
X-Spam-Status: No, score=-5.533 tagged_above=-999 required=5 tests=[AWL=0.444,  BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pu9WPTiEhutJ for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 05:59:02 -0700 (PDT)
Received: from na3sys009aog107.obsmtp.com (na3sys009aog107.obsmtp.com [74.125.149.197]) by core3.amsl.com (Postfix) with ESMTP id D8ABC3A67A8 for <oauth@ietf.org>; Wed, 30 Mar 2011 05:58:56 -0700 (PDT)
Received: from source ([209.85.161.48]) (using TLSv1) by na3sys009aob107.postini.com ([74.125.148.12]) with SMTP ID DSNKTZMpcsbA4vULUpCXaIaVc0KMuT5kNwBP@postini.com; Wed, 30 Mar 2011 06:00:36 PDT
Received: by mail-fx0-f48.google.com with SMTP id 7so1469599fxm.21 for <oauth@ietf.org>; Wed, 30 Mar 2011 06:00:34 -0700 (PDT)
Received: by 10.223.69.131 with SMTP id z3mr1232110fai.91.1301490034167; Wed, 30 Mar 2011 06:00:34 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.223.70.198 with HTTP; Wed, 30 Mar 2011 06:00:04 -0700 (PDT)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564305DF@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <AANLkTimY+d+i3HAWmw=zM02orfocnwWfmK4D3NNfwZLm@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305DF@P3PW5EX1MB01.EX1.SECURESERVER.NET>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Wed, 30 Mar 2011 07:00:04 -0600
Message-ID: <AANLkTi=cK07bQbc4T6wjRAZEu8-rvn4mkJMvGod9RaBy@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Question on scope when refreshing an access token
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 12:59:03 -0000

Yeah, maybe it could be clarified a bit. Thanks. It made sense when I
first read the text. However, when I went to implement it, I started
reading into "previously approved" (maybe too much) and I think maybe
that wording is potentially ambiguous.

On Tue, Mar 29, 2011 at 5:16 PM, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
>
>
> Yep, just down-scoping. It is there to make sure that whatever the resource owner
> approved is always the most permissive scope granted. Do I need to make it clearer?

From jricher@mitre.org  Wed Mar 30 06:58:26 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8E49A28C144 for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 06:58:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.81
X-Spam-Level: 
X-Spam-Status: No, score=-4.81 tagged_above=-999 required=5 tests=[AWL=1.789,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zNYUPBKC-CQx for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 06:58:25 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 2876128C131 for <oauth@ietf.org>; Wed, 30 Mar 2011 06:58:25 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id CC51121B0905; Wed, 30 Mar 2011 10:00:03 -0400 (EDT)
Received: from imchub2.MITRE.ORG (imchub2.mitre.org [129.83.29.74]) by smtpksrv1.mitre.org (Postfix) with ESMTP id C351821B08ED; Wed, 30 Mar 2011 10:00:03 -0400 (EDT)
Received: from [129.83.50.23] (129.83.50.23) by imchub2.MITRE.ORG (129.83.29.74) with Microsoft SMTP Server id 8.2.254.0; Wed, 30 Mar 2011 10:00:03 -0400
From: Justin Richer <jricher@mitre.org>
To: Phillip Hunt <phil.hunt@oracle.com>
In-Reply-To: <393421E2-C734-48D9-B0D1-A94FC3C1BDC7@oracle.com>
References: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET> <92655.18400.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E72344656430603@P3PW5EX1MB01.EX1.SECURESERVER.NET> <393421E2-C734-48D9-B0D1-A94FC3C1BDC7@oracle.com>
Content-Type: text/plain; charset="UTF-8"
Date: Wed, 30 Mar 2011 10:03:31 -0400
Message-ID: <1301493811.1812.258.camel@ground>
MIME-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 8bit
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 13:58:26 -0000

Isn't a "MUST with exceptions" basically the same weight as a "SHOULD"?
As per 2119:

   "SHOULD ... there
   may exist valid reasons in particular circumstances to ignore a
   particular item, but the full implications must be understood and
   carefully weighed before choosing a different course."

I've always put pretty heavy weight on "SHOULD" components in a spec, as
it really comes down to "ignore at your own peril." A "MUST" shouldn't
have exceptions like that if it's really a "MUST."

 -- Justin

On Wed, 2011-03-30 at 01:55 -0400, Phillip Hunt wrote:
> Why can't TLS be a must except when the token cannot be exposed. Eg
> because the redirect is local? 
> 
> 
> Phil
> 
> 
> Sent from my phone. 
> 
> On 2011-03-29, at 22:48, Eran Hammer-Lahav <eran@hueniverse.com>
> wrote:
> 
> 
> 
> > Francisco â€“ thanks for being persistent.
> > 
> >  
> > 
> > Sounds like the same problem exists in OAuth 1.0. Basically, the
> > only way the client knows that the same user who granted
> > authorization is the one coming back, is via the authorization code.
> > Anyone who has that code is basically assumed to be the one granting
> > access. If the code is intercepted, whoever gets it can pretend to
> > be its legitimate holder.
> > 
> >  
> > 
> > I agree this is an issue.
> > 
> >  
> > 
> > Requiring callbacks to use TLS is a big change.
> > 
> >  
> > 
> > There are some cases where it is not needed â€“ namely, when the
> > client uses the access token obtained through this transaction to do
> > something on the backend without actually exposing anything to the
> > user who delivered the authorization code. For example, an
> > application scanning your Twitter account in the background, sending
> > you emails when someone is no longer following you. Such a client
> > does not need TLS because the authorization code represents a valid
> > grant, and the MITM doesnâ€™t get any benefit from hijacking the
> > callback. No data is exposed.
> > 
> >  
> > 
> > However, this is not the typical use case.
> > 
> >  
> > 
> > As long as the security considerations are clearly stated, we can
> > move forward with either a MUST or a SHOULD. We can easily exempts
> > any internal callbacks from this requirement (localhost, application
> > scheme handler, etc.).
> > 
> > I donâ€™t want to write a specification that everyone knowingly
> > ignores. Once people ignore one security requirement, whatâ€™s to stop
> > them from ignoring others. So the most important input to this
> > discussion is what the vendors are going to do (regardless of what
> > the document says)?
> > 
> >  
> > 
> > EHL
> > 
> >  
> > 
> >  
> > 
> > From: Francisco Corella [mailto:fcorella@pomcor.com] 
> > Sent: Tuesday, March 29, 2011 3:40 PM
> > To: Phil Hunt; Justin Richer; Eran Hammer-Lahav
> > Cc: OAuth WG; Karen P. Lewison; Paul Tarjan (pt@fb.com)
> > Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> > 
> > 
> >  
> > 
> > > Isnâ€™t all this just different flavors of a session fixation
> > attacks?
> > > The client should use cookies and the state parameter to ensure
> > the
> > > same user-agent it redirected to the authorization server is the
> > one
> > > coming back.
> > 
> > It's not a session fixation attack.  It's just an interception of a
> > credential.  The authorization code is a credential that provides
> > access to the protected resources.  If the attacker can get it, the
> > attacker can get the protected resources (using the client as an
> > agent, so to speak).
> > 
> > A cookie won't help, since it would be sent from the browser to the
> > client
> > along with the authorization code.  If the attacker can observe or
> > intercept the authorization code, the attacker and observe or
> > intercept the cookie.
> > 
> > Francisco
> > 
> > --- On Tue, 3/29/11, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
> > 
> > 
> > From: Eran Hammer-Lahav <eran@hueniverse.com>
> > Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> > To: "fcorella@pomcor.com" <fcorella@pomcor.com>, "Phil Hunt"
> > <phil.hunt@oracle.com>, "Justin Richer" <jricher@mitre.org>
> > Cc: "OAuth WG" <oauth@ietf.org>, "Karen P. Lewison"
> > <kplewison@pomcor.com>, "Paul Tarjan (pt@fb.com)" <pt@fb.com>
> > Date: Tuesday, March 29, 2011, 7:50 PM
> > 
> > Isnâ€™t all this just different flavors of a session fixation attacks?
> > The client should use cookies and the state parameter to ensure the
> > same user-agent it redirected to the authorization server is the one
> > coming back.
> > 
> >  
> > 
> > EHL
> > 
> >  
> > 
> > From: Francisco Corella [mailto:fcorella@pomcor.com] 
> > Sent: Tuesday, March 29, 2011 11:46 AM
> > To: Phil Hunt; Justin Richer; Eran Hammer-Lahav
> > Cc: OAuth WG; Karen P. Lewison; Paul Tarjan (pt@fb.com)
> > Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> > 
> > 
> >  
> > 
> > > Can you explain how intercepting the authorization code
> > > without having access to the client credentials is a
> > > problem? For the sake of discussion, assume that the client
> > > has valid and secure credentials that an attacker cannot
> > > access. Also assume that the client has implemented some
> > > form of cross-site protection.
> > 
> > One way: man-in-the-middle attack.  The traffic between the
> > legitimate
> > user's browser and the client goes through the attacker's machine
> > (easy to set up with a rogue WiFi access point).  The user's browser
> > sends an http request to the client, targeting the redirect URI.
> > The
> > attacker's machine doesn't let that request go through.  The
> > attacker
> > then sends the same identical request from the attacker's own
> > browser.
> > When the client receives the request, it has no way to tell that it
> > is
> > coming from the attacker's browser rather than from the user's
> > browser.  The client exchanges the authorization code for an access
> > token, uses the access token to obtain protected resources belonging
> > to the user, and delivers those resources to the attacker's browser.
> > (Or manipulates those resources as directed by the attacker's
> > browser.)  In the Facebook use case, the client logs the user in
> > upon
> > verifying that the authorization code is valid by exchanging it
> > successfully for an access token.
> > 
> > Another way (passive attack): The attacker observes the request from
> > the user's browser to the client.  The attacker does not stop the
> > request.  The client receives the request with the authorization
> > code
> > and exchanges the authorization code for the access token.  Now the
> > attacker sends the same request from the attacker's own browser.
> > The
> > client receives the second request and exchanges the authorization
> > code for another access token.  Upon receiving the second request
> > for
> > the same authorization code, the authorization server revokes the
> > first access token, as suggested in section 4.1.2 of the
> > specification: "If an authorization code is used more than once, the
> > auhorization server MAY revoke all tokens previously issued based on
> > that authorization code".  The client then uses the second access
> > token to access protected resources for the benefit of the attacker.
> > In the Facebook use case, the attacker is logged in as the
> > legitimate
> > user.
> > 
> > > I donâ€šÃ„Ã´t know much about FBâ€šÃ„Ã´s implementation but if they
> > > allow the authorization code to be used for anything other
> > > than exchanged for an access token using secure client
> > > credentials, then they are not implementing the protocol as
> > > specified.
> > 
> > Facebook uses the protocol correctly, but the examples in the
> > Facebook
> > documentation use http rather than https for redirect URIs, so
> > implementations that follow the examples use http rather than https.
> > 
> > Francisco
> > 
> > 
> > 
> >  
> > 
> > 
> > 
> >  
> > 
> > 



From jricher@mitre.org  Wed Mar 30 07:15:21 2011
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 549B43A6B5D for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 07:15:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.879
X-Spam-Level: 
X-Spam-Status: No, score=-4.879 tagged_above=-999 required=5 tests=[AWL=1.720,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RN9yJbZI94Qp for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 07:15:20 -0700 (PDT)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by core3.amsl.com (Postfix) with ESMTP id 8B6573A6A34 for <oauth@ietf.org>; Wed, 30 Mar 2011 07:15:20 -0700 (PDT)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 5A75B21B153F; Wed, 30 Mar 2011 10:16:59 -0400 (EDT)
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 5357F21B0DCD; Wed, 30 Mar 2011 10:16:59 -0400 (EDT)
Received: from [129.83.50.23] (129.83.50.23) by imchub1.MITRE.ORG (129.83.29.73) with Microsoft SMTP Server id 8.2.254.0; Wed, 30 Mar 2011 10:16:59 -0400
From: Justin Richer <jricher@mitre.org>
To: Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564305DE@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305DE@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset="UTF-8"
Date: Wed, 30 Mar 2011 10:20:27 -0400
Message-ID: <1301494827.1812.262.camel@ground>
MIME-Version: 1.0
X-Mailer: Evolution 2.30.3 
Content-Transfer-Encoding: 8bit
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Proposed change to OAuth parameters registry
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 14:15:21 -0000

Better than x_ and still ultimately optional so as to not make server
implementors think that OAuth endpoints must be pristine. In the absence
of having a proper root namespace on this thing (which I'm still bitter
about, I know), this works.

 -- Justin

On Tue, 2011-03-29 at 19:13 -0400, Eran Hammer-Lahav wrote:
> I would like to make the following change to section 8.2:
> 
>  
> 
>    New request or response parameters for use with the authorization
>    endpoint or the token endpoint are defined and registered in the
>    parameters registry following the procedure in Section 10.2.
>  
>    Parameter names MUST conform to the param-name ABNF and parameter
>    values syntax MUST be well-defined (e.g., using ABNF, or a reference
>    to the syntax of an existing parameter).
>  
>    Unregistered vendor-specific parameter extensions that are not commonly
>    applicable, and are specific to the implementation details of the
>    authorization server where they are used SHOULD utilize a
>    vendor-specific prefix that is not likely to conflict with other 
>    registered values (e.g. begin with 'companyname_').
> 
>  
> 
> This is a more pragmatic (and less ugly) solution to vendor specific
> parameters. Instead of using the â€˜x_â€™ prefix, vendors (have and) will
> use something else that is unique to them. For example Facebook uses
> â€˜fb_â€™ for many of their parameters.
> 
>  
> 
> Feedback requested by 4/1 for inclusion in -14.
> 
>  
> 
> EHL
> 
> 



From dick.hardt@gmail.com  Wed Mar 30 08:17:40 2011
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 673AC3A6B61 for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 08:17:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7LEP05O18Tgl for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 08:17:39 -0700 (PDT)
Received: from mail-iw0-f172.google.com (mail-iw0-f172.google.com [209.85.214.172]) by core3.amsl.com (Postfix) with ESMTP id 17C0E3A6B71 for <oauth@ietf.org>; Wed, 30 Mar 2011 08:17:39 -0700 (PDT)
Received: by iwn39 with SMTP id 39so1568453iwn.31 for <oauth@ietf.org>; Wed, 30 Mar 2011 08:19:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:subject:mime-version:content-type:from :in-reply-to:date:cc:message-id:references:to:x-mailer; bh=z15GFM/xD3hP7xTOPIBMPUH1CxTrOdhYM9bc1bmsimw=; b=dwtPU7lSO20bB1be8sglR9lifRC+06PMkhk03wcU0jz6CUbCblkgvQCxlc3w/GDsaV o9mdiUW3wnXauis9qZr48Zeemq75ALnxl0vb4hiki+RrgOE2mpQGIkwsfYB0x/YYTbTc cyqaE6eINAdoKa+ny1/kEOewmXwcqsqyNKzzI=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :message-id:references:to:x-mailer; b=wDm+3JiReaQjEi/nsbcT0kpaiN8J1sNfxxv+MCHfWzBBK3TzJUpM5RaChOFo8HHu+0 Cxvm3ovfI0jWcZDzTkJS77t25AocJKr3bE4bzq9KWiU87OAh/Za9aT2/9GWRXHHf8QGQ fRas5rwt7klOzOK2JSQD6CX8WrR4sSCV99PPQ=
Received: by 10.231.142.32 with SMTP id o32mr1334523ibu.143.1301498358009; Wed, 30 Mar 2011 08:19:18 -0700 (PDT)
Received: from [192.168.1.16] (c-24-5-83-209.hsd1.ca.comcast.net [24.5.83.209]) by mx.google.com with ESMTPS id y10sm102072iba.29.2011.03.30.08.19.15 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 30 Mar 2011 08:19:16 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-36-1068607149
From: Dick Hardt <dick.hardt@gmail.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Wed, 30 Mar 2011 08:19:14 -0700
Message-Id: <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 15:17:40 -0000

--Apple-Mail-36-1068607149
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Thanks for pointing out my misunderstanding. I was thinking client in =
the sense of the side of TLS initiating a request.

I agree that requiring TLS on the callback is an unexpected change.=20

I recall reviewing the security implications of an unsecured callback as =
being nominal if the authorization grant is linked to the client =
credentials.


On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:

> I think you got this backwards. We=92re talking about forcing =
developers using the Facebook (or any other service) API to deploy their =
own TLS endpoint for the incoming callback (via redirection). Every =
developer will need to get a cert and deploy an HTTPS endpoint.
> =20
> That=92s has never been discussed.
> =20
> EHL
> =20
> From: Dick Hardt [mailto:dick.hardt@gmail.com]=20
> Sent: Tuesday, March 29, 2011 9:02 PM
> To: Eran Hammer-Lahav
> Cc: WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> =20
> =20
> On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:
>=20
>=20
> To clarify, I am not opposed to mandating TLS on the callback, just =
that if we do, we can=92t ship the protocol the way it is without coming =
up with some other alternative that does not require TLS deployment on =
the client side. OAuth 1.0 has no such requirement and adding it in 2.0 =
is completely unexpected by the community at large.
> =20
> I only recall the concern with TLS to be on the server side, not the =
client side -- and I don't think that it is unexpected at all.
>=20
>=20
> =20
> It would be helpful to hear from some companies with large 1.0 or 2.0 =
deployment on this matter? Anyone from Google, Facebook, Yahoo, Twitter, =
etc.?
> =20
> When working on OAuth-WRAP, I talked to all of those companies about =
using TLS, and only Facebook said that they wanted an option to be able =
to not require TLS. Since then, all Facebook's new APIs which are =
essentially using OAuth 2.0 run on TLS.
> =20
> =20
> =20


--Apple-Mail-36-1068607149
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><base href=3D"x-msg://362/"></head><body style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; ">Thanks for pointing out my misunderstanding. I was =
thinking client in the sense of the side of TLS initiating a =
request.<div><br></div><div>I agree that requiring TLS on the callback =
is an unexpected change.&nbsp;</div><div><br></div><div>I recall =
reviewing the security implications of an unsecured callback as being =
nominal if the authorization grant is linked to the client =
credentials.</div><div><br></div><div><br><div><div><div>On 2011-03-29, =
at 10:07 PM, Eran Hammer-Lahav wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">I =
think you got this backwards. We=92re talking about forcing developers =
using the Facebook (or any other service) API to deploy their own TLS =
endpoint for the incoming callback (via redirection). Every developer =
will need to get a cert and deploy an HTTPS =
endpoint.<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">That=92s has never been discussed.<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">EHL<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"border-top-style: none; =
border-right-style: none; border-bottom-style: none; border-width: =
initial; border-color: initial; border-left-style: solid; =
border-left-color: blue; border-left-width: 1.5pt; padding-top: 0in; =
padding-right: 0in; padding-bottom: 0in; padding-left: 4pt; "><div><div =
style=3D"border-right-style: none; border-bottom-style: none; =
border-left-style: none; border-width: initial; border-color: initial; =
border-top-style: solid; border-top-color: rgb(181, 196, 223); =
border-top-width: 1pt; padding-top: 3pt; padding-right: 0in; =
padding-bottom: 0in; padding-left: 0in; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; =
">From:</span></b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif; "><span class=3D"Apple-converted-space">&nbsp;</span>Dick =
Hardt [mailto:dick.hardt@gmail.com]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Tuesday, March 29, 2011 =
9:02 PM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Eran =
Hammer-Lahav<br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>WG<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] WGLC on =
draft-ietf-oauth-v2-13.txt<o:p></o:p></span></div></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">On 2011-03-29, at 4:40 =
PM, Eran Hammer-Lahav wrote:<o:p></o:p></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">To clarify, I am not opposed to mandating TLS on the =
callback, just that if we do, we can=92t ship the protocol the way it is =
without coming up with some other alternative that does not require TLS =
deployment on the client side. OAuth 1.0 has no such requirement and =
adding it in 2.0 is completely unexpected by the community at =
large.</span><o:p></o:p></div></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">I only recall the concern =
with TLS to be on the server side, not the client side -- and I don't =
think that it is unexpected at all.<o:p></o:p></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">It would be helpful to hear from =
some companies with large 1.0 or 2.0 deployment on this matter? Anyone =
from Google, Facebook, Yahoo, Twitter, =
etc.?</span><o:p></o:p></div></div></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">When working =
on OAuth-WRAP, I talked to all of those companies about using TLS, and =
only Facebook said that they wanted an option to be able to not require =
TLS. Since then, all Facebook's new APIs which are essentially using =
OAuth 2.0 run on TLS.<o:p></o:p></div></div><div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div></div></div></div></span></blockquote></div=
><br></div></div></body></html>=

--Apple-Mail-36-1068607149--

From pathogenix@gmail.com  Wed Mar 30 08:34:08 2011
Return-Path: <pathogenix@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D7DA23A6B68; Wed, 30 Mar 2011 08:34:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.597
X-Spam-Level: 
X-Spam-Status: No, score=-3.597 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4ZB4oNLpUy8x; Wed, 30 Mar 2011 08:34:05 -0700 (PDT)
Received: from mail-qw0-f44.google.com (mail-qw0-f44.google.com [209.85.216.44]) by core3.amsl.com (Postfix) with ESMTP id 1922F3A69C0; Wed, 30 Mar 2011 08:34:05 -0700 (PDT)
Received: by qwg5 with SMTP id 5so1044842qwg.31 for <multiple recipients>; Wed, 30 Mar 2011 08:35:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=czBfwkEGD9mZvL/bMJ7PY2ezGC1zM5rMYUXtBOgOJeE=; b=smeJVM+dJmExfNFKfQ32jAXpstXvhrTZj9hG1QhvaLbpHE/EWUE1s7ZPl5KQ66wJhL /lpzyJYAoPQCcW/ed4uXG9e26RMZSWKS69Y7ecM+lMBaryDHievlybNyOK21mkm5O4d+ Iuzxr0i/yVNQZAZJ4aePtWS+KnwHw3cPRDnNw=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=nnGxdjentjvyqZNiL/Ch5puDcBSr6Mlcnl/7cvE5skAWWdE8+Ga68cVbtp6fGTYxjf 9qySUVaHIzOSzZV5AF6IeiUJHdWxvr+3s4tK/K1GUKy/GSt+f+Qsh2ugNjFRcaS5rTW8 IBuR4/QhhwYQ9igoQ7u8x63ntDzJLlKg6/o0A=
MIME-Version: 1.0
Received: by 10.229.97.213 with SMTP id m21mr1162525qcn.288.1301499343734; Wed, 30 Mar 2011 08:35:43 -0700 (PDT)
Received: by 10.229.11.136 with HTTP; Wed, 30 Mar 2011 08:35:43 -0700 (PDT)
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943252B2BB6@TK5EX14MBXC203.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B1680429673943252B2BB6@TK5EX14MBXC203.redmond.corp.microsoft.com>
Date: Wed, 30 Mar 2011 16:35:43 +0100
Message-ID: <AANLkTi=pYrucDVi+7z1RQ_A243ZXCpQzYonGLSw-MAXL@mail.gmail.com>
From: Bob Gregory <pathogenix@gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Content-Type: multipart/alternative; boundary=00163683259e0f094a049fb4eecf
Cc: "openid-specs-ab@lists.openid.net" <openid-specs-ab@lists.openid.net>, "woes@ietf.org" <woes@ietf.org>, "oauth@ietf.org" <oauth@ietf.org>, "openid-specs@lists.openid.net" <openid-specs@lists.openid.net>
Subject: Re: [OAUTH-WG] JSON Web Token (JWT) Draft -04
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 15:34:08 -0000

--00163683259e0f094a049fb4eecf
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

I've just uploaded a .Net implementation of JWT issuance and consumption to
GitHub @ https://github.com/BobFromHuddle/Jwt4Net

<https://github.com/BobFromHuddle/Jwt4Net>This is no way ready for public
release, but is in use in a production system. It's based on draft 1, and
I'll try and update it to draft 4 compliance next week.

We're intending to provide full coverage of  the JWT spec as it matures, th=
e
major block for us at the moment is the lack of a specification for the
"jku" key encoding scheme. Until that's decided, we're using .Net's default
serialization of private keys which is based on RFC 4050.

 -- Bob Gregory

On Wed, Mar 30, 2011 at 9:57 AM, Mike Jones <Michael.Jones@microsoft.com>wr=
ote:

>  Draft -04 of the JSON Web Token (JWT)<http://self-issued.info/docs/draft=
-jones-json-web-token.html>specification is available.  It corrects a typo =
found by John Bradley in
> -03.
>
>
>
> The draft is available at these locations:
>
> =B7
> http://www.ietf.org/internet-drafts/draft-jones-json-web-token-04.txt
>
> =B7
> http://www.ietf.org/internet-drafts/draft-jones-json-web-token-04.xml
>
> =B7        http://self-issued.info/docs/draft-jones-json-web-token-04.htm=
l
>
> =B7        http://self-issued.info/docs/draft-jones-json-web-token-04.txt
>
> =B7        http://self-issued.info/docs/draft-jones-json-web-token-04.xml
>
> =B7        http://self-issued.info/docs/draft-jones-json-web-token.html(w=
ill point to new versions as they are posted)
>
> =B7        http://self-issued.info/docs/draft-jones-json-web-token.txt (w=
ill
> point to new versions as they are posted)
>
> =B7        http://self-issued.info/docs/draft-jones-json-web-token.xml (w=
ill
> point to new versions as they are posted)
>
> =B7        http://svn.openid.net/repos/specifications/json_web_token/1.0/=
(Subversion repository, with html, txt, and html versions available)
>
>
>
>                                                             -- Mike
>
>
>



--=20
An infinite number of mathematicians walk into a bar. The first one orders =
a
beer. The second orders half a beer. The third, a quarter of a beer. The
bartender says "You're all idiots", and pours two beers.

--00163683259e0f094a049fb4eecf
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

I&#39;ve just uploaded a .Net implementation of JWT issuance and consumptio=
n to GitHub @=A0<a href=3D"https://github.com/BobFromHuddle/Jwt4Net">https:=
//github.com/BobFromHuddle/Jwt4Net</a><div><br></div><div><a href=3D"https:=
//github.com/BobFromHuddle/Jwt4Net"></a>This is no way ready for public rel=
ease, but is in use in a production system. It&#39;s based on draft 1, and =
I&#39;ll try and update it to draft 4 compliance next week.</div>
<div><br></div><div>We&#39;re intending to provide full coverage of =A0the =
JWT spec as it matures, the major block for us at the moment is the lack of=
 a specification for the &quot;jku&quot; key encoding scheme. Until that&#3=
9;s decided, we&#39;re using .Net&#39;s default serialization of private ke=
ys which is based on RFC 4050.</div>
<div><br></div><div>=A0-- Bob Gregory<br><div><br><div class=3D"gmail_quote=
">On Wed, Mar 30, 2011 at 9:57 AM, Mike Jones <span dir=3D"ltr">&lt;<a href=
=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&gt;=
</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex;">




<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>
<p class=3D"MsoNormal">Draft -04 of the <a href=3D"http://self-issued.info/=
docs/draft-jones-json-web-token.html" target=3D"_blank">
JSON Web Token (JWT)</a> specification is available.=A0 It corrects a typo =
found by John Bradley in -03.</p>
<p class=3D"MsoNormal">=A0</p>
<p class=3D"MsoNormal">The draft is available at these locations:</p>
<p><span style=3D"font-family:Symbol"><span>=B7<span style=3D"font:7.0pt &q=
uot;Times New Roman&quot;">=A0=A0=A0=A0=A0=A0=A0
</span></span></span><a href=3D"http://www.ietf.org/internet-drafts/draft-j=
ones-json-web-token-04.txt" target=3D"_blank">http://www.ietf.org/internet-=
drafts/draft-jones-json-web-token-04.txt</a></p>
<p><span style=3D"font-family:Symbol"><span>=B7<span style=3D"font:7.0pt &q=
uot;Times New Roman&quot;">=A0=A0=A0=A0=A0=A0=A0
</span></span></span><a href=3D"http://www.ietf.org/internet-drafts/draft-j=
ones-json-web-token-04.xml" target=3D"_blank">http://www.ietf.org/internet-=
drafts/draft-jones-json-web-token-04.xml</a></p>
<p><span style=3D"font-family:Symbol"><span>=B7<span style=3D"font:7.0pt &q=
uot;Times New Roman&quot;">=A0=A0=A0=A0=A0=A0=A0
</span></span></span><a href=3D"http://self-issued.info/docs/draft-jones-js=
on-web-token-04.html" target=3D"_blank">http://self-issued.info/docs/draft-=
jones-json-web-token-04.html</a></p>
<p><span style=3D"font-family:Symbol"><span>=B7<span style=3D"font:7.0pt &q=
uot;Times New Roman&quot;">=A0=A0=A0=A0=A0=A0=A0
</span></span></span><a href=3D"http://self-issued.info/docs/draft-jones-js=
on-web-token-04.txt" target=3D"_blank">http://self-issued.info/docs/draft-j=
ones-json-web-token-04.txt</a></p>
<p><span style=3D"font-family:Symbol"><span>=B7<span style=3D"font:7.0pt &q=
uot;Times New Roman&quot;">=A0=A0=A0=A0=A0=A0=A0
</span></span></span><a href=3D"http://self-issued.info/docs/draft-jones-js=
on-web-token-04.xml" target=3D"_blank">http://self-issued.info/docs/draft-j=
ones-json-web-token-04.xml</a></p>
<p><span style=3D"font-family:Symbol"><span>=B7<span style=3D"font:7.0pt &q=
uot;Times New Roman&quot;">=A0=A0=A0=A0=A0=A0=A0
</span></span></span><a href=3D"http://self-issued.info/docs/draft-jones-js=
on-web-token.html" target=3D"_blank">http://self-issued.info/docs/draft-jon=
es-json-web-token.html</a> (will point to new versions as they are posted)<=
/p>

<p><span style=3D"font-family:Symbol"><span>=B7<span style=3D"font:7.0pt &q=
uot;Times New Roman&quot;">=A0=A0=A0=A0=A0=A0=A0
</span></span></span><a href=3D"http://self-issued.info/docs/draft-jones-js=
on-web-token.txt" target=3D"_blank">http://self-issued.info/docs/draft-jone=
s-json-web-token.txt</a> (will point to new versions as they are posted)</p=
>

<p><span style=3D"font-family:Symbol"><span>=B7<span style=3D"font:7.0pt &q=
uot;Times New Roman&quot;">=A0=A0=A0=A0=A0=A0=A0
</span></span></span><a href=3D"http://self-issued.info/docs/draft-jones-js=
on-web-token.xml" target=3D"_blank">http://self-issued.info/docs/draft-jone=
s-json-web-token.xml</a> (will point to new versions as they are posted)</p=
>

<p><span style=3D"font-family:Symbol"><span>=B7<span style=3D"font:7.0pt &q=
uot;Times New Roman&quot;">=A0=A0=A0=A0=A0=A0=A0
</span></span></span><a href=3D"http://svn.openid.net/repos/specifications/=
json_web_token/1.0/" target=3D"_blank">http://svn.openid.net/repos/specific=
ations/json_web_token/1.0/</a> (Subversion repository, with html, txt, and =
html versions available)</p>

<p class=3D"MsoNormal">=A0</p>
<p class=3D"MsoNormal">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 -- Mike</p>
<p class=3D"MsoNormal">=A0</p>
</div>
</div>

</blockquote></div><br><br clear=3D"all"><br>-- <br>An infinite number of m=
athematicians walk into a bar. The first one orders a beer. The second orde=
rs half a beer. The third, a quarter of a beer. The bartender says &quot;Yo=
u&#39;re all idiots&quot;, and pours two beers.<br>

</div></div>

--00163683259e0f094a049fb4eecf--

From Michael.Jones@microsoft.com  Wed Mar 30 08:35:53 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EE5CB3A6A20; Wed, 30 Mar 2011 08:35:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.579
X-Spam-Level: 
X-Spam-Status: No, score=-10.579 tagged_above=-999 required=5 tests=[AWL=0.019, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yCBUOkIX0f7y; Wed, 30 Mar 2011 08:35:45 -0700 (PDT)
Received: from smtp.microsoft.com (mailb.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 15EFA28C131; Wed, 30 Mar 2011 08:35:44 -0700 (PDT)
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (157.54.79.174) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Wed, 30 Mar 2011 08:37:22 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.01.0270.002; Wed, 30 Mar 2011 08:37:21 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Bob Gregory <pathogenix@gmail.com>
Thread-Topic: [OAUTH-WG] JSON Web Token (JWT) Draft -04
Thread-Index: AcvuuIVAmFKf4FToR3mJsYxJZdQlsgAckiCAAA6ifnA=
Date: Wed, 30 Mar 2011 15:37:21 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252BA221@TK5EX14MBXC203.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B1680429673943252B2BB6@TK5EX14MBXC203.redmond.corp.microsoft.com> <AANLkTi=pYrucDVi+7z1RQ_A243ZXCpQzYonGLSw-MAXL@mail.gmail.com>
In-Reply-To: <AANLkTi=pYrucDVi+7z1RQ_A243ZXCpQzYonGLSw-MAXL@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943252BA221TK5EX14MBXC203r_"
MIME-Version: 1.0
Cc: "openid-specs-ab@lists.openid.net" <openid-specs-ab@lists.openid.net>, "woes@ietf.org" <woes@ietf.org>, "oauth@ietf.org" <oauth@ietf.org>, "openid-specs@lists.openid.net" <openid-specs@lists.openid.net>
Subject: Re: [OAUTH-WG] JSON Web Token (JWT) Draft -04
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 15:35:53 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943252BA221TK5EX14MBXC203r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Thanks, Bob.  That's great to hear!

I look forward to your feedback on the spec based upon your actual use.

                                                            -- Mike

From: Bob Gregory [mailto:pathogenix@gmail.com]
Sent: Wednesday, March 30, 2011 8:36 AM
To: Mike Jones
Cc: woes@ietf.org; oauth@ietf.org; openid-specs-ab@lists.openid.net; openid=
-specs@lists.openid.net
Subject: Re: [OAUTH-WG] JSON Web Token (JWT) Draft -04

I've just uploaded a .Net implementation of JWT issuance and consumption to=
 GitHub @ https://github.com/BobFromHuddle/Jwt4Net

This is no way ready for public release, but is in use in a production syst=
em. It's based on draft 1, and I'll try and update it to draft 4 compliance=
 next week.

We're intending to provide full coverage of  the JWT spec as it matures, th=
e major block for us at the moment is the lack of a specification for the "=
jku" key encoding scheme. Until that's decided, we're using .Net's default =
serialization of private keys which is based on RFC 4050.

 -- Bob Gregory

On Wed, Mar 30, 2011 at 9:57 AM, Mike Jones <Michael.Jones@microsoft.com<ma=
ilto:Michael.Jones@microsoft.com>> wrote:
Draft -04 of the JSON Web Token (JWT)<http://self-issued.info/docs/draft-jo=
nes-json-web-token.html> specification is available.  It corrects a typo fo=
und by John Bradley in -03.

The draft is available at these locations:

*        http://www.ietf.org/internet-drafts/draft-jones-json-web-token-04.=
txt

*        http://www.ietf.org/internet-drafts/draft-jones-json-web-token-04.=
xml

*        http://self-issued.info/docs/draft-jones-json-web-token-04.html

*        http://self-issued.info/docs/draft-jones-json-web-token-04.txt

*        http://self-issued.info/docs/draft-jones-json-web-token-04.xml

*        http://self-issued.info/docs/draft-jones-json-web-token.html (will=
 point to new versions as they are posted)

*        http://self-issued.info/docs/draft-jones-json-web-token.txt (will =
point to new versions as they are posted)

*        http://self-issued.info/docs/draft-jones-json-web-token.xml (will =
point to new versions as they are posted)

*        http://svn.openid.net/repos/specifications/json_web_token/1.0/ (Su=
bversion repository, with html, txt, and html versions available)

                                                            -- Mike




--
An infinite number of mathematicians walk into a bar. The first one orders =
a beer. The second orders half a beer. The third, a quarter of a beer. The =
bartender says "You're all idiots", and pours two beers.

--_000_4E1F6AAD24975D4BA5B1680429673943252BA221TK5EX14MBXC203r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p
	{mso-style-priority:99;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#002060;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">Thanks, Bob.&nbsp; That&#=
8217;s great to hear!<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">I look forward to your fe=
edback on the spec based upon your actual use.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Bob Greg=
ory [mailto:pathogenix@gmail.com]
<br>
<b>Sent:</b> Wednesday, March 30, 2011 8:36 AM<br>
<b>To:</b> Mike Jones<br>
<b>Cc:</b> woes@ietf.org; oauth@ietf.org; openid-specs-ab@lists.openid.net;=
 openid-specs@lists.openid.net<br>
<b>Subject:</b> Re: [OAUTH-WG] JSON Web Token (JWT) Draft -04<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I've just uploaded a .Net implementation of JWT issu=
ance and consumption to GitHub @&nbsp;<a href=3D"https://github.com/BobFrom=
Huddle/Jwt4Net">https://github.com/BobFromHuddle/Jwt4Net</a><o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">This is no way ready for public release, but is in u=
se in a production system. It's based on draft 1, and I'll try and update i=
t to draft 4 compliance next week.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">We're intending to provide full coverage of &nbsp;th=
e JWT spec as it matures, the major block for us at the moment is the lack =
of a specification for the &quot;jku&quot; key encoding scheme. Until that'=
s decided, we're using .Net's default serialization
 of private keys which is based on RFC 4050.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;-- Bob Gregory<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Wed, Mar 30, 2011 at 9:57 AM, Mike Jones &lt;<a h=
ref=3D"mailto:Michael.Jones@microsoft.com">Michael.Jones@microsoft.com</a>&=
gt; wrote:<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Draft -04 of the
<a href=3D"http://self-issued.info/docs/draft-jones-json-web-token.html" ta=
rget=3D"_blank">
JSON Web Token (JWT)</a> specification is available.&nbsp; It corrects a ty=
po found by John Bradley in -03.<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">The draft is available at these locations:<o:p></o:p></p>
<p><span style=3D"font-family:Symbol">&middot;</span><span style=3D"font-si=
ze:7.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><a href=3D"http://www.ietf.org/internet-drafts/draft-jones-json-web-=
token-04.txt" target=3D"_blank">http://www.ietf.org/internet-drafts/draft-j=
ones-json-web-token-04.txt</a><o:p></o:p></p>
<p><span style=3D"font-family:Symbol">&middot;</span><span style=3D"font-si=
ze:7.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><a href=3D"http://www.ietf.org/internet-drafts/draft-jones-json-web-=
token-04.xml" target=3D"_blank">http://www.ietf.org/internet-drafts/draft-j=
ones-json-web-token-04.xml</a><o:p></o:p></p>
<p><span style=3D"font-family:Symbol">&middot;</span><span style=3D"font-si=
ze:7.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><a href=3D"http://self-issued.info/docs/draft-jones-json-web-token-0=
4.html" target=3D"_blank">http://self-issued.info/docs/draft-jones-json-web=
-token-04.html</a><o:p></o:p></p>
<p><span style=3D"font-family:Symbol">&middot;</span><span style=3D"font-si=
ze:7.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><a href=3D"http://self-issued.info/docs/draft-jones-json-web-token-0=
4.txt" target=3D"_blank">http://self-issued.info/docs/draft-jones-json-web-=
token-04.txt</a><o:p></o:p></p>
<p><span style=3D"font-family:Symbol">&middot;</span><span style=3D"font-si=
ze:7.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><a href=3D"http://self-issued.info/docs/draft-jones-json-web-token-0=
4.xml" target=3D"_blank">http://self-issued.info/docs/draft-jones-json-web-=
token-04.xml</a><o:p></o:p></p>
<p><span style=3D"font-family:Symbol">&middot;</span><span style=3D"font-si=
ze:7.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><a href=3D"http://self-issued.info/docs/draft-jones-json-web-token.h=
tml" target=3D"_blank">http://self-issued.info/docs/draft-jones-json-web-to=
ken.html</a> (will point to new versions as they are posted)<o:p></o:p></p>
<p><span style=3D"font-family:Symbol">&middot;</span><span style=3D"font-si=
ze:7.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><a href=3D"http://self-issued.info/docs/draft-jones-json-web-token.t=
xt" target=3D"_blank">http://self-issued.info/docs/draft-jones-json-web-tok=
en.txt</a> (will point to new versions as they are posted)<o:p></o:p></p>
<p><span style=3D"font-family:Symbol">&middot;</span><span style=3D"font-si=
ze:7.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><a href=3D"http://self-issued.info/docs/draft-jones-json-web-token.x=
ml" target=3D"_blank">http://self-issued.info/docs/draft-jones-json-web-tok=
en.xml</a> (will point to new versions as they are posted)<o:p></o:p></p>
<p><span style=3D"font-family:Symbol">&middot;</span><span style=3D"font-si=
ze:7.0pt">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span><a href=3D"http://svn.openid.net/repos/specifications/json_web_token=
/1.0/" target=3D"_blank">http://svn.openid.net/repos/specifications/json_we=
b_token/1.0/</a> (Subversion repository, with html, txt, and html versions =
available)<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:=
p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><br>
<br clear=3D"all">
<br>
-- <br>
An infinite number of mathematicians walk into a bar. The first one orders =
a beer. The second orders half a beer. The third, a quarter of a beer. The =
bartender says &quot;You're all idiots&quot;, and pours two beers.<o:p></o:=
p></p>
</div>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943252BA221TK5EX14MBXC203r_--

From phil.hunt@oracle.com  Wed Mar 30 09:14:15 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8D6743A6B6C for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 09:14:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.554
X-Spam-Level: 
X-Spam-Status: No, score=-6.554 tagged_above=-999 required=5 tests=[AWL=0.044,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Ke0NhkdUYyT for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 09:14:14 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 3A6A33A6AB4 for <oauth@ietf.org>; Wed, 30 Mar 2011 09:14:14 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2UGFol8008678 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 30 Mar 2011 16:15:51 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2UGFnhX025974 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 30 Mar 2011 16:15:49 GMT
Received: from abhmt016.oracle.com (abhmt016.oracle.com [141.146.116.25]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2UGFm27007154; Wed, 30 Mar 2011 11:15:48 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 30 Mar 2011 09:15:48 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-37-1071999289
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com>
Date: Wed, 30 Mar 2011 09:15:46 -0700
Message-Id: <35E9F3F5-96BE-42F3-B9EF-0D9EE36B0CD4@oracle.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt358.oracle.com [141.146.40.158]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090209.4D935735.0184,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 16:14:15 -0000

--Apple-Mail-37-1071999289
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Developers of say a mobile app would not have to deploy it since the =
redirect endpoint would be local per the specific exception proposed. =
There should be NO requirement to make a client app implement TLS server =
side security.=20

The concern here is that all "network" paths are secured to prevent =
impersonation or theft of the session. Remember that in many cases, once =
the code is granted, the subsequent token is often good for a LONG time =
and thus this becomes the weak point in this protocol.

Re: Justin's comments on SHOULD, I find SHOULD is just too broad, it =
does not define when it is acceptable not to have security.  I prefer =
clear specification text that says the network paths must be protected.

Re: Eran's comments about impact on the existing community.  I don't =
think you are grasping the broadness of acceptance of OAuth 2.0. The =
existing OAuth 1.0 users are primarily social networks. I haven't heard =
them object. In fact, I've noticed almost all have started enabling =
HTTPS everywhere (at least as a user option). But OAuth2 has a much =
broader community now that I would argue is VERY concerned about risks =
of impersonation and real financial loss.

Phil
phil.hunt@oracle.com




On 2011-03-30, at 8:19 AM, Dick Hardt wrote:

> Thanks for pointing out my misunderstanding. I was thinking client in =
the sense of the side of TLS initiating a request.
>=20
> I agree that requiring TLS on the callback is an unexpected change.=20
>=20
> I recall reviewing the security implications of an unsecured callback =
as being nominal if the authorization grant is linked to the client =
credentials.
>=20
>=20
> On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:
>=20
>> I think you got this backwards. We=92re talking about forcing =
developers using the Facebook (or any other service) API to deploy their =
own TLS endpoint for the incoming callback (via redirection). Every =
developer will need to get a cert and deploy an HTTPS endpoint.
>> =20
>> That=92s has never been discussed.
>> =20
>> EHL
>> =20
>> From: Dick Hardt [mailto:dick.hardt@gmail.com]=20
>> Sent: Tuesday, March 29, 2011 9:02 PM
>> To: Eran Hammer-Lahav
>> Cc: WG
>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>> =20
>> =20
>> On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:
>>=20
>>=20
>> To clarify, I am not opposed to mandating TLS on the callback, just =
that if we do, we can=92t ship the protocol the way it is without coming =
up with some other alternative that does not require TLS deployment on =
the client side. OAuth 1.0 has no such requirement and adding it in 2.0 =
is completely unexpected by the community at large.
>> =20
>> I only recall the concern with TLS to be on the server side, not the =
client side -- and I don't think that it is unexpected at all.
>>=20
>>=20
>> =20
>> It would be helpful to hear from some companies with large 1.0 or 2.0 =
deployment on this matter? Anyone from Google, Facebook, Yahoo, Twitter, =
etc.?
>> =20
>> When working on OAuth-WRAP, I talked to all of those companies about =
using TLS, and only Facebook said that they wanted an option to be able =
to not require TLS. Since then, all Facebook's new APIs which are =
essentially using OAuth 2.0 run on TLS.
>> =20
>> =20
>> =20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail-37-1071999289
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
">Developers of say a mobile app would not have to deploy it since the =
redirect endpoint would be local per the specific exception proposed. =
There should be NO requirement to make a client app implement TLS server =
side security.&nbsp;<div><br></div><div>The concern here is that all =
"network" paths are secured to prevent impersonation or theft of the =
session. Remember that in many cases, once the code is granted, the =
subsequent token is often good for a LONG time and thus this becomes the =
weak point in this protocol.</div><div><div><br></div><div>Re: Justin's =
comments on SHOULD, I find SHOULD is just too broad, it does not define =
when it is acceptable not to have security. &nbsp;I prefer clear =
specification text that says the network paths must be =
protected.</div><div><br></div><div>Re: Eran's comments about impact on =
the existing community. &nbsp;I don't think you are grasping the =
broadness of acceptance of OAuth 2.0. The existing OAuth 1.0 users are =
primarily social networks. I haven't heard them object. In fact, I've =
noticed almost all have started enabling HTTPS everywhere (at least as a =
user option). But OAuth2 has a much broader community now that I would =
argue is VERY concerned about risks of impersonation and real financial =
loss.</div><div><br></div><div><div><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-align: auto; text-indent: 0px; text-transform: none; =
white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-30, at 8:19 AM, Dick Hardt wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">Thanks for pointing out my =
misunderstanding. I was thinking client in the sense of the side of TLS =
initiating a request.<div><br></div><div>I agree that requiring TLS on =
the callback is an unexpected change.&nbsp;</div><div><br></div><div>I =
recall reviewing the security implications of an unsecured callback as =
being nominal if the authorization grant is linked to the client =
credentials.</div><div><br></div><div><br><div><div><div>On 2011-03-29, =
at 10:07 PM, Eran Hammer-Lahav wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">I =
think you got this backwards. We=92re talking about forcing developers =
using the Facebook (or any other service) API to deploy their own TLS =
endpoint for the incoming callback (via redirection). Every developer =
will need to get a cert and deploy an HTTPS =
endpoint.<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">That=92s has never been discussed.<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">EHL<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"border-top-style: none; =
border-right-style: none; border-bottom-style: none; border-width: =
initial; border-color: initial; border-left-style: solid; =
border-left-color: blue; border-left-width: 1.5pt; padding-top: 0in; =
padding-right: 0in; padding-bottom: 0in; padding-left: 4pt; "><div><div =
style=3D"border-right-style: none; border-bottom-style: none; =
border-left-style: none; border-width: initial; border-color: initial; =
border-top-style: solid; border-top-color: rgb(181, 196, 223); =
border-top-width: 1pt; padding-top: 3pt; padding-right: 0in; =
padding-bottom: 0in; padding-left: 0in; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; =
">From:</span></b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif; "><span class=3D"Apple-converted-space">&nbsp;</span>Dick =
Hardt [mailto:dick.hardt@gmail.com]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Tuesday, March 29, 2011 =
9:02 PM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Eran =
Hammer-Lahav<br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>WG<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] WGLC on =
draft-ietf-oauth-v2-13.txt<o:p></o:p></span></div></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">On 2011-03-29, at 4:40 =
PM, Eran Hammer-Lahav wrote:<o:p></o:p></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">To clarify, I am not opposed to mandating TLS on the =
callback, just that if we do, we can=92t ship the protocol the way it is =
without coming up with some other alternative that does not require TLS =
deployment on the client side. OAuth 1.0 has no such requirement and =
adding it in 2.0 is completely unexpected by the community at =
large.</span><o:p></o:p></div></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">I only recall the concern =
with TLS to be on the server side, not the client side -- and I don't =
think that it is unexpected at all.<o:p></o:p></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">It would be helpful to hear from =
some companies with large 1.0 or 2.0 deployment on this matter? Anyone =
from Google, Facebook, Yahoo, Twitter, =
etc.?</span><o:p></o:p></div></div></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">When working =
on OAuth-WRAP, I talked to all of those companies about using TLS, and =
only Facebook said that they wanted an option to be able to not require =
TLS. Since then, all Facebook's new APIs which are essentially using =
OAuth 2.0 run on TLS.<o:p></o:p></div></div><div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div></div></div></div></span></blockquote></div=
><br></div></div></div>_______________________________________________<br>=
OAuth mailing list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></blockquote></div><br></div></div></body></html=
>=

--Apple-Mail-37-1071999289--

From dick.hardt@gmail.com  Wed Mar 30 09:23:36 2011
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1CBAB3A6A44 for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 09:23:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level: 
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QwPZazFwmVc7 for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 09:23:33 -0700 (PDT)
Received: from mail-px0-f182.google.com (mail-px0-f182.google.com [209.85.212.182]) by core3.amsl.com (Postfix) with ESMTP id 4A0D43A68D4 for <oauth@ietf.org>; Wed, 30 Mar 2011 09:23:33 -0700 (PDT)
Received: by pxi20 with SMTP id 20so352851pxi.27 for <oauth@ietf.org>; Wed, 30 Mar 2011 09:25:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:subject:mime-version:content-type:from :in-reply-to:date:cc:message-id:references:to:x-mailer; bh=Yx5GlOs4aLQV4SSVoOWOQjhJvK5hnBSOQnX420gjzKo=; b=GzdY8+9OEmfrLxVGNUH3MqUUcD9Kv1ICAiGR2Gn2s6cs8jMQWQmeyIcQa6jIAkWnQY jGjgfCc5Yf9LfGLcaovf1XLRsMhnNZZqEHgjaDT5x30XYIhDqxGj75pt8JctHhyWF8Jw aTrZ1EyLaCsNyyx/Kw6oceHrE5wj3+aZkMfqA=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :message-id:references:to:x-mailer; b=cyG7Qc9l/dBWSPIUadNWVubgUJMnSX3wm3Ao1dHi3TGqrvkoBkPQmSQJ2k1rlQRnLA MQLGnHUGbxaPl8fRrWqLOR23VXx9RimeE1RANzOS/dqVqWQQpnzZSDp06iyU/VB4rO7n xdUqP580aS3pEFryQtOLbZ1+E4V4oRMOiW054=
Received: by 10.143.178.6 with SMTP id f6mr1129146wfp.59.1301502312327; Wed, 30 Mar 2011 09:25:12 -0700 (PDT)
Received: from [192.168.1.16] (c-24-5-83-209.hsd1.ca.comcast.net [24.5.83.209]) by mx.google.com with ESMTPS id p40sm284015wfc.5.2011.03.30.09.25.08 (version=TLSv1/SSLv3 cipher=OTHER); Wed, 30 Mar 2011 09:25:09 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-42-1072559945
From: Dick Hardt <dick.hardt@gmail.com>
In-Reply-To: <35E9F3F5-96BE-42F3-B9EF-0D9EE36B0CD4@oracle.com>
Date: Wed, 30 Mar 2011 09:25:06 -0700
Message-Id: <D8AC8216-D51F-465B-A6C0-1FB0437036EA@gmail.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com> <35E9F3F5-96BE-42F3-B9EF-0D9EE36B0CD4@oracle.com>
To: Phil Hunt <phil.hunt@oracle.com>
X-Mailer: Apple Mail (2.1084)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 16:23:36 -0000

--Apple-Mail-42-1072559945
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Phil

I'd suggest you review the spec so that you understand what Eran and I =
are saying. No code has been granted in the redirect to a web client, =
where implementing TLS server side is a major barrier.=20

-- Dick

On 2011-03-30, at 9:15 AM, Phil Hunt wrote:

> Developers of say a mobile app would not have to deploy it since the =
redirect endpoint would be local per the specific exception proposed. =
There should be NO requirement to make a client app implement TLS server =
side security.=20
>=20
> The concern here is that all "network" paths are secured to prevent =
impersonation or theft of the session. Remember that in many cases, once =
the code is granted, the subsequent token is often good for a LONG time =
and thus this becomes the weak point in this protocol.
>=20
> Re: Justin's comments on SHOULD, I find SHOULD is just too broad, it =
does not define when it is acceptable not to have security.  I prefer =
clear specification text that says the network paths must be protected.
>=20
> Re: Eran's comments about impact on the existing community.  I don't =
think you are grasping the broadness of acceptance of OAuth 2.0. The =
existing OAuth 1.0 users are primarily social networks. I haven't heard =
them object. In fact, I've noticed almost all have started enabling =
HTTPS everywhere (at least as a user option). But OAuth2 has a much =
broader community now that I would argue is VERY concerned about risks =
of impersonation and real financial loss.
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> On 2011-03-30, at 8:19 AM, Dick Hardt wrote:
>=20
>> Thanks for pointing out my misunderstanding. I was thinking client in =
the sense of the side of TLS initiating a request.
>>=20
>> I agree that requiring TLS on the callback is an unexpected change.=20=

>>=20
>> I recall reviewing the security implications of an unsecured callback =
as being nominal if the authorization grant is linked to the client =
credentials.
>>=20
>>=20
>> On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:
>>=20
>>> I think you got this backwards. We=92re talking about forcing =
developers using the Facebook (or any other service) API to deploy their =
own TLS endpoint for the incoming callback (via redirection). Every =
developer will need to get a cert and deploy an HTTPS endpoint.
>>> =20
>>> That=92s has never been discussed.
>>> =20
>>> EHL
>>> =20
>>> From: Dick Hardt [mailto:dick.hardt@gmail.com]=20
>>> Sent: Tuesday, March 29, 2011 9:02 PM
>>> To: Eran Hammer-Lahav
>>> Cc: WG
>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>> =20
>>> =20
>>> On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:
>>>=20
>>>=20
>>> To clarify, I am not opposed to mandating TLS on the callback, just =
that if we do, we can=92t ship the protocol the way it is without coming =
up with some other alternative that does not require TLS deployment on =
the client side. OAuth 1.0 has no such requirement and adding it in 2.0 =
is completely unexpected by the community at large.
>>> =20
>>> I only recall the concern with TLS to be on the server side, not the =
client side -- and I don't think that it is unexpected at all.
>>>=20
>>>=20
>>> =20
>>> It would be helpful to hear from some companies with large 1.0 or =
2.0 deployment on this matter? Anyone from Google, Facebook, Yahoo, =
Twitter, etc.?
>>> =20
>>> When working on OAuth-WRAP, I talked to all of those companies about =
using TLS, and only Facebook said that they wanted an option to be able =
to not require TLS. Since then, all Facebook's new APIs which are =
essentially using OAuth 2.0 run on TLS.
>>> =20
>>> =20
>>> =20
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20


--Apple-Mail-42-1072559945
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div>Phil</div><div><br></div><div>I'd suggest you review the spec so =
that you understand what Eran and I are saying. No code has been granted =
in the redirect to a web client, where implementing TLS server side is a =
major barrier.&nbsp;</div><div><br></div><div>-- =
Dick</div><br><div><div>On 2011-03-30, at 9:15 AM, Phil Hunt =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: =
space; -webkit-line-break: after-white-space; ">Developers of say a =
mobile app would not have to deploy it since the redirect endpoint would =
be local per the specific exception proposed. There should be NO =
requirement to make a client app implement TLS server side =
security.&nbsp;<div><br></div><div>The concern here is that all =
"network" paths are secured to prevent impersonation or theft of the =
session. Remember that in many cases, once the code is granted, the =
subsequent token is often good for a LONG time and thus this becomes the =
weak point in this protocol.</div><div><div><br></div><div>Re: Justin's =
comments on SHOULD, I find SHOULD is just too broad, it does not define =
when it is acceptable not to have security. &nbsp;I prefer clear =
specification text that says the network paths must be =
protected.</div><div><br></div><div>Re: Eran's comments about impact on =
the existing community. &nbsp;I don't think you are grasping the =
broadness of acceptance of OAuth 2.0. The existing OAuth 1.0 users are =
primarily social networks. I haven't heard them object. In fact, I've =
noticed almost all have started enabling HTTPS everywhere (at least as a =
user option). But OAuth2 has a much broader community now that I would =
argue is VERY concerned about risks of impersonation and real financial =
loss.</div><div><br></div><div><div><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-size: =
medium; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-size: =
medium; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-30, at 8:19 AM, Dick Hardt wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">Thanks for pointing out my =
misunderstanding. I was thinking client in the sense of the side of TLS =
initiating a request.<div><br></div><div>I agree that requiring TLS on =
the callback is an unexpected change.&nbsp;</div><div><br></div><div>I =
recall reviewing the security implications of an unsecured callback as =
being nominal if the authorization grant is linked to the client =
credentials.</div><div><br></div><div><br><div><div><div>On 2011-03-29, =
at 10:07 PM, Eran Hammer-Lahav wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">I =
think you got this backwards. We=92re talking about forcing developers =
using the Facebook (or any other service) API to deploy their own TLS =
endpoint for the incoming callback (via redirection). Every developer =
will need to get a cert and deploy an HTTPS =
endpoint.<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">That=92s has never been discussed.<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">EHL<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"border-top-style: none; =
border-right-style: none; border-bottom-style: none; border-width: =
initial; border-color: initial; border-left-style: solid; =
border-left-color: blue; border-left-width: 1.5pt; padding-top: 0in; =
padding-right: 0in; padding-bottom: 0in; padding-left: 4pt; "><div><div =
style=3D"border-right-style: none; border-bottom-style: none; =
border-left-style: none; border-width: initial; border-color: initial; =
border-top-style: solid; border-top-color: rgb(181, 196, 223); =
border-top-width: 1pt; padding-top: 3pt; padding-right: 0in; =
padding-bottom: 0in; padding-left: 0in; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; =
">From:</span></b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif; "><span class=3D"Apple-converted-space">&nbsp;</span>Dick =
Hardt [mailto:dick.hardt@gmail.com]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Tuesday, March 29, 2011 =
9:02 PM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Eran =
Hammer-Lahav<br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>WG<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] WGLC on =
draft-ietf-oauth-v2-13.txt<o:p></o:p></span></div></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">On 2011-03-29, at 4:40 =
PM, Eran Hammer-Lahav wrote:<o:p></o:p></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">To clarify, I am not opposed to mandating TLS on the =
callback, just that if we do, we can=92t ship the protocol the way it is =
without coming up with some other alternative that does not require TLS =
deployment on the client side. OAuth 1.0 has no such requirement and =
adding it in 2.0 is completely unexpected by the community at =
large.</span><o:p></o:p></div></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">I only recall the concern =
with TLS to be on the server side, not the client side -- and I don't =
think that it is unexpected at all.<o:p></o:p></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">It would be helpful to hear from =
some companies with large 1.0 or 2.0 deployment on this matter? Anyone =
from Google, Facebook, Yahoo, Twitter, =
etc.?</span><o:p></o:p></div></div></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">When working =
on OAuth-WRAP, I talked to all of those companies about using TLS, and =
only Facebook said that they wanted an option to be able to not require =
TLS. Since then, all Facebook's new APIs which are essentially using =
OAuth 2.0 run on TLS.<o:p></o:p></div></div><div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div></div></div></div></span></blockquote></div=
><br></div></div></div>_______________________________________________<br>=
OAuth mailing list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a><br></blockquote></div><br></div></div></div></b=
lockquote></div><br></body></html>=

--Apple-Mail-42-1072559945--

From eran@hueniverse.com  Wed Mar 30 09:59:50 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8E3B63A6BA3 for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 09:59:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.637
X-Spam-Level: 
X-Spam-Status: No, score=-2.637 tagged_above=-999 required=5 tests=[AWL=-0.038, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KtC735nFZJLe for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 09:59:49 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id EE1A33A6A4D for <oauth@ietf.org>; Wed, 30 Mar 2011 09:59:48 -0700 (PDT)
Received: (qmail 24297 invoked from network); 30 Mar 2011 17:01:26 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 30 Mar 2011 17:01:26 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Wed, 30 Mar 2011 10:01:07 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Justin Richer <jricher@mitre.org>
Date: Wed, 30 Mar 2011 10:00:54 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: Acvu/A+bwwJpk18YR5uMj7mFOs0IFQ==
Message-ID: <7C8D8FAD-9785-415B-B3A6-78458A44E8CC@hueniverse.com>
References: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET> <92655.18400.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E72344656430603@P3PW5EX1MB01.EX1.SECURESERVER.NET> <393421E2-C734-48D9-B0D1-A94FC3C1BDC7@oracle.com> <1301493811.1812.258.camel@ground>
In-Reply-To: <1301493811.1812.258.camel@ground>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 16:59:50 -0000
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From gffletch@aol.com  Wed Mar 30 10:31:57 2011
Return-Path: <gffletch@aol.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7370F3A6A44 for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 10:31:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.296
X-Spam-Level: 
X-Spam-Status: No, score=-2.296 tagged_above=-999 required=5 tests=[AWL=0.302,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L2WVJPXnW076 for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 10:31:55 -0700 (PDT)
Received: from imr-ma04.mx.aol.com (imr-ma04.mx.aol.com [64.12.206.42]) by core3.amsl.com (Postfix) with ESMTP id 8F1B23A6BA3 for <oauth@ietf.org>; Wed, 30 Mar 2011 10:31:51 -0700 (PDT)
Received: from mtaout-ma02.r1000.mx.aol.com (mtaout-ma02.r1000.mx.aol.com [172.29.41.2]) by imr-ma04.mx.aol.com (8.14.1/8.14.1) with ESMTP id p2UHX2sM014263; Wed, 30 Mar 2011 13:33:02 -0400
Received: from palantir.local (unknown [10.172.4.28]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mtaout-ma02.r1000.mx.aol.com (MUA/Third Party Client Interface) with ESMTPSA id C1230E000272; Wed, 30 Mar 2011 13:33:01 -0400 (EDT)
Message-ID: <4D93694D.70200@aol.com>
Date: Wed, 30 Mar 2011 13:33:01 -0400
From: George Fletcher <gffletch@aol.com>
Organization: AOL LLC
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<92655.18400.qm@web55806.mail.re3.yahoo.com>	<90C41DD21FB7C64BB94121FBBC2E72344656430603@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<393421E2-C734-48D9-B0D1-A94FC3C1BDC7@oracle.com>	<948E6CDC-BEF2-4078-B5EE-B89983B35874@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E72344656430604@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E72344656430604@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: multipart/alternative; boundary="------------060105080708060907010207"
x-aol-global-disposition: G
X-AOL-SCOLL-SCORE: 0:2:461589888:93952408  
X-AOL-SCOLL-URL_COUNT: 0  
x-aol-sid: 3039ac1d29024d93694d05cf
X-AOL-IP: 10.172.4.28
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 17:31:57 -0000

This is a multi-part message in MIME format.
--------------060105080708060907010207
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

 From a deployment perspective... I'm considering allowing HTTP 
redirect_uri (for development only) but making the UI very obnoxious 
(e.g. bright red background, warnings etc) such that no real user would 
click through, but a developer will ignore. It also forces them to 
switch to TLS for production. Thoughts?

Also, as long as the authorization code is one-time-use, the passive 
attack doesn't work. It has to be MITM. Is there any reason 
authorization codes shouldn't be short-lived and one-time-use?

Thanks,
George

On 3/30/11 2:34 AM, Eran Hammer-Lahav wrote:
>
> Iâ€™ve been doing this longer. Requiring TLS on the redirection endpoint 
> is a big change for OAuth deployments. This would have been 
> unthinkable for OAuth 1.0(a). One of the main goals of 2.0 was to make 
> it much easier for client developers. I donâ€™t think deploying HTTPS as 
> a prerequisite for playing with an OAuth endpoint is trivial for most 
> client developers.
>
> When we had the same debate over bearer token and TLS, many people 
> argued to keep it SHOULD, but no one said they will actually deploy it 
> without TLS. That was a very useful data point. We should take a 
> moment to find out what existing OAuth providers have to say about this.
>
> To clarify â€“ I am not objecting to making this a MUST. But I am 
> objecting and will delay this change until we gather more information 
> from actual deployments. Since this applies to OAuth 1.0, it would be 
> very relevant to ask existing providers if they will try and enforce 
> such a restriction for 1.0 as well.
>
> Specifications written in a bubble usually fail outright or fail to 
> reflect reality.
>
> Also, the attacks are different for the authorization code and 
> implicit grant types. Each can benefit from using TLS for the 
> redirection endpoint in different ways (one transmission of code from 
> user-agent to client, the other manipulation of scripts from client to 
> user-agent). Just want to make sure we donâ€™t just focus on one vector.
>
> EHL
>
> *From:*Chuck Mortimore [mailto:cmortimore@salesforce.com]
> *Sent:* Tuesday, March 29, 2011 11:19 PM
> *To:* Phillip Hunt
> *Cc:* Eran Hammer-Lahav; Karen P. Lewison; OAuth WG
> *Subject:* Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
> +1
>
> I disagree that to use TLS is a big change.  Rather I'd categorize 
> using TLS as a big inconvenience.
>
> We should define a secure profile.  If individual deployments choose 
> to relax the spec and determine HTTP acceptable for local host or 
> other convenience thats fine, but it shouldn't be compliant.
>
>
> - cmort
>
>
> On Mar 29, 2011, at 10:55 PM, "Phillip Hunt" <phil.hunt@oracle.com 
> <mailto:phil.hunt@oracle.com>> wrote:
>
>     Why can't TLS be a must except when the token cannot be exposed.
>     Eg because the redirect is local?
>
>     Phil
>
>     Sent from my phone.
>
>
>     On 2011-03-29, at 22:48, Eran Hammer-Lahav <eran@hueniverse.com
>     <mailto:eran@hueniverse.com>> wrote:
>
>         Francisco â€“ thanks for being persistent.
>
>         Sounds like the same problem exists in OAuth 1.0. Basically,
>         the only way the client knows that the same user who granted
>         authorization is the one coming back, is via the authorization
>         code. Anyone who has that code is basically assumed to be the
>         one granting access. If the code is intercepted, whoever gets
>         it can pretend to be its legitimate holder.
>
>         I agree this is an issue.
>
>         Requiring callbacks to use TLS is a big change.
>
>         There are some cases where it is not needed â€“ namely, when the
>         client uses the access token obtained through this transaction
>         to do something on the backend without actually exposing
>         anything to the user who delivered the authorization code. For
>         example, an application scanning your Twitter account in the
>         background, sending you emails when someone is no longer
>         following you. Such a client does not need TLS because the
>         authorization code represents a valid grant, and the MITM
>         doesnâ€™t get any benefit from hijacking the callback. No data
>         is exposed.
>
>         However, this is not the typical use case.
>
>         As long as the security considerations are clearly stated, we
>         can move forward with either a MUST or a SHOULD. We can easily
>         exempts any internal callbacks from this requirement
>         (localhost, application scheme handler, etc.).
>
>         I donâ€™t want to write a specification that everyone knowingly
>         ignores. Once people ignore one security requirement, whatâ€™s
>         to stop them from ignoring others. So the most important input
>         to this discussion is what the vendors are going to do
>         (regardless of what the document says)?
>
>         EHL
>
>         *From:*Francisco Corella [mailto:fcorella@pomcor.com]
>         *Sent:* Tuesday, March 29, 2011 3:40 PM
>         *To:* Phil Hunt; Justin Richer; Eran Hammer-Lahav
>         *Cc:* OAuth WG; Karen P. Lewison; Paul Tarjan (pt@fb.com
>         <mailto:pt@fb.com>)
>         *Subject:* RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
>         > Isnâ€™t all this just different flavors of a session fixation
>         attacks?
>         > The client should use cookies and the state parameter to
>         ensure the
>         > same user-agent it redirected to the authorization server is
>         the one
>         > coming back.
>
>         It's not a session fixation attack.  It's just an interception
>         of a
>         credential.  The authorization code is a credential that provides
>         access to the protected resources.  If the attacker can get
>         it, the
>         attacker can get the protected resources (using the client as an
>         agent, so to speak).
>
>         A cookie won't help, since it would be sent from the browser
>         to the client
>         along with the authorization code.  If the attacker can observe or
>         intercept the authorization code, the attacker and observe or
>         intercept the cookie.
>
>         Francisco
>
>         --- On *Tue, 3/29/11, Eran Hammer-Lahav /<eran@hueniverse.com
>         <mailto:eran@hueniverse.com>>/* wrote:
>
>
>         From: Eran Hammer-Lahav <eran@hueniverse.com
>         <mailto:eran@hueniverse.com>>
>         Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>         To: "fcorella@pomcor.com <mailto:fcorella@pomcor.com>"
>         <fcorella@pomcor.com <mailto:fcorella@pomcor.com>>, "Phil
>         Hunt" <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>,
>         "Justin Richer" <jricher@mitre.org <mailto:jricher@mitre.org>>
>         Cc: "OAuth WG" <oauth@ietf.org <mailto:oauth@ietf.org>>,
>         "Karen P. Lewison" <kplewison@pomcor.com
>         <mailto:kplewison@pomcor.com>>, "Paul Tarjan (pt@fb.com
>         <mailto:pt@fb.com>)" <pt@fb.com <mailto:pt@fb.com>>
>         Date: Tuesday, March 29, 2011, 7:50 PM
>
>         Isnâ€™t all this just different flavors of a session fixation
>         attacks? The client should use cookies and the state parameter
>         to ensure the same user-agent it redirected to the
>         authorization server is the one coming back.
>
>         EHL
>
>         *From:*Francisco Corella [mailto:fcorella@pomcor.com]
>         *Sent:* Tuesday, March 29, 2011 11:46 AM
>         *To:* Phil Hunt; Justin Richer; Eran Hammer-Lahav
>         *Cc:* OAuth WG; Karen P. Lewison; Paul Tarjan (pt@fb.com
>         <mailto:pt@fb.com>)
>         *Subject:* RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
>         > Can you explain how intercepting the authorization code
>         > without having access to the client credentials is a
>         > problem? For the sake of discussion, assume that the client
>         > has valid and secure credentials that an attacker cannot
>         > access. Also assume that the client has implemented some
>         > form of cross-site protection.
>
>         One way: man-in-the-middle attack.  The traffic between the
>         legitimate
>         user's browser and the client goes through the attacker's machine
>         (easy to set up with a rogue WiFi access point).  The user's
>         browser
>         sends an http request to the client, targeting the redirect
>         URI.  The
>         attacker's machine doesn't let that request go through.  The
>         attacker
>         then sends the same identical request from the attacker's own
>         browser.
>         When the client receives the request, it has no way to tell
>         that it is
>         coming from the attacker's browser rather than from the user's
>         browser.  The client exchanges the authorization code for an
>         access
>         token, uses the access token to obtain protected resources
>         belonging
>         to the user, and delivers those resources to the attacker's
>         browser.
>         (Or manipulates those resources as directed by the attacker's
>         browser.)  In the Facebook use case, the client logs the user
>         in upon
>         verifying that the authorization code is valid by exchanging it
>         successfully for an access token.
>
>         Another way (passive attack): The attacker observes the
>         request from
>         the user's browser to the client.  The attacker does not stop the
>         request.  The client receives the request with the
>         authorization code
>         and exchanges the authorization code for the access token. 
>         Now the
>         attacker sends the same request from the attacker's own
>         browser.  The
>         client receives the second request and exchanges the authorization
>         code for another access token.  Upon receiving the second
>         request for
>         the same authorization code, the authorization server revokes the
>         first access token, as suggested in section 4.1.2 of the
>         specification: "If an authorization code is used more than
>         once, the
>         auhorization server MAY revoke all tokens previously issued
>         based on
>         that authorization code".  The client then uses the second access
>         token to access protected resources for the benefit of the
>         attacker.
>         In the Facebook use case, the attacker is logged in as the
>         legitimate
>         user.
>
>         > I donâ€šÃ„Ã´t know much about FBâ€šÃ„Ã´s implementation but if they
>         > allow the authorization code to be used for anything other
>         > than exchanged for an access token using secure client
>         > credentials, then they are not implementing the protocol as
>         > specified.
>
>         Facebook uses the protocol correctly, but the examples in the
>         Facebook
>         documentation use http rather than https for redirect URIs, so
>         implementations that follow the examples use http rather than
>         https.
>
>         Francisco
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------060105080708060907010207
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 8bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#ffffff">
    <font face="Helvetica, Arial, sans-serif">From a deployment
      perspective... I'm considering allowing HTTP redirect_uri (for
      development only) but making the UI very obnoxious (e.g. bright
      red background, warnings etc) such that no real user would click
      through, but a developer will ignore. It also forces them to
      switch to TLS for production. Thoughts?<br>
      <br>
      Also, as long as the authorization code is one-time-use, the
      passive attack doesn't work. It has to be MITM. Is there any
      reason authorization codes shouldn't be short-lived and
      one-time-use?<br>
      <br>
      Thanks,<br>
      George</font><br>
    <br>
    On 3/30/11 2:34 AM, Eran Hammer-Lahav wrote:
    <blockquote
cite="mid:90C41DD21FB7C64BB94121FBBC2E72344656430604@P3PW5EX1MB01.EX1.SECURESERVER.NET"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.yiv1552031577msonormal, li.yiv1552031577msonormal, div.yiv1552031577msonormal
	{mso-style-name:yiv1552031577msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">Iâ€™ve been doing this longer. Requiring TLS on the
            redirection endpoint is a big change for OAuth deployments.
            This would have been unthinkable for OAuth 1.0(a). One of
            the main goals of 2.0 was to make it much easier for client
            developers. I donâ€™t think deploying HTTPS as a prerequisite
            for playing with an OAuth endpoint is trivial for most
            client developers.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">When we had the same debate over bearer token and
            TLS, many people argued to keep it SHOULD, but no one said
            they will actually deploy it without TLS. That was a very
            useful data point. We should take a moment to find out what
            existing OAuth providers have to say about this. <o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">To clarify â€“ I am not objecting to making this a
            MUST. But I am objecting and will delay this change until we
            gather more information from actual deployments. Since this
            applies to OAuth 1.0, it would be very relevant to ask
            existing providers if they will try and enforce such a
            restriction for 1.0 as well.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">Specifications written in a bubble usually fail
            outright or fail to reflect reality.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">Also, the attacks are different for the
            authorization code and implicit grant types. Each can
            benefit from using TLS for the redirection endpoint in
            different ways (one transmission of code from user-agent to
            client, the other manipulation of scripts from client to
            user-agent). Just want to make sure we donâ€™t just focus on
            one vector.<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);">EHL<o:p></o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <p class="MsoNormal"><span style="font-size: 11pt; font-family:
            &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31,
            73, 125);"><o:p>Â </o:p></span></p>
        <div style="border-width: medium medium medium 1.5pt;
          border-style: none none none solid; border-color:
          -moz-use-text-color -moz-use-text-color -moz-use-text-color
          blue; padding: 0in 0in 0in 4pt;">
          <div>
            <div style="border-right: medium none; border-width: 1pt
              medium medium; border-style: solid none none;
              border-color: rgb(181, 196, 223) -moz-use-text-color
              -moz-use-text-color; padding: 3pt 0in 0in;">
              <p class="MsoNormal"><b><span style="font-size: 10pt;
                    font-family:
                    &quot;Tahoma&quot;,&quot;sans-serif&quot;;">From:</span></b><span
                  style="font-size: 10pt; font-family:
                  &quot;Tahoma&quot;,&quot;sans-serif&quot;;"> Chuck
                  Mortimore [<a class="moz-txt-link-freetext" href="mailto:cmortimore@salesforce.com">mailto:cmortimore@salesforce.com</a>] <br>
                  <b>Sent:</b> Tuesday, March 29, 2011 11:19 PM<br>
                  <b>To:</b> Phillip Hunt<br>
                  <b>Cc:</b> Eran Hammer-Lahav; Karen P. Lewison; OAuth
                  WG<br>
                  <b>Subject:</b> Re: [OAUTH-WG] WGLC on
                  draft-ietf-oauth-v2-13.txt<o:p></o:p></span></p>
            </div>
          </div>
          <p class="MsoNormal"><o:p>Â </o:p></p>
          <div>
            <p class="MsoNormal">+1Â <o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">Â <o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal">I disagree that to use TLS is a big
              change. Â Rather I'd categorize using TLS as a big
              inconvenience. Â <o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal"><o:p>Â </o:p></p>
          </div>
          <div>
            <p class="MsoNormal">We should define a secure profile. Â If
              individual deployments choose to relax the spec and
              determine HTTP acceptable for local host or other
              convenience thats fine, but it shouldn't be compliant. Â <o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal"><br>
              - cmort<o:p></o:p></p>
          </div>
          <div>
            <p class="MsoNormal" style="margin-bottom: 12pt;"><br>
              On Mar 29, 2011, at 10:55 PM, "Phillip Hunt" &lt;<a
                moz-do-not-send="true"
                href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;
              wrote:<o:p></o:p></p>
          </div>
          <blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
            <div>
              <div>
                <p class="MsoNormal">Why can't TLS be a must except when
                  the token cannot be exposed. Eg because the redirect
                  is local?Â <o:p></o:p></p>
              </div>
              <div>
                <p class="MsoNormal"><o:p>Â </o:p></p>
              </div>
              <div>
                <p class="MsoNormal">Phil<o:p></o:p></p>
                <div>
                  <p class="MsoNormal"><o:p>Â </o:p></p>
                </div>
                <div>
                  <p class="MsoNormal">Sent from my phone.Â <o:p></o:p></p>
                </div>
              </div>
              <div>
                <p class="MsoNormal" style="margin-bottom: 12pt;"><br>
                  On 2011-03-29, at 22:48, Eran Hammer-Lahav &lt;<a
                    moz-do-not-send="true"
                    href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;
                  wrote:<o:p></o:p></p>
              </div>
              <blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
                <div>
                  <div>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Francisco â€“ thanks for
                        being persistent.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Sounds like the same
                        problem exists in OAuth 1.0. Basically, the only
                        way the client knows that the same user who
                        granted authorization is the one coming back, is
                        via the authorization code. Anyone who has that
                        code is basically assumed to be the one granting
                        access. If the code is intercepted, whoever gets
                        it can pretend to be its legitimate holder.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">I agree this is an
                        issue.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Requiring callbacks to
                        use TLS is a big change.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">There are some cases
                        where it is not needed â€“ namely, when the client
                        uses the access token obtained through this
                        transaction to do something on the backend
                        without actually exposing anything to the user
                        who delivered the authorization code. For
                        example, an application scanning your Twitter
                        account in the background, sending you emails
                        when someone is no longer following you. Such a
                        client does not need TLS because the
                        authorization code represents a valid grant, and
                        the MITM doesnâ€™t get any benefit from hijacking
                        the callback. No data is exposed.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">However, this is not
                        the typical use case.</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">As long as the
                        security considerations are clearly stated, we
                        can move forward with either a MUST or a SHOULD.
                        We can easily exempts any internal callbacks
                        from this requirement (localhost, application
                        scheme handler, etc.).</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">I donâ€™t want to write
                        a specification that everyone knowingly ignores.
                        Once people ignore one security requirement,
                        whatâ€™s to stop them from ignoring others. So the
                        most important input to this discussion is what
                        the vendors are going to do (regardless of what
                        the document says)?</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">EHL</span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <p class="MsoNormal" style=""><span
                        style="font-size: 11pt; font-family:
                        &quot;Calibri&quot;,&quot;sans-serif&quot;;
                        color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                    <div style="border-width: medium medium medium
                      1.5pt; border-style: none none none solid;
                      border-color: -moz-use-text-color
                      -moz-use-text-color -moz-use-text-color blue;
                      padding: 0in 0in 0in 4pt;">
                      <div>
                        <div style="border-right: medium none;
                          border-width: 1pt medium medium; border-style:
                          solid none none; border-color: rgb(181, 196,
                          223) -moz-use-text-color -moz-use-text-color;
                          padding: 3pt 0in 0in;">
                          <p class="MsoNormal" style=""><b><span
                                style="font-size: 10pt; font-family:
                                &quot;Tahoma&quot;,&quot;sans-serif&quot;;">From:</span></b><span
                              style="font-size: 10pt; font-family:
                              &quot;Tahoma&quot;,&quot;sans-serif&quot;;">
                              Francisco Corella
                              [<a class="moz-txt-link-freetext" href="mailto:fcorella@pomcor.com">mailto:fcorella@pomcor.com</a>] <br>
                              <b>Sent:</b> Tuesday, March 29, 2011 3:40
                              PM<br>
                              <b>To:</b> Phil Hunt; Justin Richer; Eran
                              Hammer-Lahav<br>
                              <b>Cc:</b> OAuth WG; Karen P. Lewison;
                              Paul Tarjan (<a moz-do-not-send="true"
                                href="mailto:pt@fb.com">pt@fb.com</a>)<br>
                              <b>Subject:</b> RE: [OAUTH-WG] WGLC on
                              draft-ietf-oauth-v2-13.txt</span><o:p></o:p></p>
                        </div>
                      </div>
                      <p class="MsoNormal" style="">Â <o:p></o:p></p>
                      <table class="MsoNormalTable" border="0"
                        cellpadding="0" cellspacing="0">
                        <tbody>
                          <tr>
                            <td style="padding: 0in;" valign="top">
                              <p class="MsoNormal" style="">&gt; Isnâ€™t
                                all this just different flavors of a
                                session fixation attacks?<br>
                                &gt; The client should use cookies and
                                the state parameter to ensure the<br>
                                &gt; same user-agent it redirected to
                                the authorization server is the one<br>
                                &gt; coming back.<br>
                                <br>
                                It's not a session fixation attack.Â 
                                It's just an interception of a<br>
                                credential.Â  The authorization code is a
                                credential that provides<br>
                                access to the protected resources.Â  If
                                the attacker can get it, the<br>
                                attacker can get the protected resources
                                (using the client as an<br>
                                agent, so to speak).<br>
                                <br>
                                A cookie won't help, since it would be
                                sent from the browser to the client<br>
                                along with the authorization code.Â  If
                                the attacker can observe or<br>
                                intercept the authorization code, the
                                attacker and observe or<br>
                                intercept the cookie.<br>
                                <br>
                                Francisco<br>
                                <br>
                                --- On <b>Tue, 3/29/11, Eran
                                  Hammer-Lahav <i>&lt;<a
                                      moz-do-not-send="true"
                                      href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;</i></b>
                                wrote:<o:p></o:p></p>
                              <p class="MsoNormal" style="margin-bottom:
                                12pt;"><br>
                                From: Eran Hammer-Lahav &lt;<a
                                  moz-do-not-send="true"
                                  href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;<br>
                                Subject: RE: [OAUTH-WG] WGLC on
                                draft-ietf-oauth-v2-13.txt<br>
                                To: "<a moz-do-not-send="true"
                                  href="mailto:fcorella@pomcor.com">fcorella@pomcor.com</a>"
                                &lt;<a moz-do-not-send="true"
                                  href="mailto:fcorella@pomcor.com">fcorella@pomcor.com</a>&gt;,
                                "Phil Hunt" &lt;<a
                                  moz-do-not-send="true"
                                  href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;,
                                "Justin Richer" &lt;<a
                                  moz-do-not-send="true"
                                  href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br>
                                Cc: "OAuth WG" &lt;<a
                                  moz-do-not-send="true"
                                  href="mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;,
                                "Karen P. Lewison" &lt;<a
                                  moz-do-not-send="true"
                                  href="mailto:kplewison@pomcor.com">kplewison@pomcor.com</a>&gt;,
                                "Paul Tarjan (<a moz-do-not-send="true"
                                  href="mailto:pt@fb.com">pt@fb.com</a>)"
                                &lt;<a moz-do-not-send="true"
                                  href="mailto:pt@fb.com">pt@fb.com</a>&gt;<br>
                                Date: Tuesday, March 29, 2011, 7:50 PM<o:p></o:p></p>
                              <div id="yiv1552031577">
                                <div>
                                  <p class="yiv1552031577msonormal"><span
                                      style="font-size: 11pt;
                                      font-family:
                                      &quot;Arial&quot;,&quot;sans-serif&quot;;
                                      color: rgb(31, 73, 125);">Isnâ€™t
                                      all this just different flavors of
                                      a session fixation attacks? The
                                      client should use cookies and the
                                      state parameter to ensure the same
                                      user-agent it redirected to the
                                      authorization server is the one
                                      coming back.</span><o:p></o:p></p>
                                  <p class="yiv1552031577msonormal"><span
                                      style="font-size: 11pt;
                                      font-family:
                                      &quot;Arial&quot;,&quot;sans-serif&quot;;
                                      color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                                  <p class="yiv1552031577msonormal"><span
                                      style="font-size: 11pt;
                                      font-family:
                                      &quot;Arial&quot;,&quot;sans-serif&quot;;
                                      color: rgb(31, 73, 125);">EHL</span><o:p></o:p></p>
                                  <p class="yiv1552031577msonormal"><span
                                      style="font-size: 11pt;
                                      font-family:
                                      &quot;Arial&quot;,&quot;sans-serif&quot;;
                                      color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
                                  <div style="border-width: medium
                                    medium medium 1.5pt; border-style:
                                    none none none solid; padding: 0in
                                    0in 0in 4pt; border-color:
                                    -moz-use-text-color
                                    -moz-use-text-color
                                    -moz-use-text-color blue;">
                                    <div>
                                      <div style="border-right: medium
                                        none; border-width: 1pt medium
                                        medium; border-style: solid none
                                        none; padding: 3pt 0in 0in;
                                        border-color:
                                        -moz-use-text-color;">
                                        <p
                                          class="yiv1552031577msonormal"><b><span
                                              style="font-size: 10pt;
                                              font-family:
                                              &quot;Arial&quot;,&quot;sans-serif&quot;;">From:</span></b><span
                                            style="font-size: 10pt;
                                            font-family:
                                            &quot;Arial&quot;,&quot;sans-serif&quot;;">
                                            Francisco Corella
                                            [<a class="moz-txt-link-freetext" href="mailto:fcorella@pomcor.com">mailto:fcorella@pomcor.com</a>]
                                            <br>
                                            <b>Sent:</b> Tuesday, March
                                            29, 2011 11:46 AM<br>
                                            <b>To:</b> Phil Hunt; Justin
                                            Richer; Eran Hammer-Lahav<br>
                                            <b>Cc:</b> OAuth WG; Karen
                                            P. Lewison; Paul Tarjan (<a
                                              moz-do-not-send="true"
                                              href="mailto:pt@fb.com">pt@fb.com</a>)<br>
                                            <b>Subject:</b> RE:
                                            [OAUTH-WG] WGLC on
                                            draft-ietf-oauth-v2-13.txt</span><o:p></o:p></p>
                                      </div>
                                    </div>
                                    <p class="yiv1552031577msonormal">Â <o:p></o:p></p>
                                    <table class="MsoNormalTable"
                                      border="0" cellpadding="0"
                                      cellspacing="0">
                                      <tbody>
                                        <tr>
                                          <td style="padding: 0in;"
                                            valign="top">
                                            <p
                                              class="yiv1552031577msonormal"
                                              style="margin-bottom:
                                              12pt;">&gt; Can you
                                              explain how intercepting
                                              the authorization code<br>
                                              &gt; without having access
                                              to the client credentials
                                              is a<br>
                                              &gt; problem? For the sake
                                              of discussion, assume that
                                              the client<br>
                                              &gt; has valid and secure
                                              credentials that an
                                              attacker cannot<br>
                                              &gt; access. Also assume
                                              that the client has
                                              implemented some<br>
                                              &gt; form of cross-site
                                              protection.<br>
                                              <br>
                                              One way: man-in-the-middle
                                              attack.Â  The traffic
                                              between the legitimate<br>
                                              user's browser and the
                                              client goes through the
                                              attacker's machine<br>
                                              (easy to set up with a
                                              rogue WiFi access point).Â 
                                              The user's browser<br>
                                              sends an http request to
                                              the client, targeting the
                                              redirect URI.Â  The<br>
                                              attacker's machine doesn't
                                              let that request go
                                              through.Â  The attacker<br>
                                              then sends the same
                                              identical request from the
                                              attacker's own browser.<br>
                                              When the client receives
                                              the request, it has no way
                                              to tell that it is<br>
                                              coming from the attacker's
                                              browser rather than from
                                              the user's<br>
                                              browser.Â  The client
                                              exchanges the
                                              authorization code for an
                                              access<br>
                                              token, uses the access
                                              token to obtain protected
                                              resources belonging<br>
                                              to the user, and delivers
                                              those resources to the
                                              attacker's browser.<br>
                                              (Or manipulates those
                                              resources as directed by
                                              the attacker's<br>
                                              browser.)Â  In the Facebook
                                              use case, the client logs
                                              the user in upon<br>
                                              verifying that the
                                              authorization code is
                                              valid by exchanging it<br>
                                              successfully for an access
                                              token.<br>
                                              <br>
                                              Another way (passive
                                              attack): The attacker
                                              observes the request from<br>
                                              the user's browser to the
                                              client.Â  The attacker does
                                              not stop the<br>
                                              request.Â  The client
                                              receives the request with
                                              the authorization code<br>
                                              and exchanges the
                                              authorization code for the
                                              access token.Â  Now the<br>
                                              attacker sends the same
                                              request from the
                                              attacker's own browser.Â 
                                              The<br>
                                              client receives the second
                                              request and exchanges the
                                              authorization<br>
                                              code for another access
                                              token.Â  Upon receiving the
                                              second request for<br>
                                              the same authorization
                                              code, the authorization
                                              server revokes the<br>
                                              first access token, as
                                              suggested in section 4.1.2
                                              of the<br>
                                              specification: "If an
                                              authorization code is used
                                              more than once, the<br>
                                              auhorization server MAY
                                              revoke all tokens
                                              previously issued based on<br>
                                              that authorization code".Â 
                                              The client then uses the
                                              second access<br>
                                              token to access protected
                                              resources for the benefit
                                              of the attacker.<br>
                                              In the Facebook use case,
                                              the attacker is logged in
                                              as the legitimate<br>
                                              user.<br>
                                              <br>
                                              &gt; I donâ€šÃ„Ã´t know much
                                              about FBâ€šÃ„Ã´s
                                              implementation but if they<br>
                                              &gt; allow the
                                              authorization code to be
                                              used for anything other<br>
                                              &gt; than exchanged for an
                                              access token using secure
                                              client<br>
                                              &gt; credentials, then
                                              they are not implementing
                                              the protocol as<br>
                                              &gt; specified.<br>
                                              <br>
                                              Facebook uses the protocol
                                              correctly, but the
                                              examples in the Facebook<br>
                                              documentation use http
                                              rather than https for
                                              redirect URIs, so<br>
                                              implementations that
                                              follow the examples use
                                              http rather than https.<br>
                                              <br>
                                              Francisco<o:p></o:p></p>
                                          </td>
                                        </tr>
                                      </tbody>
                                    </table>
                                    <p class="yiv1552031577msonormal"><span
                                        style="font-size: 10pt;
                                        font-family:
                                        &quot;Arial&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
                                  </div>
                                </div>
                              </div>
                            </td>
                          </tr>
                        </tbody>
                      </table>
                      <p class="MsoNormal" style=""><span
                          style="font-size: 10pt; font-family:
                          &quot;Calibri&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
                    </div>
                  </div>
                </div>
              </blockquote>
            </div>
          </blockquote>
          <blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
            <div>
              <p class="MsoNormal">_______________________________________________<br>
                OAuth mailing list<br>
                <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
                <a moz-do-not-send="true"
                  href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
            </div>
          </blockquote>
        </div>
      </div>
      <pre wrap="">
<fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------060105080708060907010207--

From phil.hunt@oracle.com  Wed Mar 30 11:07:14 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C442828C185 for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 11:07:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.555
X-Spam-Level: 
X-Spam-Status: No, score=-6.555 tagged_above=-999 required=5 tests=[AWL=0.043,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qaer4YTY5R4G for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 11:07:12 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 3D3BD28C12E for <oauth@ietf.org>; Wed, 30 Mar 2011 11:07:12 -0700 (PDT)
Received: from rcsinet13.oracle.com (rcsinet13.oracle.com [148.87.113.125]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2UI8l2k017979 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 30 Mar 2011 18:08:49 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by rcsinet13.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2UI8kbh032566 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 30 Mar 2011 18:08:47 GMT
Received: from abhmt010.oracle.com (abhmt010.oracle.com [141.146.116.19]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2UI8kjX006209; Wed, 30 Mar 2011 13:08:46 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 30 Mar 2011 11:08:45 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-49--1068706651
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <D8AC8216-D51F-465B-A6C0-1FB0437036EA@gmail.com>
Date: Wed, 30 Mar 2011 11:08:44 -0700
Message-Id: <468D1939-37F9-4FDE-A874-C10F322ECD8F@oracle.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com> <35E9F3F5-96BE-42F3-B9EF-0D9EE36B0CD4@oracle.com> <D8AC8216-D51F-465B-A6C0-1FB0437036EA@gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt356.oracle.com [141.146.40.156]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090203.4D9371AF.00A4,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 18:07:14 -0000

--Apple-Mail-49--1068706651
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

I believe there are really two separate issues in this thread - hence =
the confusion. This is a fairly complex interchange since it involves =
re-directs, message confidentiality, and server authentication issues.

ONE:=20

I believe the text Dick is referring to is:

"If the response includes an access token, the authorization server MUST =
require TLS 1.2 as defined in [RFC5246] and MAY support additional =
transport- layer mechanisms meeting its security requirements. If the =
response does not include an access token, the authorization server =
SHOULD require TLS 1.2 and any additional transport-layer mechanism =
meeting its security requirements."

I believe the contentious part is the second part "If the response does =
not include an access token...". =20
1. Should we further clarify as "either within the redirect URL" or =
within a response document since some might argue that a redirect URL is =
not the response document when in this case it still carries =
information.
2. If no data is present, "state" is still available. How much of a =
concern do we have? Some are arguing that there is no need to secure =
this.=20

In my opinion the MUST is required for reasons other than leakage. Note =
that we are talking about a RESPONSE message to a REQUEST that =
definitely should have been secure because in this case TLS =
authenticates the authorization server. Reverting to a SHOULD implies =
the original REQUEST need not be secure -- which means the client app =
has not authenticated the authorization service. If this is the case, =
then security depends solely on the integrity of the authorization code =
(artifact) not being spoofed since the whole authorization step is not =
secured from the perspective of the client. Given the variety of token =
systems out there, I would rather not depend on security of the authz =
code alone.

TWO:

There is a second issue that people are raising regarding the redirect =
that would force clients to implement TLS server side security. I'm not =
seeing where this is covered in the spec. The exception we are =
discussing is that if the redirect endpoint is local to the user-agent, =
then TLS is not required. However, if it is remote (such as an OAuth =
client that is a web service), then TLS is a MUST.  Maybe this point =
needs to be discussed in section 2.1.1?

Further, from section 2.2:
"Since requests to the token endpoint result in the transmission of =
clear-text credentials (in the HTTP request and response), the =
authorization server MUST require the use of a transport-layer security =
mechanism when sending requests to the token endpoints. The =
authorization server MUST support TLS 1.2 as defined in [RFC5246], and =
MAY support additional transport-layer mechanisms meeting its security =
requirements"

This paragraph seems to indicate that the transmission of the authz code =
in 2.1 is unsecure.  I think the first phrase (Since requests to the =
token endpoint result in the transmission of clear-text credentials (in =
the HTTP request and response)) should be removed as it isn't quite in =
sync with even the current 2.1 endpoint behaviour.

Cheers,

Phil
phil.hunt@oracle.com




On 2011-03-30, at 9:25 AM, Dick Hardt wrote:

> Phil
>=20
> I'd suggest you review the spec so that you understand what Eran and I =
are saying. No code has been granted in the redirect to a web client, =
where implementing TLS server side is a major barrier.=20
>=20
> -- Dick
>=20
> On 2011-03-30, at 9:15 AM, Phil Hunt wrote:
>=20
>> Developers of say a mobile app would not have to deploy it since the =
redirect endpoint would be local per the specific exception proposed. =
There should be NO requirement to make a client app implement TLS server =
side security.=20
>>=20
>> The concern here is that all "network" paths are secured to prevent =
impersonation or theft of the session. Remember that in many cases, once =
the code is granted, the subsequent token is often good for a LONG time =
and thus this becomes the weak point in this protocol.
>>=20
>> Re: Justin's comments on SHOULD, I find SHOULD is just too broad, it =
does not define when it is acceptable not to have security.  I prefer =
clear specification text that says the network paths must be protected.
>>=20
>> Re: Eran's comments about impact on the existing community.  I don't =
think you are grasping the broadness of acceptance of OAuth 2.0. The =
existing OAuth 1.0 users are primarily social networks. I haven't heard =
them object. In fact, I've noticed almost all have started enabling =
HTTPS everywhere (at least as a user option). But OAuth2 has a much =
broader community now that I would argue is VERY concerned about risks =
of impersonation and real financial loss.
>>=20
>> Phil
>> phil.hunt@oracle.com
>>=20
>>=20
>>=20
>>=20
>> On 2011-03-30, at 8:19 AM, Dick Hardt wrote:
>>=20
>>> Thanks for pointing out my misunderstanding. I was thinking client =
in the sense of the side of TLS initiating a request.
>>>=20
>>> I agree that requiring TLS on the callback is an unexpected change.=20=

>>>=20
>>> I recall reviewing the security implications of an unsecured =
callback as being nominal if the authorization grant is linked to the =
client credentials.
>>>=20
>>>=20
>>> On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:
>>>=20
>>>> I think you got this backwards. We=92re talking about forcing =
developers using the Facebook (or any other service) API to deploy their =
own TLS endpoint for the incoming callback (via redirection). Every =
developer will need to get a cert and deploy an HTTPS endpoint.
>>>> =20
>>>> That=92s has never been discussed.
>>>> =20
>>>> EHL
>>>> =20
>>>> From: Dick Hardt [mailto:dick.hardt@gmail.com]=20
>>>> Sent: Tuesday, March 29, 2011 9:02 PM
>>>> To: Eran Hammer-Lahav
>>>> Cc: WG
>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>> =20
>>>> =20
>>>> On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:
>>>>=20
>>>>=20
>>>> To clarify, I am not opposed to mandating TLS on the callback, just =
that if we do, we can=92t ship the protocol the way it is without coming =
up with some other alternative that does not require TLS deployment on =
the client side. OAuth 1.0 has no such requirement and adding it in 2.0 =
is completely unexpected by the community at large.
>>>> =20
>>>> I only recall the concern with TLS to be on the server side, not =
the client side -- and I don't think that it is unexpected at all.
>>>>=20
>>>>=20
>>>> =20
>>>> It would be helpful to hear from some companies with large 1.0 or =
2.0 deployment on this matter? Anyone from Google, Facebook, Yahoo, =
Twitter, etc.?
>>>> =20
>>>> When working on OAuth-WRAP, I talked to all of those companies =
about using TLS, and only Facebook said that they wanted an option to be =
able to not require TLS. Since then, all Facebook's new APIs which are =
essentially using OAuth 2.0 run on TLS.
>>>> =20
>>>> =20
>>>> =20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20


--Apple-Mail-49--1068706651
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">I =
believe there are really two separate issues in this thread - hence the =
confusion. This is a fairly complex interchange since it involves =
re-directs, message confidentiality, and server authentication =
issues.<div><br></div><div>ONE:&nbsp;</div><div><br></div><div>I believe =
the text Dick is referring to is:<div><br></div><div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px; font: normal normal normal 10px/normal Courier; ">"If =
the response includes an access token, the authorization server MUST =
require TLS 1.2 as defined in [RFC5246] and MAY support additional =
transport- layer mechanisms meeting its security requirements. If the =
response does not include an access token, the authorization server =
SHOULD require TLS 1.2 and any additional transport-layer mechanism =
meeting its security requirements."</div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal =
normal normal 10px/normal Courier; "><br></div><div>I believe the =
contentious part is the second part "If the response does not include an =
access token...". &nbsp;</div><div>1. Should we further clarify as =
"either within the redirect URL" or within a response document since =
some might argue that a redirect URL is not the response document when =
in this case it still carries information.</div><div>2. If no data is =
present, "state" is still available. How much of a concern do we have? =
Some are arguing that there is no need to secure =
this.&nbsp;</div><div><br></div><div>In my opinion the MUST is required =
for reasons other than leakage. Note that we are talking about a =
RESPONSE message to a REQUEST that definitely should have been secure =
because in this case TLS authenticates the authorization server. =
Reverting to a SHOULD implies the original REQUEST need not be secure -- =
which means the client app has not authenticated the authorization =
service. If this is the case, then security depends solely on the =
integrity of the authorization code (artifact) not being spoofed since =
the whole authorization step is not secured from the perspective of the =
client. Given the variety of token systems out there, I would rather not =
depend on security of the authz code =
alone.</div><div><br></div><div>TWO:</div><div><br></div><div>There is a =
second issue that people are raising regarding the redirect that would =
force clients to implement TLS server side security. I'm not seeing =
where this is covered in the spec. The exception we are discussing is =
that if the redirect endpoint is local to the user-agent, then TLS is =
not required. However, if it is remote (such as an OAuth client that is =
a web service), then TLS is a MUST. &nbsp;Maybe this point needs to be =
discussed in section 2.1.1?</div><div><br></div><div>Further, from =
section 2.2:</div><div><div style=3D"margin-top: 0px; margin-right: 0px; =
margin-bottom: 0px; margin-left: 0px; font: normal normal normal =
10px/normal Courier; ">"Since requests to the token endpoint result in =
the transmission of clear-text credentials (in the HTTP request and =
response), the authorization server MUST require the use of a =
transport-layer security mechanism when sending requests to the token =
endpoints. The authorization server MUST support TLS 1.2 as defined in =
[RFC5246], and MAY support additional transport-layer mechanisms meeting =
its security requirements"</div></div><div><br></div><div>This paragraph =
seems to indicate that the transmission of the authz code in 2.1 is =
unsecure. &nbsp;I think the first phrase (<span class=3D"Apple-style-span"=
 style=3D"font-family: Courier; font-size: 10px; ">Since requests to the =
token endpoint result in the transmission of clear-text credentials (in =
the HTTP request and response)</span>) should be removed as it isn't =
quite in sync with even the current 2.1 endpoint =
behaviour.</div><div><br></div><div>Cheers,</div><div><br></div><div><span=
 class=3D"Apple-style-span" style=3D"font-size: 12px; =
">Phil</span></div><div><div style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; color: =
rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; orphans: 2; text-indent: 0px; =
text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div><br =
class=3D"Apple-interchange-newline"><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-30, at 9:25 AM, Dick Hardt wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; =
"><div>Phil</div><div><br></div><div>I'd suggest you review the spec so =
that you understand what Eran and I are saying. No code has been granted =
in the redirect to a web client, where implementing TLS server side is a =
major barrier.&nbsp;</div><div><br></div><div>-- =
Dick</div><br><div><div>On 2011-03-30, at 9:15 AM, Phil Hunt =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div style=3D"word-wrap: break-word; -webkit-nbsp-mode: =
space; -webkit-line-break: after-white-space; ">Developers of say a =
mobile app would not have to deploy it since the redirect endpoint would =
be local per the specific exception proposed. There should be NO =
requirement to make a client app implement TLS server side =
security.&nbsp;<div><br></div><div>The concern here is that all =
"network" paths are secured to prevent impersonation or theft of the =
session. Remember that in many cases, once the code is granted, the =
subsequent token is often good for a LONG time and thus this becomes the =
weak point in this protocol.</div><div><div><br></div><div>Re: Justin's =
comments on SHOULD, I find SHOULD is just too broad, it does not define =
when it is acceptable not to have security. &nbsp;I prefer clear =
specification text that says the network paths must be =
protected.</div><div><br></div><div>Re: Eran's comments about impact on =
the existing community. &nbsp;I don't think you are grasping the =
broadness of acceptance of OAuth 2.0. The existing OAuth 1.0 users are =
primarily social networks. I haven't heard them object. In fact, I've =
noticed almost all have started enabling HTTPS everywhere (at least as a =
user option). But OAuth2 has a much broader community now that I would =
argue is VERY concerned about risks of impersonation and real financial =
loss.</div><div><br></div><div><div><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-size: =
medium; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-size: =
medium; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-indent: =
0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-30, at 8:19 AM, Dick Hardt wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">Thanks for pointing out my =
misunderstanding. I was thinking client in the sense of the side of TLS =
initiating a request.<div><br></div><div>I agree that requiring TLS on =
the callback is an unexpected change.&nbsp;</div><div><br></div><div>I =
recall reviewing the security implications of an unsecured callback as =
being nominal if the authorization grant is linked to the client =
credentials.</div><div><br></div><div><br><div><div><div>On 2011-03-29, =
at 10:07 PM, Eran Hammer-Lahav wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">I =
think you got this backwards. We=92re talking about forcing developers =
using the Facebook (or any other service) API to deploy their own TLS =
endpoint for the incoming callback (via redirection). Every developer =
will need to get a cert and deploy an HTTPS =
endpoint.<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">That=92s has never been discussed.<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">EHL<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"border-top-style: none; =
border-right-style: none; border-bottom-style: none; border-width: =
initial; border-color: initial; border-left-style: solid; =
border-left-color: blue; border-left-width: 1.5pt; padding-top: 0in; =
padding-right: 0in; padding-bottom: 0in; padding-left: 4pt; "><div><div =
style=3D"border-right-style: none; border-bottom-style: none; =
border-left-style: none; border-width: initial; border-color: initial; =
border-top-style: solid; border-top-color: rgb(181, 196, 223); =
border-top-width: 1pt; padding-top: 3pt; padding-right: 0in; =
padding-bottom: 0in; padding-left: 0in; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; =
">From:</span></b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif; "><span class=3D"Apple-converted-space">&nbsp;</span>Dick =
Hardt [mailto:dick.hardt@gmail.com]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Tuesday, March 29, 2011 =
9:02 PM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Eran =
Hammer-Lahav<br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>WG<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] WGLC on =
draft-ietf-oauth-v2-13.txt<o:p></o:p></span></div></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">On 2011-03-29, at 4:40 =
PM, Eran Hammer-Lahav wrote:<o:p></o:p></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">To clarify, I am not opposed to mandating TLS on the =
callback, just that if we do, we can=92t ship the protocol the way it is =
without coming up with some other alternative that does not require TLS =
deployment on the client side. OAuth 1.0 has no such requirement and =
adding it in 2.0 is completely unexpected by the community at =
large.</span><o:p></o:p></div></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">I only recall the concern =
with TLS to be on the server side, not the client side -- and I don't =
think that it is unexpected at all.<o:p></o:p></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">It would be helpful to hear from =
some companies with large 1.0 or 2.0 deployment on this matter? Anyone =
from Google, Facebook, Yahoo, Twitter, =
etc.?</span><o:p></o:p></div></div></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">When working =
on OAuth-WRAP, I talked to all of those companies about using TLS, and =
only Facebook said that they wanted an option to be able to not require =
TLS. Since then, all Facebook's new APIs which are essentially using =
OAuth 2.0 run on TLS.<o:p></o:p></div></div><div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div></div></div></div></span></blockquote></div=
><br></div></div></div>_______________________________________________<br>=
OAuth mailing list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a><br></blockquote></div><br></div></div></div></b=
lockquote></div><br></div></blockquote></div><br></div></div></body></html=
>=

--Apple-Mail-49--1068706651--

From eran@hueniverse.com  Wed Mar 30 11:22:03 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6488428C196 for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 11:22:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.636
X-Spam-Level: 
X-Spam-Status: No, score=-2.636 tagged_above=-999 required=5 tests=[AWL=-0.038, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xDFDH7qxY6L6 for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 11:21:51 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 6C7A33A6BB0 for <oauth@ietf.org>; Wed, 30 Mar 2011 11:21:51 -0700 (PDT)
Received: (qmail 4291 invoked from network); 30 Mar 2011 18:23:29 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 30 Mar 2011 18:23:29 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Wed, 30 Mar 2011 11:23:13 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phil Hunt <phil.hunt@oracle.com>, Dick Hardt <dick.hardt@gmail.com>
Date: Wed, 30 Mar 2011 11:23:07 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvvBZEnjG3HOnAjQ+m6H+ZUsWRyzQAAY4vw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465643075C@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com> <35E9F3F5-96BE-42F3-B9EF-0D9EE36B0CD4@oracle.com> <D8AC8216-D51F-465B-A6C0-1FB0437036EA@gmail.com> <468D1939-37F9-4FDE-A874-C10F322ECD8F@oracle.com>
In-Reply-To: <468D1939-37F9-4FDE-A874-C10F322ECD8F@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234465643075CP3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 18:22:03 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234465643075CP3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

We have consensus to change issue one to a MUST. Basically, the authorizati=
on endpoint MUST always use TLS regardless of its output.

We are still debating mandating TLS for the redirection URI (registered or =
dynamic) for any non-localhost transmission. The issue is not limited to se=
nding the authorization code, but also when receiving HTML/JS code used to =
extract the token from the fragment in the implicit grant case. The issue i=
s not whether there is a security risk, but what language we should use to =
warn against it (i.e. make insecure a violation of the spec via a MUST, or =
clearly explain the risks via a SHOULD).

EHL

From: Phil Hunt [mailto:phil.hunt@oracle.com]
Sent: Wednesday, March 30, 2011 11:09 AM
To: Dick Hardt
Cc: Eran Hammer-Lahav; OAuth WG
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt

I believe there are really two separate issues in this thread - hence the c=
onfusion. This is a fairly complex interchange since it involves re-directs=
, message confidentiality, and server authentication issues.

ONE:

I believe the text Dick is referring to is:

"If the response includes an access token, the authorization server MUST re=
quire TLS 1.2 as defined in [RFC5246] and MAY support additional transport-=
 layer mechanisms meeting its security requirements. If the response does n=
ot include an access token, the authorization server SHOULD require TLS 1.2=
 and any additional transport-layer mechanism meeting its security requirem=
ents."

I believe the contentious part is the second part "If the response does not=
 include an access token...".
1. Should we further clarify as "either within the redirect URL" or within =
a response document since some might argue that a redirect URL is not the r=
esponse document when in this case it still carries information.
2. If no data is present, "state" is still available. How much of a concern=
 do we have? Some are arguing that there is no need to secure this.

In my opinion the MUST is required for reasons other than leakage. Note tha=
t we are talking about a RESPONSE message to a REQUEST that definitely shou=
ld have been secure because in this case TLS authenticates the authorizatio=
n server. Reverting to a SHOULD implies the original REQUEST need not be se=
cure -- which means the client app has not authenticated the authorization =
service. If this is the case, then security depends solely on the integrity=
 of the authorization code (artifact) not being spoofed since the whole aut=
horization step is not secured from the perspective of the client. Given th=
e variety of token systems out there, I would rather not depend on security=
 of the authz code alone.

TWO:

There is a second issue that people are raising regarding the redirect that=
 would force clients to implement TLS server side security. I'm not seeing =
where this is covered in the spec. The exception we are discussing is that =
if the redirect endpoint is local to the user-agent, then TLS is not requir=
ed. However, if it is remote (such as an OAuth client that is a web service=
), then TLS is a MUST.  Maybe this point needs to be discussed in section 2=
.1.1?

Further, from section 2.2:
"Since requests to the token endpoint result in the transmission of clear-t=
ext credentials (in the HTTP request and response), the authorization serve=
r MUST require the use of a transport-layer security mechanism when sending=
 requests to the token endpoints. The authorization server MUST support TLS=
 1.2 as defined in [RFC5246], and MAY support additional transport-layer me=
chanisms meeting its security requirements"

This paragraph seems to indicate that the transmission of the authz code in=
 2.1 is unsecure.  I think the first phrase (Since requests to the token en=
dpoint result in the transmission of clear-text credentials (in the HTTP re=
quest and response)) should be removed as it isn't quite in sync with even =
the current 2.1 endpoint behaviour.

Cheers,

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>



On 2011-03-30, at 9:25 AM, Dick Hardt wrote:


Phil

I'd suggest you review the spec so that you understand what Eran and I are =
saying. No code has been granted in the redirect to a web client, where imp=
lementing TLS server side is a major barrier.

-- Dick

On 2011-03-30, at 9:15 AM, Phil Hunt wrote:


Developers of say a mobile app would not have to deploy it since the redire=
ct endpoint would be local per the specific exception proposed. There shoul=
d be NO requirement to make a client app implement TLS server side security=
.

The concern here is that all "network" paths are secured to prevent imperso=
nation or theft of the session. Remember that in many cases, once the code =
is granted, the subsequent token is often good for a LONG time and thus thi=
s becomes the weak point in this protocol.

Re: Justin's comments on SHOULD, I find SHOULD is just too broad, it does n=
ot define when it is acceptable not to have security.  I prefer clear speci=
fication text that says the network paths must be protected.

Re: Eran's comments about impact on the existing community.  I don't think =
you are grasping the broadness of acceptance of OAuth 2.0. The existing OAu=
th 1.0 users are primarily social networks. I haven't heard them object. In=
 fact, I've noticed almost all have started enabling HTTPS everywhere (at l=
east as a user option). But OAuth2 has a much broader community now that I =
would argue is VERY concerned about risks of impersonation and real financi=
al loss.

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>




On 2011-03-30, at 8:19 AM, Dick Hardt wrote:


Thanks for pointing out my misunderstanding. I was thinking client in the s=
ense of the side of TLS initiating a request.

I agree that requiring TLS on the callback is an unexpected change.

I recall reviewing the security implications of an unsecured callback as be=
ing nominal if the authorization grant is linked to the client credentials.


On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:


I think you got this backwards. We're talking about forcing developers usin=
g the Facebook (or any other service) API to deploy their own TLS endpoint =
for the incoming callback (via redirection). Every developer will need to g=
et a cert and deploy an HTTPS endpoint.

That's has never been discussed.

EHL

From: Dick Hardt [mailto:dick.hardt@gmail.com]
Sent: Tuesday, March 29, 2011 9:02 PM
To: Eran Hammer-Lahav
Cc: WG
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt


On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:



To clarify, I am not opposed to mandating TLS on the callback, just that if=
 we do, we can't ship the protocol the way it is without coming up with som=
e other alternative that does not require TLS deployment on the client side=
. OAuth 1.0 has no such requirement and adding it in 2.0 is completely unex=
pected by the community at large.

I only recall the concern with TLS to be on the server side, not the client=
 side -- and I don't think that it is unexpected at all.




It would be helpful to hear from some companies with large 1.0 or 2.0 deplo=
yment on this matter? Anyone from Google, Facebook, Yahoo, Twitter, etc.?

When working on OAuth-WRAP, I talked to all of those companies about using =
TLS, and only Facebook said that they wanted an option to be able to not re=
quire TLS. Since then, all Facebook's new APIs which are essentially using =
OAuth 2.0 run on TLS.




_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth




--_000_90C41DD21FB7C64BB94121FBBC2E7234465643075CP3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Courier;
	panose-1:2 7 4 9 2 2 5 2 4 4;}
@font-face
	{font-family:Courier;
	panose-1:2 7 4 9 2 2 5 2 4 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>We have c=
onsensus to change issue one to a MUST. Basically, the authorization endpoi=
nt MUST always use TLS regardless of its output.<o:p></o:p></span></p><p cl=
ass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans=
-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><sp=
an style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F49=
7D'>We are still debating mandating TLS for the redirection URI (registered=
 or dynamic) for any non-localhost transmission. The issue is not limited t=
o sending the authorization code, but also when receiving HTML/JS code used=
 to extract the token from the fragment in the implicit grant case. The iss=
ue is not whether there is a security risk, but what language we should use=
 to warn against it (i.e. make insecure a violation of the spec via a MUST,=
 or clearly explain the risks via a SHOULD).<o:p></o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
>EHL<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.=
0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></sp=
an></p><div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0=
in 0in 4.0pt'><div><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt=
;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span style=3D'font-siz=
e:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span style=3D'=
font-size:10.0pt;font-family:"Tahoma","sans-serif"'> Phil Hunt [mailto:phil=
.hunt@oracle.com] <br><b>Sent:</b> Wednesday, March 30, 2011 11:09 AM<br><b=
>To:</b> Dick Hardt<br><b>Cc:</b> Eran Hammer-Lahav; OAuth WG<br><b>Subject=
:</b> Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<o:p></o:p></span></=
p></div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNorma=
l>I believe there are really two separate issues in this thread - hence the=
 confusion. This is a fairly complex interchange since it involves re-direc=
ts, message confidentiality, and server authentication issues.<o:p></o:p></=
p><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoN=
ormal>ONE:&nbsp;<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;<=
/o:p></p></div><div><p class=3DMsoNormal>I believe the text Dick is referri=
ng to is:<o:p></o:p></p><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></di=
v><div><div><p class=3DMsoNormal><span style=3D'font-size:7.5pt;font-family=
:Courier'>&quot;If the response includes an access token, the authorization=
 server MUST require TLS 1.2 as defined in [RFC5246] and MAY support additi=
onal transport- layer mechanisms meeting its security requirements. If the =
response does not include an access token, the authorization server SHOULD =
require TLS 1.2 and any additional transport-layer mechanism meeting its se=
curity requirements.&quot;<o:p></o:p></span></p></div><div><p class=3DMsoNo=
rmal><span style=3D'font-size:7.5pt;font-family:Courier'><o:p>&nbsp;</o:p><=
/span></p></div><div><p class=3DMsoNormal>I believe the contentious part is=
 the second part &quot;If the response does not include an access token...&=
quot;. &nbsp;<o:p></o:p></p></div><div><p class=3DMsoNormal>1. Should we fu=
rther clarify as &quot;either within the redirect URL&quot; or within a res=
ponse document since some might argue that a redirect URL is not the respon=
se document when in this case it still carries information.<o:p></o:p></p><=
/div><div><p class=3DMsoNormal>2. If no data is present, &quot;state&quot; =
is still available. How much of a concern do we have? Some are arguing that=
 there is no need to secure this.&nbsp;<o:p></o:p></p></div><div><p class=
=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>In my opi=
nion the MUST is required for reasons other than leakage. Note that we are =
talking about a RESPONSE message to a REQUEST that definitely should have b=
een secure because in this case TLS authenticates the authorization server.=
 Reverting to a SHOULD implies the original REQUEST need not be secure -- w=
hich means the client app has not authenticated the authorization service. =
If this is the case, then security depends solely on the integrity of the a=
uthorization code (artifact) not being spoofed since the whole authorizatio=
n step is not secured from the perspective of the client. Given the variety=
 of token systems out there, I would rather not depend on security of the a=
uthz code alone.<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;<=
/o:p></p></div><div><p class=3DMsoNormal>TWO:<o:p></o:p></p></div><div><p c=
lass=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>There=
 is a second issue that people are raising regarding the redirect that woul=
d force clients to implement TLS server side security. I'm not seeing where=
 this is covered in the spec. The exception we are discussing is that if th=
e redirect endpoint is local to the user-agent, then TLS is not required. H=
owever, if it is remote (such as an OAuth client that is a web service), th=
en TLS is a MUST. &nbsp;Maybe this point needs to be discussed in section 2=
.1.1?<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></=
div><div><p class=3DMsoNormal>Further, from section 2.2:<o:p></o:p></p></di=
v><div><div><p class=3DMsoNormal><span style=3D'font-size:7.5pt;font-family=
:Courier'>&quot;Since requests to the token endpoint result in the transmis=
sion of clear-text credentials (in the HTTP request and response), the auth=
orization server MUST require the use of a transport-layer security mechani=
sm when sending requests to the token endpoints. The authorization server M=
UST support TLS 1.2 as defined in [RFC5246], and MAY support additional tra=
nsport-layer mechanisms meeting its security requirements&quot;<o:p></o:p><=
/span></p></div></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div>=
<div><p class=3DMsoNormal>This paragraph seems to indicate that the transmi=
ssion of the authz code in 2.1 is unsecure. &nbsp;I think the first phrase =
(<span class=3Dapple-style-span><span style=3D'font-size:7.5pt;font-family:=
Courier'>Since requests to the token endpoint result in the transmission of=
 clear-text credentials (in the HTTP request and response)</span></span>) s=
hould be removed as it isn't quite in sync with even the current 2.1 endpoi=
nt behaviour.<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:=
p></p></div><div><p class=3DMsoNormal>Cheers,<o:p></o:p></p></div><div><p c=
lass=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal><span=
 class=3Dapple-style-span><span style=3D'font-size:9.0pt'>Phil</span></span=
><o:p></o:p></p></div><div><div><div><div><div><div><p class=3DMsoNormal><s=
pan style=3D'font-size:9.0pt;font-family:"Helvetica","sans-serif";color:bla=
ck'><a href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><o:p></=
o:p></span></p></div></div></div></div><p class=3DMsoNormal><o:p>&nbsp;</o:=
p></p></div><p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><o:p>&nbsp;=
</o:p></p></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p clas=
s=3DMsoNormal>On 2011-03-30, at 9:25 AM, Dick Hardt wrote:<o:p></o:p></p></=
div><p class=3DMsoNormal><br><br><o:p></o:p></p><div><div><p class=3DMsoNor=
mal>Phil<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p=
></div><div><p class=3DMsoNormal>I'd suggest you review the spec so that yo=
u understand what Eran and I are saying. No code has been granted in the re=
direct to a web client, where implementing TLS server side is a major barri=
er.&nbsp;<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></=
p></div><div><p class=3DMsoNormal>-- Dick<o:p></o:p></p></div><p class=3DMs=
oNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On 2011-03-30, =
at 9:15 AM, Phil Hunt wrote:<o:p></o:p></p></div><p class=3DMsoNormal><br><=
br><o:p></o:p></p><div><p class=3DMsoNormal>Developers of say a mobile app =
would not have to deploy it since the redirect endpoint would be local per =
the specific exception proposed. There should be NO requirement to make a c=
lient app implement TLS server side security.&nbsp;<o:p></o:p></p><div><p c=
lass=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>The c=
oncern here is that all &quot;network&quot; paths are secured to prevent im=
personation or theft of the session. Remember that in many cases, once the =
code is granted, the subsequent token is often good for a LONG time and thu=
s this becomes the weak point in this protocol.<o:p></o:p></p></div><div><d=
iv><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNorma=
l>Re: Justin's comments on SHOULD, I find SHOULD is just too broad, it does=
 not define when it is acceptable not to have security. &nbsp;I prefer clea=
r specification text that says the network paths must be protected.<o:p></o=
:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p c=
lass=3DMsoNormal>Re: Eran's comments about impact on the existing community=
. &nbsp;I don't think you are grasping the broadness of acceptance of OAuth=
 2.0. The existing OAuth 1.0 users are primarily social networks. I haven't=
 heard them object. In fact, I've noticed almost all have started enabling =
HTTPS everywhere (at least as a user option). But OAuth2 has a much broader=
 community now that I would argue is VERY concerned about risks of imperson=
ation and real financial loss.<o:p></o:p></p></div><div><p class=3DMsoNorma=
l><o:p>&nbsp;</o:p></p></div><div><div><div><div><div><div><div><p class=3D=
MsoNormal><span style=3D'font-size:9.0pt;font-family:"Helvetica","sans-seri=
f"'>Phil<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span style=
=3D'font-size:9.0pt;font-family:"Helvetica","sans-serif"'><a href=3D"mailto=
:phil.hunt@oracle.com">phil.hunt@oracle.com</a><o:p></o:p></span></p></div>=
</div></div></div><p class=3DMsoNormal><span style=3D'font-size:13.5pt;font=
-family:"Helvetica","sans-serif"'><o:p>&nbsp;</o:p></span></p></div><p clas=
s=3DMsoNormal><span style=3D'font-size:13.5pt;font-family:"Helvetica","sans=
-serif"'><br><br></span><o:p></o:p></p></div><p class=3DMsoNormal><o:p>&nbs=
p;</o:p></p><div><div><p class=3DMsoNormal>On 2011-03-30, at 8:19 AM, Dick =
Hardt wrote:<o:p></o:p></p></div><p class=3DMsoNormal><br><br><o:p></o:p></=
p><div><p class=3DMsoNormal>Thanks for pointing out my misunderstanding. I =
was thinking client in the sense of the side of TLS initiating a request.<o=
:p></o:p></p><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p c=
lass=3DMsoNormal>I agree that requiring TLS on the callback is an unexpecte=
d change.&nbsp;<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</=
o:p></p></div><div><p class=3DMsoNormal>I recall reviewing the security imp=
lications of an unsecured callback as being nominal if the authorization gr=
ant is linked to the client credentials.<o:p></o:p></p></div><div><p class=
=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal><o:p>&nbs=
p;</o:p></p><div><div><div><p class=3DMsoNormal>On 2011-03-29, at 10:07 PM,=
 Eran Hammer-Lahav wrote:<o:p></o:p></p></div><p class=3DMsoNormal><br><br>=
<o:p></o:p></p><div><div><p class=3DMsoNormal><span style=3D'font-size:11.0=
pt;font-family:"Calibri","sans-serif";color:#1F497D'>I think you got this b=
ackwards. We&#8217;re talking about forcing developers using the Facebook (=
or any other service) API to deploy their own TLS endpoint for the incoming=
 callback (via redirection). Every developer will need to get a cert and de=
ploy an HTTPS endpoint.</span><o:p></o:p></p></div><div><p class=3DMsoNorma=
l><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:=
#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
>That&#8217;s has never been discussed.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3D=
MsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif=
";color:#1F497D'>EHL</span><o:p></o:p></p></div><div><p class=3DMsoNormal><=
span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F=
497D'>&nbsp;</span><o:p></o:p></p></div><div style=3D'border:none;border-le=
ft:solid blue 1.5pt;padding:0in 0in 0in 4.0pt;border-width:initial;border-c=
olor:initial'><div><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt=
;padding:3.0pt 0in 0in 0in;border-width:initial;border-color:initial'><div>=
<p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma=
","sans-serif"'>From:</span></b><span class=3Dapple-converted-space><span s=
tyle=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span></=
span><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Dic=
k Hardt [mailto:dick.hardt@gmail.com]<span class=3Dapple-converted-space>&n=
bsp;</span><br><b>Sent:</b><span class=3Dapple-converted-space>&nbsp;</span=
>Tuesday, March 29, 2011 9:02 PM<br><b>To:</b><span class=3Dapple-converted=
-space>&nbsp;</span>Eran Hammer-Lahav<br><b>Cc:</b><span class=3Dapple-conv=
erted-space>&nbsp;</span>WG<br><b>Subject:</b><span class=3Dapple-converted=
-space>&nbsp;</span>Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt</span=
><o:p></o:p></p></div></div></div><div><p class=3DMsoNormal>&nbsp;<o:p></o:=
p></p></div><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><div>=
<div><p class=3DMsoNormal>On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrot=
e:<o:p></o:p></p></div></div><div><p class=3DMsoNormal><br><br><br><o:p></o=
:p></p></div><div><div><div><p class=3DMsoNormal><span style=3D'font-size:1=
1.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>To clarify, I am no=
t opposed to mandating TLS on the callback, just that if we do, we can&#821=
7;t ship the protocol the way it is without coming up with some other alter=
native that does not require TLS deployment on the client side. OAuth 1.0 h=
as no such requirement and adding it in 2.0 is completely unexpected by the=
 community at large.</span><o:p></o:p></p></div></div></div><div><div><p cl=
ass=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p class=3DMsoNo=
rmal>I only recall the concern with TLS to be on the server side, not the c=
lient side -- and I don't think that it is unexpected at all.<o:p></o:p></p=
></div></div><div><p class=3DMsoNormal><br><br><br><o:p></o:p></p></div><di=
v><div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-famil=
y:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><=
/div><div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fa=
mily:"Calibri","sans-serif";color:#1F497D'>It would be helpful to hear from=
 some companies with large 1.0 or 2.0 deployment on this matter? Anyone fro=
m Google, Facebook, Yahoo, Twitter, etc.?</span><o:p></o:p></p></div></div>=
</div></div><div><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div=
><div><div><p class=3DMsoNormal>When working on OAuth-WRAP, I talked to all=
 of those companies about using TLS, and only Facebook said that they wante=
d an option to be able to not require TLS. Since then, all Facebook's new A=
PIs which are essentially using OAuth 2.0 run on TLS.<o:p></o:p></p></div><=
/div><div><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><=
div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p clas=
s=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div></div></div></div><p class=
=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div><p class=3DMsoNormal>__=
_____________________________________________<br>OAuth mailing list<br><a h=
ref=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a href=3D"https://www.=
ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oaut=
h</a><o:p></o:p></p></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><=
/div></div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div><p c=
lass=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></div></body></html=
>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234465643075CP3PW5EX1MB01E_--

From phil.hunt@oracle.com  Wed Mar 30 11:27:50 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ED4C928C19B for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 11:27:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.556
X-Spam-Level: 
X-Spam-Status: No, score=-6.556 tagged_above=-999 required=5 tests=[AWL=0.042,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XMp0ui+1NniG for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 11:27:49 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 7B87628C19A for <oauth@ietf.org>; Wed, 30 Mar 2011 11:27:48 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2UITNkS019435 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Wed, 30 Mar 2011 18:29:25 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2UITM1t022898 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 30 Mar 2011 18:29:23 GMT
Received: from abhmt020.oracle.com (abhmt020.oracle.com [141.146.116.29]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2UITMUj027910; Wed, 30 Mar 2011 13:29:22 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 30 Mar 2011 11:29:21 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-51--1067470690
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465643075C@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Wed, 30 Mar 2011 11:29:20 -0700
Message-Id: <0D1980D8-B7E6-461B-B5FB-FC9C0800DB65@oracle.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com> <35E9F3F5-96BE-42F3-B9EF-0D9EE36B0CD4@oracle.com> <D8AC8216-D51F-465B-A6C0-1FB0437036EA@gmail.com> <468D1939-37F9-4FDE-A874-C10F322ECD8F@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234465643075C@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090202.4D937683.015A,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 18:27:51 -0000

--Apple-Mail-51--1067470690
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

+1 for the first

The second is almost right, except some of us are suggesting a middle =
ground of using a 'MUST EXCEPT' for where the redirect is to a client =
local to the user-agent.

IMO, the phrasing below reflect positions that are too restrictive/too =
open.

Phil
phil.hunt@oracle.com




On 2011-03-30, at 11:23 AM, Eran Hammer-Lahav wrote:

> We have consensus to change issue one to a MUST. Basically, the =
authorization endpoint MUST always use TLS regardless of its output.
> =20
> We are still debating mandating TLS for the redirection URI =
(registered or dynamic) for any non-localhost transmission. The issue is =
not limited to sending the authorization code, but also when receiving =
HTML/JS code used to extract the token from the fragment in the implicit =
grant case. The issue is not whether there is a security risk, but what =
language we should use to warn against it (i.e. make insecure a =
violation of the spec via a MUST, or clearly explain the risks via a =
SHOULD).
> =20
> EHL
> =20
> From: Phil Hunt [mailto:phil.hunt@oracle.com]=20
> Sent: Wednesday, March 30, 2011 11:09 AM
> To: Dick Hardt
> Cc: Eran Hammer-Lahav; OAuth WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> =20
> I believe there are really two separate issues in this thread - hence =
the confusion. This is a fairly complex interchange since it involves =
re-directs, message confidentiality, and server authentication issues.
> =20
> ONE:=20
> =20
> I believe the text Dick is referring to is:
> =20
> "If the response includes an access token, the authorization server =
MUST require TLS 1.2 as defined in [RFC5246] and MAY support additional =
transport- layer mechanisms meeting its security requirements. If the =
response does not include an access token, the authorization server =
SHOULD require TLS 1.2 and any additional transport-layer mechanism =
meeting its security requirements."
> =20
> I believe the contentious part is the second part "If the response =
does not include an access token...". =20
> 1. Should we further clarify as "either within the redirect URL" or =
within a response document since some might argue that a redirect URL is =
not the response document when in this case it still carries =
information.
> 2. If no data is present, "state" is still available. How much of a =
concern do we have? Some are arguing that there is no need to secure =
this.=20
> =20
> In my opinion the MUST is required for reasons other than leakage. =
Note that we are talking about a RESPONSE message to a REQUEST that =
definitely should have been secure because in this case TLS =
authenticates the authorization server. Reverting to a SHOULD implies =
the original REQUEST need not be secure -- which means the client app =
has not authenticated the authorization service. If this is the case, =
then security depends solely on the integrity of the authorization code =
(artifact) not being spoofed since the whole authorization step is not =
secured from the perspective of the client. Given the variety of token =
systems out there, I would rather not depend on security of the authz =
code alone.
> =20
> TWO:
> =20
> There is a second issue that people are raising regarding the redirect =
that would force clients to implement TLS server side security. I'm not =
seeing where this is covered in the spec. The exception we are =
discussing is that if the redirect endpoint is local to the user-agent, =
then TLS is not required. However, if it is remote (such as an OAuth =
client that is a web service), then TLS is a MUST.  Maybe this point =
needs to be discussed in section 2.1.1?
> =20
> Further, from section 2.2:
> "Since requests to the token endpoint result in the transmission of =
clear-text credentials (in the HTTP request and response), the =
authorization server MUST require the use of a transport-layer security =
mechanism when sending requests to the token endpoints. The =
authorization server MUST support TLS 1.2 as defined in [RFC5246], and =
MAY support additional transport-layer mechanisms meeting its security =
requirements"
> =20
> This paragraph seems to indicate that the transmission of the authz =
code in 2.1 is unsecure.  I think the first phrase (Since requests to =
the token endpoint result in the transmission of clear-text credentials =
(in the HTTP request and response)) should be removed as it isn't quite =
in sync with even the current 2.1 endpoint behaviour.
> =20
> Cheers,
> =20
> Phil
> phil.hunt@oracle.com
> =20
> =20
>=20
> =20
> On 2011-03-30, at 9:25 AM, Dick Hardt wrote:
>=20
>=20
> Phil
> =20
> I'd suggest you review the spec so that you understand what Eran and I =
are saying. No code has been granted in the redirect to a web client, =
where implementing TLS server side is a major barrier.=20
> =20
> -- Dick
> =20
> On 2011-03-30, at 9:15 AM, Phil Hunt wrote:
>=20
>=20
> Developers of say a mobile app would not have to deploy it since the =
redirect endpoint would be local per the specific exception proposed. =
There should be NO requirement to make a client app implement TLS server =
side security.=20
> =20
> The concern here is that all "network" paths are secured to prevent =
impersonation or theft of the session. Remember that in many cases, once =
the code is granted, the subsequent token is often good for a LONG time =
and thus this becomes the weak point in this protocol.
> =20
> Re: Justin's comments on SHOULD, I find SHOULD is just too broad, it =
does not define when it is acceptable not to have security.  I prefer =
clear specification text that says the network paths must be protected.
> =20
> Re: Eran's comments about impact on the existing community.  I don't =
think you are grasping the broadness of acceptance of OAuth 2.0. The =
existing OAuth 1.0 users are primarily social networks. I haven't heard =
them object. In fact, I've noticed almost all have started enabling =
HTTPS everywhere (at least as a user option). But OAuth2 has a much =
broader community now that I would argue is VERY concerned about risks =
of impersonation and real financial loss.
> =20
> Phil
> phil.hunt@oracle.com
> =20
>=20
>=20
> =20
> On 2011-03-30, at 8:19 AM, Dick Hardt wrote:
>=20
>=20
> Thanks for pointing out my misunderstanding. I was thinking client in =
the sense of the side of TLS initiating a request.
> =20
> I agree that requiring TLS on the callback is an unexpected change.=20
> =20
> I recall reviewing the security implications of an unsecured callback =
as being nominal if the authorization grant is linked to the client =
credentials.
> =20
> =20
> On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:
>=20
>=20
> I think you got this backwards. We=92re talking about forcing =
developers using the Facebook (or any other service) API to deploy their =
own TLS endpoint for the incoming callback (via redirection). Every =
developer will need to get a cert and deploy an HTTPS endpoint.
> =20
> That=92s has never been discussed.
> =20
> EHL
> =20
> From: Dick Hardt [mailto:dick.hardt@gmail.com]=20
> Sent: Tuesday, March 29, 2011 9:02 PM
> To: Eran Hammer-Lahav
> Cc: WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> =20
> =20
> On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:
>=20
>=20
>=20
> To clarify, I am not opposed to mandating TLS on the callback, just =
that if we do, we can=92t ship the protocol the way it is without coming =
up with some other alternative that does not require TLS deployment on =
the client side. OAuth 1.0 has no such requirement and adding it in 2.0 =
is completely unexpected by the community at large.
> =20
> I only recall the concern with TLS to be on the server side, not the =
client side -- and I don't think that it is unexpected at all.
>=20
>=20
>=20
> =20
> It would be helpful to hear from some companies with large 1.0 or 2.0 =
deployment on this matter? Anyone from Google, Facebook, Yahoo, Twitter, =
etc.?
> =20
> When working on OAuth-WRAP, I talked to all of those companies about =
using TLS, and only Facebook said that they wanted an option to be able =
to not require TLS. Since then, all Facebook's new APIs which are =
essentially using OAuth 2.0 run on TLS.
> =20
> =20
> =20
> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> =20
> =20
> =20


--Apple-Mail-51--1067470690
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">+1 =
for the first<div><br></div><div>The second is almost right, except some =
of us are suggesting a middle ground of using a 'MUST EXCEPT' for where =
the redirect is to a client local to the =
user-agent.</div><div><br></div><div>IMO, the phrasing below reflect =
positions that are too restrictive/too =
open.<br><div><br></div><div><div>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-30, at 11:23 AM, Eran Hammer-Lahav =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; font-family: Helvetica; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: =
normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">We =
have consensus to change issue one to a MUST. Basically, the =
authorization endpoint MUST always use TLS regardless of its =
output.<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">We =
are still debating mandating TLS for the redirection URI (registered or =
dynamic) for any non-localhost transmission. The issue is not limited to =
sending the authorization code, but also when receiving HTML/JS code =
used to extract the token from the fragment in the implicit grant case. =
The issue is not whether there is a security risk, but what language we =
should use to warn against it (i.e. make insecure a violation of the =
spec via a MUST, or clearly explain the risks via a =
SHOULD).<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">EHL<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"border-top-style: none; =
border-right-style: none; border-bottom-style: none; border-width: =
initial; border-color: initial; border-left-style: solid; =
border-left-color: blue; border-left-width: 1.5pt; padding-top: 0in; =
padding-right: 0in; padding-bottom: 0in; padding-left: 4pt; "><div><div =
style=3D"border-right-style: none; border-bottom-style: none; =
border-left-style: none; border-width: initial; border-color: initial; =
border-top-style: solid; border-top-color: rgb(181, 196, 223); =
border-top-width: 1pt; padding-top: 3pt; padding-right: 0in; =
padding-bottom: 0in; padding-left: 0in; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; =
">From:</span></b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif; "><span class=3D"Apple-converted-space">&nbsp;</span>Phil =
Hunt [mailto:phil.hunt@oracle.com]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Wednesday, March 30, 2011 =
11:09 AM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Dick =
Hardt<br><b>Cc:</b><span class=3D"Apple-converted-space">&nbsp;</span>Eran=
 Hammer-Lahav; OAuth WG<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] WGLC on =
draft-ietf-oauth-v2-13.txt<o:p></o:p></span></div></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">I believe there are =
really two separate issues in this thread - hence the confusion. This is =
a fairly complex interchange since it involves re-directs, message =
confidentiality, and server authentication =
issues.<o:p></o:p></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
">ONE:&nbsp;<o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">I believe the text Dick =
is referring to is:<o:p></o:p></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
7.5pt; font-family: Courier; ">"If the response includes an access =
token, the authorization server MUST require TLS 1.2 as defined in =
[RFC5246] and MAY support additional transport- layer mechanisms meeting =
its security requirements. If the response does not include an access =
token, the authorization server SHOULD require TLS 1.2 and any =
additional transport-layer mechanism meeting its security =
requirements."<o:p></o:p></span></div></div><div><div style=3D"margin-top:=
 0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 7.5pt; font-family: Courier; =
"><o:p>&nbsp;</o:p></span></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">I believe the =
contentious part is the second part "If the response does not include an =
access token...". &nbsp;<o:p></o:p></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; ">1. Should we further clarify as "either within the redirect =
URL" or within a response document since some might argue that a =
redirect URL is not the response document when in this case it still =
carries information.<o:p></o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">2. If no data =
is present, "state" is still available. How much of a concern do we =
have? Some are arguing that there is no need to secure =
this.&nbsp;<o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">In my opinion the MUST is =
required for reasons other than leakage. Note that we are talking about =
a RESPONSE message to a REQUEST that definitely should have been secure =
because in this case TLS authenticates the authorization server. =
Reverting to a SHOULD implies the original REQUEST need not be secure -- =
which means the client app has not authenticated the authorization =
service. If this is the case, then security depends solely on the =
integrity of the authorization code (artifact) not being spoofed since =
the whole authorization step is not secured from the perspective of the =
client. Given the variety of token systems out there, I would rather not =
depend on security of the authz code =
alone.<o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
">TWO:<o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">There is a second issue =
that people are raising regarding the redirect that would force clients =
to implement TLS server side security. I'm not seeing where this is =
covered in the spec. The exception we are discussing is that if the =
redirect endpoint is local to the user-agent, then TLS is not required. =
However, if it is remote (such as an OAuth client that is a web =
service), then TLS is a MUST. &nbsp;Maybe this point needs to be =
discussed in section 2.1.1?<o:p></o:p></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">Further, from =
section 2.2:<o:p></o:p></div></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 7.5pt; font-family: Courier; ">"Since requests to =
the token endpoint result in the transmission of clear-text credentials =
(in the HTTP request and response), the authorization server MUST =
require the use of a transport-layer security mechanism when sending =
requests to the token endpoints. The authorization server MUST support =
TLS 1.2 as defined in [RFC5246], and MAY support additional =
transport-layer mechanisms meeting its security =
requirements"<o:p></o:p></span></div></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">This paragraph =
seems to indicate that the transmission of the authz code in 2.1 is =
unsecure. &nbsp;I think the first phrase (<span =
class=3D"apple-style-span"><span style=3D"font-size: 7.5pt; font-family: =
Courier; ">Since requests to the token endpoint result in the =
transmission of clear-text credentials (in the HTTP request and =
response)</span></span>) should be removed as it isn't quite in sync =
with even the current 2.1 endpoint =
behaviour.<o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
">Cheers,<o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span =
class=3D"apple-style-span"><span style=3D"font-size: 9pt; =
">Phil</span></span><o:p></o:p></div></div><div><div><div><div><div><div><=
div style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: =
0.0001pt; margin-left: 0in; font-size: 12pt; font-family: 'Times New =
Roman', serif; "><span style=3D"font-size: 9pt; font-family: Helvetica, =
sans-serif; color: black; "><a href=3D"mailto:phil.hunt@oracle.com" =
style=3D"color: blue; text-decoration: underline; =
">phil.hunt@oracle.com</a><o:p></o:p></span></div></div></div></div></div>=
<div style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: =
0.0001pt; margin-left: 0in; font-size: 12pt; font-family: 'Times New =
Roman', serif; "><o:p>&nbsp;</o:p></div></div><p class=3D"MsoNormal" =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 12pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></p></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">On 2011-03-30, at 9:25 =
AM, Dick Hardt wrote:<o:p></o:p></div></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
">Phil<o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">I'd suggest you review =
the spec so that you understand what Eran and I are saying. No code has =
been granted in the redirect to a web client, where implementing TLS =
server side is a major barrier.&nbsp;<o:p></o:p></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">-- =
Dick<o:p></o:p></div></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">On 2011-03-30, at 9:15 =
AM, Phil Hunt wrote:<o:p></o:p></div></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><br><br><o:p></o:p></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">Developers of say a =
mobile app would not have to deploy it since the redirect endpoint would =
be local per the specific exception proposed. There should be NO =
requirement to make a client app implement TLS server side =
security.&nbsp;<o:p></o:p></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">The concern here is that =
all "network" paths are secured to prevent impersonation or theft of the =
session. Remember that in many cases, once the code is granted, the =
subsequent token is often good for a LONG time and thus this becomes the =
weak point in this protocol.<o:p></o:p></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; ">Re: Justin's =
comments on SHOULD, I find SHOULD is just too broad, it does not define =
when it is acceptable not to have security. &nbsp;I prefer clear =
specification text that says the network paths must be =
protected.<o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">Re: Eran's comments about =
impact on the existing community. &nbsp;I don't think you are grasping =
the broadness of acceptance of OAuth 2.0. The existing OAuth 1.0 users =
are primarily social networks. I haven't heard them object. In fact, =
I've noticed almost all have started enabling HTTPS everywhere (at least =
as a user option). But OAuth2 has a much broader community now that I =
would argue is VERY concerned about risks of impersonation and real =
financial loss.<o:p></o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div><div><div><div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 9pt; font-family: Helvetica, =
sans-serif; ">Phil<o:p></o:p></span></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 9pt; font-family: Helvetica, =
sans-serif; "><a href=3D"mailto:phil.hunt@oracle.com" style=3D"color: =
blue; text-decoration: underline; =
">phil.hunt@oracle.com</a><o:p></o:p></span></div></div></div></div></div>=
<div style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: =
0.0001pt; margin-left: 0in; font-size: 12pt; font-family: 'Times New =
Roman', serif; "><span style=3D"font-size: 13.5pt; font-family: =
Helvetica, sans-serif; "><o:p>&nbsp;</o:p></span></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 13.5pt; font-family: Helvetica, =
sans-serif; "><br><br></span><o:p></o:p></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">On 2011-03-30, at 8:19 =
AM, Dick Hardt wrote:<o:p></o:p></div></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><br><br><o:p></o:p></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">Thanks for pointing out =
my misunderstanding. I was thinking client in the sense of the side of =
TLS initiating a request.<o:p></o:p></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">I agree that requiring =
TLS on the callback is an unexpected =
change.&nbsp;<o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">I recall reviewing the =
security implications of an unsecured callback as being nominal if the =
authorization grant is linked to the client =
credentials.<o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div><div><div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; ">On 2011-03-29, at 10:07 =
PM, Eran Hammer-Lahav wrote:<o:p></o:p></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><br><br><o:p></o:p></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">I think you got this backwards. We=92re talking =
about forcing developers using the Facebook (or any other service) API =
to deploy their own TLS endpoint for the incoming callback (via =
redirection). Every developer will need to get a cert and deploy an =
HTTPS endpoint.</span><o:p></o:p></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">That=92s has never been =
discussed.</span><o:p></o:p></div></div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); ">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
">EHL</span><o:p></o:p></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">&nbsp;</span><o:p></o:p></div></div><div style=3D"border-top-style: =
none; border-right-style: none; border-bottom-style: none; border-width: =
initial; border-color: initial; border-left-style: solid; padding-top: =
0in; padding-right: 0in; padding-bottom: 0in; padding-left: 4pt; =
border-width: initial; border-color: initial; "><div><div =
style=3D"border-right-style: none; border-bottom-style: none; =
border-left-style: none; border-width: initial; border-color: initial; =
border-top-style: solid; padding-top: 3pt; padding-right: 0in; =
padding-bottom: 0in; padding-left: 0in; border-width: initial; =
border-color: initial; "><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; =
">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 10pt; font-family: Tahoma, sans-serif; =
">&nbsp;</span></span><span style=3D"font-size: 10pt; font-family: =
Tahoma, sans-serif; ">Dick Hardt [mailto:dick.hardt@gmail.com]<span =
class=3D"apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Tuesday, March 29, 2011 =
9:02 PM<br><b>To:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Eran =
Hammer-Lahav<br><b>Cc:</b><span =
class=3D"apple-converted-space">&nbsp;</span>WG<br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [OAUTH-WG] WGLC on =
draft-ietf-oauth-v2-13.txt</span><o:p></o:p></div></div></div></div><div><=
div style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: =
0.0001pt; margin-left: 0in; font-size: 12pt; font-family: 'Times New =
Roman', serif; ">&nbsp;<o:p></o:p></div></div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; ">&nbsp;<o:p></o:p></div></div><div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; ">On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav =
wrote:<o:p></o:p></div></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><br><br><br><o:p></o:p></div></div><div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">To clarify, I am not opposed to =
mandating TLS on the callback, just that if we do, we can=92t ship the =
protocol the way it is without coming up with some other alternative =
that does not require TLS deployment on the client side. OAuth 1.0 has =
no such requirement and adding it in 2.0 is completely unexpected by the =
community at =
large.</span><o:p></o:p></div></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; ">&nbsp;<o:p></o:p></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; ">I only recall the concern with TLS to be on the server side, =
not the client side -- and I don't think that it is unexpected at =
all.<o:p></o:p></div></div></div><div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; =
"><br><br><br><o:p></o:p></div></div><div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
">&nbsp;</span><o:p></o:p></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">It would be helpful to hear from =
some companies with large 1.0 or 2.0 deployment on this matter? Anyone =
from Google, Facebook, Yahoo, Twitter, =
etc.?</span><o:p></o:p></div></div></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; ">&nbsp;<o:p></o:p></div></div></div><div><div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; ">When working on OAuth-WRAP, I talked to all of those companies =
about using TLS, and only Facebook said that they wanted an option to be =
able to not require TLS. Since then, all Facebook's new APIs which are =
essentially using OAuth 2.0 run on =
TLS.<o:p></o:p></div></div></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
">&nbsp;<o:p></o:p></div></div></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
">&nbsp;<o:p></o:p></div></div></div><div><div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
">&nbsp;<o:p></o:p></div></div></div></div></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div></div></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; ">_______________________________________________<br>OAuth =
mailing list<br><a href=3D"mailto:OAuth@ietf.org" style=3D"color: blue; =
text-decoration: underline; ">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: =
blue; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></div></div><d=
iv style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div></div></div></div></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><o:p>&nbsp;</o:p></div></div></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; =
"><o:p>&nbsp;</o:p></div></div></div></div></div></div></span></blockquote=
></div><br></div></div></body></html>=

--Apple-Mail-51--1067470690--

From eran@hueniverse.com  Wed Mar 30 15:17:33 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AB73A28C15A for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 15:17:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.636
X-Spam-Level: 
X-Spam-Status: No, score=-2.636 tagged_above=-999 required=5 tests=[AWL=-0.038, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZDk5AXgAS+3n for <oauth@core3.amsl.com>; Wed, 30 Mar 2011 15:17:31 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 2B5243A67EE for <oauth@ietf.org>; Wed, 30 Mar 2011 15:17:30 -0700 (PDT)
Received: (qmail 15456 invoked from network); 30 Mar 2011 22:19:09 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 30 Mar 2011 22:19:06 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Wed, 30 Mar 2011 15:18:58 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Wed, 30 Mar 2011 15:18:51 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvvAJhPOM9wNwQATOujIIvh0sJYEwAJfIkw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465643082E@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET> <92655.18400.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E72344656430603@P3PW5EX1MB01.EX1.SECURESERVER.NET> <393421E2-C734-48D9-B0D1-A94FC3C1BDC7@oracle.com> <948E6CDC-BEF2-4078-B5EE-B89983B35874@salesforce.com> <90C41DD21FB7C64BB94121FBBC2E72344656430604@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4D93694D.70200@aol.com>
In-Reply-To: <4D93694D.70200@aol.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234465643082EP3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Mar 2011 22:17:33 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234465643082EP3PW5EX1MB01E_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

QWZ0ZXIgbXVjaCByZWZsZWN0aW9uIGFuZCByZXZpZXcgb2YgdGhlIGJpZyBwaWN0dXJlIChPQXV0
aCAxLjAgZGVwbG95bWVudCBpbmNsdWRlZCksIEkgaGF2ZSBjb21lIHRvIHRoZSBjb25jbHVzaW9u
IHRoYXQgdGhpcyBpcyBhIHZhbGlkIHNlY3VyaXR5IGNvbmNlcm4gd2hpY2ggc2hvdWxkIGJlIGV4
cGxhaW5lZCBpbiB0aGUgc2VjdXJpdHkgY29uc2lkZXJhdGlvbiBzZWN0aW9uLCBidXQgd2hpY2gg
ZG9lcyBub3QgbWVyaXQgYSByZXF1aXJlbWVudCB0byB1c2UgVExTIG9uIHRoZSBjbGllbnQgc2lk
ZS4NCg0KSSBhbSBub3cgb3Bwb3NlZCB0byBzcGVjaWZ5aW5nIGEgTVVTVCB1c2UgVExTIHdpdGgg
dGhlIGNhbGxiYWNrIFVSSSBkZXBsb3llZCBieSB0aGUgY2xpZW50Lg0KDQpXZSBzaG91bGQgY2hh
bmdlIHNlY3Rpb24gMi4xIGFzIGZvbGxvd3M6DQoNCiAgIFNpbmNlIHJlcXVlc3RzIHRvIHRoZSBh
dXRob3JpemF0aW9uIGVuZHBvaW50IHJlc3VsdCBpbiB1c2VyIGF1dGhlbnRpY2F0aW9uDQogICBh
bmQgdGhlIHRyYW5zbWlzc2lvbiBvZiBjbGVhci10ZXh0IGNyZWRlbnRpYWxzIChpbiB0aGUgSFRU
UCByZXNwb25zZSksIHRoZQ0KICAgYXV0aG9yaXphdGlvbiBzZXJ2ZXIgTVVTVCByZXF1aXJlIHRo
ZSB1c2Ugb2YgYSB0cmFuc3BvcnQtbGF5ZXINCiAgIHNlY3VyaXR5IG1lY2hhbmlzbSB3aGVuIHNl
bmRpbmcgcmVxdWVzdHMgdG8gdGhlIHRva2VuIGVuZHBvaW50cy4gIFRoZQ0KICAgYXV0aG9yaXph
dGlvbiBzZXJ2ZXIgTVVTVCBzdXBwb3J0IFRMUyAxLjIgYXMgZGVmaW5lZCBpbiBbUkZDNTI0Njxo
dHRwOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmM1MjQ2Pl0sDQogICBhbmQgTUFZIHN1cHBvcnQg
YWRkaXRpb25hbCB0cmFuc3BvcnQtbGF5ZXIgbWVjaGFuaXNtcyBtZWV0aW5nIGl0cw0KICAgc2Vj
dXJpdHkgcmVxdWlyZW1lbnRzLg0KDQpUaGlzIGlzIHRoZSBvbmx5IG5vcm1hdGl2ZSBjaGFuZ2Ug
d2Ugc2hvdWxkIG1ha2UuDQoNCk15IHJlYXNvbiBmb3IgcmVqZWN0aW5nIHRoZSByZXF1aXJlbWVu
dCB0byB1c2UgVExTIG9uIHRoZSBjbGllbnQgc2lkZSBpcyB0aGF0IGl0IGlzIGEgbWlzbGVhZGlu
ZyBhbmQgbmFycm93bHkgZm9jdXNlZCBndWlkZWxpbmUuIElmIHRoZSBjbGllbnQgZGVwbG95cyBh
biBIVFRQUyByZWRpcmVjdGlvbiBVUkkgZW5kcG9pbnQsIG9ubHkgdG8gdGhlbiBzZXQgYW4gaW5z
ZWN1cmUgY29va2llIGZvciBzZXNzaW9uIG1hbmFnZW1lbnQsIHRoZSBzYW1lIGF0dGFjayBpcyBz
dGlsbCBwb3NzaWJsZS4gSU9XLCBpZiB0aGUgY2xpZW50IGFsbG93cyAqYW55KiBraW5kIG9mIGlu
c2VjdXJlIGF1dGhlbnRpY2F0aW9uLCBPQXV0aCBvciBub3QsIHRoaXMgZXhwbG9pdCBjYW4gcHV0
IHByb3RlY3RlZCByZXNvdXJjZXMgYXQgcmlzay4NCg0KVGhlIG9ubHkgbWVhbmluZ2Z1bCAtIGJ1
dCBjb21wbGV0ZWx5IG91dCBvZiBzY29wZSDigJMgcmVxdWlyZW1lbnQgdG8gbWFrZSBpcyB0aGF0
IGFueSBjbGllbnQgdXNpbmcgT0F1dGggTVVTVCBvbmx5IHN1cHBvcnQgc2VjdXJlIGF1dGhlbnRp
Y2F0aW9uIG9mIGFueSBraW5kIHVzaW5nIGFueSBwcm90b2NvbCAoT0F1dGgsIGNvb2tpZXMsIEJh
c2ljKS4gVGhpcyB0cmFuc2xhdGVzIGludG8gZnVsbCBIVFRQUyBkZXBsb3ltZW50IGZvciBjbGll
bnQgYXBwbGljYXRpb25zLCBzb21ldGhpbmcgdGhhdCBpcyBhIGdyb3dpbmcgdHJlbmQgYnV0IGZh
ciBmcm9tIGluZHVzdHJ5IHN0YW5kYXJkLg0KDQpTbyB3aGlsZSB0aGlzIGlzIGEgdmFsaWQgY29u
Y2VybiwgZm9yY2luZyB0aGUgY2xpZW50IHRvIGRlcGxveSBUTFMgZm9yIHRoZSBPQXV0aCBlbmRw
b2ludCBpcyBhbiBvdmVyLXJlYWN0aW9uIGFuZCBpbnN1ZmZpY2llbnQgYXQgdGhhdC4NCg0KRUhM
DQoNCg0KRnJvbTogR2VvcmdlIEZsZXRjaGVyIFttYWlsdG86Z2ZmbGV0Y2hAYW9sLmNvbV0NClNl
bnQ6IFdlZG5lc2RheSwgTWFyY2ggMzAsIDIwMTEgMTA6MzMgQU0NClRvOiBFcmFuIEhhbW1lci1M
YWhhdg0KQ2M6IENodWNrIE1vcnRpbW9yZTsgUGhpbGxpcCBIdW50OyBLYXJlbiBQLiBMZXdpc29u
OyBPQXV0aCBXRw0KU3ViamVjdDogUmU6IFtPQVVUSC1XR10gV0dMQyBvbiBkcmFmdC1pZXRmLW9h
dXRoLXYyLTEzLnR4dA0KDQpGcm9tIGEgZGVwbG95bWVudCBwZXJzcGVjdGl2ZS4uLiBJJ20gY29u
c2lkZXJpbmcgYWxsb3dpbmcgSFRUUCByZWRpcmVjdF91cmkgKGZvciBkZXZlbG9wbWVudCBvbmx5
KSBidXQgbWFraW5nIHRoZSBVSSB2ZXJ5IG9ibm94aW91cyAoZS5nLiBicmlnaHQgcmVkIGJhY2tn
cm91bmQsIHdhcm5pbmdzIGV0Yykgc3VjaCB0aGF0IG5vIHJlYWwgdXNlciB3b3VsZCBjbGljayB0
aHJvdWdoLCBidXQgYSBkZXZlbG9wZXIgd2lsbCBpZ25vcmUuIEl0IGFsc28gZm9yY2VzIHRoZW0g
dG8gc3dpdGNoIHRvIFRMUyBmb3IgcHJvZHVjdGlvbi4gVGhvdWdodHM/DQoNCkFsc28sIGFzIGxv
bmcgYXMgdGhlIGF1dGhvcml6YXRpb24gY29kZSBpcyBvbmUtdGltZS11c2UsIHRoZSBwYXNzaXZl
IGF0dGFjayBkb2Vzbid0IHdvcmsuIEl0IGhhcyB0byBiZSBNSVRNLiBJcyB0aGVyZSBhbnkgcmVh
c29uIGF1dGhvcml6YXRpb24gY29kZXMgc2hvdWxkbid0IGJlIHNob3J0LWxpdmVkIGFuZCBvbmUt
dGltZS11c2U/DQoNClRoYW5rcywNCkdlb3JnZQ0KDQpPbiAzLzMwLzExIDI6MzQgQU0sIEVyYW4g
SGFtbWVyLUxhaGF2IHdyb3RlOg0KSeKAmXZlIGJlZW4gZG9pbmcgdGhpcyBsb25nZXIuIFJlcXVp
cmluZyBUTFMgb24gdGhlIHJlZGlyZWN0aW9uIGVuZHBvaW50IGlzIGEgYmlnIGNoYW5nZSBmb3Ig
T0F1dGggZGVwbG95bWVudHMuIFRoaXMgd291bGQgaGF2ZSBiZWVuIHVudGhpbmthYmxlIGZvciBP
QXV0aCAxLjAoYSkuIE9uZSBvZiB0aGUgbWFpbiBnb2FscyBvZiAyLjAgd2FzIHRvIG1ha2UgaXQg
bXVjaCBlYXNpZXIgZm9yIGNsaWVudCBkZXZlbG9wZXJzLiBJIGRvbuKAmXQgdGhpbmsgZGVwbG95
aW5nIEhUVFBTIGFzIGEgcHJlcmVxdWlzaXRlIGZvciBwbGF5aW5nIHdpdGggYW4gT0F1dGggZW5k
cG9pbnQgaXMgdHJpdmlhbCBmb3IgbW9zdCBjbGllbnQgZGV2ZWxvcGVycy4NCg0KV2hlbiB3ZSBo
YWQgdGhlIHNhbWUgZGViYXRlIG92ZXIgYmVhcmVyIHRva2VuIGFuZCBUTFMsIG1hbnkgcGVvcGxl
IGFyZ3VlZCB0byBrZWVwIGl0IFNIT1VMRCwgYnV0IG5vIG9uZSBzYWlkIHRoZXkgd2lsbCBhY3R1
YWxseSBkZXBsb3kgaXQgd2l0aG91dCBUTFMuIFRoYXQgd2FzIGEgdmVyeSB1c2VmdWwgZGF0YSBw
b2ludC4gV2Ugc2hvdWxkIHRha2UgYSBtb21lbnQgdG8gZmluZCBvdXQgd2hhdCBleGlzdGluZyBP
QXV0aCBwcm92aWRlcnMgaGF2ZSB0byBzYXkgYWJvdXQgdGhpcy4NCg0KVG8gY2xhcmlmeSDigJMg
SSBhbSBub3Qgb2JqZWN0aW5nIHRvIG1ha2luZyB0aGlzIGEgTVVTVC4gQnV0IEkgYW0gb2JqZWN0
aW5nIGFuZCB3aWxsIGRlbGF5IHRoaXMgY2hhbmdlIHVudGlsIHdlIGdhdGhlciBtb3JlIGluZm9y
bWF0aW9uIGZyb20gYWN0dWFsIGRlcGxveW1lbnRzLiBTaW5jZSB0aGlzIGFwcGxpZXMgdG8gT0F1
dGggMS4wLCBpdCB3b3VsZCBiZSB2ZXJ5IHJlbGV2YW50IHRvIGFzayBleGlzdGluZyBwcm92aWRl
cnMgaWYgdGhleSB3aWxsIHRyeSBhbmQgZW5mb3JjZSBzdWNoIGEgcmVzdHJpY3Rpb24gZm9yIDEu
MCBhcyB3ZWxsLg0KDQpTcGVjaWZpY2F0aW9ucyB3cml0dGVuIGluIGEgYnViYmxlIHVzdWFsbHkg
ZmFpbCBvdXRyaWdodCBvciBmYWlsIHRvIHJlZmxlY3QgcmVhbGl0eS4NCg0KQWxzbywgdGhlIGF0
dGFja3MgYXJlIGRpZmZlcmVudCBmb3IgdGhlIGF1dGhvcml6YXRpb24gY29kZSBhbmQgaW1wbGlj
aXQgZ3JhbnQgdHlwZXMuIEVhY2ggY2FuIGJlbmVmaXQgZnJvbSB1c2luZyBUTFMgZm9yIHRoZSBy
ZWRpcmVjdGlvbiBlbmRwb2ludCBpbiBkaWZmZXJlbnQgd2F5cyAob25lIHRyYW5zbWlzc2lvbiBv
ZiBjb2RlIGZyb20gdXNlci1hZ2VudCB0byBjbGllbnQsIHRoZSBvdGhlciBtYW5pcHVsYXRpb24g
b2Ygc2NyaXB0cyBmcm9tIGNsaWVudCB0byB1c2VyLWFnZW50KS4gSnVzdCB3YW50IHRvIG1ha2Ug
c3VyZSB3ZSBkb27igJl0IGp1c3QgZm9jdXMgb24gb25lIHZlY3Rvci4NCg0KRUhMDQoNCg0KRnJv
bTogQ2h1Y2sgTW9ydGltb3JlIFttYWlsdG86Y21vcnRpbW9yZUBzYWxlc2ZvcmNlLmNvbV0NClNl
bnQ6IFR1ZXNkYXksIE1hcmNoIDI5LCAyMDExIDExOjE5IFBNDQpUbzogUGhpbGxpcCBIdW50DQpD
YzogRXJhbiBIYW1tZXItTGFoYXY7IEthcmVuIFAuIExld2lzb247IE9BdXRoIFdHDQpTdWJqZWN0
OiBSZTogW09BVVRILVdHXSBXR0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgtdjItMTMudHh0DQoNCisx
DQoNCkkgZGlzYWdyZWUgdGhhdCB0byB1c2UgVExTIGlzIGEgYmlnIGNoYW5nZS4gIFJhdGhlciBJ
J2QgY2F0ZWdvcml6ZSB1c2luZyBUTFMgYXMgYSBiaWcgaW5jb252ZW5pZW5jZS4NCg0KV2Ugc2hv
dWxkIGRlZmluZSBhIHNlY3VyZSBwcm9maWxlLiAgSWYgaW5kaXZpZHVhbCBkZXBsb3ltZW50cyBj
aG9vc2UgdG8gcmVsYXggdGhlIHNwZWMgYW5kIGRldGVybWluZSBIVFRQIGFjY2VwdGFibGUgZm9y
IGxvY2FsIGhvc3Qgb3Igb3RoZXIgY29udmVuaWVuY2UgdGhhdHMgZmluZSwgYnV0IGl0IHNob3Vs
ZG4ndCBiZSBjb21wbGlhbnQuDQoNCi0gY21vcnQNCg0KT24gTWFyIDI5LCAyMDExLCBhdCAxMDo1
NSBQTSwgIlBoaWxsaXAgSHVudCIgPHBoaWwuaHVudEBvcmFjbGUuY29tPG1haWx0bzpwaGlsLmh1
bnRAb3JhY2xlLmNvbT4+IHdyb3RlOg0KV2h5IGNhbid0IFRMUyBiZSBhIG11c3QgZXhjZXB0IHdo
ZW4gdGhlIHRva2VuIGNhbm5vdCBiZSBleHBvc2VkLiBFZyBiZWNhdXNlIHRoZSByZWRpcmVjdCBp
cyBsb2NhbD8NCg0KUGhpbA0KDQpTZW50IGZyb20gbXkgcGhvbmUuDQoNCk9uIDIwMTEtMDMtMjks
IGF0IDIyOjQ4LCBFcmFuIEhhbW1lci1MYWhhdiA8ZXJhbkBodWVuaXZlcnNlLmNvbTxtYWlsdG86
ZXJhbkBodWVuaXZlcnNlLmNvbT4+IHdyb3RlOg0KRnJhbmNpc2NvIOKAkyB0aGFua3MgZm9yIGJl
aW5nIHBlcnNpc3RlbnQuDQoNClNvdW5kcyBsaWtlIHRoZSBzYW1lIHByb2JsZW0gZXhpc3RzIGlu
IE9BdXRoIDEuMC4gQmFzaWNhbGx5LCB0aGUgb25seSB3YXkgdGhlIGNsaWVudCBrbm93cyB0aGF0
IHRoZSBzYW1lIHVzZXIgd2hvIGdyYW50ZWQgYXV0aG9yaXphdGlvbiBpcyB0aGUgb25lIGNvbWlu
ZyBiYWNrLCBpcyB2aWEgdGhlIGF1dGhvcml6YXRpb24gY29kZS4gQW55b25lIHdobyBoYXMgdGhh
dCBjb2RlIGlzIGJhc2ljYWxseSBhc3N1bWVkIHRvIGJlIHRoZSBvbmUgZ3JhbnRpbmcgYWNjZXNz
LiBJZiB0aGUgY29kZSBpcyBpbnRlcmNlcHRlZCwgd2hvZXZlciBnZXRzIGl0IGNhbiBwcmV0ZW5k
IHRvIGJlIGl0cyBsZWdpdGltYXRlIGhvbGRlci4NCg0KSSBhZ3JlZSB0aGlzIGlzIGFuIGlzc3Vl
Lg0KDQpSZXF1aXJpbmcgY2FsbGJhY2tzIHRvIHVzZSBUTFMgaXMgYSBiaWcgY2hhbmdlLg0KDQpU
aGVyZSBhcmUgc29tZSBjYXNlcyB3aGVyZSBpdCBpcyBub3QgbmVlZGVkIOKAkyBuYW1lbHksIHdo
ZW4gdGhlIGNsaWVudCB1c2VzIHRoZSBhY2Nlc3MgdG9rZW4gb2J0YWluZWQgdGhyb3VnaCB0aGlz
IHRyYW5zYWN0aW9uIHRvIGRvIHNvbWV0aGluZyBvbiB0aGUgYmFja2VuZCB3aXRob3V0IGFjdHVh
bGx5IGV4cG9zaW5nIGFueXRoaW5nIHRvIHRoZSB1c2VyIHdobyBkZWxpdmVyZWQgdGhlIGF1dGhv
cml6YXRpb24gY29kZS4gRm9yIGV4YW1wbGUsIGFuIGFwcGxpY2F0aW9uIHNjYW5uaW5nIHlvdXIg
VHdpdHRlciBhY2NvdW50IGluIHRoZSBiYWNrZ3JvdW5kLCBzZW5kaW5nIHlvdSBlbWFpbHMgd2hl
biBzb21lb25lIGlzIG5vIGxvbmdlciBmb2xsb3dpbmcgeW91LiBTdWNoIGEgY2xpZW50IGRvZXMg
bm90IG5lZWQgVExTIGJlY2F1c2UgdGhlIGF1dGhvcml6YXRpb24gY29kZSByZXByZXNlbnRzIGEg
dmFsaWQgZ3JhbnQsIGFuZCB0aGUgTUlUTSBkb2VzbuKAmXQgZ2V0IGFueSBiZW5lZml0IGZyb20g
aGlqYWNraW5nIHRoZSBjYWxsYmFjay4gTm8gZGF0YSBpcyBleHBvc2VkLg0KDQpIb3dldmVyLCB0
aGlzIGlzIG5vdCB0aGUgdHlwaWNhbCB1c2UgY2FzZS4NCg0KQXMgbG9uZyBhcyB0aGUgc2VjdXJp
dHkgY29uc2lkZXJhdGlvbnMgYXJlIGNsZWFybHkgc3RhdGVkLCB3ZSBjYW4gbW92ZSBmb3J3YXJk
IHdpdGggZWl0aGVyIGEgTVVTVCBvciBhIFNIT1VMRC4gV2UgY2FuIGVhc2lseSBleGVtcHRzIGFu
eSBpbnRlcm5hbCBjYWxsYmFja3MgZnJvbSB0aGlzIHJlcXVpcmVtZW50IChsb2NhbGhvc3QsIGFw
cGxpY2F0aW9uIHNjaGVtZSBoYW5kbGVyLCBldGMuKS4NCkkgZG9u4oCZdCB3YW50IHRvIHdyaXRl
IGEgc3BlY2lmaWNhdGlvbiB0aGF0IGV2ZXJ5b25lIGtub3dpbmdseSBpZ25vcmVzLiBPbmNlIHBl
b3BsZSBpZ25vcmUgb25lIHNlY3VyaXR5IHJlcXVpcmVtZW50LCB3aGF04oCZcyB0byBzdG9wIHRo
ZW0gZnJvbSBpZ25vcmluZyBvdGhlcnMuIFNvIHRoZSBtb3N0IGltcG9ydGFudCBpbnB1dCB0byB0
aGlzIGRpc2N1c3Npb24gaXMgd2hhdCB0aGUgdmVuZG9ycyBhcmUgZ29pbmcgdG8gZG8gKHJlZ2Fy
ZGxlc3Mgb2Ygd2hhdCB0aGUgZG9jdW1lbnQgc2F5cyk/DQoNCkVITA0KDQoNCkZyb206IEZyYW5j
aXNjbyBDb3JlbGxhIFttYWlsdG86ZmNvcmVsbGFAcG9tY29yLmNvbV0NClNlbnQ6IFR1ZXNkYXks
IE1hcmNoIDI5LCAyMDExIDM6NDAgUE0NClRvOiBQaGlsIEh1bnQ7IEp1c3RpbiBSaWNoZXI7IEVy
YW4gSGFtbWVyLUxhaGF2DQpDYzogT0F1dGggV0c7IEthcmVuIFAuIExld2lzb247IFBhdWwgVGFy
amFuIChwdEBmYi5jb208bWFpbHRvOnB0QGZiLmNvbT4pDQpTdWJqZWN0OiBSRTogW09BVVRILVdH
XSBXR0xDIG9uIGRyYWZ0LWlldGYtb2F1dGgtdjItMTMudHh0DQoNCj4gSXNu4oCZdCBhbGwgdGhp
cyBqdXN0IGRpZmZlcmVudCBmbGF2b3JzIG9mIGEgc2Vzc2lvbiBmaXhhdGlvbiBhdHRhY2tzPw0K
PiBUaGUgY2xpZW50IHNob3VsZCB1c2UgY29va2llcyBhbmQgdGhlIHN0YXRlIHBhcmFtZXRlciB0
byBlbnN1cmUgdGhlDQo+IHNhbWUgdXNlci1hZ2VudCBpdCByZWRpcmVjdGVkIHRvIHRoZSBhdXRo
b3JpemF0aW9uIHNlcnZlciBpcyB0aGUgb25lDQo+IGNvbWluZyBiYWNrLg0KDQpJdCdzIG5vdCBh
IHNlc3Npb24gZml4YXRpb24gYXR0YWNrLiAgSXQncyBqdXN0IGFuIGludGVyY2VwdGlvbiBvZiBh
DQpjcmVkZW50aWFsLiAgVGhlIGF1dGhvcml6YXRpb24gY29kZSBpcyBhIGNyZWRlbnRpYWwgdGhh
dCBwcm92aWRlcw0KYWNjZXNzIHRvIHRoZSBwcm90ZWN0ZWQgcmVzb3VyY2VzLiAgSWYgdGhlIGF0
dGFja2VyIGNhbiBnZXQgaXQsIHRoZQ0KYXR0YWNrZXIgY2FuIGdldCB0aGUgcHJvdGVjdGVkIHJl
c291cmNlcyAodXNpbmcgdGhlIGNsaWVudCBhcyBhbg0KYWdlbnQsIHNvIHRvIHNwZWFrKS4NCg0K
QSBjb29raWUgd29uJ3QgaGVscCwgc2luY2UgaXQgd291bGQgYmUgc2VudCBmcm9tIHRoZSBicm93
c2VyIHRvIHRoZSBjbGllbnQNCmFsb25nIHdpdGggdGhlIGF1dGhvcml6YXRpb24gY29kZS4gIElm
IHRoZSBhdHRhY2tlciBjYW4gb2JzZXJ2ZSBvcg0KaW50ZXJjZXB0IHRoZSBhdXRob3JpemF0aW9u
IGNvZGUsIHRoZSBhdHRhY2tlciBhbmQgb2JzZXJ2ZSBvcg0KaW50ZXJjZXB0IHRoZSBjb29raWUu
DQoNCkZyYW5jaXNjbw0KDQotLS0gT24gVHVlLCAzLzI5LzExLCBFcmFuIEhhbW1lci1MYWhhdiA8
ZXJhbkBodWVuaXZlcnNlLmNvbTxtYWlsdG86ZXJhbkBodWVuaXZlcnNlLmNvbT4+IHdyb3RlOg0K
DQpGcm9tOiBFcmFuIEhhbW1lci1MYWhhdiA8ZXJhbkBodWVuaXZlcnNlLmNvbTxtYWlsdG86ZXJh
bkBodWVuaXZlcnNlLmNvbT4+DQpTdWJqZWN0OiBSRTogW09BVVRILVdHXSBXR0xDIG9uIGRyYWZ0
LWlldGYtb2F1dGgtdjItMTMudHh0DQpUbzogImZjb3JlbGxhQHBvbWNvci5jb208bWFpbHRvOmZj
b3JlbGxhQHBvbWNvci5jb20+IiA8ZmNvcmVsbGFAcG9tY29yLmNvbTxtYWlsdG86ZmNvcmVsbGFA
cG9tY29yLmNvbT4+LCAiUGhpbCBIdW50IiA8cGhpbC5odW50QG9yYWNsZS5jb208bWFpbHRvOnBo
aWwuaHVudEBvcmFjbGUuY29tPj4sICJKdXN0aW4gUmljaGVyIiA8anJpY2hlckBtaXRyZS5vcmc8
bWFpbHRvOmpyaWNoZXJAbWl0cmUub3JnPj4NCkNjOiAiT0F1dGggV0ciIDxvYXV0aEBpZXRmLm9y
ZzxtYWlsdG86b2F1dGhAaWV0Zi5vcmc+PiwgIkthcmVuIFAuIExld2lzb24iIDxrcGxld2lzb25A
cG9tY29yLmNvbTxtYWlsdG86a3BsZXdpc29uQHBvbWNvci5jb20+PiwgIlBhdWwgVGFyamFuIChw
dEBmYi5jb208bWFpbHRvOnB0QGZiLmNvbT4pIiA8cHRAZmIuY29tPG1haWx0bzpwdEBmYi5jb20+
Pg0KRGF0ZTogVHVlc2RheSwgTWFyY2ggMjksIDIwMTEsIDc6NTAgUE0NCg0KSXNu4oCZdCBhbGwg
dGhpcyBqdXN0IGRpZmZlcmVudCBmbGF2b3JzIG9mIGEgc2Vzc2lvbiBmaXhhdGlvbiBhdHRhY2tz
PyBUaGUgY2xpZW50IHNob3VsZCB1c2UgY29va2llcyBhbmQgdGhlIHN0YXRlIHBhcmFtZXRlciB0
byBlbnN1cmUgdGhlIHNhbWUgdXNlci1hZ2VudCBpdCByZWRpcmVjdGVkIHRvIHRoZSBhdXRob3Jp
emF0aW9uIHNlcnZlciBpcyB0aGUgb25lIGNvbWluZyBiYWNrLg0KDQoNCg0KRUhMDQoNCg0KDQpG
cm9tOiBGcmFuY2lzY28gQ29yZWxsYSBbbWFpbHRvOmZjb3JlbGxhQHBvbWNvci5jb21dDQpTZW50
OiBUdWVzZGF5LCBNYXJjaCAyOSwgMjAxMSAxMTo0NiBBTQ0KVG86IFBoaWwgSHVudDsgSnVzdGlu
IFJpY2hlcjsgRXJhbiBIYW1tZXItTGFoYXYNCkNjOiBPQXV0aCBXRzsgS2FyZW4gUC4gTGV3aXNv
bjsgUGF1bCBUYXJqYW4gKHB0QGZiLmNvbTxtYWlsdG86cHRAZmIuY29tPikNClN1YmplY3Q6IFJF
OiBbT0FVVEgtV0ddIFdHTEMgb24gZHJhZnQtaWV0Zi1vYXV0aC12Mi0xMy50eHQNCg0KDQoNCj4g
Q2FuIHlvdSBleHBsYWluIGhvdyBpbnRlcmNlcHRpbmcgdGhlIGF1dGhvcml6YXRpb24gY29kZQ0K
PiB3aXRob3V0IGhhdmluZyBhY2Nlc3MgdG8gdGhlIGNsaWVudCBjcmVkZW50aWFscyBpcyBhDQo+
IHByb2JsZW0/IEZvciB0aGUgc2FrZSBvZiBkaXNjdXNzaW9uLCBhc3N1bWUgdGhhdCB0aGUgY2xp
ZW50DQo+IGhhcyB2YWxpZCBhbmQgc2VjdXJlIGNyZWRlbnRpYWxzIHRoYXQgYW4gYXR0YWNrZXIg
Y2Fubm90DQo+IGFjY2Vzcy4gQWxzbyBhc3N1bWUgdGhhdCB0aGUgY2xpZW50IGhhcyBpbXBsZW1l
bnRlZCBzb21lDQo+IGZvcm0gb2YgY3Jvc3Mtc2l0ZSBwcm90ZWN0aW9uLg0KDQpPbmUgd2F5OiBt
YW4taW4tdGhlLW1pZGRsZSBhdHRhY2suICBUaGUgdHJhZmZpYyBiZXR3ZWVuIHRoZSBsZWdpdGlt
YXRlDQp1c2VyJ3MgYnJvd3NlciBhbmQgdGhlIGNsaWVudCBnb2VzIHRocm91Z2ggdGhlIGF0dGFj
a2VyJ3MgbWFjaGluZQ0KKGVhc3kgdG8gc2V0IHVwIHdpdGggYSByb2d1ZSBXaUZpIGFjY2VzcyBw
b2ludCkuICBUaGUgdXNlcidzIGJyb3dzZXINCnNlbmRzIGFuIGh0dHAgcmVxdWVzdCB0byB0aGUg
Y2xpZW50LCB0YXJnZXRpbmcgdGhlIHJlZGlyZWN0IFVSSS4gIFRoZQ0KYXR0YWNrZXIncyBtYWNo
aW5lIGRvZXNuJ3QgbGV0IHRoYXQgcmVxdWVzdCBnbyB0aHJvdWdoLiAgVGhlIGF0dGFja2VyDQp0
aGVuIHNlbmRzIHRoZSBzYW1lIGlkZW50aWNhbCByZXF1ZXN0IGZyb20gdGhlIGF0dGFja2VyJ3Mg
b3duIGJyb3dzZXIuDQpXaGVuIHRoZSBjbGllbnQgcmVjZWl2ZXMgdGhlIHJlcXVlc3QsIGl0IGhh
cyBubyB3YXkgdG8gdGVsbCB0aGF0IGl0IGlzDQpjb21pbmcgZnJvbSB0aGUgYXR0YWNrZXIncyBi
cm93c2VyIHJhdGhlciB0aGFuIGZyb20gdGhlIHVzZXIncw0KYnJvd3Nlci4gIFRoZSBjbGllbnQg
ZXhjaGFuZ2VzIHRoZSBhdXRob3JpemF0aW9uIGNvZGUgZm9yIGFuIGFjY2Vzcw0KdG9rZW4sIHVz
ZXMgdGhlIGFjY2VzcyB0b2tlbiB0byBvYnRhaW4gcHJvdGVjdGVkIHJlc291cmNlcyBiZWxvbmdp
bmcNCnRvIHRoZSB1c2VyLCBhbmQgZGVsaXZlcnMgdGhvc2UgcmVzb3VyY2VzIHRvIHRoZSBhdHRh
Y2tlcidzIGJyb3dzZXIuDQooT3IgbWFuaXB1bGF0ZXMgdGhvc2UgcmVzb3VyY2VzIGFzIGRpcmVj
dGVkIGJ5IHRoZSBhdHRhY2tlcidzDQpicm93c2VyLikgIEluIHRoZSBGYWNlYm9vayB1c2UgY2Fz
ZSwgdGhlIGNsaWVudCBsb2dzIHRoZSB1c2VyIGluIHVwb24NCnZlcmlmeWluZyB0aGF0IHRoZSBh
dXRob3JpemF0aW9uIGNvZGUgaXMgdmFsaWQgYnkgZXhjaGFuZ2luZyBpdA0Kc3VjY2Vzc2Z1bGx5
IGZvciBhbiBhY2Nlc3MgdG9rZW4uDQoNCkFub3RoZXIgd2F5IChwYXNzaXZlIGF0dGFjayk6IFRo
ZSBhdHRhY2tlciBvYnNlcnZlcyB0aGUgcmVxdWVzdCBmcm9tDQp0aGUgdXNlcidzIGJyb3dzZXIg
dG8gdGhlIGNsaWVudC4gIFRoZSBhdHRhY2tlciBkb2VzIG5vdCBzdG9wIHRoZQ0KcmVxdWVzdC4g
IFRoZSBjbGllbnQgcmVjZWl2ZXMgdGhlIHJlcXVlc3Qgd2l0aCB0aGUgYXV0aG9yaXphdGlvbiBj
b2RlDQphbmQgZXhjaGFuZ2VzIHRoZSBhdXRob3JpemF0aW9uIGNvZGUgZm9yIHRoZSBhY2Nlc3Mg
dG9rZW4uICBOb3cgdGhlDQphdHRhY2tlciBzZW5kcyB0aGUgc2FtZSByZXF1ZXN0IGZyb20gdGhl
IGF0dGFja2VyJ3Mgb3duIGJyb3dzZXIuICBUaGUNCmNsaWVudCByZWNlaXZlcyB0aGUgc2Vjb25k
IHJlcXVlc3QgYW5kIGV4Y2hhbmdlcyB0aGUgYXV0aG9yaXphdGlvbg0KY29kZSBmb3IgYW5vdGhl
ciBhY2Nlc3MgdG9rZW4uICBVcG9uIHJlY2VpdmluZyB0aGUgc2Vjb25kIHJlcXVlc3QgZm9yDQp0
aGUgc2FtZSBhdXRob3JpemF0aW9uIGNvZGUsIHRoZSBhdXRob3JpemF0aW9uIHNlcnZlciByZXZv
a2VzIHRoZQ0KZmlyc3QgYWNjZXNzIHRva2VuLCBhcyBzdWdnZXN0ZWQgaW4gc2VjdGlvbiA0LjEu
MiBvZiB0aGUNCnNwZWNpZmljYXRpb246ICJJZiBhbiBhdXRob3JpemF0aW9uIGNvZGUgaXMgdXNl
ZCBtb3JlIHRoYW4gb25jZSwgdGhlDQphdWhvcml6YXRpb24gc2VydmVyIE1BWSByZXZva2UgYWxs
IHRva2VucyBwcmV2aW91c2x5IGlzc3VlZCBiYXNlZCBvbg0KdGhhdCBhdXRob3JpemF0aW9uIGNv
ZGUiLiAgVGhlIGNsaWVudCB0aGVuIHVzZXMgdGhlIHNlY29uZCBhY2Nlc3MNCnRva2VuIHRvIGFj
Y2VzcyBwcm90ZWN0ZWQgcmVzb3VyY2VzIGZvciB0aGUgYmVuZWZpdCBvZiB0aGUgYXR0YWNrZXIu
DQpJbiB0aGUgRmFjZWJvb2sgdXNlIGNhc2UsIHRoZSBhdHRhY2tlciBpcyBsb2dnZWQgaW4gYXMg
dGhlIGxlZ2l0aW1hdGUNCnVzZXIuDQoNCj4gSSBkb27igJrDhMO0dCBrbm93IG11Y2ggYWJvdXQg
RkLigJrDhMO0cyBpbXBsZW1lbnRhdGlvbiBidXQgaWYgdGhleQ0KPiBhbGxvdyB0aGUgYXV0aG9y
aXphdGlvbiBjb2RlIHRvIGJlIHVzZWQgZm9yIGFueXRoaW5nIG90aGVyDQo+IHRoYW4gZXhjaGFu
Z2VkIGZvciBhbiBhY2Nlc3MgdG9rZW4gdXNpbmcgc2VjdXJlIGNsaWVudA0KPiBjcmVkZW50aWFs
cywgdGhlbiB0aGV5IGFyZSBub3QgaW1wbGVtZW50aW5nIHRoZSBwcm90b2NvbCBhcw0KPiBzcGVj
aWZpZWQuDQoNCkZhY2Vib29rIHVzZXMgdGhlIHByb3RvY29sIGNvcnJlY3RseSwgYnV0IHRoZSBl
eGFtcGxlcyBpbiB0aGUgRmFjZWJvb2sNCmRvY3VtZW50YXRpb24gdXNlIGh0dHAgcmF0aGVyIHRo
YW4gaHR0cHMgZm9yIHJlZGlyZWN0IFVSSXMsIHNvDQppbXBsZW1lbnRhdGlvbnMgdGhhdCBmb2xs
b3cgdGhlIGV4YW1wbGVzIHVzZSBodHRwIHJhdGhlciB0aGFuIGh0dHBzLg0KDQpGcmFuY2lzY28N
Cg0KDQoNCg0KDQpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
Xw0KT0F1dGggbWFpbGluZyBsaXN0DQpPQXV0aEBpZXRmLm9yZzxtYWlsdG86T0F1dGhAaWV0Zi5v
cmc+DQpodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL29hdXRoDQoNCg0KDQoN
Cg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCg0KT0F1
dGggbWFpbGluZyBsaXN0DQoNCk9BdXRoQGlldGYub3JnPG1haWx0bzpPQXV0aEBpZXRmLm9yZz4N
Cg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9vYXV0aA0KDQo=

--_000_90C41DD21FB7C64BB94121FBBC2E7234465643082EP3PW5EX1MB01E_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_90C41DD21FB7C64BB94121FBBC2E7234465643082EP3PW5EX1MB01E_--

From torsten@lodderstedt.net  Thu Mar 31 03:06:27 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 44A693A697A for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 03:06:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.248
X-Spam-Level: 
X-Spam-Status: No, score=-2.248 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fEpBD7vktFxg for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 03:06:26 -0700 (PDT)
Received: from smtprelay04.ispgateway.de (smtprelay04.ispgateway.de [80.67.31.38]) by core3.amsl.com (Postfix) with ESMTP id 271683A6919 for <oauth@ietf.org>; Thu, 31 Mar 2011 03:06:25 -0700 (PDT)
Received: from [130.129.66.195] by smtprelay04.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Q5EnL-00085L-K9; Thu, 31 Mar 2011 12:08:03 +0200
Message-ID: <4D945285.6000006@lodderstedt.net>
Date: Thu, 31 Mar 2011 12:08:05 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
Content-Type: text/plain; charset=ISO-8859-15; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Subject: [OAUTH-WG] Security Considerations Section Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 10:06:27 -0000

Hi all,

I just uploaded a proposal for the security section of the core spec to 
the IETF site 
(http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-securityconsiderations/). 


As posted on the list previously, our idea was first to derive a 
security consideration section for the core spec by cutting down 
http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/  to a 
reasonable size. We tried to go through the document and identify the 
pieces that should go into the spec in the informal OAuth security 
session here at IETF-80. Although we did not make it further than 4.1.3, 
the meeting turned out to be valuable since we agreed on certain 
principles we are expected to apply when producing the section:
- focus on service provider and application developers perspective (and 
the protocol implementation)
- document the "what" and not the "why" - for "why" include informative 
reference to security document
- explicitely state don'ts and explicitely define and distinguish three 
client categories (web, native, JavaScript)
For example we had a really lengthy discussion about native apps, client 
secrets and client authentication - bottom line: we just state 
"Authorization server MUST NOT issue client secrets to installed or 
JavaScript applications."

Moreover, we agreed to produce a security considerations section as 
concise as possible and as quickly as possible. There were objections in 
the room to "just" cut down our document. Instead the proposal was to 
start something new.

So the proposed text focus on the "WHAT" and references 
http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/ for a 
discussion of the "WHY".

Your feedback is appreciated.

regards,
Torsten.

From hannes.tschofenig@gmx.net  Thu Mar 31 05:16:20 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CFE983A6B0E for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 05:16:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.435
X-Spam-Level: 
X-Spam-Status: No, score=-102.435 tagged_above=-999 required=5 tests=[AWL=0.164, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id THp5nJtSIS6w for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 05:16:19 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.22]) by core3.amsl.com (Postfix) with SMTP id D8B8C3A6767 for <oauth@ietf.org>; Thu, 31 Mar 2011 05:16:18 -0700 (PDT)
Received: (qmail invoked by alias); 31 Mar 2011 12:17:57 -0000
Received: from dhcp-924f.meeting.ietf.org (EHLO dhcp-924f.meeting.ietf.org) [130.129.10.79] by mail.gmx.net (mp068) with SMTP; 31 Mar 2011 14:17:57 +0200
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1+M78pRGPGMK9Ghajjr/Lgl8KOfXK04OrFH+/uijS a0UVYuAc1G5/2r
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
In-Reply-To: <4D945285.6000006@lodderstedt.net>
Date: Thu, 31 Mar 2011 14:17:55 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <EE7B515F-93AF-41EB-9C90-1697ED0E5B98@gmx.net>
References: <4D945285.6000006@lodderstedt.net>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: Apple Mail (2.1084)
X-Y-GMX-Trusted: 0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Security Considerations Section Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 12:16:20 -0000

Hi all,=20

I am very happy that you got a proposal put together to quickly. Thanks =
for the good writeup!

A few comments below.=20

---------------

2.  Security Considerations



   Note: This section focuses on the security principles implementors of
   the protocol MUST consider.  These principles have been derived based
   on the comprehensive security analysis of the OAuth 2.0 protocol
   given in [
I-D.lodderstedt-oauth-security
].

I would write:=20

This section focuses on the security principles implementors of
 the protocol must consider.  We encourage readers to consult the=20
more detailed analysis with additional background information can
be found in [I-D.lodderstedt-oauth-security].

2.1.  Client Secrets



   Authorization servers can issue client secrets to web applications.
   Application developers MUST ensure confidentiality of client secrets.

   Authorization server MUST NOT issue client secrets to native or
   JavaScript applications. =20

[hannes] "... since these client secrets cannot be protected easily in =
these=20
environments."

Instead authorization servers MUST utilize

[hannes] I added the MUST here.=20

   other means than client authentication to achieve their security
   objectives.  Authorization servers can issue client secrets to native
   applications on a per installation base.

[hannes] I am not sure what you want to say with the last sentence given =
what you said in the earlier sentence.=20

   Authorization servers MUST NOT automatic repeat approvals for clients
   without secrets.

[hannes] Could you say why?=20

2.2.  Refresh Tokens



   Authorization servers may issue refresh tokens to web and native
   applications.

[hannes] I would say: "The OAuth protocol allows authorization servers=20=

may issue refresh tokens to web and native applications."

   Refresh tokens should only be accessible to the authorization server
   and the client the token has been issued to. =20


[hannes] why do you say "should"? Couldn't we say "MUST"?

The authorization
   server MUST maintain the link between a refresh token and the client
   it has been issued to.  This relation MUST be validated on every
   token refreshment request.

   Authorization server as well as application developers MUST ensure

[hannes] write:=20
"Authorization server operators as well as application developers MUST =
ensure"

   confidentiality of refresh tokens, on transit and storage.
   Authorization servers should implement means to detect abuse of
   refresh tokens.

[hannes] write : "It is RECOMMENDED for authorization server operators =
to enable means to detect abuse of
   refresh tokens."=20

On the other hand we could argue that authorization server operators are =
encouraged to monitor abuse in general; not only for refresh tokens.

   (what about revocation?)

[hannes] Ignore revocation because OAuth core does not consider =
revocation.=20


2.3.  Access Tokens



   Access tokens should only be accessible to the authorization server,
   the target resource servers and the client the token has been issued
   to.

[hannes] why should and not must?=20
(with the exception listed below)

  The only exception is the implicit grant where the user agent
   gets access to the access token that is transmitted in the URI
   fragment.

   Application developers MUST NOT store access tokens in non-transient
   memory.


2.4.  Token Scope



   Application developers should only acquire access tokens with the
   minimal scope they need in order to implement the respective
   application function.

[hannes] I would say that it is useful to talk about "It is strongly =
RECOMMENDED ....".=20

2.5.  Phishing attacks on redirect-based flows



   Application developers should, when possible, use external browsers
   instead of browsers embedded in the application for performing the
   end-user authorization process.

[hannes] again, recommended is more appropriate. I would also extend the =
sentence to say=20
a few words about the why.

   Authorization servers MUST ensure authenticity of the endpoint in
   order to prevent phishing attacks.

[hannes] I wonder whether this is the right way of phrasing it: What =
about=20
"To reduce the risk of phishing attacks authorization servers MUST =
provide their=20
identity to other entities."

  For example, they can utilize
   HTTPS server authentication for that purpose.  Moreover, service
   Providers should attempt to educate users about the risks phishing
   attacks pose, and should provide mechanisms that make it easy for
   Users to confirm the authenticity of their sites. e.g. extended
   validation certificates.

[hannes] s/Providers/providers
s/Users/users.=20

2.6.  Request confidentiality



   The following data MUST be transmitted over secure transport (such as
   TLS) only:

[hannes] What about The following security sensitive data elements MUST =
NOT transmitted in clear:=20
 access tokens, refresh tokens, resource owner passwords,
   authorization codes, and client secrets.


2.7.  Online Guessing Attacks



   Authorization servers MUST prevent guessing attacks on the following
   credentials: authorization codes, refresh tokens, resource owner
   passwords, and client secrets.

   When creating token handles or other secrets not intended for usage
   by human users, the authorization server MUST include a reasonable
   level of entropy in order to mitigate the risk of guessing attacks.


2.8.  Authorization code disclosure



   Confidentiality of authorization codes MUST be ensured on transport,
   even considering browser histories and HTTP referer headers.

   Authorization server as well as the client MUST ensure that
   authorization code transmission is protected by using transport-layer
   mechanisms such as TLS and that the duration of an authorization code
   is limited.

[hannes] Minor change:=20
"
   The authorization server and the client MUST ensure that the=20
   authorization code transmission is protected by using channel =
security,=20
   such as TLS, and that the lifetime of the authorization code
   is limited.
"

   For web applications, authorization servers MUST authenticate the
   client and validate that the authorization code had been issued to
   the same client.

   For native applications, authorization servers MUST enforce one time
   usage of the authorization code.  Moreover, if an Authorization
   Server observes multiple attempts to redeem an authorization code,
   the Authorization Server MAY want to revoke all tokens granted based
   on the authorization code.


2.9.  Session Fixation



   The session fixation attack leverages the authorization code flow in
   an attempt to get another user to log-in and authorize access on
   behalf of the attacker.  The victim, seeing only a normal request
   from an expected application, approves the request.  The attacker
   then uses the victim's authorization to gain access to the
   information unknowingly authorized by the victim.

   In order to prevent such an attack, authorization servers MUST ensure
   that the redirect_uri used in the authorization flow is the same as
   the redirect_uri used to exchange the respective authorization code
   into tokens.  Authorization servers SHOULD require clients to pre-
   register their redirect_uri's and validate the actual redirect_uri
   against the pre-registered value.

[hannes] I think that this is what you want to say:=20
"
The authorization server operators SHOULD require client application=20
developers  to pre-register their redirect_uri's and validate the actual=20=

redirect_uri against the pre-registered value.
"

2.10.  Malicious client obtains authorization



   A malicious client could impersonate a valid client and obtain an
   access authorization that way.

[hannes]=20
"
   A malicious client could impersonate as a valid client to obtain
   access to a protected resource.=20
"

   Assumption: It is not the task of the authorization server to protect
   the end-user's device from malicious software.  This is the
   responsibility of the platform running on the particular device
   probably in cooperation with other components of the respective
   ecosystem (e.g. an application management infrastructure).  The sole
   responsibility of the authorization server is to control access to
   the end-user's resources living in resource servers and to prevent
   unauthorized access to them.  Based on this assumption, the following
   countermeasures are recommended.

   If the impersonated client is a web application, the authorization
   server MUST authentication the client. =20

   [hannes] Write:=20

"
In case of a client running as web application, the authorization
   server MUST authentication the client. =20
"

The authorization server
   SHOULD require clients to pre-register their redirect_uri's and
   validate the actual redirect_uri against the pre-registered value.

   If the impersonated client is an native or JavaScript application,

[hannes] write:=20

"In case of a client running as a native or JavaScript application,"

   the authorization server MUST utilize other means to achieve its
   security objectives.  The authorization server may enforce explicit
   user authentication or ask the end-user for consent.  In this
   context, the user shall be explained the purpose, scope, and duration
   of the authorization.  The authorization server must make the metat-
   data available to the end-user it associates with the particular
   client.  It is up to the user to validate the binding of this data to
   the particular application (e.g.  Name) and to approve the
   authorization request.

[hannes] Do you want to use RFC 2119 language in the above paragraph?
What meta-data are you talking about?=20


   The authorization server MAY also limit the scope of tokens.

[hannes] Is MAY a bit weak here? In what cases would you say it is=20
highly recommended to limit the scope. Would't you always want to do =
that?=20

2.11.  Resource Owner Password Credentials



   The "Resource Owner Password Credentials" grant type is often used
   for legacy/migration reasons.  It has higher risk because it
   maintains the uid/password anti-pattern and the client could abuse
   the user id and password.  Additionally, because the user does not
   have control over the authorization process, clients using this grant
   type are not limited by scope, but instead have potentially the same
   capabilities as the user themselves.  The client could also acquire
   long-living tokens and pass them up to a attacker web service for
   further abuse.

   Authorization servers and application developers SHOULD minimize use
   of this grant types.  Other flows which facilitate user control and
   transparency should be used instead.

[hannes] This writeup essentially says "Please don't use it; it is =
completely insecure".=20




   The authorization server SHOULD generally restrict the scope of
   access tokens issued by this flow.

   The authorization server MUST ensure the resource owners control and
   transparency with respect to all authorizations issued to clients.


2.12.  Authenticity of endpoints



   Authorization servers MUST support validation of endpoint
   authenticity using HTTPS server authentication.

[hannes] write:=20

"
HTTPS with server-side authentication MUST be implemented and used by=20
authorization servers in all exchanges.
"


   Application developers MUST validate the authorization server
   endpoint's authenticity and ensure proper handling of CA certificates
   as well as certificate chain validation.

[hannes] I am not sure what you want. Do you want the human (as the =
application developer to verify something) or do you want the =
application developer to write code that does certificate checking. =
Then, you may also want to perform authorization.=20

---------------


Ciao
Hannes

On Mar 31, 2011, at 12:08 PM, Torsten Lodderstedt wrote:

> Hi all,
>=20
> I just uploaded a proposal for the security section of the core spec =
to the IETF site =
(http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-securityconsidera=
tions/).=20
>=20
> As posted on the list previously, our idea was first to derive a =
security consideration section for the core spec by cutting down =
http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/  to a =
reasonable size. We tried to go through the document and identify the =
pieces that should go into the spec in the informal OAuth security =
session here at IETF-80. Although we did not make it further than 4.1.3, =
the meeting turned out to be valuable since we agreed on certain =
principles we are expected to apply when producing the section:
> - focus on service provider and application developers perspective =
(and the protocol implementation)
> - document the "what" and not the "why" - for "why" include =
informative reference to security document
> - explicitely state don'ts and explicitely define and distinguish =
three client categories (web, native, JavaScript)
> For example we had a really lengthy discussion about native apps, =
client secrets and client authentication - bottom line: we just state =
"Authorization server MUST NOT issue client secrets to installed or =
JavaScript applications."
>=20
> Moreover, we agreed to produce a security considerations section as =
concise as possible and as quickly as possible. There were objections in =
the room to "just" cut down our document. Instead the proposal was to =
start something new.
>=20
> So the proposed text focus on the "WHAT" and references =
http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/ for a =
discussion of the "WHY".
>=20
> Your feedback is appreciated.
>=20
> regards,
> Torsten.


From hannes.tschofenig@gmx.net  Thu Mar 31 05:45:24 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A1B2B3A6B13 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 05:45:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.337
X-Spam-Level: 
X-Spam-Status: No, score=-101.337 tagged_above=-999 required=5 tests=[AWL=-0.957, BAYES_00=-2.599, TVD_SPACE_RATIO=2.219, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D0OJvndFHgog for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 05:45:24 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.22]) by core3.amsl.com (Postfix) with SMTP id BEB7E3A6B12 for <oauth@ietf.org>; Thu, 31 Mar 2011 05:45:23 -0700 (PDT)
Received: (qmail invoked by alias); 31 Mar 2011 12:47:02 -0000
Received: from dhcp-924f.meeting.ietf.org (EHLO dhcp-924f.meeting.ietf.org) [130.129.10.79] by mail.gmx.net (mp050) with SMTP; 31 Mar 2011 14:47:02 +0200
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1+gaJRd3T6gBA5qlp5DxhsTRinaR7SMY7mw3YzwHi dc+2j9sml/fpSO
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain
Content-Transfer-Encoding: 7bit
Date: Thu, 31 Mar 2011 14:47:00 +0200
Message-Id: <A3087459-E0D2-4F8B-B4C2-4E4AB87A73D1@gmx.net>
To: OAuth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1084)
X-Mailer: Apple Mail (2.1084)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] Presentation slides, please!
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 12:45:24 -0000


From prateek.mishra@oracle.com  Thu Mar 31 06:02:04 2011
Return-Path: <prateek.mishra@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D62F928C168 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 06:02:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZLm2R6YwU5jJ for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 06:02:02 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 0F14B3A6B12 for <oauth@ietf.org>; Thu, 31 Mar 2011 06:02:02 -0700 (PDT)
Received: from rcsinet13.oracle.com (rcsinet13.oracle.com [148.87.113.125]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2VD3Z8h026255 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 31 Mar 2011 13:03:36 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by rcsinet13.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2VD3Xag023384 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 31 Mar 2011 13:03:34 GMT
Received: from abhmt020.oracle.com (abhmt020.oracle.com [141.146.116.29]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2VD3X37017797; Thu, 31 Mar 2011 08:03:33 -0500
Received: from [10.154.6.60] (/10.154.6.60) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 31 Mar 2011 06:03:32 -0700
Message-ID: <4D947BA4.6080502@oracle.com>
Date: Thu, 31 Mar 2011 09:03:32 -0400
From: Prateek Mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <90C41DD21FB7C64BB94121FBBC2E72344656430523@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<92655.18400.qm@web55806.mail.re3.yahoo.com>	<90C41DD21FB7C64BB94121FBBC2E72344656430603@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<393421E2-C734-48D9-B0D1-A94FC3C1BDC7@oracle.com>	<948E6CDC-BEF2-4078-B5EE-B89983B35874@salesforce.com>	<90C41DD21FB7C64BB94121FBBC2E72344656430604@P3PW5EX1MB01.EX1.SECURESERVER.NET>	<4D93694D.70200@aol.com> <90C41DD21FB7C64BB94121FBBC2E7234465643082E@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465643082E@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: multipart/alternative; boundary="------------080306040203040802030902"
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090205.4D947BA7.006E:SCFSTAT5015188,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 13:02:04 -0000

This is a multi-part message in MIME format.
--------------080306040203040802030902
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

I would like to strongly disagree with this proposal.

It amounts to explicitly making OAuth 2.0 insecure so as to satisfy some 
mysterious and unspecified set of legacy OAuth 1.0 deployments.

The SAML web SSO (artifact) profile - which shares many characteristics 
with the initial steps in OAuth - requires precisely such a 
counter-measure and is widely implemented
in 1000s of deployments.

It is irrelevant that clients, authorization servers or resource servers 
might indulge in poor secuirty practices outside of OAuth 2.0.
It is specious and inappropriate to reference such behavior when 
discussing the security properties of OAuth; instead
our task is to ensure that the OAuth 2.0 does not include well-known 
security defects of precisely this type.

- prateek


> After much reflection and review of the big picture (OAuth 1.0 
> deployment included), I have come to the conclusion that this is a 
> valid security concern which should be explained in the security 
> consideration section, but which does not merit a requirement to use 
> TLS on the client side.
>
>  
>
> I am now opposed to specifying a MUST use TLS with the callback URI 
> deployed by the client.
>
>  
>
> We should change section 2.1 as follows:
>
>  
>
>    Since requests to the authorization endpoint result in user 
> authentication
>
>    and the transmission of clear-text credentials (in the HTTP 
> response), the
>
>    authorization server MUST require the use of a transport-layer
>
>    security mechanism when sending requests to the token endpoints.  The
>
>    authorization server MUST support TLS 1.2 as defined in [RFC5246 
> <http://tools.ietf.org/html/rfc5246>],
>
>    and MAY support additional transport-layer mechanisms meeting its
>
>    security requirements.
>
>  
>
> This is the only normative change we should make.
>
>  
>
> My reason for rejecting the requirement to use TLS on the client side 
> is that it is a misleading and narrowly focused guideline. If the 
> client deploys an HTTPS redirection URI endpoint, only to then set an 
> insecure cookie for session management, the same attack is still 
> possible. IOW, if the client allows **any** kind of insecure 
> authentication, OAuth or not, this exploit can put protected resources 
> at risk.
>
>  
>
> The only meaningful - but completely out of scope â€“ requirement to 
> make is that any client using OAuth MUST only support secure 
> authentication of any kind using any protocol (OAuth, cookies, Basic). 
> This translates into full HTTPS deployment for client applications, 
> something that is a growing trend but far from industry standard.
>
>  
>
> So while this is a valid concern, forcing the client to deploy TLS for 
> the OAuth endpoint is an over-reaction and insufficient at that.
>
>  
>
> EHL
>
>  
>
>  
>
> *From:* George Fletcher [mailto:gffletch@aol.com]
> *Sent:* Wednesday, March 30, 2011 10:33 AM
> *To:* Eran Hammer-Lahav
> *Cc:* Chuck Mortimore; Phillip Hunt; Karen P. Lewison; OAuth WG
> *Subject:* Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
>  
>
> From a deployment perspective... I'm considering allowing HTTP 
> redirect_uri (for development only) but making the UI very obnoxious 
> (e.g. bright red background, warnings etc) such that no real user 
> would click through, but a developer will ignore. It also forces them 
> to switch to TLS for production. Thoughts?
>
> Also, as long as the authorization code is one-time-use, the passive 
> attack doesn't work. It has to be MITM. Is there any reason 
> authorization codes shouldn't be short-lived and one-time-use?
>
> Thanks,
> George
>
> On 3/30/11 2:34 AM, Eran Hammer-Lahav wrote:
>
> Iâ€™ve been doing this longer. Requiring TLS on the redirection endpoint 
> is a big change for OAuth deployments. This would have been 
> unthinkable for OAuth 1.0(a). One of the main goals of 2.0 was to make 
> it much easier for client developers. I donâ€™t think deploying HTTPS as 
> a prerequisite for playing with an OAuth endpoint is trivial for most 
> client developers.
>
>  
>
> When we had the same debate over bearer token and TLS, many people 
> argued to keep it SHOULD, but no one said they will actually deploy it 
> without TLS. That was a very useful data point. We should take a 
> moment to find out what existing OAuth providers have to say about this.
>
>  
>
> To clarify â€“ I am not objecting to making this a MUST. But I am 
> objecting and will delay this change until we gather more information 
> from actual deployments. Since this applies to OAuth 1.0, it would be 
> very relevant to ask existing providers if they will try and enforce 
> such a restriction for 1.0 as well.
>
>  
>
> Specifications written in a bubble usually fail outright or fail to 
> reflect reality.
>
>  
>
> Also, the attacks are different for the authorization code and 
> implicit grant types. Each can benefit from using TLS for the 
> redirection endpoint in different ways (one transmission of code from 
> user-agent to client, the other manipulation of scripts from client to 
> user-agent). Just want to make sure we donâ€™t just focus on one vector.
>
>  
>
> EHL
>
>  
>
>  
>
> *From:* Chuck Mortimore [mailto:cmortimore@salesforce.com]
> *Sent:* Tuesday, March 29, 2011 11:19 PM
> *To:* Phillip Hunt
> *Cc:* Eran Hammer-Lahav; Karen P. Lewison; OAuth WG
> *Subject:* Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
>  
>
> +1 
>
>  
>
> I disagree that to use TLS is a big change.  Rather I'd categorize 
> using TLS as a big inconvenience.  
>
>  
>
> We should define a secure profile.  If individual deployments choose 
> to relax the spec and determine HTTP acceptable for local host or 
> other convenience thats fine, but it shouldn't be compliant.  
>
>
> - cmort
>
>
> On Mar 29, 2011, at 10:55 PM, "Phillip Hunt" <phil.hunt@oracle.com 
> <mailto:phil.hunt@oracle.com>> wrote:
>
>     Why can't TLS be a must except when the token cannot be exposed.
>     Eg because the redirect is local? 
>
>      
>
>     Phil
>
>      
>
>     Sent from my phone. 
>
>
>     On 2011-03-29, at 22:48, Eran Hammer-Lahav <eran@hueniverse.com
>     <mailto:eran@hueniverse.com>> wrote:
>
>         Francisco â€“ thanks for being persistent.
>
>          
>
>         Sounds like the same problem exists in OAuth 1.0. Basically,
>         the only way the client knows that the same user who granted
>         authorization is the one coming back, is via the authorization
>         code. Anyone who has that code is basically assumed to be the
>         one granting access. If the code is intercepted, whoever gets
>         it can pretend to be its legitimate holder.
>
>          
>
>         I agree this is an issue.
>
>          
>
>         Requiring callbacks to use TLS is a big change.
>
>          
>
>         There are some cases where it is not needed â€“ namely, when the
>         client uses the access token obtained through this transaction
>         to do something on the backend without actually exposing
>         anything to the user who delivered the authorization code. For
>         example, an application scanning your Twitter account in the
>         background, sending you emails when someone is no longer
>         following you. Such a client does not need TLS because the
>         authorization code represents a valid grant, and the MITM
>         doesnâ€™t get any benefit from hijacking the callback. No data
>         is exposed.
>
>          
>
>         However, this is not the typical use case.
>
>          
>
>         As long as the security considerations are clearly stated, we
>         can move forward with either a MUST or a SHOULD. We can easily
>         exempts any internal callbacks from this requirement
>         (localhost, application scheme handler, etc.).
>
>         I donâ€™t want to write a specification that everyone knowingly
>         ignores. Once people ignore one security requirement, whatâ€™s
>         to stop them from ignoring others. So the most important input
>         to this discussion is what the vendors are going to do
>         (regardless of what the document says)?
>
>          
>
>         EHL
>
>          
>
>          
>
>         *From:* Francisco Corella [mailto:fcorella@pomcor.com]
>         *Sent:* Tuesday, March 29, 2011 3:40 PM
>         *To:* Phil Hunt; Justin Richer; Eran Hammer-Lahav
>         *Cc:* OAuth WG; Karen P. Lewison; Paul Tarjan (pt@fb.com
>         <mailto:pt@fb.com>)
>         *Subject:* RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
>          
>
>         > Isnâ€™t all this just different flavors of a session fixation
>         attacks?
>         > The client should use cookies and the state parameter to
>         ensure the
>         > same user-agent it redirected to the authorization server is
>         the one
>         > coming back.
>
>         It's not a session fixation attack.  It's just an interception
>         of a
>         credential.  The authorization code is a credential that provides
>         access to the protected resources.  If the attacker can get
>         it, the
>         attacker can get the protected resources (using the client as an
>         agent, so to speak).
>
>         A cookie won't help, since it would be sent from the browser
>         to the client
>         along with the authorization code.  If the attacker can observe or
>         intercept the authorization code, the attacker and observe or
>         intercept the cookie.
>
>         Francisco
>
>         --- On *Tue, 3/29/11, Eran Hammer-Lahav /<eran@hueniverse.com
>         <mailto:eran@hueniverse.com>>/* wrote:
>
>
>         From: Eran Hammer-Lahav <eran@hueniverse.com
>         <mailto:eran@hueniverse.com>>
>         Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>         To: "fcorella@pomcor.com <mailto:fcorella@pomcor.com>"
>         <fcorella@pomcor.com <mailto:fcorella@pomcor.com>>, "Phil
>         Hunt" <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>>,
>         "Justin Richer" <jricher@mitre.org <mailto:jricher@mitre.org>>
>         Cc: "OAuth WG" <oauth@ietf.org <mailto:oauth@ietf.org>>,
>         "Karen P. Lewison" <kplewison@pomcor.com
>         <mailto:kplewison@pomcor.com>>, "Paul Tarjan (pt@fb.com
>         <mailto:pt@fb.com>)" <pt@fb.com <mailto:pt@fb.com>>
>         Date: Tuesday, March 29, 2011, 7:50 PM
>
>         Isnâ€™t all this just different flavors of a session fixation
>         attacks? The client should use cookies and the state parameter
>         to ensure the same user-agent it redirected to the
>         authorization server is the one coming back.
>
>          
>
>         EHL
>
>          
>
>         *From:* Francisco Corella [mailto:fcorella@pomcor.com]
>         *Sent:* Tuesday, March 29, 2011 11:46 AM
>         *To:* Phil Hunt; Justin Richer; Eran Hammer-Lahav
>         *Cc:* OAuth WG; Karen P. Lewison; Paul Tarjan (pt@fb.com
>         <mailto:pt@fb.com>)
>         *Subject:* RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>
>          
>
>         > Can you explain how intercepting the authorization code
>         > without having access to the client credentials is a
>         > problem? For the sake of discussion, assume that the client
>         > has valid and secure credentials that an attacker cannot
>         > access. Also assume that the client has implemented some
>         > form of cross-site protection.
>
>         One way: man-in-the-middle attack.  The traffic between the
>         legitimate
>         user's browser and the client goes through the attacker's machine
>         (easy to set up with a rogue WiFi access point).  The user's
>         browser
>         sends an http request to the client, targeting the redirect
>         URI.  The
>         attacker's machine doesn't let that request go through.  The
>         attacker
>         then sends the same identical request from the attacker's own
>         browser.
>         When the client receives the request, it has no way to tell
>         that it is
>         coming from the attacker's browser rather than from the user's
>         browser.  The client exchanges the authorization code for an
>         access
>         token, uses the access token to obtain protected resources
>         belonging
>         to the user, and delivers those resources to the attacker's
>         browser.
>         (Or manipulates those resources as directed by the attacker's
>         browser.)  In the Facebook use case, the client logs the user
>         in upon
>         verifying that the authorization code is valid by exchanging it
>         successfully for an access token.
>
>         Another way (passive attack): The attacker observes the
>         request from
>         the user's browser to the client.  The attacker does not stop the
>         request.  The client receives the request with the
>         authorization code
>         and exchanges the authorization code for the access token. 
>         Now the
>         attacker sends the same request from the attacker's own
>         browser.  The
>         client receives the second request and exchanges the authorization
>         code for another access token.  Upon receiving the second
>         request for
>         the same authorization code, the authorization server revokes the
>         first access token, as suggested in section 4.1.2 of the
>         specification: "If an authorization code is used more than
>         once, the
>         auhorization server MAY revoke all tokens previously issued
>         based on
>         that authorization code".  The client then uses the second access
>         token to access protected resources for the benefit of the
>         attacker.
>         In the Facebook use case, the attacker is logged in as the
>         legitimate
>         user.
>
>         > I donâ€šÃ„Ã´t know much about FBâ€šÃ„Ã´s implementation but if they
>         > allow the authorization code to be used for anything other
>         > than exchanged for an access token using secure client
>         > credentials, then they are not implementing the protocol as
>         > specified.
>
>         Facebook uses the protocol correctly, but the examples in the
>         Facebook
>         documentation use http rather than https for redirect URIs, so
>         implementations that follow the examples use http rather than
>         https.
>
>         Francisco
>
>          
>
>          
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>  
>  
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth
>
>  
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>   

--------------080306040203040802030902
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 8bit

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
  <meta content="text/html;charset=UTF-8" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
I would like to strongly disagree with this proposal. <br>
<br>
It amounts to explicitly making OAuth 2.0 insecure so as to satisfy
some mysterious and unspecified set of legacy OAuth 1.0 deployments.<br>
<br>
The SAML web SSO (artifact) profile - which shares many characteristics
with the initial steps in OAuth - requires precisely such a
counter-measure and is widely implemented<br>
in 1000s of deployments.<br>
<br>
It is irrelevant that clients, authorization servers or resource
servers might indulge in poor secuirty practices outside of OAuth 2.0. <br>
It is specious and inappropriate to reference such behavior when
discussing the security properties of OAuth; instead<br>
our task is to ensure that the OAuth 2.0 does not include well-known
security defects of precisely this type. <br>
<br>
- prateek<br>
<br>
<br>
<blockquote
 cite="mid:90C41DD21FB7C64BB94121FBBC2E7234465643082E@P3PW5EX1MB01.EX1.SECURESERVER.NET"
 type="cite">
  <meta http-equiv="Content-Type" content="text/html; ">
  <meta name="Generator" content="Microsoft Word 14 (filtered medium)">
  <style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";
	color:black;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
p.yiv1552031577msonormal, li.yiv1552031577msonormal, div.yiv1552031577msonormal
	{mso-style-name:yiv1552031577msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
  <div class="WordSection1">
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">After
much reflection and review of the big picture (OAuth 1.0 deployment
included), I have come to the conclusion that this is a valid security
concern which should be explained in the security consideration
section, but which does not merit a requirement to use TLS on the
client side.<o:p></o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);"><o:p>Â </o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">I
am now opposed to specifying a MUST use TLS with the callback URI
deployed by the client.<o:p></o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);"><o:p>Â </o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">We
should change section 2.1 as follows:<o:p></o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);"><o:p>Â </o:p></span></p>
  <p class="MsoNormal" style="page-break-before: always;"><span
 style="font-family: &quot;Courier New&quot;;">Â Â  Since requests to the
authorization endpoint result in user authentication<o:p></o:p></span></p>
  <p class="MsoNormal" style="page-break-before: always;"><span
 style="font-family: &quot;Courier New&quot;;">Â Â  and the transmission of
clear-text credentials (in the HTTP response), the<o:p></o:p></span></p>
  <p class="MsoNormal" style="page-break-before: always;"><span
 style="font-family: &quot;Courier New&quot;;">Â Â  authorization server MUST
require the use of a transport-layer<o:p></o:p></span></p>
  <p class="MsoNormal" style="page-break-before: always;"><span
 style="font-family: &quot;Courier New&quot;;">Â Â  security mechanism when sending
requests to the token endpoints.Â  The<o:p></o:p></span></p>
  <p class="MsoNormal" style="page-break-before: always;"><span
 style="font-family: &quot;Courier New&quot;;">Â Â  authorization server MUST
support TLS 1.2 as defined in [<a moz-do-not-send="true"
 href="http://tools.ietf.org/html/rfc5246"
 title="&quot;The Transport Layer Security (TLS) Protocol Version 1.2&quot;">RFC5246</a>],<o:p></o:p></span></p>
  <p class="MsoNormal" style="page-break-before: always;"><span
 style="font-family: &quot;Courier New&quot;;">Â Â  and MAY support additional
transport-layer mechanisms meeting its<o:p></o:p></span></p>
  <p class="MsoNormal" style="page-break-before: always;"><span
 style="font-family: &quot;Courier New&quot;;">Â Â  security requirements.<o:p></o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);"><o:p>Â </o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">This
is the only normative change we should make.<o:p></o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);"><o:p>Â </o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">My
reason for rejecting the requirement to use TLS on the client side is
that it is a misleading and narrowly focused guideline. If the client
deploys an HTTPS redirection URI endpoint, only to then set an insecure
cookie for session management, the same attack is still possible. IOW,
if the client allows *<b>any</b>* kind of insecure authentication,
OAuth or not, this exploit can put protected resources at risk.<o:p></o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);"><o:p>Â </o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">The
only meaningful - but completely out of scope â€“ requirement to make is
that any client using OAuth MUST only support secure authentication of
any kind using any protocol (OAuth, cookies, Basic). This translates
into full HTTPS deployment for client applications, something that is a
growing trend but far from industry standard.<o:p></o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);"><o:p>Â </o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">So
while this is a valid concern, forcing the client to deploy TLS for the
OAuth endpoint is an over-reaction and insufficient at that.<o:p></o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);"><o:p>Â </o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">EHL<o:p></o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);"><o:p>Â </o:p></span></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);"><o:p>Â </o:p></span></p>
  <div
 style="border-style: none none none solid; border-color: -moz-use-text-color -moz-use-text-color -moz-use-text-color blue; border-width: medium medium medium 1.5pt; padding: 0in 0in 0in 4pt;">
  <div>
  <div
 style="border-style: solid none none; border-color: rgb(181, 196, 223) -moz-use-text-color -moz-use-text-color; border-width: 1pt medium medium; padding: 3pt 0in 0in;">
  <p class="MsoNormal"><b><span
 style="font-size: 10pt; font-family: &quot;Tahoma&quot;,&quot;sans-serif&quot;; color: windowtext;">From:</span></b><span
 style="font-size: 10pt; font-family: &quot;Tahoma&quot;,&quot;sans-serif&quot;; color: windowtext;">
George Fletcher [<a class="moz-txt-link-freetext" href="mailto:gffletch@aol.com">mailto:gffletch@aol.com</a>] <br>
  <b>Sent:</b> Wednesday, March 30, 2011 10:33 AM<br>
  <b>To:</b> Eran Hammer-Lahav<br>
  <b>Cc:</b> Chuck Mortimore; Phillip Hunt; Karen P. Lewison; OAuth WG<br>
  <b>Subject:</b> Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<o:p></o:p></span></p>
  </div>
  </div>
  <p class="MsoNormal"><o:p>Â </o:p></p>
  <p class="MsoNormal"><span
 style="font-family: &quot;Helvetica&quot;,&quot;sans-serif&quot;;">From a deployment
perspective... I'm considering allowing HTTP redirect_uri (for
development only) but making the UI very obnoxious (e.g. bright red
background, warnings etc) such that no real user would click through,
but a developer will ignore. It also forces them to switch to TLS for
production. Thoughts?<br>
  <br>
Also, as long as the authorization code is one-time-use, the passive
attack doesn't work. It has to be MITM. Is there any reason
authorization codes shouldn't be short-lived and one-time-use?<br>
  <br>
Thanks,<br>
George</span><br>
  <br>
On 3/30/11 2:34 AM, Eran Hammer-Lahav wrote: <o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">Iâ€™ve
been doing this longer. Requiring TLS on the redirection endpoint is a
big change for OAuth deployments. This would have been unthinkable for
OAuth 1.0(a). One of the main goals of 2.0 was to make it much easier
for client developers. I donâ€™t think deploying HTTPS as a prerequisite
for playing with an OAuth endpoint is trivial for most client
developers.</span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">When we
had the same debate over bearer token and TLS, many people argued to
keep it SHOULD, but no one said they will actually deploy it without
TLS. That was a very useful data point. We should take a moment to find
out what existing OAuth providers have to say about this. </span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">To
clarify â€“ I am not objecting to making this a MUST. But I am objecting
and will delay this change until we gather more information from actual
deployments. Since this applies to OAuth 1.0, it would be very relevant
to ask existing providers if they will try and enforce such a
restriction for 1.0 as well.</span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">Specifications
written in a bubble usually fail outright or fail to reflect reality.</span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">Also,
the attacks are different for the authorization code and implicit grant
types. Each can benefit from using TLS for the redirection endpoint in
different ways (one transmission of code from user-agent to client, the
other manipulation of scripts from client to user-agent). Just want to
make sure we donâ€™t just focus on one vector.</span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">EHL</span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
  <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
  <div
 style="border-style: none none none solid; border-color: -moz-use-text-color -moz-use-text-color -moz-use-text-color blue; border-width: medium medium medium 1.5pt; padding: 0in 0in 0in 4pt;">
  <div>
  <div
 style="border-style: solid none none; border-color: -moz-use-text-color; border-width: 1pt medium medium; padding: 3pt 0in 0in;">
  <p class="MsoNormal"><b><span
 style="font-size: 10pt; font-family: &quot;Tahoma&quot;,&quot;sans-serif&quot;;">From:</span></b><span
 style="font-size: 10pt; font-family: &quot;Tahoma&quot;,&quot;sans-serif&quot;;"> Chuck
Mortimore [<a moz-do-not-send="true"
 href="mailto:cmortimore@salesforce.com">mailto:cmortimore@salesforce.com</a>]
  <br>
  <b>Sent:</b> Tuesday, March 29, 2011 11:19 PM<br>
  <b>To:</b> Phillip Hunt<br>
  <b>Cc:</b> Eran Hammer-Lahav; Karen P. Lewison; OAuth WG<br>
  <b>Subject:</b> Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt</span><o:p></o:p></p>
  </div>
  </div>
  <p class="MsoNormal">Â <o:p></o:p></p>
  <div>
  <p class="MsoNormal">+1Â <o:p></o:p></p>
  </div>
  <div>
  <p class="MsoNormal">Â <o:p></o:p></p>
  </div>
  <div>
  <p class="MsoNormal">I disagree that to use TLS is a big change.
Â Rather I'd categorize using TLS as a big inconvenience. Â <o:p></o:p></p>
  </div>
  <div>
  <p class="MsoNormal">Â <o:p></o:p></p>
  </div>
  <div>
  <p class="MsoNormal">We should define a secure profile. Â If
individual deployments choose to relax the spec and determine HTTP
acceptable for local host or other convenience thats fine, but it
shouldn't be compliant. Â <o:p></o:p></p>
  </div>
  <div>
  <p class="MsoNormal"><br>
- cmort<o:p></o:p></p>
  </div>
  <div>
  <p class="MsoNormal" style="margin-bottom: 12pt;"><br>
On Mar 29, 2011, at 10:55 PM, "Phillip Hunt" &lt;<a
 moz-do-not-send="true" href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;
wrote:<o:p></o:p></p>
  </div>
  <blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
    <div>
    <div>
    <p class="MsoNormal">Why can't TLS be a must except when the token
cannot be exposed. Eg because the redirect is local?Â <o:p></o:p></p>
    </div>
    <div>
    <p class="MsoNormal">Â <o:p></o:p></p>
    </div>
    <div>
    <p class="MsoNormal">Phil<o:p></o:p></p>
    <div>
    <p class="MsoNormal">Â <o:p></o:p></p>
    </div>
    <div>
    <p class="MsoNormal">Sent from my phone.Â <o:p></o:p></p>
    </div>
    </div>
    <div>
    <p class="MsoNormal" style="margin-bottom: 12pt;"><br>
On 2011-03-29, at 22:48, Eran Hammer-Lahav &lt;<a moz-do-not-send="true"
 href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt; wrote:<o:p></o:p></p>
    </div>
    <blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
      <div>
      <div>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Francisco
â€“ thanks for being persistent.</span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Sounds
like the same problem exists in OAuth 1.0. Basically, the only way the
client knows that the same user who granted authorization is the one
coming back, is via the authorization code. Anyone who has that code is
basically assumed to be the one granting access. If the code is
intercepted, whoever gets it can pretend to be its legitimate holder.</span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">I
agree this is an issue.</span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Requiring
callbacks to use TLS is a big change.</span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">There
are some cases where it is not needed â€“ namely, when the client uses
the access token obtained through this transaction to do something on
the backend without actually exposing anything to the user who
delivered the authorization code. For example, an application scanning
your Twitter account in the background, sending you emails when someone
is no longer following you. Such a client does not need TLS because the
authorization code represents a valid grant, and the MITM doesnâ€™t get
any benefit from hijacking the callback. No data is exposed.</span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">However,
this is not the typical use case.</span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">As
long as the security considerations are clearly stated, we can move
forward with either a MUST or a SHOULD. We can easily exempts any
internal callbacks from this requirement (localhost, application scheme
handler, etc.).</span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">I
donâ€™t want to write a specification that everyone knowingly ignores.
Once people ignore one security requirement, whatâ€™s to stop them from
ignoring others. So the most important input to this discussion is what
the vendors are going to do (regardless of what the document says)?</span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">EHL</span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
      <p class="MsoNormal"><span
 style="font-size: 11pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
      <div
 style="border-style: none none none solid; border-color: -moz-use-text-color -moz-use-text-color -moz-use-text-color blue; border-width: medium medium medium 1.5pt; padding: 0in 0in 0in 4pt;">
      <div>
      <div
 style="border-style: solid none none; border-color: rgb(181, 196, 223) -moz-use-text-color -moz-use-text-color; border-width: 1pt medium medium; padding: 3pt 0in 0in;">
      <p class="MsoNormal"><b><span
 style="font-size: 10pt; font-family: &quot;Tahoma&quot;,&quot;sans-serif&quot;;">From:</span></b><span
 style="font-size: 10pt; font-family: &quot;Tahoma&quot;,&quot;sans-serif&quot;;">
Francisco Corella [<a moz-do-not-send="true"
 href="mailto:fcorella@pomcor.com">mailto:fcorella@pomcor.com</a>] <br>
      <b>Sent:</b> Tuesday, March 29, 2011 3:40 PM<br>
      <b>To:</b> Phil Hunt; Justin Richer; Eran Hammer-Lahav<br>
      <b>Cc:</b> OAuth WG; Karen P. Lewison; Paul Tarjan (<a
 moz-do-not-send="true" href="mailto:pt@fb.com">pt@fb.com</a>)<br>
      <b>Subject:</b> RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt</span><o:p></o:p></p>
      </div>
      </div>
      <p class="MsoNormal">Â <o:p></o:p></p>
      <table class="MsoNormalTable" border="0" cellpadding="0"
 cellspacing="0">
        <tbody>
          <tr>
            <td style="padding: 0in;" valign="top">
            <p class="MsoNormal">&gt; Isnâ€™t all this just different
flavors of a session fixation attacks?<br>
&gt; The client should use cookies and the state parameter to ensure the<br>
&gt; same user-agent it redirected to the authorization server is the
one<br>
&gt; coming back.<br>
            <br>
It's not a session fixation attack.Â  It's just an interception of a<br>
credential.Â  The authorization code is a credential that provides<br>
access to the protected resources.Â  If the attacker can get it, the<br>
attacker can get the protected resources (using the client as an<br>
agent, so to speak).<br>
            <br>
A cookie won't help, since it would be sent from the browser to the
client<br>
along with the authorization code.Â  If the attacker can observe or<br>
intercept the authorization code, the attacker and observe or<br>
intercept the cookie.<br>
            <br>
Francisco<br>
            <br>
--- On <b>Tue, 3/29/11, Eran Hammer-Lahav <i>&lt;<a
 moz-do-not-send="true" href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;</i></b>
wrote:<o:p></o:p></p>
            <p class="MsoNormal" style="margin-bottom: 12pt;"><br>
From: Eran Hammer-Lahav &lt;<a moz-do-not-send="true"
 href="mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;<br>
Subject: RE: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<br>
To: "<a moz-do-not-send="true" href="mailto:fcorella@pomcor.com">fcorella@pomcor.com</a>"
&lt;<a moz-do-not-send="true" href="mailto:fcorella@pomcor.com">fcorella@pomcor.com</a>&gt;,
"Phil Hunt" &lt;<a moz-do-not-send="true"
 href="mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a>&gt;,
"Justin Richer" &lt;<a moz-do-not-send="true"
 href="mailto:jricher@mitre.org">jricher@mitre.org</a>&gt;<br>
Cc: "OAuth WG" &lt;<a moz-do-not-send="true"
 href="mailto:oauth@ietf.org">oauth@ietf.org</a>&gt;, "Karen P.
Lewison" &lt;<a moz-do-not-send="true"
 href="mailto:kplewison@pomcor.com">kplewison@pomcor.com</a>&gt;, "Paul
Tarjan (<a moz-do-not-send="true" href="mailto:pt@fb.com">pt@fb.com</a>)"
&lt;<a moz-do-not-send="true" href="mailto:pt@fb.com">pt@fb.com</a>&gt;<br>
Date: Tuesday, March 29, 2011, 7:50 PM<o:p></o:p></p>
            <div id="yiv1552031577">
            <div>
            <p class="yiv1552031577msonormal"><span
 style="font-size: 11pt; font-family: &quot;Arial&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Isnâ€™t
all this just different flavors of a session fixation attacks? The
client should use cookies and the state parameter to ensure the same
user-agent it redirected to the authorization server is the one coming
back.</span><o:p></o:p></p>
            <p class="yiv1552031577msonormal"><span
 style="font-size: 11pt; font-family: &quot;Arial&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
            <p class="yiv1552031577msonormal"><span
 style="font-size: 11pt; font-family: &quot;Arial&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">EHL</span><o:p></o:p></p>
            <p class="yiv1552031577msonormal"><span
 style="font-size: 11pt; font-family: &quot;Arial&quot;,&quot;sans-serif&quot;; color: rgb(31, 73, 125);">Â </span><o:p></o:p></p>
            <div
 style="border-style: none none none solid; border-color: -moz-use-text-color -moz-use-text-color -moz-use-text-color blue; border-width: medium medium medium 1.5pt; padding: 0in 0in 0in 4pt;">
            <div>
            <div
 style="border-style: solid none none; border-color: -moz-use-text-color; border-width: 1pt medium medium; padding: 3pt 0in 0in;">
            <p class="yiv1552031577msonormal"><b><span
 style="font-size: 10pt; font-family: &quot;Arial&quot;,&quot;sans-serif&quot;;">From:</span></b><span
 style="font-size: 10pt; font-family: &quot;Arial&quot;,&quot;sans-serif&quot;;"> Francisco
Corella [<a moz-do-not-send="true" href="mailto:fcorella@pomcor.com">mailto:fcorella@pomcor.com</a>]
            <br>
            <b>Sent:</b> Tuesday, March 29, 2011 11:46 AM<br>
            <b>To:</b> Phil Hunt; Justin Richer; Eran Hammer-Lahav<br>
            <b>Cc:</b> OAuth WG; Karen P. Lewison; Paul Tarjan (<a
 moz-do-not-send="true" href="mailto:pt@fb.com">pt@fb.com</a>)<br>
            <b>Subject:</b> RE: [OAUTH-WG] WGLC on
draft-ietf-oauth-v2-13.txt</span><o:p></o:p></p>
            </div>
            </div>
            <p class="yiv1552031577msonormal">Â <o:p></o:p></p>
            <table class="MsoNormalTable" border="0" cellpadding="0"
 cellspacing="0">
              <tbody>
                <tr>
                  <td style="padding: 0in;" valign="top">
                  <p class="yiv1552031577msonormal"
 style="margin-bottom: 12pt;">&gt; Can you explain how intercepting the
authorization code<br>
&gt; without having access to the client credentials is a<br>
&gt; problem? For the sake of discussion, assume that the client<br>
&gt; has valid and secure credentials that an attacker cannot<br>
&gt; access. Also assume that the client has implemented some<br>
&gt; form of cross-site protection.<br>
                  <br>
One way: man-in-the-middle attack.Â  The traffic between the legitimate<br>
user's browser and the client goes through the attacker's machine<br>
(easy to set up with a rogue WiFi access point).Â  The user's browser<br>
sends an http request to the client, targeting the redirect URI.Â  The<br>
attacker's machine doesn't let that request go through.Â  The attacker<br>
then sends the same identical request from the attacker's own browser.<br>
When the client receives the request, it has no way to tell that it is<br>
coming from the attacker's browser rather than from the user's<br>
browser.Â  The client exchanges the authorization code for an access<br>
token, uses the access token to obtain protected resources belonging<br>
to the user, and delivers those resources to the attacker's browser.<br>
(Or manipulates those resources as directed by the attacker's<br>
browser.)Â  In the Facebook use case, the client logs the user in upon<br>
verifying that the authorization code is valid by exchanging it<br>
successfully for an access token.<br>
                  <br>
Another way (passive attack): The attacker observes the request from<br>
the user's browser to the client.Â  The attacker does not stop the<br>
request.Â  The client receives the request with the authorization code<br>
and exchanges the authorization code for the access token.Â  Now the<br>
attacker sends the same request from the attacker's own browser.Â  The<br>
client receives the second request and exchanges the authorization<br>
code for another access token.Â  Upon receiving the second request for<br>
the same authorization code, the authorization server revokes the<br>
first access token, as suggested in section 4.1.2 of the<br>
specification: "If an authorization code is used more than once, the<br>
auhorization server MAY revoke all tokens previously issued based on<br>
that authorization code".Â  The client then uses the second access<br>
token to access protected resources for the benefit of the attacker.<br>
In the Facebook use case, the attacker is logged in as the legitimate<br>
user.<br>
                  <br>
&gt; I donâ€šÃ„Ã´t know much about FBâ€šÃ„Ã´s implementation but if they<br>
&gt; allow the authorization code to be used for anything other<br>
&gt; than exchanged for an access token using secure client<br>
&gt; credentials, then they are not implementing the protocol as<br>
&gt; specified.<br>
                  <br>
Facebook uses the protocol correctly, but the examples in the Facebook<br>
documentation use http rather than https for redirect URIs, so<br>
implementations that follow the examples use http rather than https.<br>
                  <br>
Francisco<o:p></o:p></p>
                  </td>
                </tr>
              </tbody>
            </table>
            <p class="yiv1552031577msonormal"><span
 style="font-size: 10pt; font-family: &quot;Arial&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
            </div>
            </div>
            </div>
            </td>
          </tr>
        </tbody>
      </table>
      <p class="MsoNormal"><span
 style="font-size: 10pt; font-family: &quot;Calibri&quot;,&quot;sans-serif&quot;;">Â </span><o:p></o:p></p>
      </div>
      </div>
      </div>
    </blockquote>
    </div>
  </blockquote>
  <blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
    <div>
    <p class="MsoNormal">_______________________________________________<br>
OAuth mailing list<br>
    <a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
    <a moz-do-not-send="true"
 href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>
    </div>
  </blockquote>
  </div>
  <pre><o:p>Â </o:p></pre>
  <pre><o:p>Â </o:p></pre>
  <pre>_______________________________________________<o:p></o:p></pre>
  <pre>OAuth mailing list<o:p></o:p></pre>
  <pre><a moz-do-not-send="true" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre>
  <pre><a moz-do-not-send="true"
 href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></pre>
  <p class="MsoNormal"><o:p>Â </o:p></p>
  </div>
  </div>
  <pre wrap="">
<hr size="4" width="90%">
_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
  </pre>
</blockquote>
</body>
</html>

--------------080306040203040802030902--

From skylar@kiva.org  Thu Mar 31 07:30:27 2011
Return-Path: <skylar@kiva.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E2E8E28C11D for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 07:30:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SBTmouvtIFgd for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 07:30:27 -0700 (PDT)
Received: from na3sys010aog101.obsmtp.com (na3sys010aog101.obsmtp.com [74.125.245.70]) by core3.amsl.com (Postfix) with SMTP id 771B628C0F2 for <oauth@ietf.org>; Thu, 31 Mar 2011 07:30:25 -0700 (PDT)
Received: from source ([209.85.212.45]) (using TLSv1) by na3sys010aob101.postini.com ([74.125.244.12]) with SMTP ID DSNKTZSQZZyXuVKJStSplU4icidQpj2g8Mp6@postini.com; Thu, 31 Mar 2011 07:32:06 PDT
Received: by vws17 with SMTP id 17so2292985vws.32 for <oauth@ietf.org>; Thu, 31 Mar 2011 07:32:04 -0700 (PDT)
Received: by 10.52.0.130 with SMTP id 2mr3775782vde.180.1301581924228; Thu, 31 Mar 2011 07:32:04 -0700 (PDT)
Received: from [10.0.1.4] ([131.171.70.103]) by mx.google.com with ESMTPS id dm9sm320853vdb.19.2011.03.31.07.32.02 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 31 Mar 2011 07:32:02 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=windows-1252
From: Skylar Woodward <skylar@kiva.org>
In-Reply-To: <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com>
Date: Thu, 31 Mar 2011 10:32:01 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <BDA696B1-585A-4B44-89BE-E0FCA87BB496@kiva.org>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
X-Mailer: Apple Mail (2.1084)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 14:30:28 -0000

A requirement for TLS on the callback would make OAuth prohibitive for =
many of our developers. The developers are usually volunteers and they =
are already donating their own resources to help a non-profit (from =
which US law mandates the developers cannot profit). In other cases the =
developers are small firms operating in developing counties where =
establishing and maintaing a valid certificate may still be a imperfect =
art.

In short, a requirement like this puts the nail in the coffin of many =
would-be efforts to help out.

So as Dick identifies here, we have sufficient security around the =
authorization grant by tying it client credentials.  I would thus be =
opposed to the term "MUST."  I also think it's helpful to have the =
language limit the SHOULD to the non-user-agent cases. There's no reason =
we should suggest a callback URI designed for client-side intercept to =
use an HTTPS url - so this is in the spirit of Phil's response to =
Justin's comment on limiting the scope of SHOULD.

skylar



On Mar 30, 2011, at 11:19 AM, Dick Hardt wrote:

> Thanks for pointing out my misunderstanding. I was thinking client in =
the sense of the side of TLS initiating a request.
>=20
> I agree that requiring TLS on the callback is an unexpected change.=20
>=20
> I recall reviewing the security implications of an unsecured callback =
as being nominal if the authorization grant is linked to the client =
credentials.
>=20
>=20
> On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:
>=20
>> I think you got this backwards. We=92re talking about forcing =
developers using the Facebook (or any other service) API to deploy their =
own TLS endpoint for the incoming callback (via redirection). Every =
developer will need to get a cert and deploy an HTTPS endpoint.
>> =20
>> That=92s has never been discussed.
>> =20
>> EHL
>> =20
>> From: Dick Hardt [mailto:dick.hardt@gmail.com]=20
>> Sent: Tuesday, March 29, 2011 9:02 PM
>> To: Eran Hammer-Lahav
>> Cc: WG
>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>> =20
>> =20
>> On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:
>>=20
>>=20
>> To clarify, I am not opposed to mandating TLS on the callback, just =
that if we do, we can=92t ship the protocol the way it is without coming =
up with some other alternative that does not require TLS deployment on =
the client side. OAuth 1.0 has no such requirement and adding it in 2.0 =
is completely unexpected by the community at large.
>> =20
>> I only recall the concern with TLS to be on the server side, not the =
client side -- and I don't think that it is unexpected at all.
>>=20
>>=20
>> =20
>> It would be helpful to hear from some companies with large 1.0 or 2.0 =
deployment on this matter? Anyone from Google, Facebook, Yahoo, Twitter, =
etc.?
>> =20
>> When working on OAuth-WRAP, I talked to all of those companies about =
using TLS, and only Facebook said that they wanted an option to be able =
to not require TLS. Since then, all Facebook's new APIs which are =
essentially using OAuth 2.0 run on TLS.
>> =20
>> =20
>> =20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From torsten@lodderstedt.net  Thu Mar 31 08:48:24 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 42B603A6983 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 08:48:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level: 
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bOxMphm35S9a for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 08:48:23 -0700 (PDT)
Received: from smtprelay05.ispgateway.de (smtprelay05.ispgateway.de [80.67.31.100]) by core3.amsl.com (Postfix) with ESMTP id 306AF3A690D for <oauth@ietf.org>; Thu, 31 Mar 2011 08:48:23 -0700 (PDT)
Received: from [130.129.66.195] by smtprelay05.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Q5K8H-00063v-Ja for oauth@ietf.org; Thu, 31 Mar 2011 17:50:01 +0200
Message-ID: <4D94A2AA.7090506@lodderstedt.net>
Date: Thu, 31 Mar 2011 17:50:02 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
References: <4D945285.6000006@lodderstedt.net>
In-Reply-To: <4D945285.6000006@lodderstedt.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Subject: Re: [OAUTH-WG] Security Considerations Section Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 15:48:24 -0000

I just uploaded a revised version incorporating most comments we 
gathered today.

http://tools.ietf.org/html/draft-lodderstedt-oauth-securityconsiderations-01

regards,
Torsten.
Am 31.03.2011 12:08, schrieb Torsten Lodderstedt:
> Hi all,
>
> I just uploaded a proposal for the security section of the core spec 
> to the IETF site 
> (http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-securityconsiderations/). 
>
>
> As posted on the list previously, our idea was first to derive a 
> security consideration section for the core spec by cutting down 
> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/  to 
> a reasonable size. We tried to go through the document and identify 
> the pieces that should go into the spec in the informal OAuth security 
> session here at IETF-80. Although we did not make it further than 
> 4.1.3, the meeting turned out to be valuable since we agreed on 
> certain principles we are expected to apply when producing the section:
> - focus on service provider and application developers perspective 
> (and the protocol implementation)
> - document the "what" and not the "why" - for "why" include 
> informative reference to security document
> - explicitely state don'ts and explicitely define and distinguish 
> three client categories (web, native, JavaScript)
> For example we had a really lengthy discussion about native apps, 
> client secrets and client authentication - bottom line: we just state 
> "Authorization server MUST NOT issue client secrets to installed or 
> JavaScript applications."
>
> Moreover, we agreed to produce a security considerations section as 
> concise as possible and as quickly as possible. There were objections 
> in the room to "just" cut down our document. Instead the proposal was 
> to start something new.
>
> So the proposed text focus on the "WHAT" and references 
> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/ for 
> a discussion of the "WHY".
>
> Your feedback is appreciated.
>
> regards,
> Torsten.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From torsten@lodderstedt.net  Thu Mar 31 08:53:02 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B6A8D3A6B6B for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 08:53:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level: 
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 89hCjRMQsfvL for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 08:52:57 -0700 (PDT)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.31.35]) by core3.amsl.com (Postfix) with ESMTP id 123E53A6B49 for <oauth@ietf.org>; Thu, 31 Mar 2011 08:52:55 -0700 (PDT)
Received: from [130.129.66.195] by smtprelay01.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Q5KCg-0004g1-76; Thu, 31 Mar 2011 17:54:34 +0200
Message-ID: <4D94A3BB.5010702@lodderstedt.net>
Date: Thu, 31 Mar 2011 17:54:35 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <A3087459-E0D2-4F8B-B4C2-4E4AB87A73D1@gmx.net>
In-Reply-To: <A3087459-E0D2-4F8B-B4C2-4E4AB87A73D1@gmx.net>
Content-Type: multipart/mixed; boundary="------------040308030709030703000600"
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Presentation slides, please!
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 15:53:03 -0000

This is a multi-part message in MIME format.
--------------040308030709030703000600
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

please

Am 31.03.2011 14:47, schrieb Hannes Tschofenig:
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--------------040308030709030703000600
Content-Type: application/pdf;
 name="ietf-80-oauth-security.pdf"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="ietf-80-oauth-security.pdf"
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--------------040308030709030703000600--

From mark.mcgloin@ie.ibm.com  Thu Mar 31 09:00:57 2011
Return-Path: <mark.mcgloin@ie.ibm.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 371753A6B49 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 09:00:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GsIb30cpocqJ for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 09:00:56 -0700 (PDT)
Received: from mtagate5.uk.ibm.com (mtagate5.uk.ibm.com [194.196.100.165]) by core3.amsl.com (Postfix) with ESMTP id 012BB3A6B3D for <oauth@ietf.org>; Thu, 31 Mar 2011 09:00:55 -0700 (PDT)
Received: from d06nrmr1707.portsmouth.uk.ibm.com (d06nrmr1707.portsmouth.uk.ibm.com [9.149.39.225]) by mtagate5.uk.ibm.com (8.13.1/8.13.1) with ESMTP id p2VG2SWU015946 for <oauth@ietf.org>; Thu, 31 Mar 2011 16:02:28 GMT
Received: from d06av06.portsmouth.uk.ibm.com (d06av06.portsmouth.uk.ibm.com [9.149.37.217]) by d06nrmr1707.portsmouth.uk.ibm.com (8.13.8/8.13.8/NCO v10.0) with ESMTP id p2VG34DH1953946 for <oauth@ietf.org>; Thu, 31 Mar 2011 17:03:04 +0100
Received: from d06av06.portsmouth.uk.ibm.com (loopback [127.0.0.1]) by d06av06.portsmouth.uk.ibm.com (8.14.4/8.13.1/NCO v10.0 AVout) with ESMTP id p2VG2R8d009619 for <oauth@ietf.org>; Thu, 31 Mar 2011 10:02:28 -0600
Received: from d06ml093.portsmouth.uk.ibm.com (d06ml093.portsmouth.uk.ibm.com [9.149.104.171]) by d06av06.portsmouth.uk.ibm.com (8.14.4/8.13.1/NCO v10.0 AVin) with ESMTP id p2VG2R8E009616; Thu, 31 Mar 2011 10:02:27 -0600
In-Reply-To: <4D945285.6000006@lodderstedt.net>
References: <4D945285.6000006@lodderstedt.net>
X-KeepSent: 595CA209:B5A4478F-80257864:0053CF09; type=4; name=$KeepSent
To: Torsten Lodderstedt <torsten@lodderstedt.net>
X-Mailer: Lotus Notes Release 8.5.1FP5 SHF29 November 12, 2010
Message-ID: <OF595CA209.B5A4478F-ON80257864.0053CF09-80257864.00581BF5@ie.ibm.com>
From: Mark Mcgloin <mark.mcgloin@ie.ibm.com>
Date: Thu, 31 Mar 2011 17:01:49 +0100
X-MIMETrack: Serialize by Router on D06ML093/06/M/IBM(Release 8.0.2FP6|July 15, 2010) at 31/03/2011 17:01:52
MIME-Version: 1.0
Content-type: text/plain; charset=US-ASCII
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Security Considerations Section Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 16:00:57 -0000

Some comments Torsten. Will also think about missing considerations later

2.4.  Token Scope
I think this should be from the perspective of the Authorization server.
e.g.
When obtaining end user authorization and where the client requests scope,
the authorization server MAY want to consider whether to honour that scope
based on who/what the client is and the type of access grant or for
automated approvals etc

2.5.  Phishing attacks on redirect-based flows
Application developers should, when possible, use external browsers
   instead of browsers embedded in the application for performing the
   end-user authorization process.
Why? If there are good reasons, then they need to be stated.

2.6.  Request confidentiality
What is secure transport? I think it should just state TLS or give some
examples if you are referring to something else
However , stating that authorization codes must be sent over TLS is still
being debated  wrt redirect_uri

2.12.  Authenticity of endpoints
I think I must be missing some subtleties of the statements in this section
as I don't understand. Is it just stating that both must be capable of
supporting TLS?



Mark McGloin


Torsten Lodderstedt <torsten@lodderstedt.net> wrote on 31/03/2011 11:08:05:

> Torsten Lodderstedt <torsten@lodderstedt.net>
> 31/03/2011 11:08
>
> To
>
> OAuth WG <oauth@ietf.org>
>
> cc
>
> Phil Hunt <phil.hunt@oracle.com>, Mark Mcgloin/Ireland/IBM@IBMIE,
> Anthony Nadalin <tonynad@microsoft.com>, Eran Hammer-Lahav
> <eran@hueniverse.com>, Hannes Tschofenig <hannes.tschofenig@gmx.net>
>
> Subject
>
> Security Considerations Section Proposal
>
> Hi all,
>
> I just uploaded a proposal for the security section of the core spec to
> the IETF site
> (http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-
> securityconsiderations/).
>
>
> As posted on the list previously, our idea was first to derive a
> security consideration section for the core spec by cutting down
> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/  to a
> reasonable size. We tried to go through the document and identify the
> pieces that should go into the spec in the informal OAuth security
> session here at IETF-80. Although we did not make it further than 4.1.3,
> the meeting turned out to be valuable since we agreed on certain
> principles we are expected to apply when producing the section:
> - focus on service provider and application developers perspective (and
> the protocol implementation)
> - document the "what" and not the "why" - for "why" include informative
> reference to security document
> - explicitely state don'ts and explicitely define and distinguish three
> client categories (web, native, JavaScript)
> For example we had a really lengthy discussion about native apps, client
> secrets and client authentication - bottom line: we just state
> "Authorization server MUST NOT issue client secrets to installed or
> JavaScript applications."
>
> Moreover, we agreed to produce a security considerations section as
> concise as possible and as quickly as possible. There were objections in
> the room to "just" cut down our document. Instead the proposal was to
> start something new.
>
> So the proposed text focus on the "WHAT" and references
> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/ for a
> discussion of the "WHY".
>
> Your feedback is appreciated.
>
> regards,
> Torsten.


From torsten@lodderstedt.net  Thu Mar 31 09:10:29 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CA8B328C12B for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 09:10:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level: 
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SLWAseeSgkHs for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 09:10:26 -0700 (PDT)
Received: from smtprelay03.ispgateway.de (smtprelay03.ispgateway.de [80.67.29.7]) by core3.amsl.com (Postfix) with ESMTP id 9AF193A69BF for <oauth@ietf.org>; Thu, 31 Mar 2011 09:10:25 -0700 (PDT)
Received: from [130.129.66.195] by smtprelay03.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Q5KTb-0000pR-Om; Thu, 31 Mar 2011 18:12:03 +0200
Message-ID: <4D94A7D4.6070402@lodderstedt.net>
Date: Thu, 31 Mar 2011 18:12:04 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Mark Mcgloin <mark.mcgloin@ie.ibm.com>
References: <4D945285.6000006@lodderstedt.net> <OF595CA209.B5A4478F-ON80257864.0053CF09-80257864.00581BF5@ie.ibm.com>
In-Reply-To: <OF595CA209.B5A4478F-ON80257864.0053CF09-80257864.00581BF5@ie.ibm.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Security Considerations Section Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 16:10:29 -0000

Hi Mark,

thank you for your comments:

Am 31.03.2011 18:01, schrieb Mark Mcgloin:
> Some comments Torsten. Will also think about missing considerations later
>
> 2.4.  Token Scope
> I think this should be from the perspective of the Authorization server.
> e.g.
> When obtaining end user authorization and where the client requests scope,
> the authorization server MAY want to consider whether to honour that scope
> based on who/what the client is and the type of access grant or for
> automated approvals etc

The intention of the current text is to advice developers to apply the 
least-privileges pattern. I will add something wrt the authz server 
based on your proposal.

> 2.5.  Phishing attacks on redirect-based flows
> Application developers should, when possible, use external browsers
>     instead of browsers embedded in the application for performing the
>     end-user authorization process.
> Why? If there are good reasons, then they need to be stated.

Added some text in -01 (hopefully helpful :-))

> 2.6.  Request confidentiality
> What is secure transport? I think it should just state TLS or give some
> examples if you are referring to something else
> However , stating that authorization codes must be sent over TLS is still
> being debated  wrt redirect_uri

completly reformulated in -01

> 2.12.  Authenticity of endpoints
> I think I must be missing some subtleties of the statements in this section
> as I don't understand. Is it just stating that both must be capable of
> supporting TLS?

in the end, yes.
tried to make that more clear in -01

regards,
Torsten.

> Mark McGloin
>
>
> Torsten Lodderstedt<torsten@lodderstedt.net>  wrote on 31/03/2011 11:08:05:
>
>> Torsten Lodderstedt<torsten@lodderstedt.net>
>> 31/03/2011 11:08
>>
>> To
>>
>> OAuth WG<oauth@ietf.org>
>>
>> cc
>>
>> Phil Hunt<phil.hunt@oracle.com>, Mark Mcgloin/Ireland/IBM@IBMIE,
>> Anthony Nadalin<tonynad@microsoft.com>, Eran Hammer-Lahav
>> <eran@hueniverse.com>, Hannes Tschofenig<hannes.tschofenig@gmx.net>
>>
>> Subject
>>
>> Security Considerations Section Proposal
>>
>> Hi all,
>>
>> I just uploaded a proposal for the security section of the core spec to
>> the IETF site
>> (http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-
>> securityconsiderations/).
>>
>>
>> As posted on the list previously, our idea was first to derive a
>> security consideration section for the core spec by cutting down
>> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/  to a
>> reasonable size. We tried to go through the document and identify the
>> pieces that should go into the spec in the informal OAuth security
>> session here at IETF-80. Although we did not make it further than 4.1.3,
>> the meeting turned out to be valuable since we agreed on certain
>> principles we are expected to apply when producing the section:
>> - focus on service provider and application developers perspective (and
>> the protocol implementation)
>> - document the "what" and not the "why" - for "why" include informative
>> reference to security document
>> - explicitely state don'ts and explicitely define and distinguish three
>> client categories (web, native, JavaScript)
>> For example we had a really lengthy discussion about native apps, client
>> secrets and client authentication - bottom line: we just state
>> "Authorization server MUST NOT issue client secrets to installed or
>> JavaScript applications."
>>
>> Moreover, we agreed to produce a security considerations section as
>> concise as possible and as quickly as possible. There were objections in
>> the room to "just" cut down our document. Instead the proposal was to
>> start something new.
>>
>> So the proposed text focus on the "WHAT" and references
>> http://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security/ for a
>> discussion of the "WHY".
>>
>> Your feedback is appreciated.
>>
>> regards,
>> Torsten.

From eran@hueniverse.com  Thu Mar 31 09:41:07 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3B0503A6844 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 09:41:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.636
X-Spam-Level: 
X-Spam-Status: No, score=-2.636 tagged_above=-999 required=5 tests=[AWL=-0.037, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VzbIFxYpYuot for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 09:41:06 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id D8A803A6A33 for <oauth@ietf.org>; Thu, 31 Mar 2011 09:41:05 -0700 (PDT)
Received: (qmail 11488 invoked from network); 31 Mar 2011 16:42:44 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 31 Mar 2011 16:42:44 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Thu, 31 Mar 2011 09:42:39 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Skylar Woodward <skylar@kiva.org>, Dick Hardt <dick.hardt@gmail.com>
Date: Thu, 31 Mar 2011 09:42:24 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvvsGl8KNezFbLJRq+VinztCvBitgAEGppw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E72344656430968@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com> <BDA696B1-585A-4B44-89BE-E0FCA87BB496@kiva.org>
In-Reply-To: <BDA696B1-585A-4B44-89BE-E0FCA87BB496@kiva.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 16:41:07 -0000

It is important to distinguish between securing the resource server and sec=
uring the client. I think this is where this conversation has been somewhat=
 broken.

If the client is user-agent based or web server based, it MUST user TLS 100=
% of the time when authenticating its users or delivering any scripts that =
may have access to any OAuth credentials (tokens, code, etc.). This goes fa=
r beyond just securing the redirection call.

For example, a JS client running in the browser will not leak the access to=
ken received from the authorization server using the implicit grant because=
 it is delivered over TLS and is in the fragment which will not be send to =
the server containing the script. However, if that script is served without=
 TLS, it can be manipulated by a MITM and changed to send the access token =
anywhere.

Same with server based clients using cookies for their own user authenticat=
ion. If they don't use TLS exclusively, sessions can be hijacked and any pr=
otected resources they have access to are now potentially compromised.

IOW, if the client isn't perfect all around, securing the redirection URI d=
oes not increase its security. It's like putting an armed guard at one entr=
ance to a building with 100 other wide-open doors. It is hypocritical and i=
rresponsible to create the illusion of client security by focusing solely o=
n the redirection URI.

IMO, a strong warning with a comprehensive explanation of the overall clien=
t security model will do much more good than putting horse blinds on and pr=
etending that what the client does right after the callback is 'not OAuth' =
and something we should not care about.

A MUST use TLS focused narrowly on the redirection URI does not make the we=
b better. At best, it make one door secure, but it also has the potential o=
f creating a false sense of security which is typically where things go ter=
ribly wrong.

BTW, a profile of OAuth used primarily for login such as the proposed OpenI=
D Connect, should make the callback use of TLS required. In that context, i=
t is a logical extension of the server's use of TLS to provide a secure log=
in experience.

EHL

> -----Original Message-----
> From: Skylar Woodward [mailto:skylar@kiva.org]
> Sent: Thursday, March 31, 2011 7:32 AM
> To: Dick Hardt
> Cc: Eran Hammer-Lahav; OAuth WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> A requirement for TLS on the callback would make OAuth prohibitive for
> many of our developers. The developers are usually volunteers and they ar=
e
> already donating their own resources to help a non-profit (from which US =
law
> mandates the developers cannot profit). In other cases the developers are
> small firms operating in developing counties where establishing and
> maintaing a valid certificate may still be a imperfect art.
>=20
> In short, a requirement like this puts the nail in the coffin of many wou=
ld-be
> efforts to help out.
>=20
> So as Dick identifies here, we have sufficient security around the
> authorization grant by tying it client credentials.  I would thus be oppo=
sed to
> the term "MUST."  I also think it's helpful to have the language limit th=
e
> SHOULD to the non-user-agent cases. There's no reason we should suggest a
> callback URI designed for client-side intercept to use an HTTPS url - so =
this is
> in the spirit of Phil's response to Justin's comment on limiting the scop=
e of
> SHOULD.
>=20
> skylar
>=20
>=20
>=20
> On Mar 30, 2011, at 11:19 AM, Dick Hardt wrote:
>=20
> > Thanks for pointing out my misunderstanding. I was thinking client in t=
he
> sense of the side of TLS initiating a request.
> >
> > I agree that requiring TLS on the callback is an unexpected change.
> >
> > I recall reviewing the security implications of an unsecured callback a=
s being
> nominal if the authorization grant is linked to the client credentials.
> >
> >
> > On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:
> >
> >> I think you got this backwards. We're talking about forcing developers
> using the Facebook (or any other service) API to deploy their own TLS
> endpoint for the incoming callback (via redirection). Every developer wil=
l
> need to get a cert and deploy an HTTPS endpoint.
> >>
> >> That's has never been discussed.
> >>
> >> EHL
> >>
> >> From: Dick Hardt [mailto:dick.hardt@gmail.com]
> >> Sent: Tuesday, March 29, 2011 9:02 PM
> >> To: Eran Hammer-Lahav
> >> Cc: WG
> >> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>
> >>
> >> On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:
> >>
> >>
> >> To clarify, I am not opposed to mandating TLS on the callback, just th=
at if
> we do, we can't ship the protocol the way it is without coming up with so=
me
> other alternative that does not require TLS deployment on the client side=
.
> OAuth 1.0 has no such requirement and adding it in 2.0 is completely
> unexpected by the community at large.
> >>
> >> I only recall the concern with TLS to be on the server side, not the c=
lient
> side -- and I don't think that it is unexpected at all.
> >>
> >>
> >>
> >> It would be helpful to hear from some companies with large 1.0 or 2.0
> deployment on this matter? Anyone from Google, Facebook, Yahoo, Twitter,
> etc.?
> >>
> >> When working on OAuth-WRAP, I talked to all of those companies about
> using TLS, and only Facebook said that they wanted an option to be able t=
o
> not require TLS. Since then, all Facebook's new APIs which are essentiall=
y
> using OAuth 2.0 run on TLS.
> >>
> >>
> >>
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth


From phil.hunt@oracle.com  Thu Mar 31 10:28:34 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C30A53A6A1B for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 10:28:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.557
X-Spam-Level: 
X-Spam-Status: No, score=-6.557 tagged_above=-999 required=5 tests=[AWL=0.042,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 06V7azm2VSCX for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 10:28:33 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 5B81D3A697A for <oauth@ietf.org>; Thu, 31 Mar 2011 10:28:33 -0700 (PDT)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2VHU99A009743 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 31 Mar 2011 17:30:10 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by rcsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2VHU6H2012583 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 31 Mar 2011 17:30:08 GMT
Received: from abhmt006.oracle.com (abhmt006.oracle.com [141.146.116.15]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2VHU5bV009768; Thu, 31 Mar 2011 12:30:05 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 31 Mar 2011 10:30:05 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E72344656430968@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Thu, 31 Mar 2011 10:30:03 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <60AE2831-6A66-4B4E-B060-C546C6E4A896@oracle.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com> <BDA696B1-585A-4B44-89BE-E0FCA87BB496@kiva.org> <90C41DD21FB7C64BB94121FBBC2E72344656430968@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt358.oracle.com [141.146.40.158]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090206.4D94BA20.012E:SCFSTAT5015188,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 17:28:34 -0000

+1

I agree this is not just about setting one TLS setting to mandatory.=20

I believe we need language that is simple and clear.  Terms like SHOULD =
are loopholes that create risk as they are too broad. They also have =
served to make the security considerations incredibly long and complex =
since we had to explain all the risks exposed. In this respect, I think =
the overall specification needs to be tightened up considerably in order =
to get back to a simple specification.

Folks this is an AUTHORIZATION protocol! Our default position 'should' =
be that TLS is a MUST unless it can be demonstrated why there is =
absolutely no risk to turning it off.  For example, I agree that if a =
redirect end-point is local, it does not need to be on. There are =
relatively few exceptions.

In my opinion, most OAuth sites in production today do not do enough to =
protect authorization codes and are currently open to relatively simple =
hijacking attacks. The current OAuth usage in my opinion is not only a =
mark of success of OAuth but rather a demonstration that tightening =
requirements is critical to keeping OAuth successful.

As deployers of OAuth come on board supporting higher-risk data (e.g. =
financial, trading, etc) the tolerance for OAuth failures will be low.  =
We've got a good acceptance now, and I would not like to see it =
jeopardized by some deployers taking short-cuts because of lack of =
effort or lack of proper funds to support a secure deployment. If I were =
a charity, the last thing I would want is to risk the confidentiality of =
my donors.

If however, there is a strong community here that disagrees because they =
don't see any risk, then maybe there is a strong case to be made for a =
second RFC that defines a tighter set of requirements ("Secure OAuth"). =
In a sense, this is starting to happen now with regards to security =
considerations - they are just too long.  I would rather avoid this if =
we can.

Phil
phil.hunt@oracle.com




On 2011-03-31, at 9:42 AM, Eran Hammer-Lahav wrote:

> It is important to distinguish between securing the resource server =
and securing the client. I think this is where this conversation has =
been somewhat broken.
>=20
> If the client is user-agent based or web server based, it MUST user =
TLS 100% of the time when authenticating its users or delivering any =
scripts that may have access to any OAuth credentials (tokens, code, =
etc.). This goes far beyond just securing the redirection call.
>=20
> For example, a JS client running in the browser will not leak the =
access token received from the authorization server using the implicit =
grant because it is delivered over TLS and is in the fragment which will =
not be send to the server containing the script. However, if that script =
is served without TLS, it can be manipulated by a MITM and changed to =
send the access token anywhere.
>=20
> Same with server based clients using cookies for their own user =
authentication. If they don't use TLS exclusively, sessions can be =
hijacked and any protected resources they have access to are now =
potentially compromised.
>=20
> IOW, if the client isn't perfect all around, securing the redirection =
URI does not increase its security. It's like putting an armed guard at =
one entrance to a building with 100 other wide-open doors. It is =
hypocritical and irresponsible to create the illusion of client security =
by focusing solely on the redirection URI.
>=20
> IMO, a strong warning with a comprehensive explanation of the overall =
client security model will do much more good than putting horse blinds =
on and pretending that what the client does right after the callback is =
'not OAuth' and something we should not care about.
>=20
> A MUST use TLS focused narrowly on the redirection URI does not make =
the web better. At best, it make one door secure, but it also has the =
potential of creating a false sense of security which is typically where =
things go terribly wrong.
>=20
> BTW, a profile of OAuth used primarily for login such as the proposed =
OpenID Connect, should make the callback use of TLS required. In that =
context, it is a logical extension of the server's use of TLS to provide =
a secure login experience.
>=20
> EHL
>=20
>> -----Original Message-----
>> From: Skylar Woodward [mailto:skylar@kiva.org]
>> Sent: Thursday, March 31, 2011 7:32 AM
>> To: Dick Hardt
>> Cc: Eran Hammer-Lahav; OAuth WG
>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>=20
>> A requirement for TLS on the callback would make OAuth prohibitive =
for
>> many of our developers. The developers are usually volunteers and =
they are
>> already donating their own resources to help a non-profit (from which =
US law
>> mandates the developers cannot profit). In other cases the developers =
are
>> small firms operating in developing counties where establishing and
>> maintaing a valid certificate may still be a imperfect art.
>>=20
>> In short, a requirement like this puts the nail in the coffin of many =
would-be
>> efforts to help out.
>>=20
>> So as Dick identifies here, we have sufficient security around the
>> authorization grant by tying it client credentials.  I would thus be =
opposed to
>> the term "MUST."  I also think it's helpful to have the language =
limit the
>> SHOULD to the non-user-agent cases. There's no reason we should =
suggest a
>> callback URI designed for client-side intercept to use an HTTPS url - =
so this is
>> in the spirit of Phil's response to Justin's comment on limiting the =
scope of
>> SHOULD.
>>=20
>> skylar
>>=20
>>=20
>>=20
>> On Mar 30, 2011, at 11:19 AM, Dick Hardt wrote:
>>=20
>>> Thanks for pointing out my misunderstanding. I was thinking client =
in the
>> sense of the side of TLS initiating a request.
>>>=20
>>> I agree that requiring TLS on the callback is an unexpected change.
>>>=20
>>> I recall reviewing the security implications of an unsecured =
callback as being
>> nominal if the authorization grant is linked to the client =
credentials.
>>>=20
>>>=20
>>> On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:
>>>=20
>>>> I think you got this backwards. We're talking about forcing =
developers
>> using the Facebook (or any other service) API to deploy their own TLS
>> endpoint for the incoming callback (via redirection). Every developer =
will
>> need to get a cert and deploy an HTTPS endpoint.
>>>>=20
>>>> That's has never been discussed.
>>>>=20
>>>> EHL
>>>>=20
>>>> From: Dick Hardt [mailto:dick.hardt@gmail.com]
>>>> Sent: Tuesday, March 29, 2011 9:02 PM
>>>> To: Eran Hammer-Lahav
>>>> Cc: WG
>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>>=20
>>>>=20
>>>> On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:
>>>>=20
>>>>=20
>>>> To clarify, I am not opposed to mandating TLS on the callback, just =
that if
>> we do, we can't ship the protocol the way it is without coming up =
with some
>> other alternative that does not require TLS deployment on the client =
side.
>> OAuth 1.0 has no such requirement and adding it in 2.0 is completely
>> unexpected by the community at large.
>>>>=20
>>>> I only recall the concern with TLS to be on the server side, not =
the client
>> side -- and I don't think that it is unexpected at all.
>>>>=20
>>>>=20
>>>>=20
>>>> It would be helpful to hear from some companies with large 1.0 or =
2.0
>> deployment on this matter? Anyone from Google, Facebook, Yahoo, =
Twitter,
>> etc.?
>>>>=20
>>>> When working on OAuth-WRAP, I talked to all of those companies =
about
>> using TLS, and only Facebook said that they wanted an option to be =
able to
>> not require TLS. Since then, all Facebook's new APIs which are =
essentially
>> using OAuth 2.0 run on TLS.
>>>>=20
>>>>=20
>>>>=20
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From eran@hueniverse.com  Thu Mar 31 10:42:08 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 377843A6A33 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 10:42:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.636
X-Spam-Level: 
X-Spam-Status: No, score=-2.636 tagged_above=-999 required=5 tests=[AWL=-0.037, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 28iz1a+5AZ0u for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 10:42:06 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id ADCE13A69FC for <oauth@ietf.org>; Thu, 31 Mar 2011 10:42:06 -0700 (PDT)
Received: (qmail 14847 invoked from network); 31 Mar 2011 17:43:46 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 31 Mar 2011 17:43:45 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Thu, 31 Mar 2011 10:43:38 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 31 Mar 2011 10:43:31 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AcvvyU0ELu5/E3qITfGcvwuJDuZ4twAAUDOA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664D60D@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com> <BDA696B1-585A-4B44-89BE-E0FCA87BB496@kiva.org> <90C41DD21FB7C64BB94121FBBC2E72344656430968@P3PW5EX1MB01.EX1.SECURESERVER.NET> <60AE2831-6A66-4B4E-B060-C546C6E4A896@oracle.com>
In-Reply-To: <60AE2831-6A66-4B4E-B060-C546C6E4A896@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 17:42:08 -0000

Seems like your +1 is for a different conclusion :-)

My point is that specifications should reflect reality, not unattained aspi=
rations. That leads to devaluation of the specification and dismissal of ot=
her - more important - security requirements. If the majority of members wi=
ll confirm that they will not allow clients to register or provide a non HT=
TPS callback (excluding localhost), I will be much more inclined to support=
 a MUST here. But without that, I don't want to write text knowing it will =
be ignored by many deployments.

Also, what should be the policy regarding non http/https schemes? What if t=
he callback is using a local application handler which triggers sending the=
 code over an insecure channel? This is another example where an explanatio=
n is much more valuable than a normative MUST.

EHL



> -----Original Message-----
> From: Phil Hunt [mailto:phil.hunt@oracle.com]
> Sent: Thursday, March 31, 2011 10:30 AM
> To: Eran Hammer-Lahav
> Cc: Skylar Woodward; Dick Hardt; OAuth WG
> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>=20
> +1
>=20
> I agree this is not just about setting one TLS setting to mandatory.
>=20
> I believe we need language that is simple and clear.  Terms like SHOULD a=
re
> loopholes that create risk as they are too broad. They also have served t=
o
> make the security considerations incredibly long and complex since we had
> to explain all the risks exposed. In this respect, I think the overall
> specification needs to be tightened up considerably in order to get back =
to a
> simple specification.
>=20
> Folks this is an AUTHORIZATION protocol! Our default position 'should' be
> that TLS is a MUST unless it can be demonstrated why there is absolutely =
no
> risk to turning it off.  For example, I agree that if a redirect end-poin=
t is local,
> it does not need to be on. There are relatively few exceptions.
>=20
> In my opinion, most OAuth sites in production today do not do enough to
> protect authorization codes and are currently open to relatively simple
> hijacking attacks. The current OAuth usage in my opinion is not only a ma=
rk of
> success of OAuth but rather a demonstration that tightening requirements =
is
> critical to keeping OAuth successful.
>=20
> As deployers of OAuth come on board supporting higher-risk data (e.g.
> financial, trading, etc) the tolerance for OAuth failures will be low.  W=
e've got
> a good acceptance now, and I would not like to see it jeopardized by some
> deployers taking short-cuts because of lack of effort or lack of proper f=
unds
> to support a secure deployment. If I were a charity, the last thing I wou=
ld
> want is to risk the confidentiality of my donors.
>=20
> If however, there is a strong community here that disagrees because they
> don't see any risk, then maybe there is a strong case to be made for a se=
cond
> RFC that defines a tighter set of requirements ("Secure OAuth"). In a sen=
se,
> this is starting to happen now with regards to security considerations - =
they
> are just too long.  I would rather avoid this if we can.
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> On 2011-03-31, at 9:42 AM, Eran Hammer-Lahav wrote:
>=20
> > It is important to distinguish between securing the resource server and
> securing the client. I think this is where this conversation has been som=
ewhat
> broken.
> >
> > If the client is user-agent based or web server based, it MUST user TLS
> 100% of the time when authenticating its users or delivering any scripts =
that
> may have access to any OAuth credentials (tokens, code, etc.). This goes =
far
> beyond just securing the redirection call.
> >
> > For example, a JS client running in the browser will not leak the acces=
s
> token received from the authorization server using the implicit grant bec=
ause
> it is delivered over TLS and is in the fragment which will not be send to=
 the
> server containing the script. However, if that script is served without T=
LS, it
> can be manipulated by a MITM and changed to send the access token
> anywhere.
> >
> > Same with server based clients using cookies for their own user
> authentication. If they don't use TLS exclusively, sessions can be hijack=
ed and
> any protected resources they have access to are now potentially
> compromised.
> >
> > IOW, if the client isn't perfect all around, securing the redirection U=
RI does
> not increase its security. It's like putting an armed guard at one entran=
ce to a
> building with 100 other wide-open doors. It is hypocritical and irrespons=
ible
> to create the illusion of client security by focusing solely on the redir=
ection
> URI.
> >
> > IMO, a strong warning with a comprehensive explanation of the overall
> client security model will do much more good than putting horse blinds on
> and pretending that what the client does right after the callback is 'not
> OAuth' and something we should not care about.
> >
> > A MUST use TLS focused narrowly on the redirection URI does not make
> the web better. At best, it make one door secure, but it also has the
> potential of creating a false sense of security which is typically where =
things
> go terribly wrong.
> >
> > BTW, a profile of OAuth used primarily for login such as the proposed
> OpenID Connect, should make the callback use of TLS required. In that
> context, it is a logical extension of the server's use of TLS to provide =
a secure
> login experience.
> >
> > EHL
> >
> >> -----Original Message-----
> >> From: Skylar Woodward [mailto:skylar@kiva.org]
> >> Sent: Thursday, March 31, 2011 7:32 AM
> >> To: Dick Hardt
> >> Cc: Eran Hammer-Lahav; OAuth WG
> >> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>
> >> A requirement for TLS on the callback would make OAuth prohibitive
> >> for many of our developers. The developers are usually volunteers and
> >> they are already donating their own resources to help a non-profit
> >> (from which US law mandates the developers cannot profit). In other
> >> cases the developers are small firms operating in developing counties
> >> where establishing and maintaing a valid certificate may still be a
> imperfect art.
> >>
> >> In short, a requirement like this puts the nail in the coffin of many
> >> would-be efforts to help out.
> >>
> >> So as Dick identifies here, we have sufficient security around the
> >> authorization grant by tying it client credentials.  I would thus be
> >> opposed to the term "MUST."  I also think it's helpful to have the
> >> language limit the SHOULD to the non-user-agent cases. There's no
> >> reason we should suggest a callback URI designed for client-side
> >> intercept to use an HTTPS url - so this is in the spirit of Phil's
> >> response to Justin's comment on limiting the scope of SHOULD.
> >>
> >> skylar
> >>
> >>
> >>
> >> On Mar 30, 2011, at 11:19 AM, Dick Hardt wrote:
> >>
> >>> Thanks for pointing out my misunderstanding. I was thinking client
> >>> in the
> >> sense of the side of TLS initiating a request.
> >>>
> >>> I agree that requiring TLS on the callback is an unexpected change.
> >>>
> >>> I recall reviewing the security implications of an unsecured
> >>> callback as being
> >> nominal if the authorization grant is linked to the client credentials=
.
> >>>
> >>>
> >>> On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:
> >>>
> >>>> I think you got this backwards. We're talking about forcing
> >>>> developers
> >> using the Facebook (or any other service) API to deploy their own TLS
> >> endpoint for the incoming callback (via redirection). Every developer
> >> will need to get a cert and deploy an HTTPS endpoint.
> >>>>
> >>>> That's has never been discussed.
> >>>>
> >>>> EHL
> >>>>
> >>>> From: Dick Hardt [mailto:dick.hardt@gmail.com]
> >>>> Sent: Tuesday, March 29, 2011 9:02 PM
> >>>> To: Eran Hammer-Lahav
> >>>> Cc: WG
> >>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
> >>>>
> >>>>
> >>>> On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:
> >>>>
> >>>>
> >>>> To clarify, I am not opposed to mandating TLS on the callback, just
> >>>> that if
> >> we do, we can't ship the protocol the way it is without coming up
> >> with some other alternative that does not require TLS deployment on th=
e
> client side.
> >> OAuth 1.0 has no such requirement and adding it in 2.0 is completely
> >> unexpected by the community at large.
> >>>>
> >>>> I only recall the concern with TLS to be on the server side, not
> >>>> the client
> >> side -- and I don't think that it is unexpected at all.
> >>>>
> >>>>
> >>>>
> >>>> It would be helpful to hear from some companies with large 1.0 or
> >>>> 2.0
> >> deployment on this matter? Anyone from Google, Facebook, Yahoo,
> >> Twitter, etc.?
> >>>>
> >>>> When working on OAuth-WRAP, I talked to all of those companies
> >>>> about
> >> using TLS, and only Facebook said that they wanted an option to be
> >> able to not require TLS. Since then, all Facebook's new APIs which
> >> are essentially using OAuth 2.0 run on TLS.
> >>>>
> >>>>
> >>>>
> >>>
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth


From phil.hunt@oracle.com  Thu Mar 31 11:08:57 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A245F3A6AAB for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:08:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.557
X-Spam-Level: 
X-Spam-Status: No, score=-6.557 tagged_above=-999 required=5 tests=[AWL=0.041,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZFXY3pS8y1wI for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:08:55 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 163053A69FC for <oauth@ietf.org>; Thu, 31 Mar 2011 11:08:55 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2VIATTs016137 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 31 Mar 2011 18:10:33 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2VIAS9N027930 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 31 Mar 2011 18:10:28 GMT
Received: from abhmt015.oracle.com (abhmt015.oracle.com [141.146.116.24]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2VIARPV012340; Thu, 31 Mar 2011 13:10:28 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 31 Mar 2011 11:10:26 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-5--982205394
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465664D60D@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Thu, 31 Mar 2011 11:10:25 -0700
Message-Id: <9599ACE3-3FFE-4FB4-8D83-53E0EC3D0498@oracle.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com> <BDA696B1-585A-4B44-89BE-E0FCA87BB496@kiva.org> <90C41DD21FB7C64BB94121FBBC2E72344656430968@P3PW5EX1MB01.EX1.SECURESERVER.NET> <60AE2831-6A66-4B4E-B060-C546C6E4A896@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234465664D60D@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt358.oracle.com [141.146.40.158]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090203.4D94C395.0051:SCFSTAT5015188,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:08:58 -0000

--Apple-Mail-5--982205394
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Unfortunately these aren't just "aspirations". We're talking about what =
are the *necessary* minimums.

Yes, I have been focusing on a couple of very specific aspects of =
authorization and I agree, the whole spec is important. But I disagree =
that that would be justification not to fix authorization as you =
suggest.  After all if the first step, authorization, is insecure or =
hijackable, the rest of the specification is kind of pointless isn't it?

Having contributed to the security considerations, I have grown =
concerned that the lassie faire approach is actually making the spec =
more complex. Because of all the options, the security considerations =
have had to explain all of the issues (and there are many) and what the =
remediations are. Further with so many specific deployment options, =
inter-operability seems to be a big question. With so many specifics, =
what would an inter-operable specification be? My conclusion? The OAuth =
2 spec is bogged down by too much choice resulting to too much practical =
complexity.=20

=3D=3D> Conclusion: Current implementors will find it challenging to =
ensure their deployment is secure. <=3D=3D  I can't make this point =
strongly enough!

I think we are in agreement on most things (hence my +1). But I think we =
are simply at a stage where refinement is key to success. A good =
specification should focus on what are the key options keeping choice to =
a minimum. We just aren't there yet - and we may need some substantive =
changes to fix this (I hope not).

Phil
phil.hunt@oracle.com




On 2011-03-31, at 10:43 AM, Eran Hammer-Lahav wrote:

> Seems like your +1 is for a different conclusion :-)
>=20
> My point is that specifications should reflect reality, not unattained =
aspirations. That leads to devaluation of the specification and =
dismissal of other - more important - security requirements. If the =
majority of members will confirm that they will not allow clients to =
register or provide a non HTTPS callback (excluding localhost), I will =
be much more inclined to support a MUST here. But without that, I don't =
want to write text knowing it will be ignored by many deployments.
>=20
> Also, what should be the policy regarding non http/https schemes? What =
if the callback is using a local application handler which triggers =
sending the code over an insecure channel? This is another example where =
an explanation is much more valuable than a normative MUST.
>=20
> EHL
>=20
>=20
>=20
>> -----Original Message-----
>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
>> Sent: Thursday, March 31, 2011 10:30 AM
>> To: Eran Hammer-Lahav
>> Cc: Skylar Woodward; Dick Hardt; OAuth WG
>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>=20
>> +1
>>=20
>> I agree this is not just about setting one TLS setting to mandatory.
>>=20
>> I believe we need language that is simple and clear.  Terms like =
SHOULD are
>> loopholes that create risk as they are too broad. They also have =
served to
>> make the security considerations incredibly long and complex since we =
had
>> to explain all the risks exposed. In this respect, I think the =
overall
>> specification needs to be tightened up considerably in order to get =
back to a
>> simple specification.
>>=20
>> Folks this is an AUTHORIZATION protocol! Our default position =
'should' be
>> that TLS is a MUST unless it can be demonstrated why there is =
absolutely no
>> risk to turning it off.  For example, I agree that if a redirect =
end-point is local,
>> it does not need to be on. There are relatively few exceptions.
>>=20
>> In my opinion, most OAuth sites in production today do not do enough =
to
>> protect authorization codes and are currently open to relatively =
simple
>> hijacking attacks. The current OAuth usage in my opinion is not only =
a mark of
>> success of OAuth but rather a demonstration that tightening =
requirements is
>> critical to keeping OAuth successful.
>>=20
>> As deployers of OAuth come on board supporting higher-risk data (e.g.
>> financial, trading, etc) the tolerance for OAuth failures will be =
low.  We've got
>> a good acceptance now, and I would not like to see it jeopardized by =
some
>> deployers taking short-cuts because of lack of effort or lack of =
proper funds
>> to support a secure deployment. If I were a charity, the last thing I =
would
>> want is to risk the confidentiality of my donors.
>>=20
>> If however, there is a strong community here that disagrees because =
they
>> don't see any risk, then maybe there is a strong case to be made for =
a second
>> RFC that defines a tighter set of requirements ("Secure OAuth"). In a =
sense,
>> this is starting to happen now with regards to security =
considerations - they
>> are just too long.  I would rather avoid this if we can.
>>=20
>> Phil
>> phil.hunt@oracle.com
>>=20
>>=20
>>=20
>>=20
>> On 2011-03-31, at 9:42 AM, Eran Hammer-Lahav wrote:
>>=20
>>> It is important to distinguish between securing the resource server =
and
>> securing the client. I think this is where this conversation has been =
somewhat
>> broken.
>>>=20
>>> If the client is user-agent based or web server based, it MUST user =
TLS
>> 100% of the time when authenticating its users or delivering any =
scripts that
>> may have access to any OAuth credentials (tokens, code, etc.). This =
goes far
>> beyond just securing the redirection call.
>>>=20
>>> For example, a JS client running in the browser will not leak the =
access
>> token received from the authorization server using the implicit grant =
because
>> it is delivered over TLS and is in the fragment which will not be =
send to the
>> server containing the script. However, if that script is served =
without TLS, it
>> can be manipulated by a MITM and changed to send the access token
>> anywhere.
>>>=20
>>> Same with server based clients using cookies for their own user
>> authentication. If they don't use TLS exclusively, sessions can be =
hijacked and
>> any protected resources they have access to are now potentially
>> compromised.
>>>=20
>>> IOW, if the client isn't perfect all around, securing the =
redirection URI does
>> not increase its security. It's like putting an armed guard at one =
entrance to a
>> building with 100 other wide-open doors. It is hypocritical and =
irresponsible
>> to create the illusion of client security by focusing solely on the =
redirection
>> URI.
>>>=20
>>> IMO, a strong warning with a comprehensive explanation of the =
overall
>> client security model will do much more good than putting horse =
blinds on
>> and pretending that what the client does right after the callback is =
'not
>> OAuth' and something we should not care about.
>>>=20
>>> A MUST use TLS focused narrowly on the redirection URI does not make
>> the web better. At best, it make one door secure, but it also has the
>> potential of creating a false sense of security which is typically =
where things
>> go terribly wrong.
>>>=20
>>> BTW, a profile of OAuth used primarily for login such as the =
proposed
>> OpenID Connect, should make the callback use of TLS required. In that
>> context, it is a logical extension of the server's use of TLS to =
provide a secure
>> login experience.
>>>=20
>>> EHL
>>>=20
>>>> -----Original Message-----
>>>> From: Skylar Woodward [mailto:skylar@kiva.org]
>>>> Sent: Thursday, March 31, 2011 7:32 AM
>>>> To: Dick Hardt
>>>> Cc: Eran Hammer-Lahav; OAuth WG
>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>>=20
>>>> A requirement for TLS on the callback would make OAuth prohibitive
>>>> for many of our developers. The developers are usually volunteers =
and
>>>> they are already donating their own resources to help a non-profit
>>>> (from which US law mandates the developers cannot profit). In other
>>>> cases the developers are small firms operating in developing =
counties
>>>> where establishing and maintaing a valid certificate may still be a
>> imperfect art.
>>>>=20
>>>> In short, a requirement like this puts the nail in the coffin of =
many
>>>> would-be efforts to help out.
>>>>=20
>>>> So as Dick identifies here, we have sufficient security around the
>>>> authorization grant by tying it client credentials.  I would thus =
be
>>>> opposed to the term "MUST."  I also think it's helpful to have the
>>>> language limit the SHOULD to the non-user-agent cases. There's no
>>>> reason we should suggest a callback URI designed for client-side
>>>> intercept to use an HTTPS url - so this is in the spirit of Phil's
>>>> response to Justin's comment on limiting the scope of SHOULD.
>>>>=20
>>>> skylar
>>>>=20
>>>>=20
>>>>=20
>>>> On Mar 30, 2011, at 11:19 AM, Dick Hardt wrote:
>>>>=20
>>>>> Thanks for pointing out my misunderstanding. I was thinking client
>>>>> in the
>>>> sense of the side of TLS initiating a request.
>>>>>=20
>>>>> I agree that requiring TLS on the callback is an unexpected =
change.
>>>>>=20
>>>>> I recall reviewing the security implications of an unsecured
>>>>> callback as being
>>>> nominal if the authorization grant is linked to the client =
credentials.
>>>>>=20
>>>>>=20
>>>>> On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:
>>>>>=20
>>>>>> I think you got this backwards. We're talking about forcing
>>>>>> developers
>>>> using the Facebook (or any other service) API to deploy their own =
TLS
>>>> endpoint for the incoming callback (via redirection). Every =
developer
>>>> will need to get a cert and deploy an HTTPS endpoint.
>>>>>>=20
>>>>>> That's has never been discussed.
>>>>>>=20
>>>>>> EHL
>>>>>>=20
>>>>>> From: Dick Hardt [mailto:dick.hardt@gmail.com]
>>>>>> Sent: Tuesday, March 29, 2011 9:02 PM
>>>>>> To: Eran Hammer-Lahav
>>>>>> Cc: WG
>>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>>>>=20
>>>>>>=20
>>>>>> On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:
>>>>>>=20
>>>>>>=20
>>>>>> To clarify, I am not opposed to mandating TLS on the callback, =
just
>>>>>> that if
>>>> we do, we can't ship the protocol the way it is without coming up
>>>> with some other alternative that does not require TLS deployment on =
the
>> client side.
>>>> OAuth 1.0 has no such requirement and adding it in 2.0 is =
completely
>>>> unexpected by the community at large.
>>>>>>=20
>>>>>> I only recall the concern with TLS to be on the server side, not
>>>>>> the client
>>>> side -- and I don't think that it is unexpected at all.
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>> It would be helpful to hear from some companies with large 1.0 or
>>>>>> 2.0
>>>> deployment on this matter? Anyone from Google, Facebook, Yahoo,
>>>> Twitter, etc.?
>>>>>>=20
>>>>>> When working on OAuth-WRAP, I talked to all of those companies
>>>>>> about
>>>> using TLS, and only Facebook said that they wanted an option to be
>>>> able to not require TLS. Since then, all Facebook's new APIs which
>>>> are essentially using OAuth 2.0 run on TLS.
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>=20
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>=20


--Apple-Mail-5--982205394
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
">Unfortunately these aren't just "aspirations". We're talking about =
what are the *necessary* minimums.<div><br></div><div>Yes, I have been =
focusing on a couple of very specific aspects of authorization and I =
agree, the whole spec is important. But I disagree that that would be =
justification not to fix authorization as you suggest. &nbsp;After all =
if the first step, authorization, is insecure or hijackable, the rest of =
the specification is kind of pointless isn't =
it?</div><div><br></div><div>Having contributed to the security =
considerations, I have grown concerned that the lassie faire approach is =
actually making the spec more complex. Because of all the options, the =
security considerations have had to explain all of the issues (and there =
are many) and what the remediations are. Further with so many specific =
deployment options, inter-operability seems to be a big question. With =
so many specifics, what would an inter-operable specification be? My =
conclusion? The OAuth 2 spec is bogged down by too much choice resulting =
to too much practical complexity.&nbsp;</div><div><br></div><div>=3D=3D&gt=
; <b><i>Conclusion: Current implementors will find it challenging to =
ensure their deployment is secure. </i></b>&lt;=3D=3D &nbsp;I can't make =
this point strongly enough!<br><div><br></div><div>I think we are in =
agreement on most things (hence my +1). But I think we are simply at a =
stage where refinement is key to success.&nbsp;A good specification =
should focus on what are the key options keeping choice to a minimum. We =
just aren't there yet - and we may need some substantive changes to fix =
this (I hope not).</div><div><br></div><div><div><div =
apple-content-edited=3D"true">Phil<br><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br><br><br><=
br></div><br><div><div>On 2011-03-31, at 10:43 AM, Eran Hammer-Lahav =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div>Seems like your +1 is for a different conclusion =
:-)<br><br>My point is that specifications should reflect reality, not =
unattained aspirations. That leads to devaluation of the specification =
and dismissal of other - more important - security requirements. If the =
majority of members will confirm that they will not allow clients to =
register or provide a non HTTPS callback (excluding localhost), I will =
be much more inclined to support a MUST here. But without that, I don't =
want to write text knowing it will be ignored by many =
deployments.<br><br>Also, what should be the policy regarding non =
http/https schemes? What if the callback is using a local application =
handler which triggers sending the code over an insecure channel? This =
is another example where an explanation is much more valuable than a =
normative MUST.<br><br>EHL<br><br><br><br><blockquote =
type=3D"cite">-----Original Message-----<br></blockquote><blockquote =
type=3D"cite">From: Phil Hunt =
[mailto:phil.hunt@oracle.com]<br></blockquote><blockquote =
type=3D"cite">Sent: Thursday, March 31, 2011 10:30 =
AM<br></blockquote><blockquote type=3D"cite">To: Eran =
Hammer-Lahav<br></blockquote><blockquote type=3D"cite">Cc: Skylar =
Woodward; Dick Hardt; OAuth WG<br></blockquote><blockquote =
type=3D"cite">Subject: Re: [OAUTH-WG] WGLC on =
draft-ietf-oauth-v2-13.txt<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote =
type=3D"cite">+1<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">I agree this is =
not just about setting one TLS setting to =
mandatory.<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">I believe we =
need language that is simple and clear. &nbsp;Terms like SHOULD =
are<br></blockquote><blockquote type=3D"cite">loopholes that create risk =
as they are too broad. They also have served =
to<br></blockquote><blockquote type=3D"cite">make the security =
considerations incredibly long and complex since we =
had<br></blockquote><blockquote type=3D"cite">to explain all the risks =
exposed. In this respect, I think the =
overall<br></blockquote><blockquote type=3D"cite">specification needs to =
be tightened up considerably in order to get back to =
a<br></blockquote><blockquote type=3D"cite">simple =
specification.<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">Folks this is =
an AUTHORIZATION protocol! Our default position 'should' =
be<br></blockquote><blockquote type=3D"cite">that TLS is a MUST unless =
it can be demonstrated why there is absolutely =
no<br></blockquote><blockquote type=3D"cite">risk to turning it off. =
&nbsp;For example, I agree that if a redirect end-point is =
local,<br></blockquote><blockquote type=3D"cite">it does not need to be =
on. There are relatively few exceptions.<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">In my opinion, =
most OAuth sites in production today do not do enough =
to<br></blockquote><blockquote type=3D"cite">protect authorization codes =
and are currently open to relatively simple<br></blockquote><blockquote =
type=3D"cite">hijacking attacks. The current OAuth usage in my opinion =
is not only a mark of<br></blockquote><blockquote type=3D"cite">success =
of OAuth but rather a demonstration that tightening requirements =
is<br></blockquote><blockquote type=3D"cite">critical to keeping OAuth =
successful.<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">As deployers of =
OAuth come on board supporting higher-risk data =
(e.g.<br></blockquote><blockquote type=3D"cite">financial, trading, etc) =
the tolerance for OAuth failures will be low. &nbsp;We've =
got<br></blockquote><blockquote type=3D"cite">a good acceptance now, and =
I would not like to see it jeopardized by =
some<br></blockquote><blockquote type=3D"cite">deployers taking =
short-cuts because of lack of effort or lack of proper =
funds<br></blockquote><blockquote type=3D"cite">to support a secure =
deployment. If I were a charity, the last thing I =
would<br></blockquote><blockquote type=3D"cite">want is to risk the =
confidentiality of my donors.<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">If however, =
there is a strong community here that disagrees because =
they<br></blockquote><blockquote type=3D"cite">don't see any risk, then =
maybe there is a strong case to be made for a =
second<br></blockquote><blockquote type=3D"cite">RFC that defines a =
tighter set of requirements ("Secure OAuth"). In a =
sense,<br></blockquote><blockquote type=3D"cite">this is starting to =
happen now with regards to security considerations - =
they<br></blockquote><blockquote type=3D"cite">are just too long. =
&nbsp;I would rather avoid this if we can.<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote =
type=3D"cite">Phil<br></blockquote><blockquote type=3D"cite"><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><br></blockqu=
ote><blockquote type=3D"cite"><br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">On 2011-03-31, =
at 9:42 AM, Eran Hammer-Lahav wrote:<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite">It is important to distinguish between securing the =
resource server and<br></blockquote></blockquote><blockquote =
type=3D"cite">securing the client. I think this is where this =
conversation has been somewhat<br></blockquote><blockquote =
type=3D"cite">broken.<br></blockquote><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite">If the client is user-agent =
based or web server based, it MUST user =
TLS<br></blockquote></blockquote><blockquote type=3D"cite">100% of the =
time when authenticating its users or delivering any scripts =
that<br></blockquote><blockquote type=3D"cite">may have access to any =
OAuth credentials (tokens, code, etc.). This goes =
far<br></blockquote><blockquote type=3D"cite">beyond just securing the =
redirection call.<br></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite">For example, a JS client running =
in the browser will not leak the =
access<br></blockquote></blockquote><blockquote type=3D"cite">token =
received from the authorization server using the implicit grant =
because<br></blockquote><blockquote type=3D"cite">it is delivered over =
TLS and is in the fragment which will not be send to =
the<br></blockquote><blockquote type=3D"cite">server containing the =
script. However, if that script is served without TLS, =
it<br></blockquote><blockquote type=3D"cite">can be manipulated by a =
MITM and changed to send the access token<br></blockquote><blockquote =
type=3D"cite">anywhere.<br></blockquote><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite">Same with server based clients =
using cookies for their own =
user<br></blockquote></blockquote><blockquote =
type=3D"cite">authentication. If they don't use TLS exclusively, =
sessions can be hijacked and<br></blockquote><blockquote type=3D"cite">any=
 protected resources they have access to are now =
potentially<br></blockquote><blockquote =
type=3D"cite">compromised.<br></blockquote><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite">IOW, if the client isn't perfect =
all around, securing the redirection URI =
does<br></blockquote></blockquote><blockquote type=3D"cite">not increase =
its security. It's like putting an armed guard at one entrance to =
a<br></blockquote><blockquote type=3D"cite">building with 100 other =
wide-open doors. It is hypocritical and =
irresponsible<br></blockquote><blockquote type=3D"cite">to create the =
illusion of client security by focusing solely on the =
redirection<br></blockquote><blockquote =
type=3D"cite">URI.<br></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite">IMO, a strong warning with a =
comprehensive explanation of the =
overall<br></blockquote></blockquote><blockquote type=3D"cite">client =
security model will do much more good than putting horse blinds =
on<br></blockquote><blockquote type=3D"cite">and pretending that what =
the client does right after the callback is =
'not<br></blockquote><blockquote type=3D"cite">OAuth' and something we =
should not care about.<br></blockquote><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite">A MUST use TLS focused narrowly =
on the redirection URI does not =
make<br></blockquote></blockquote><blockquote type=3D"cite">the web =
better. At best, it make one door secure, but it also has =
the<br></blockquote><blockquote type=3D"cite">potential of creating a =
false sense of security which is typically where =
things<br></blockquote><blockquote type=3D"cite">go terribly =
wrong.<br></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite">BTW, a profile of OAuth used =
primarily for login such as the =
proposed<br></blockquote></blockquote><blockquote type=3D"cite">OpenID =
Connect, should make the callback use of TLS required. In =
that<br></blockquote><blockquote type=3D"cite">context, it is a logical =
extension of the server's use of TLS to provide a =
secure<br></blockquote><blockquote type=3D"cite">login =
experience.<br></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote =
type=3D"cite">EHL<br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">-----Original =
Message-----<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">From: =
Skylar Woodward =
[mailto:skylar@kiva.org]<br></blockquote></blockquote></blockquote><blockq=
uote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">Sent: Thursday, March 31, 2011 7:32 =
AM<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">To: =
Dick Hardt<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">Cc: =
Eran Hammer-Lahav; OAuth =
WG<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">Subject:=
 Re: [OAUTH-WG] WGLC on =
draft-ietf-oauth-v2-13.txt<br></blockquote></blockquote></blockquote><bloc=
kquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">A =
requirement for TLS on the callback would make OAuth =
prohibitive<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">for =
many of our developers. The developers are usually volunteers =
and<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">they =
are already donating their own resources to help a =
non-profit<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">(from =
which US law mandates the developers cannot profit). In =
other<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">cases =
the developers are small firms operating in developing =
counties<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">where =
establishing and maintaing a valid certificate may still be =
a<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite">imperfect art.<br></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">In =
short, a requirement like this puts the nail in the coffin of =
many<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">would-be=
 efforts to help =
out.<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">So as =
Dick identifies here, we have sufficient security around =
the<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">authorization grant by tying it client credentials. =
&nbsp;I would thus =
be<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">opposed =
to the term "MUST." &nbsp;I also think it's helpful to have =
the<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">language=
 limit the SHOULD to the non-user-agent cases. There's =
no<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">reason =
we should suggest a callback URI designed for =
client-side<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">intercept to use an HTTPS url - so this is in the spirit =
of Phil's<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">response=
 to Justin's comment on limiting the scope of =
SHOULD.<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">skylar<br></blockquote></blockquote></blockquote><blockquote=
 type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">On Mar =
30, 2011, at 11:19 AM, Dick Hardt =
wrote:<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite">Thanks for pointing out my =
misunderstanding. I was thinking =
client<br></blockquote></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite">in =
the<br></blockquote></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">sense =
of the side of TLS initiating a =
request.<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote><blo=
ckquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite">I agree that requiring TLS on =
the callback is an unexpected =
change.<br></blockquote></blockquote></blockquote></blockquote><blockquote=
 type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote><blo=
ckquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite">I recall reviewing the security =
implications of an =
unsecured<br></blockquote></blockquote></blockquote></blockquote><blockquo=
te type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite">callback as =
being<br></blockquote></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">nominal =
if the authorization grant is linked to the client =
credentials.<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote><blo=
ckquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote><blo=
ckquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite">On 2011-03-29, at 10:07 PM, Eran =
Hammer-Lahav =
wrote:<br></blockquote></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote><blo=
ckquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">I =
think you got this backwards. We're talking about =
forcing<br></blockquote></blockquote></blockquote></blockquote></blockquot=
e><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">developers<br></blockquote></blockquote></blockquote></block=
quote></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite">using the Facebook (or any other =
service) API to deploy their own =
TLS<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">endpoint=
 for the incoming callback (via redirection). Every =
developer<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">will =
need to get a cert and deploy an HTTPS =
endpoint.<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">That's =
has never been =
discussed.<br></blockquote></blockquote></blockquote></blockquote></blockq=
uote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">EHL<br></blockquote></blockquote></blockquote></blockquote><=
/blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">From: =
Dick Hardt =
[mailto:dick.hardt@gmail.com]<br></blockquote></blockquote></blockquote></=
blockquote></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite">Sent: Tuesday, March 29, 2011 =
9:02 =
PM<br></blockquote></blockquote></blockquote></blockquote></blockquote><bl=
ockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">To: =
Eran =
Hammer-Lahav<br></blockquote></blockquote></blockquote></blockquote></bloc=
kquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">Cc: =
WG<br></blockquote></blockquote></blockquote></blockquote></blockquote><bl=
ockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">Subject:=
 Re: [OAUTH-WG] WGLC on =
draft-ietf-oauth-v2-13.txt<br></blockquote></blockquote></blockquote></blo=
ckquote></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">On =
2011-03-29, at 4:40 PM, Eran Hammer-Lahav =
wrote:<br></blockquote></blockquote></blockquote></blockquote></blockquote=
><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">To =
clarify, I am not opposed to mandating TLS on the callback, =
just<br></blockquote></blockquote></blockquote></blockquote></blockquote><=
blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">that =
if<br></blockquote></blockquote></blockquote></blockquote></blockquote><bl=
ockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">we do, we can't ship the protocol the way it is without =
coming up<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">with =
some other alternative that does not require TLS deployment on =
the<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite">client side.<br></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">OAuth =
1.0 has no such requirement and adding it in 2.0 is =
completely<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">unexpected by the community at =
large.<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">I only =
recall the concern with TLS to be on the server side, =
not<br></blockquote></blockquote></blockquote></blockquote></blockquote><b=
lockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">the =
client<br></blockquote></blockquote></blockquote></blockquote></blockquote=
><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">side -- and I don't think that it is unexpected at =
all.<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">It =
would be helpful to hear from some companies with large 1.0 =
or<br></blockquote></blockquote></blockquote></blockquote></blockquote><bl=
ockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">2.0<br></blockquote></blockquote></blockquote></blockquote><=
/blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite">deployment on this matter? =
Anyone from Google, Facebook, =
Yahoo,<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">Twitter,=
 etc.?<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">When =
working on OAuth-WRAP, I talked to all of those =
companies<br></blockquote></blockquote></blockquote></blockquote></blockqu=
ote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite">about<br></blockquote></blockquote></blockquote></blockquote=
></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite">using TLS, and only Facebook =
said that they wanted an option to =
be<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">able =
to not require TLS. Since then, all Facebook's new APIs =
which<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite">are =
essentially using OAuth 2.0 run on =
TLS.<br></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote></bl=
ockquote><blockquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote></blockquote></blockquote><blo=
ckquote type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote =
type=3D"cite">_______________________________________________<br></blockqu=
ote></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite">OAuth mailing =
list<br></blockquote></blockquote></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br></blockquote></blockq=
uote></blockquote></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><blockquote type=3D"cite"><blockquote type=3D"cite"><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a><br></blockquote></blockquote></blockquote></blo=
ckquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote =
type=3D"cite">_______________________________________________<br></blockqu=
ote></blockquote><blockquote type=3D"cite"><blockquote type=3D"cite">OAuth=
 mailing list<br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite"><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br></blockquote></blockq=
uote><blockquote type=3D"cite"><blockquote type=3D"cite"><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a><br></blockquote></blockquote><br></div></blockq=
uote></div><br></div></div></div></body></html>=

--Apple-Mail-5--982205394--

From Michael.Jones@microsoft.com  Thu Mar 31 11:14:12 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7873D3A6B31 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:14:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.579
X-Spam-Level: 
X-Spam-Status: No, score=-10.579 tagged_above=-999 required=5 tests=[AWL=0.019, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ECLeqviVKNeI for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:14:11 -0700 (PDT)
Received: from smtp.microsoft.com (mail2.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 2BD7B3A69C2 for <oauth@ietf.org>; Thu, 31 Mar 2011 11:14:11 -0700 (PDT)
Received: from TK5EX14HUBC104.redmond.corp.microsoft.com (157.54.80.25) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 11:15:50 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14HUBC104.redmond.corp.microsoft.com ([157.54.80.25]) with mapi id 14.01.0270.002; Thu, 31 Mar 2011 11:15:49 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: OAuth 2.0 Bearer Token Specification draft -04
Thread-Index: Acvvz6WMZOICLoxLQyqmfre5g+P+sg==
Date: Thu, 31 Mar 2011 18:15:48 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252C2406@TK5EX14MBXC203.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943252C2406TK5EX14MBXC203r_"
MIME-Version: 1.0
Subject: [OAUTH-WG] OAuth 2.0 Bearer Token Specification draft -04
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:14:12 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943252C2406TK5EX14MBXC203r_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_4E1F6AAD24975D4BA5B1680429673943252C2406TK5EX14MBXC203r_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_4E1F6AAD24975D4BA5B1680429673943252C2406TK5EX14MBXC203r_--

From Internet-Drafts@ietf.org  Thu Mar 31 11:15:03 2011
Return-Path: <Internet-Drafts@ietf.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E8F783A6B38; Thu, 31 Mar 2011 11:15:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.579
X-Spam-Level: 
X-Spam-Status: No, score=-102.579 tagged_above=-999 required=5 tests=[AWL=0.020, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e9gGCFgDFAjI; Thu, 31 Mar 2011 11:15:02 -0700 (PDT)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2DF543A69C2; Thu, 31 Mar 2011 11:15:02 -0700 (PDT)
MIME-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
From: Internet-Drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 3.14
Message-ID: <20110331181502.25585.41265.idtracker@localhost>
Date: Thu, 31 Mar 2011 11:15:02 -0700
Cc: oauth@ietf.org
Subject: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-bearer-04.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:15:03 -0000

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Open Authentication Protocol Working Group of the IETF.


	Title           : The OAuth 2.0 Protocol: Bearer Tokens
	Author(s)       : M. Jones, et al.
	Filename        : draft-ietf-oauth-v2-bearer-04.txt
	Pages           : 18
	Date            : 2011-03-31

This specification describes how to use bearer tokens when accessing
OAuth 2.0 protected resources.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-oauth-v2-bearer-04.txt

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Message/External-body; name="draft-ietf-oauth-v2-bearer-04.txt";
	site="ftp.ietf.org"; access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID: <2011-03-31111319.I-D@ietf.org>


--NextPart--

From Michael.Jones@microsoft.com  Thu Mar 31 11:15:45 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B2FAC28B797; Thu, 31 Mar 2011 11:15:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.58
X-Spam-Level: 
X-Spam-Status: No, score=-10.58 tagged_above=-999 required=5 tests=[AWL=0.018,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CIgU5kAD1VXh; Thu, 31 Mar 2011 11:15:44 -0700 (PDT)
Received: from smtp.microsoft.com (mailb.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 602683A69C2; Thu, 31 Mar 2011 11:15:37 -0700 (PDT)
Received: from TK5EX14HUBC101.redmond.corp.microsoft.com (157.54.7.153) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 11:17:16 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14HUBC101.redmond.corp.microsoft.com ([157.54.7.153]) with mapi id 14.01.0270.002; Thu, 31 Mar 2011 11:17:16 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Phil Hunt <phil.hunt@oracle.com>, George Fletcher <gffletch@aol.com>
Thread-Topic: [OAUTH-WG] OAuth Bearer Token draft
Thread-Index: AQHL59/vQF3/QQ7se06T2jClluYQKJQ4lYAAgA70ehA=
Date: Thu, 31 Mar 2011 18:17:16 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252C242C@TK5EX14MBXC203.redmond.corp.microsoft.com>
References: <288129.60351.qm@web32309.mail.mud.yahoo.com><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AC@IMCMBX3.MITRE.ORG><B9AAB819-3C40-4E6D-9ED5-FFEC905FE065@oracle.com>, <90C41DD21FB7C64BB94121FBBC2E7234464F337368@P3PW5EX1MB01.EX1.SECURESERVER.NET><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71AF@IMCMBX3.MITRE.ORG>, <F3A733F7-4A4B-45E1-8879-EBBFCC82FA48@oracle.com><D24C564ACEAD16459EF2526E1D7D605D0FFC3C71B1@IMCMBX3.MITRE.ORG><0BB28BF7-0331-4C6E-ABE3-A18FB0FB71D3@oracle.com><4D79461C.1020200@lodderstedt.net><5A61CBCB-F644-4B43-937C-1BE59AC9B013@oracle.com><4D796C9E.1070507@aol.com><4E1F6AAD24975D4BA5B16804296739432528C8AB@TK5EX14MBXC207.redmond.corp.microsoft.com> <1986667044-1299830172-cardhu_decombobulator_blackberry.rim.net-393558361-@b1.c11.bise7.blackberry> <4D8773CC.4010003@aol.com> <88DBF649-171E-4E40-BE66-D5520C0CA84E@oracle.com>
In-Reply-To: <88DBF649-171E-4E40-BE66-D5520C0CA84E@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943252C242CTK5EX14MBXC203r_"
MIME-Version: 1.0
Cc: "oauth-bounces@ietf.org" <oauth-bounces@ietf.org>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:15:45 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943252C242CTK5EX14MBXC203r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

This suggestion has been adopted in draft 04.

                                                            Thanks all,
                                                            -- Mike

From: Phil Hunt [mailto:phil.hunt@oracle.com]
Sent: Monday, March 21, 2011 11:44 AM
To: George Fletcher
Cc: Mike Jones; oauth-bounces@ietf.org; OAuth WG
Subject: Re: [OAUTH-WG] OAuth Bearer Token draft

+1

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>




On 2011-03-21, at 8:50 AM, George Fletcher wrote:


+1

On 3/11/11 2:56 AM, torsten@lodderstedt.net<mailto:torsten@lodderstedt.net>=
 wrote:

Why not "bearer_token"? This would be in line with the Authorization scheme=
 name.



regards,

Torsten.

Gesendet mit BlackBerry(r) Webmail von Telekom Deutschland



-----Original Message-----

From: Mike Jones <Michael.Jones@microsoft.com><mailto:Michael.Jones@microso=
ft.com>

Sender: oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org>

Date: Fri, 11 Mar 2011 01:54:00

To: OAuth WG<oauth@ietf.org><mailto:oauth@ietf.org>

Subject: Re: [OAUTH-WG] OAuth Bearer Token draft



_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth



_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth





--

Chief Architect                   AIM:  gffletch

Identity Services Engineering     Work: george.fletcher@teamaol.com<mailto:=
george.fletcher@teamaol.com>

AOL Inc.                          Home: gffletch@aol.com<mailto:gffletch@ao=
l.com>

Mobile: +1-703-462-3494           Blog: http://practicalid.blogspot.com<htt=
p://practicalid.blogspot.com/>

Office: +1-703-265-2544           Twitter: http://twitter.com/gffletch
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_4E1F6AAD24975D4BA5B1680429673943252C242CTK5EX14MBXC203r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#002060;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">This suggestion has been =
adopted in draft 04.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Thanks all,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Phil Hun=
t [mailto:phil.hunt@oracle.com]
<br>
<b>Sent:</b> Monday, March 21, 2011 11:44 AM<br>
<b>To:</b> George Fletcher<br>
<b>Cc:</b> Mike Jones; oauth-bounces@ietf.org; OAuth WG<br>
<b>Subject:</b> Re: [OAUTH-WG] OAuth Bearer Token draft<o:p></o:p></span></=
p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&#43;1<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;;color:black">Phil<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;;color:black"><a href=3D"mailto:phil.hun=
t@oracle.com">phil.hunt@oracle.com</a><o:p></o:p></span></p>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;;color:black"><o:p>&nbsp;</o:p></span><=
/p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:13.5pt;font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;;color:black"><br>
<br>
</span><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On 2011-03-21, at 8:50 AM, George Fletcher wrote:<o:=
p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Helvetica&quot;,&qu=
ot;sans-serif&quot;">&#43;1<br>
<br>
</span>On 3/11/11 2:56 AM, <a href=3D"mailto:torsten@lodderstedt.net">torst=
en@lodderstedt.net</a> wrote:
<o:p></o:p></p>
<pre>Why not &quot;bearer_token&quot;? This would be in line with the Autho=
rization scheme name.<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>regards,<o:p></o:p></pre>
<pre>Torsten.<o:p></o:p></pre>
<pre>Gesendet mit BlackBerry&reg; Webmail von Telekom Deutschland&nbsp; <o:=
p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>-----Original Message-----<o:p></o:p></pre>
<pre>From: Mike Jones <a href=3D"mailto:Michael.Jones@microsoft.com">&lt;Mi=
chael.Jones@microsoft.com&gt;</a><o:p></o:p></pre>
<pre>Sender: <a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.o=
rg</a><o:p></o:p></pre>
<pre>Date: Fri, 11 Mar 2011 01:54:00 <o:p></o:p></pre>
<pre>To: OAuth WG<a href=3D"mailto:oauth@ietf.org">&lt;oauth@ietf.org&gt;</=
a><o:p></o:p></pre>
<pre>Subject: Re: [OAUTH-WG] OAuth Bearer Token draft<o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>OAuth mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ie=
tf.org/mailman/listinfo/oauth</a><o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>OAuth mailing list<o:p></o:p></pre>
<pre><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><o:p></o:p></pre>
<pre><a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ie=
tf.org/mailman/listinfo/oauth</a><o:p></o:p></pre>
<pre><o:p>&nbsp;</o:p></pre>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<pre>-- <o:p></o:p></pre>
<pre>Chief Architect&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AIM:&nbsp; gffletch<o=
:p></o:p></pre>
<pre>Identity Services Engineering&nbsp;&nbsp;&nbsp;&nbsp; Work: <a href=3D=
"mailto:george.fletcher@teamaol.com">george.fletcher@teamaol.com</a><o:p></=
o:p></pre>
<pre>AOL Inc.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp; Home: <a href=3D"mailto:gffletch@aol.com">gffletch@aol.com</a=
><o:p></o:p></pre>
<pre>Mobile: &#43;1-703-462-3494&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; Blog: <a href=3D"http://practicalid.blogspot.com/">http:/=
/practicalid.blogspot.com</a><o:p></o:p></pre>
<pre>Office: &#43;1-703-265-2544&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; Twitter: <a href=3D"http://twitter.com/gffletch">http://t=
witter.com/gffletch</a><o:p></o:p></pre>
</div>
<p class=3D"MsoNormal">_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.or=
g/mailman/listinfo/oauth</a><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943252C242CTK5EX14MBXC203r_--

From Michael.Jones@microsoft.com  Thu Mar 31 11:16:43 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 599243A6B85 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:16:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.581
X-Spam-Level: 
X-Spam-Status: No, score=-10.581 tagged_above=-999 required=5 tests=[AWL=0.018, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PjQYTO6swkBL for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:16:42 -0700 (PDT)
Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id 332813A6B31 for <oauth@ietf.org>; Thu, 31 Mar 2011 11:16:42 -0700 (PDT)
Received: from TK5EX14HUBC102.redmond.corp.microsoft.com (157.54.7.154) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 11:18:21 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14HUBC102.redmond.corp.microsoft.com ([157.54.7.154]) with mapi id 14.01.0270.002; Thu, 31 Mar 2011 11:18:21 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Peter Saint-Andre <stpeter@stpeter.im>
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
Thread-Index: AQHL2KwNtNCYQQdTT0GgApQhUIlMWpQ8BjeAgAI+PICAAfqgAIAHiA4Q
Date: Thu, 31 Mar 2011 18:18:20 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252C244C@TK5EX14MBXC203.redmond.corp.microsoft.com>
References: <CD86669D-CFBA-4557-9680-448DF65CFB0A@gmx.net> <4D8A65BF.7060506@stpeter.im> <90C41DD21FB7C64BB94121FBBC2E7234465642FEAB@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4D8DF070.30106@stpeter.im>
In-Reply-To: <4D8DF070.30106@stpeter.im>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:16:43 -0000
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From Michael.Jones@microsoft.com  Thu Mar 31 11:16:48 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3BD4328C10A for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:16:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.581
X-Spam-Level: 
X-Spam-Status: No, score=-10.581 tagged_above=-999 required=5 tests=[AWL=0.017, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9rDVzSe1onI9 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:16:42 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 02EC73A69FC for <oauth@ietf.org>; Thu, 31 Mar 2011 11:16:41 -0700 (PDT)
Received: from TK5EX14MLTC102.redmond.corp.microsoft.com (157.54.79.180) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 11:18:21 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14MLTC102.redmond.corp.microsoft.com ([157.54.79.180]) with mapi id 14.01.0270.002; Thu, 31 Mar 2011 11:18:21 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
Thread-Index: AQHL2LRDx1NZtUoMi0K94kqaj5UetJQ7/DmAgAvCfJA=
Date: Thu, 31 Mar 2011 18:18:00 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252C2447@TK5EX14MBXC203.redmond.corp.microsoft.com>
References: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net> <4D8A5D6B.6040003@lodderstedt.net>
In-Reply-To: <4D8A5D6B.6040003@lodderstedt.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943252C2447TK5EX14MBXC203r_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:16:48 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943252C2447TK5EX14MBXC203r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Responses to suggestions not adopted on draft 04 are inline below.  Thanks =
for your input.



                                                            -- Mike

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of T=
orsten Lodderstedt
Sent: Wednesday, March 23, 2011 1:52 PM
To: Hannes Tschofenig
Cc: OAuth WG
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt

> section 2.4
>
> What is the meaning of the component "( token "=3D" ( token / quoted-stri=
ng ) )" in the definiton of the rule "param"?

Can any of the other working group members who participated in writing this=
 particular text answer this question?  I agree that this should be defined=
 in the specification.

> "The "scope" attribute MUST NOT appear more than once."
> Is the scope optional?

Yes.  Is there a particular change to the text that you believe is necessar=
y?

> section 2.4.1
>
> I don't see the benefit of those error codes as they replicate the meanin=
g of HTTP status codes 400, 401, and 403.

I disagree with this comment, as these error codes are more specific than t=
he corresponding HTTP status codes.  Furthermore, before making any change =
to the error codes, I would want to see a demonstration of working group co=
nsensus for a specific change before making it.

> section 3.1
>
> "Token redirect" - does this also cover the threat of a counterfeit serve=
r phishing and abusing tokens (https://tools.ietf.org/html/draft-loddersted=
t-oauth-security-01#section-4.6.4)?

No, it does not, as I see it, but because the list of threats comes from NI=
ST800-63, I'm not prone to expand it here.  I believe that this was text or=
iginally authored by you.  What specific change would you suggest?

> I would furthermore suggest to add the following paragraph to this sectio=
n:
>
> Token abuse by counterfeit server: Clients SHOULD not make authenticated =
requests with an access
>       token to unfamiliar resource servers, regardless of the presence
>       of a secure channel.  If the resource server address is well-known
>       to the client, it MUST authenticate the resource servers by using H=
TTPS server authentication prior sending the request.

I believe that the suggested addition is largely redundant with this existi=
ng text:  "Presenting the token to an unauthenticated and unauthorized reso=
urce server or failing to validate the certificate chain will allow adversa=
ries to steal the token and gain unauthorized access to protected resources=
".  Is there are specific change you'd like to propose that would consolida=
te both statements of this security principle?

> section 3.3
>
> "Don't store bearer tokens in cookies As cookies are generally sent in th=
e clear, implementations MUST NOT store bearer tokens within
>       them."
>
> Every cookie can be declared to be send over encrypted channels only. Mor=
eover, it is subject to a same origin policy. So what is the threat here? I=
s it about the storage in the clear?

The threat is about transmission in the clear.  This point has already been=
 reworked in response to other comments.  Your comments on the new text wou=
ld be welcome.




--_000_4E1F6AAD24975D4BA5B1680429673943252C2447TK5EX14MBXC203r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";
	color:black;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;
	color:black;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#002060;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoPlainText">Responses to suggestions not adopted on draft 04 =
are inline below.&nbsp; Thanks for your input.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><spa=
n style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif=
&quot;;color:windowtext"> oauth-bounces@ietf.org [mailto:oauth-bounces@ietf=
.org]
<b>On Behalf Of </b>Torsten Lodderstedt<br>
<b>Sent:</b> Wednesday, March 23, 2011 1:52 PM<br>
<b>To:</b> Hannes Tschofenig<br>
<b>Cc:</b> OAuth WG<br>
<b>Subject:</b> Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt<o:=
p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">&gt; </span>section 2.=
4<br>
<span style=3D"color:#002060">&gt;</span><br>
<span style=3D"color:#002060">&gt; </span>What is the meaning of the compon=
ent &quot;( token &quot;=3D&quot; ( token / quoted-string ) )&quot; in the =
definiton of the rule &quot;param&quot;?<br>
<br>
<span style=3D"color:#002060"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">Can any of the other work=
ing group members who participated in writing this particular text answer t=
his question?&nbsp; I agree that this should be defined in the
 specification.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><br>
<span style=3D"color:#002060">&gt; </span>&quot;The &quot;scope&quot; attri=
bute MUST NOT appear more than once.&quot;&nbsp;
<br>
<span style=3D"color:#002060">&gt; </span>Is the scope optional?<br>
<br>
<span style=3D"color:#002060"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">Yes.&nbsp; Is there a par=
ticular change to the text that you believe is necessary?<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><br>
<span style=3D"color:#002060">&gt; </span>section 2.4.1<br>
<span style=3D"color:#002060">&gt;</span><br>
<span style=3D"color:#002060">&gt; </span>I don't see the benefit of those =
error codes as they replicate the meaning of HTTP status codes 400, 401, an=
d 403.<br>
<br>
<span style=3D"color:#002060"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">I disagree with this comm=
ent, as these error codes are more specific than the corresponding HTTP sta=
tus codes.&nbsp; Furthermore, before making any change to the
 error codes, I would want to see a demonstration of working group consensu=
s for a specific change before making it.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><br>
<span style=3D"color:#002060">&gt; </span>section 3.1<br>
<span style=3D"color:#002060">&gt;</span><br>
<span style=3D"color:#002060">&gt; </span>&quot;Token redirect&quot; - does=
 this also cover the threat of a counterfeit server phishing and abusing to=
kens (<a href=3D"https://tools.ietf.org/html/draft-lodderstedt-oauth-securi=
ty-01#section-4.6.4">https://tools.ietf.org/html/draft-lodderstedt-oauth-se=
curity-01#section-4.6.4</a>)?
<br>
<br>
<span style=3D"color:#002060"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">No, it does not, as I see=
 it, but because the list of threats comes from NIST800-63, I&#8217;m not p=
rone to expand it here.&nbsp; I believe that this was text originally
 authored by you.&nbsp; What specific change would you suggest?<o:p></o:p><=
/span></p>
<p class=3D"MsoNormal"><br>
<span style=3D"color:#002060">&gt; </span>I would furthermore suggest to ad=
d the following paragraph to this section:<br>
<span style=3D"color:#002060">&gt;</span><br>
<span style=3D"color:#002060">&gt; </span>Token abuse by counterfeit server=
: Clients SHOULD not make authenticated requests with an access<br>
<span style=3D"color:#002060">&gt; </span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to=
ken to unfamiliar resource servers, regardless of the presence<br>
<span style=3D"color:#002060">&gt; </span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; of=
 a secure channel.&nbsp; If the resource server address is well-known<br>
<span style=3D"color:#002060">&gt; </span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; to=
 the client, it MUST authenticate the resource servers by using HTTPS serve=
r authentication prior sending the request.<br>
<br>
<span style=3D"color:#002060"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">I believe that the sugges=
ted addition is largely redundant with this existing text:&nbsp; &#8220;Pre=
senting the token to an unauthenticated and unauthorized resource server
 or failing to validate the certificate chain will allow adversaries to ste=
al the token and gain unauthorized access to protected resources&#8221;.&nb=
sp; Is there are specific change you&#8217;d like to propose that would con=
solidate both statements of this security principle?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><br>
<span style=3D"color:#002060">&gt; </span>section 3.3<br>
<span style=3D"color:#002060">&gt;</span><br>
<span style=3D"color:#002060">&gt; </span>&quot;Don't store bearer tokens i=
n cookies As cookies are generally sent in the clear, implementations MUST =
NOT store bearer tokens within<br>
<span style=3D"color:#002060">&gt; </span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; th=
em.&quot;&nbsp;&nbsp;&nbsp; <br>
<span style=3D"color:#002060">&gt;</span><br>
<span style=3D"color:#002060">&gt; </span>Every cookie can be declared to b=
e send over encrypted channels only. Moreover, it is subject to a same orig=
in policy. So what is the threat here? Is it about the storage in the clear=
?<br>
<br>
<span style=3D"color:#002060"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#002060">The threat is about trans=
mission in the clear.&nbsp; This point has already been reworked in respons=
e to other comments.&nbsp; Your comments on the new text would be
 welcome.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<pre><o:p>&nbsp;</o:p></pre>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943252C2447TK5EX14MBXC203r_--

From Michael.Jones@microsoft.com  Thu Mar 31 11:17:12 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 722863A6B85 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:17:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.582
X-Spam-Level: 
X-Spam-Status: No, score=-10.582 tagged_above=-999 required=5 tests=[AWL=0.017, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ngUOBxqvRSlM for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:17:11 -0700 (PDT)
Received: from smtp.microsoft.com (mailc.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id 9E8463A6B31 for <oauth@ietf.org>; Thu, 31 Mar 2011 11:17:11 -0700 (PDT)
Received: from TK5EX14HUBC103.redmond.corp.microsoft.com (157.54.86.9) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 11:18:51 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14HUBC103.redmond.corp.microsoft.com ([157.54.86.9]) with mapi id 14.01.0270.002; Thu, 31 Mar 2011 11:18:51 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, OAuth WG <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
Thread-Index: AQHL2LRDx1NZtUoMi0K94kqaj5UetJQaw+AAgCy68/A=
Date: Thu, 31 Mar 2011 18:18:50 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252C2466@TK5EX14MBXC203.redmond.corp.microsoft.com>
References: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net> <90C41DD21FB7C64BB94121FBBC2E7234464F0C3D88@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234464F0C3D88@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:17:12 -0000

Responses to suggestions not adopted are inline below.  Thanks for your inp=
ut.

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of E=
ran Hammer-Lahav
Sent: Wednesday, March 02, 2011 8:34 AM
To: Hannes Tschofenig; OAuth WG
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt

Last call comments on draft-ietf-oauth-v2-bearer-03:

> Section 2.1:
>
> - RWS should be replaces with SP since the header has no other attributes=
 (and should not have any). This will make parsing easier by mandating a si=
ngle space (unless HTTPbis has other guidelines).

This is insufficient rationale to introduce a potentially breaking change. =
 I would want to see a demonstration of working group consensus for this ch=
ange before making it.

> Section 2.4:
>=20
> - ABNF includes '( token "=3D" ( token / quoted-string ) )', but no prose=
 is provided about how new parameters may be defined. Retained this extensi=
bility point must be justified with actual use cases.

This is insufficient rationale to introduce a breaking change.  I would wan=
t to see a demonstration of working group consensus for this change before =
making it.

> Section 2.4.1:
>
> - Why are the HTTP error code suggested and not required?

Because the spec should not presume that only the example HTTP error codes =
might occur.

> Section 4.3:
>=20
> - This registry is unnecessary and adds no value here (namespace collisio=
n is unlikely in general, and unlikely to cause problems). No use cases whe=
re suggested to justify it, and no additional error codes were proposed in =
over a year of discussions. Error codes were intentionally left non-extensi=
ble to increase interoperability. If addition color is needed for existing =
error codes, additional response parameters may be registered. Otherwise, i=
f new error codes are needed, a new RFC must be published updating draft-ie=
tf-oauth-v2.
> - The only way to define such a registry is to bring it up as a comment f=
or draft-ietf-oauth-v2. Otherwise, it is limited to the Bearer token header=
 only (and since this document is not extensible, not needed even here).

Your "Error extensibility proposal" note sent on 3/29/2011 documents the ne=
ed for error extensibility.  This registry meets this need, while being sim=
pler than the 3/29 proposal and in line with standard IETF extensibility pr=
actices.


From Michael.Jones@microsoft.com  Thu Mar 31 11:17:34 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 852093A69FC for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:17:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.582
X-Spam-Level: 
X-Spam-Status: No, score=-10.582 tagged_above=-999 required=5 tests=[AWL=0.016, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZoaxUrWPS6EN for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:17:25 -0700 (PDT)
Received: from smtp.microsoft.com (mail2.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id C5F1B28C0D8 for <oauth@ietf.org>; Thu, 31 Mar 2011 11:17:25 -0700 (PDT)
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (157.54.80.48) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 11:19:05 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14HUBC105.redmond.corp.microsoft.com ([157.54.80.48]) with mapi id 14.01.0270.002; Thu, 31 Mar 2011 11:19:04 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>, OAuth Mailing List <oauth@ietf.org>
Thread-Topic: Comments on draft-ietf-oauth-v2-bearer-03
Thread-Index: AcvZVAhzw0GRBeXeR+WutxG9byCctAWSHj/A
Date: Thu, 31 Mar 2011 18:19:03 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252C2470@TK5EX14MBXC203.redmond.corp.microsoft.com>
References: <255B9BB34FB7D647A506DC292726F6E1127F5DFA5F@WSMSG3153V.srv.dir.telstra.com>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E1127F5DFA5F@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943252C2470TK5EX14MBXC203r_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Comments on draft-ietf-oauth-v2-bearer-03
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:17:34 -0000

--_000_4E1F6AAD24975D4BA5B1680429673943252C2470TK5EX14MBXC203r_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Responses to suggestions not adopted are inline below.  Thanks for your inp=
ut.



                                                            -- Mike

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of M=
anger, James H
Sent: Wednesday, March 02, 2011 7:35 PM
To: OAuth Mailing List
Subject: [OAUTH-WG] Comments on draft-ietf-oauth-v2-bearer-03

> 1. There is a whole lot of text about OAuth2 get-a-token parts that isn't=
 necessary in the bearer token spec.
> A bit of context can be useful to a reader, but in this case it brings to=
o much of the complexity of the get-a-token flows into what should be a qui=
te simple spec. It is not as though it can replace reading OAuth2 core.

I believe that the text you mention is important to set the context for the=
 use of OAuth 2.0 bearer tokens so readers will understand the context and =
purpose of this specification.  I would, however, consider further clarifyi=
ng this text in a future draft, should you provide specific proposed edits =
that retain this context.

> 1a. Change the title from "The OAuth 2.0 Protocol: Bearer Tokens" to
>  "The BEARER HTTP authentication scheme", or
> "Using Bearer Tokens in HTTP requests".

Given that this specification is about using OAuth 2.0 with bearer tokens, =
removing "OAuth 2.0" from the title would remove necessary context that fra=
mes the purpose of the specification.

> 2. The abstract should say this is a mechanism for HTTP requests. My sugg=
estion:
>   "This specification describes how to include a bearer token conveying a=
uthorization information in an HTTP request. It also describes how to recog=
nize a bearer token delivered by an OAuth 2.0 delegation flow."

As above, I believe that this proposed change over-generalizes the intended=
 purpose and scope of the specification, making it less clear to implemente=
rs and adopters.

> 4. Drop most of the "Introduction" and all of the "Overview". These are a=
ll about OAuth2 core and aren't necessary for understanding how to use a be=
arer token in an HTTP request. Here is my suggestion:
> "Introduction
>
> "A bearer token is the simplest mechanism for a client to convey its auth=
ority when sending a request to a server. A server accepting a bearer token=
 assumes the authority it represents applies to whom ever presented it. Tha=
t is, there is no additional authentication of the client. Consequently, it=
 is crucial that a bearer token is never exposed to any party that might mi=
suse it. Using bearer tokens that only represents a limited amount of autho=
rity, in a specific context, for a short amount of time can reduce the risk=
s of using bearer tokens.
>
> "This document specifies the "BEARER" HTTP authentication scheme for conv=
eying a bearer token in an HTTP request header. It also specifies two alter=
natives for situations where it is infeasible for clients to modify HTTP he=
aders: a URI query parameter; and a parameter in the body of a POST that us=
es the application/x-www-form-urlencoded media type.
>
> "For example:
>  GET /resource HTTP/1.1
>  Host: example.com
>  Authorization: BEARER vF9dft4qmTG_fdf-qwAS
>
> "One possible source of dynamically issued bearer tokens is an OAuth 2.0 =
flow for user delegation or credential exchange as specified in [OAUTH2]. S=
ection X of this document describes how a bearer token is represented in an=
 OAuth 2.0 token response."

I believe that the text you mention is important to set the context for the=
 use of OAuth 2.0 bearer tokens so readers will understand the context and =
purpose of this specification.  I would, however, consider further clarifyi=
ng this text in a future draft, should you provide specific proposed edits =
that retain this context.

> 8. The allowed characters in <access-token> is crazy. Using <quoted-char>=
, but not within quotes is not a good sign?!
> Token issuers don't need 93 allowed chars, just allow the 66 web-safe one=
s and make it simpler for everyone.


This is insufficient rationale to introduce a breaking change.  I would wan=
t to see a demonstration of working group consensus for this change before =
making it.

10. Instead of concentrating on when a "WWW-Authenticate: Bearer" response =
header MUST be returned, we should focus what it means when it is present i=
n a response. Servers can return it when they need that meaning. This would=
 makes it clearer that it can be included with, say, a 200 OK response to i=
ndicate that more would be available if a bearer token had been included.

I would want to see demonstration of a working group consensus to expend th=
e usage of this field in this manner before making this change.

> 11. The "WWW-Authenticate: Bearer" response header would be a good place =
for the server to indicate whether or not it supports the URI & POST-body o=
ptional methods for conveying a bearer token. Perhaps a supports=3D"body qu=
ery" parameter?

I would want to see a specific proposal and a demonstration of a working gr=
oup consensus to expend the usage of this field in this manner before makin=
g this change.

> 12. A section explaining how a client can recognizes when a OAuth 2.0 tok=
en response contains a bearer token is needed. It would simply says that th=
e token_type parameter SHALL have the value "bearer" when the token is inte=
nded to be used with the methods defined in this spec.

It's not clear to me that overloading the meaning of the token_type paramet=
er in this manner would increase interoperability.  I would want to see dem=
onstration of a working group consensus to overload the meaning of the toke=
n_type parameter in this fashion before making this change.


--_000_4E1F6AAD24975D4BA5B1680429673943252C2470TK5EX14MBXC203r_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#002060;}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoPlainText">Responses to suggestions not adopted are inline b=
elow.&nbsp; Thanks for your input.<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><o:p>&nbsp;</o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> oauth-bo=
unces@ietf.org [mailto:oauth-bounces@ietf.org]
<b>On Behalf Of </b>Manger, James H<br>
<b>Sent:</b> Wednesday, March 02, 2011 7:35 PM<br>
<b>To:</b> OAuth Mailing List<br>
<b>Subject:</b> [OAUTH-WG] Comments on draft-ietf-oauth-v2-bearer-03<o:p></=
o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">1. There is a whole lot of text about OAuth2 get-=
a-token parts that isn&#8217;t necessary in the bearer token spec.<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">A bit of context can be useful to a reader, but i=
n this case it brings too much of the complexity of the get-a-token flows i=
nto what should be a quite simple spec. It
 is not as though it can replace reading OAuth2 core.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">I belie=
ve that the text you mention is important to set the context for the use of=
 OAuth 2.0 bearer tokens so readers will understand the context and purpose=
 of this specification.&nbsp; I would, however,
 consider further clarifying this text in a future draft, should you provid=
e specific proposed edits that retain this context.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">1a. Change the title from &#8220;The OAuth 2.0 Pr=
otocol: Bearer Tokens&#8221; to<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">&nbsp;&#8220;The BEARER HTTP authentication schem=
e&#8221;, or<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">&#8220;Using Bearer Tokens in HTTP requests&#8221=
;.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">Given t=
hat this specification is about using OAuth 2.0 with bearer tokens, removin=
g &#8220;OAuth 2.0&#8221; from the title would remove necessary context tha=
t frames the purpose of the specification.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">2. The abstract should say this is a mechanism fo=
r HTTP requests. My suggestion:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">&nbsp; &#8220;This specification describes how to=
 include a bearer token conveying authorization information in an HTTP requ=
est. It also describes how to recognize a bearer token
 delivered by an OAuth 2.0 delegation flow.&#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">As abov=
e, I believe that this proposed change over-generalizes the intended purpos=
e and scope of the specification, making it less clear to implementers and =
adopters.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">4. Drop most of the &#8220;Introduction&#8221; an=
d all of the &#8220;Overview&#8221;. These are all about OAuth2 core and ar=
en&#8217;t necessary for understanding how to use a bearer token in an HTTP
 request. Here is my suggestion:<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;
</span><span lang=3D"EN-AU">&#8220;Introduction<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;</span><span lang=3D"EN-AU"><o:p>&nbsp;</o:p></span=
></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;
</span><span lang=3D"EN-AU">&#8220;A bearer token is the simplest mechanism=
 for a client to convey its authority when sending a request to a server. A=
 server accepting a bearer token assumes the authority it represents applie=
s to whom ever presented it. That is, there
 is no additional authentication of the client. Consequently, it is crucial=
 that a bearer token is never exposed to any party that might misuse it. Us=
ing bearer tokens that only represents a limited amount of authority, in a =
specific context, for a short amount
 of time can reduce the risks of using bearer tokens.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;</span><span lang=3D"EN-AU"><o:p>&nbsp;</o:p></span=
></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;
</span><span lang=3D"EN-AU">&#8220;This document specifies the &#8220;BEARE=
R&#8221; HTTP authentication scheme for conveying a bearer token in an HTTP=
 request header. It also specifies two alternatives for situations where it=
 is infeasible for clients to modify HTTP headers: a
 URI query parameter; and a parameter in the body of a POST that uses the a=
pplication/x-www-form-urlencoded media type.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;</span><span lang=3D"EN-AU"><o:p>&nbsp;</o:p></span=
></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;
</span><span lang=3D"EN-AU">&#8220;For example:<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;</span><span lang=3D"EN-AU">&nbsp; GET /resource HT=
TP/1.1<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;</span><span lang=3D"EN-AU">&nbsp; Host: example.co=
m<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;</span><span lang=3D"EN-AU">&nbsp; Authorization: B=
EARER vF9dft4qmTG_fdf-qwAS<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;</span><span lang=3D"EN-AU"><o:p>&nbsp;</o:p></span=
></p>
<p class=3D"MsoNormal" style=3D"text-indent:.5in"><span lang=3D"EN-AU" styl=
e=3D"color:#002060">&gt;
</span><span lang=3D"EN-AU">&#8220;One possible source of dynamically issue=
d bearer tokens is an OAuth 2.0 flow for user delegation or credential exch=
ange as specified in [OAUTH2]. Section X of this document describes how a b=
earer token is represented in an OAuth 2.0
 token response.&#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">I belie=
ve that the text you mention is important to set the context for the use of=
 OAuth 2.0 bearer tokens so readers will understand the context and purpose=
 of this specification.&nbsp; I would, however,
 consider further clarifying this text in a future draft, should you provid=
e specific proposed edits that retain this context.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">8. The allowed characters in &lt;access-token&gt;=
 is crazy. Using &lt;quoted-char&gt;, but not within quotes is not a good s=
ign?!<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">Token issuers don&#8217;t need 93 allowed chars, =
just allow the 66 web-safe ones and make it simpler for everyone.<o:p></o:p=
></span></p>
<p class=3D"MsoPlainText"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p=
>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">This is=
 insufficient rationale to introduce a breaking change.&nbsp; I would want =
to see a demonstration of working group consensus for this change before ma=
king it.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU">10. Instead of concentrating on=
 when a &#8220;WWW-Authenticate: Bearer&#8221; response header MUST be retu=
rned, we should focus what it means when it is present in a response. Serve=
rs can return it when they need that meaning. This
 would makes it clearer that it can be included with, say, a 200 OK respons=
e to indicate that more would be available if a bearer token had been inclu=
ded.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">I would=
 want to see demonstration of a working group consensus to expend the usage=
 of this field in this manner before making this change.<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">11. The &#8220;WWW-Authenticate: Bearer&#8221; re=
sponse header would be a good place for the server to indicate whether or n=
ot it supports the URI &amp; POST-body optional methods for
 conveying a bearer token. Perhaps a supports=3D&#8221;body query&#8221; pa=
rameter?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">I would=
 want to see a specific proposal and a demonstration of a working group con=
sensus to expend the usage of this field in this manner before making this =
change.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">&gt; </=
span><span lang=3D"EN-AU">12. A section explaining how a client can recogni=
zes when a OAuth 2.0 token response contains a bearer token is needed. It w=
ould simply says that the token_type parameter
 SHALL have the value &#8220;bearer&#8221; when the token is intended to be=
 used with the methods defined in this spec.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU" style=3D"color:#002060">It&#821=
7;s not clear to me that overloading the meaning of the token_type paramete=
r in this manner would increase interoperability.&nbsp; I would want to see=
 demonstration of a working group consensus to overload
 the meaning of the token_type parameter in this fashion before making this=
 change.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-AU"><o:p>&nbsp;</o:p></span></p>
</div>
</body>
</html>

--_000_4E1F6AAD24975D4BA5B1680429673943252C2470TK5EX14MBXC203r_--

From Michael.Jones@microsoft.com  Thu Mar 31 11:18:11 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5F00B3A6B7C for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:18:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.582
X-Spam-Level: 
X-Spam-Status: No, score=-10.582 tagged_above=-999 required=5 tests=[AWL=0.017, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GrW1Pfbm+3PB for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:18:10 -0700 (PDT)
Received: from smtp.microsoft.com (mailb.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id A400B3A6B38 for <oauth@ietf.org>; Thu, 31 Mar 2011 11:18:10 -0700 (PDT)
Received: from TK5EX14HUBC104.redmond.corp.microsoft.com (157.54.80.25) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 11:19:50 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14HUBC104.redmond.corp.microsoft.com ([157.54.80.25]) with mapi id 14.01.0270.002; Thu, 31 Mar 2011 11:19:49 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Ron Monzillo <ron.monzillo@oracle.com>, OAuth WG <oauth@ietf.org>
Thread-Topic: editorial comment on section 2 of bearer token draft
Thread-Index: AQHL3/mUQrEv0dpnH0OtojFmnHU5FpRHmYgw
Date: Thu, 31 Mar 2011 18:19:49 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252C2488@TK5EX14MBXC203.redmond.corp.microsoft.com>
References: <4D7A3314.2090600@oracle.com>
In-Reply-To: <4D7A3314.2090600@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] editorial comment on section 2 of bearer token draft
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:18:11 -0000

This text has been revised accordingly in draft 04.  Thanks for the feedbac=
k.

				-- Mike

-----Original Message-----
From: Ron Monzillo [mailto:ron.monzillo@oracle.com]=20
Sent: Friday, March 11, 2011 6:35 AM
To: OAuth WG; Mike Jones
Subject: editorial comment on section 2 of bearer token draft

 http://tools.ietf.org/html/draft-ietf-oauth-v2-bearer-03

the doc's stated purpose is to describe "how to use bearer tokens when acce=
ssing OAuth 2.0 protected resources".

but then in section 2 and 2.1, it describes how clients make "authenticated=
 token requests"; which can be read as an authenticated request for a (e.g.=
, access) token, where, imv, what is being described is the use of a (beare=
r) token to access a protected resource.

Ron



From Michael.Jones@microsoft.com  Thu Mar 31 11:18:32 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BBDB03A6B6A for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:18:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.583
X-Spam-Level: 
X-Spam-Status: No, score=-10.583 tagged_above=-999 required=5 tests=[AWL=0.016, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pKtsLGc2wFoE for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:18:31 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id 601E63A6B31 for <oauth@ietf.org>; Thu, 31 Mar 2011 11:18:31 -0700 (PDT)
Received: from TK5EX14HUBC103.redmond.corp.microsoft.com (157.54.86.9) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 11:20:10 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14HUBC103.redmond.corp.microsoft.com ([157.54.86.9]) with mapi id 14.01.0270.002; Thu, 31 Mar 2011 11:20:10 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Peter Saint-Andre <stpeter@stpeter.im>
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
Thread-Index: AQHL2LRDx1NZtUoMi0K94kqaj5UetJQ7z06AgAvaFfA=
Date: Thu, 31 Mar 2011 18:20:09 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252C2494@TK5EX14MBXC203.redmond.corp.microsoft.com>
References: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net> <4D8A37BD.2040604@stpeter.im>
In-Reply-To: <4D8A37BD.2040604@stpeter.im>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:18:32 -0000
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From eran@hueniverse.com  Thu Mar 31 11:23:43 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 39AF13A6AAB for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:23:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.636
X-Spam-Level: 
X-Spam-Status: No, score=-2.636 tagged_above=-999 required=5 tests=[AWL=-0.037, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SfnUVfAHRL5w for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:23:42 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 55FD43A6A86 for <oauth@ietf.org>; Thu, 31 Mar 2011 11:23:42 -0700 (PDT)
Received: (qmail 7140 invoked from network); 31 Mar 2011 18:25:21 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 31 Mar 2011 18:25:21 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 31 Mar 2011 11:25:21 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Mike Jones <Michael.Jones@microsoft.com>, OAuth WG <oauth@ietf.org>
Date: Thu, 31 Mar 2011 11:25:13 -0700
Thread-Topic: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
Thread-Index: AQHL2LRDx1NZtUoMi0K94kqaj5UetJQaw+AAgCy68/CAAHDxUA==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664D63C@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <3EC990E1-78A4-4568-A2AA-1AE368862689@gmx.net> <90C41DD21FB7C64BB94121FBBC2E7234464F0C3D88@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4E1F6AAD24975D4BA5B1680429673943252C2466@TK5EX14MBXC203.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943252C2466@TK5EX14MBXC203.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-bearer-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:23:43 -0000

> -----Original Message-----
> From: Mike Jones [mailto:Michael.Jones@microsoft.com]
> Sent: Thursday, March 31, 2011 11:19 AM

> > Section 2.4:
> >
> > - ABNF includes '( token "=3D" ( token / quoted-string ) )', but no pro=
se is
> provided about how new parameters may be defined. Retained this
> extensibility point must be justified with actual use cases.
>=20
> This is insufficient rationale to introduce a breaking change.  I would w=
ant to
> see a demonstration of working group consensus for this change before
> making it.

Adding prose is a breaking change? Really??

> > Section 4.3:
> >
> > - This registry is unnecessary and adds no value here (namespace collis=
ion is
> unlikely in general, and unlikely to cause problems). No use cases where
> suggested to justify it, and no additional error codes were proposed in o=
ver a
> year of discussions. Error codes were intentionally left non-extensible t=
o
> increase interoperability. If addition color is needed for existing error=
 codes,
> additional response parameters may be registered. Otherwise, if new error
> codes are needed, a new RFC must be published updating draft-ietf-oauth-
> v2.
> > - The only way to define such a registry is to bring it up as a comment=
 for
> draft-ietf-oauth-v2. Otherwise, it is limited to the Bearer token header =
only
> (and since this document is not extensible, not needed even here).
>=20
> Your "Error extensibility proposal" note sent on 3/29/2011 documents the
> need for error extensibility.  This registry meets this need, while being
> simpler than the 3/29 proposal and in line with standard IETF extensibili=
ty
> practices.

Whatever this registry defines has no impact on v2. I think it's silly but =
I don't care about this spec enough to waste any more time with it. My prop=
osal for V2 is currently being reviewed and unless sufficient objections ar=
e raised, it will be added to -14 over the weekend.

EHL




From Michael.Jones@microsoft.com  Thu Mar 31 11:29:33 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4BD7628C0E1 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:29:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.583
X-Spam-Level: 
X-Spam-Status: No, score=-10.583 tagged_above=-999 required=5 tests=[AWL=0.016, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HH6qh9gg5JVu for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:29:32 -0700 (PDT)
Received: from smtp.microsoft.com (smtp.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 4507828C0D8 for <oauth@ietf.org>; Thu, 31 Mar 2011 11:29:32 -0700 (PDT)
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (157.54.80.67) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 11:31:11 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14HUBC107.redmond.corp.microsoft.com ([157.54.80.67]) with mapi id 14.01.0270.002; Thu, 31 Mar 2011 11:31:11 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, OAuth WG <oauth@ietf.org>
Thread-Topic: Error extensibility proposal
Thread-Index: AcvuWqe3yWo/PW+8SwCPaTggrIuHzwBdpvaw
Date: Thu, 31 Mar 2011 18:31:11 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252C24FD@TK5EX14MBXC203.redmond.corp.microsoft.com>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:29:33 -0000

I object to this proposal on two grounds:

First, changing some of the "error" return codes to HTTP numbers is an unne=
cessary and unsolicited breaking change at a time that we should be stabili=
zing the spec.

Second, the OAuth Errors registry is simpler and follows IETF standard prac=
tices.  I know of no other specification where a parameters registry is ove=
rloaded in this manner.  Please incorporate the OAuth Errors registry into =
the framework specification in lieu of this proposal.

				Thank you,
				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of E=
ran Hammer-Lahav
Sent: Tuesday, March 29, 2011 4:02 PM
To: OAuth WG
Subject: [OAUTH-WG] Error extensibility proposal

*** Requirements

The following proposal is based on two requirements:

1. Provide a way to return an OAuth error response for error situations oth=
er then 400 and 401. For example, if the server is temporarily unavailable,=
 it will return an HTTP 503 status. However, it is often desirable to still=
 return a response body using the same format as any other error. This make=
s client development easier, having to always check for a single error code=
.

2. Allow extensions modifying the behavior of the authorization and token e=
ndpoints via additional request/response parameters to define additional er=
ror codes to go along with the new functionality. For example, the UX exten=
sion defines the 'display' parameter. It could define a matching 'unsupport=
ed_display' error response.

No other use cases were identified for error extensibility. Note that this =
proposal is strictly limited to error resulting from the authorization and =
token endpoints. No other endpoints are included (in particular, protected =
resources are not covered by this proposal).

*** Design goals

The proposal was specifically designed to be minimalistic, tailored to the =
specific use cases defined, and as effortless as possible. This avoids defi=
ning error codes identical to existing HTTP status codes, as well as bind n=
ew errors to specific extension parameters. Since the error is useless with=
out understanding the extension, this method guarantees that those developi=
ng and implementing extensions will present it as a complete unit.

*** Proposal

- Non 400/401 responses

If the HTTP response status code is 4xx (other than 400/401) or 5xx, the 'e=
rror' parameter SHOULD be set to the HTTP status code. For example:

     HTTP/1.1 503 Service Unavailable
     Content-Type: application/json
     Cache-Control: no-store

     {
       "error":"503"
     }

This will also enable passing HTTP status codes such as 503 via the redirec=
tion response which is currently not possible. It will allow the authorizat=
ion server to indicate a 503 situation without defining another error code =
that has the exact same meaning.

- Extension errors

Instead of defining an additional error registry, I propose we add a single=
 field to the 'OAuth parameters registry' template:

    Additional error codes:
        Additional error codes related to the parameter usage. Error codes =
SHOULD begin with the parameter name
        when possible (e.g. 'example_invalid' error code for use with the '=
example' parameter).

Error collisions are unlikely because when a new extension is authored, the=
 registry is reviewed for potential conflicts. Since the errors are extensi=
on-specific, collisions only matter if two extensions are to be used togeth=
er. In that case, the review process will identify any potential problems. =
And since the errors are meaningless without understanding the extension, a=
 registry with a random list of errors is not very helpful.

*** Feedback

Please send any feedback, comments, support, and objections by 3/1 (so it c=
an be included or not in -14).

EHL


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


From tonynad@microsoft.com  Thu Mar 31 11:38:26 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6AE7D3A6B31 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:38:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.393
X-Spam-Level: 
X-Spam-Status: No, score=-7.393 tagged_above=-999 required=5 tests=[AWL=0.074,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ld4gGDB4akQw for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:38:25 -0700 (PDT)
Received: from smtp.microsoft.com (mail2.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 29DE83A6A76 for <oauth@ietf.org>; Thu, 31 Mar 2011 11:38:25 -0700 (PDT)
Received: from TK5EX14HUBC105.redmond.corp.microsoft.com (157.54.80.48) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 11:40:01 -0700
Received: from CH1EHSOBE001.bigfish.com (157.54.51.114) by mail.microsoft.com (157.54.80.48) with Microsoft SMTP Server (TLS) id 14.1.270.2; Thu, 31 Mar 2011 11:40:01 -0700
Received: from mail120-ch1-R.bigfish.com (216.32.181.171) by CH1EHSOBE001.bigfish.com (10.43.70.51) with Microsoft SMTP Server id 14.1.225.8; Thu, 31 Mar 2011 18:40:00 +0000
Received: from mail120-ch1 (localhost.localdomain [127.0.0.1])	by mail120-ch1-R.bigfish.com (Postfix) with ESMTP id 751667F8646	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Thu, 31 Mar 2011 18:40:00 +0000 (UTC)
X-SpamScore: -36
X-BigFish: PS-36(zz9371P542NzzdafM1202h1082kzz1033IL8275dhz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT003.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail120-ch1 (localhost.localdomain [127.0.0.1]) by mail120-ch1 (MessageSwitch) id 130159680089990_19673; Thu, 31 Mar 2011 18:40:00 +0000 (UTC)
Received: from CH1EHSMHS021.bigfish.com (snatpool1.int.messaging.microsoft.com [10.43.68.248])	by mail120-ch1.bigfish.com (Postfix) with ESMTP id 0876EFA804E;	Thu, 31 Mar 2011 18:40:00 +0000 (UTC)
Received: from SN1PRD0302HT003.namprd03.prod.outlook.com (65.55.94.9) by CH1EHSMHS021.bigfish.com (10.43.70.21) with Microsoft SMTP Server (TLS) id 14.1.225.8; Thu, 31 Mar 2011 18:39:58 +0000
Received: from SN1PRD0302MB100.namprd03.prod.outlook.com ([169.254.10.226]) by SN1PRD0302HT003.namprd03.prod.outlook.com ([10.14.148.113]) with mapi id 14.01.0225.027; Thu, 31 Mar 2011 18:39:56 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>, Eran Hammer-Lahav <eran@hueniverse.com>, OAuth WG <oauth@ietf.org>
Thread-Topic: Error extensibility proposal
Thread-Index: AcvuWqe3yWo/PW+8SwCPaTggrIuHzwBdpvawAABenpA=
Date: Thu, 31 Mar 2011 18:39:55 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E7114E7C60@SN1PRD0302MB100.namprd03.prod.outlook.com>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4E1F6AAD24975D4BA5B1680429673943252C24FD@TK5EX14MBXC203.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943252C24FD@TK5EX14MBXC203.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [130.129.71.192]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT003.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%HUENIVERSE.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14HUBC105.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14HUBC105.redmond.corp.microsoft.com
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:38:26 -0000

I also object, an error registry the proper approach here.

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of M=
ike Jones
Sent: Thursday, March 31, 2011 11:31 AM
To: Eran Hammer-Lahav; OAuth WG
Subject: Re: [OAUTH-WG] Error extensibility proposal

I object to this proposal on two grounds:

First, changing some of the "error" return codes to HTTP numbers is an unne=
cessary and unsolicited breaking change at a time that we should be stabili=
zing the spec.

Second, the OAuth Errors registry is simpler and follows IETF standard prac=
tices.  I know of no other specification where a parameters registry is ove=
rloaded in this manner.  Please incorporate the OAuth Errors registry into =
the framework specification in lieu of this proposal.

				Thank you,
				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of E=
ran Hammer-Lahav
Sent: Tuesday, March 29, 2011 4:02 PM
To: OAuth WG
Subject: [OAUTH-WG] Error extensibility proposal

*** Requirements

The following proposal is based on two requirements:

1. Provide a way to return an OAuth error response for error situations oth=
er then 400 and 401. For example, if the server is temporarily unavailable,=
 it will return an HTTP 503 status. However, it is often desirable to still=
 return a response body using the same format as any other error. This make=
s client development easier, having to always check for a single error code=
.

2. Allow extensions modifying the behavior of the authorization and token e=
ndpoints via additional request/response parameters to define additional er=
ror codes to go along with the new functionality. For example, the UX exten=
sion defines the 'display' parameter. It could define a matching 'unsupport=
ed_display' error response.

No other use cases were identified for error extensibility. Note that this =
proposal is strictly limited to error resulting from the authorization and =
token endpoints. No other endpoints are included (in particular, protected =
resources are not covered by this proposal).

*** Design goals

The proposal was specifically designed to be minimalistic, tailored to the =
specific use cases defined, and as effortless as possible. This avoids defi=
ning error codes identical to existing HTTP status codes, as well as bind n=
ew errors to specific extension parameters. Since the error is useless with=
out understanding the extension, this method guarantees that those developi=
ng and implementing extensions will present it as a complete unit.

*** Proposal

- Non 400/401 responses

If the HTTP response status code is 4xx (other than 400/401) or 5xx, the 'e=
rror' parameter SHOULD be set to the HTTP status code. For example:

     HTTP/1.1 503 Service Unavailable
     Content-Type: application/json
     Cache-Control: no-store

     {
       "error":"503"
     }

This will also enable passing HTTP status codes such as 503 via the redirec=
tion response which is currently not possible. It will allow the authorizat=
ion server to indicate a 503 situation without defining another error code =
that has the exact same meaning.

- Extension errors

Instead of defining an additional error registry, I propose we add a single=
 field to the 'OAuth parameters registry' template:

    Additional error codes:
        Additional error codes related to the parameter usage. Error codes =
SHOULD begin with the parameter name
        when possible (e.g. 'example_invalid' error code for use with the '=
example' parameter).

Error collisions are unlikely because when a new extension is authored, the=
 registry is reviewed for potential conflicts. Since the errors are extensi=
on-specific, collisions only matter if two extensions are to be used togeth=
er. In that case, the review process will identify any potential problems. =
And since the errors are meaningless without understanding the extension, a=
 registry with a random list of errors is not very helpful.

*** Feedback

Please send any feedback, comments, support, and objections by 3/1 (so it c=
an be included or not in -14).

EHL


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth





From skylar@kiva.org  Thu Mar 31 11:49:09 2011
Return-Path: <skylar@kiva.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9BC773A6A7C for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:49:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id guc0VsvvbJxD for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:49:07 -0700 (PDT)
Received: from na3sys010aog107.obsmtp.com (na3sys010aog107.obsmtp.com [74.125.245.82]) by core3.amsl.com (Postfix) with SMTP id 65BA53A6A5E for <oauth@ietf.org>; Thu, 31 Mar 2011 11:49:07 -0700 (PDT)
Received: from source ([209.85.220.182]) (using TLSv1) by na3sys010aob107.postini.com ([74.125.244.12]) with SMTP ID DSNKTZTNBsn4M39nd09A6A94TYl++PBTqbYM@postini.com; Thu, 31 Mar 2011 11:50:47 PDT
Received: by mail-vx0-f182.google.com with SMTP id 34so3899243vxc.27 for <oauth@ietf.org>; Thu, 31 Mar 2011 11:50:46 -0700 (PDT)
Received: by 10.52.88.12 with SMTP id bc12mr4016171vdb.243.1301597445475; Thu, 31 Mar 2011 11:50:45 -0700 (PDT)
Received: from [10.0.1.4] ([131.171.70.103]) by mx.google.com with ESMTPS id i7sm412015vdu.45.2011.03.31.11.50.42 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 31 Mar 2011 11:50:43 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Skylar Woodward <skylar@kiva.org>
In-Reply-To: <9599ACE3-3FFE-4FB4-8D83-53E0EC3D0498@oracle.com>
Date: Thu, 31 Mar 2011 14:50:41 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <805FC67B-CCDA-49DE-A569-15B4C942E07D@kiva.org>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com> <BDA696B1-585A-4B44-89BE-E0FCA87BB496@kiva.org> <90C41DD21FB7C64BB94121FBBC2E72344656430968@P3PW5EX1MB01.EX1.SECURESERVER.NET> <60AE2831-6A66-4B4E-B060-C546C6E4A896@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234465664D60D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <9599ACE3-3FFE-4FB4-8D83-53E0EC3D0498@oracle.com>
To: Phil Hunt <phil.hunt@oracle.com>
X-Mailer: Apple Mail (2.1084)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:49:09 -0000

I think I understand both of your points. Phil is saying that the client =
must run over HTTPS to be secure so not being able to take an HTTP =
endpoint is a non-starter anyway.  Eran is saying security is a holistic =
evaluation, and since all secure clients would be HTTPS anyway (as Phil =
also asserts) why bother concerning the spec with this.

I'd have to agree with Eran on this especially as I think Phil's =
argument assumes popular use cases but not all possible applications. =
So, imagine a website secured inside a corporate firewall. This service =
needs to access the provider's services via OAuth and thus exposes one =
callback open to the world for purposes of the OAuth handshake. The =
redirect URI is HTTP since the corporation is having trouble acquiring =
or setting up a certificate for HTTPS - in any case, the provider does =
not requrire it. In this case, the auth code flows into the firewall via =
HTTP, but is further validated by client credentials over TLS in access =
token requests. Valid tokens return to the web application inside the =
corporate firewall over TLS and the information is still secure from =
outside threats. So, my point is that the use of client credentials =
(always kept secret and inside the firewall) secures the auth code =
exchange and use of HTTP doesn't create a vulnerability.  It is actually =
more critical that the user-interface portion of the app (not the =
callback URI, on whichever server it may reside) be secured than the =
actual callback URI itself.

However, all points are taken that developers should be encourage to =
develop secure apps and that in most cases, that means deploying =
common-case consumer web apps over HTTPS.  I don't think we'll be using =
our API to force this shift in the web, however. Given that some =
companies represented in the working group still have developer web =
sites that transmit all secrets and application data over HTTP, we have =
to assume the developers habits will trail the examples of the industry. =
 Instead, we'll use developer education to help them make secure =
products and thus earn the trust of our users.  But enforcing a =
best-practice via the API won't ensure secure apps. Only careful =
auditing and approval of the clients will help increase security of our =
app ecosystem.  Currently we don't have the bandwidth to do this. We can =
only promise to shut down or disable misleading or careless apps as we =
find them.

To access certain kinds of data we may have increased expectations =
around app security or encryption. (Not all of our data is financial, =
much of it is more social-private like Facebook or Twitter.)  For the =
more sensitive apps we would review the apps more closely and regularly =
to see they preform to our stated Terms of Service, expectations, or =
partner contract. Still, we can't ensure that level of compliance just =
by requiring TLS at one leg of the Auth handshake.

I understand the desire to establish a minimum level of tenacity in =
fighting for overall protocol strength. I just feel that if you require =
TLS on the callback URI for web apps you'll have a fair number of =
violations due to the state of the art today and will exclude =
alternative use cases like the one I described. Furthermore the =
requirement of TLS here isn't required to ensure security, so much as =
the need for TLS on web app server itself (which may be different from =
that of the callback).  (Apps without client credentials, if allowed, =
would also need TLS).

skylar


On Mar 31, 2011, at 2:10 PM, Phil Hunt wrote:

> Unfortunately these aren't just "aspirations". We're talking about =
what are the *necessary* minimums.
>=20
> Yes, I have been focusing on a couple of very specific aspects of =
authorization and I agree, the whole spec is important. But I disagree =
that that would be justification not to fix authorization as you =
suggest.  After all if the first step, authorization, is insecure or =
hijackable, the rest of the specification is kind of pointless isn't it?
>=20
> Having contributed to the security considerations, I have grown =
concerned that the lassie faire approach is actually making the spec =
more complex. Because of all the options, the security considerations =
have had to explain all of the issues (and there are many) and what the =
remediations are. Further with so many specific deployment options, =
inter-operability seems to be a big question. With so many specifics, =
what would an inter-operable specification be? My conclusion? The OAuth =
2 spec is bogged down by too much choice resulting to too much practical =
complexity.=20
>=20
> =3D=3D> Conclusion: Current implementors will find it challenging to =
ensure their deployment is secure. <=3D=3D  I can't make this point =
strongly enough!
>=20
> I think we are in agreement on most things (hence my +1). But I think =
we are simply at a stage where refinement is key to success. A good =
specification should focus on what are the key options keeping choice to =
a minimum. We just aren't there yet - and we may need some substantive =
changes to fix this (I hope not).
>=20
> Phil
> phil.hunt@oracle.com
>=20
>=20
>=20
>=20
> On 2011-03-31, at 10:43 AM, Eran Hammer-Lahav wrote:
>=20
>> Seems like your +1 is for a different conclusion :-)
>>=20
>> My point is that specifications should reflect reality, not =
unattained aspirations. That leads to devaluation of the specification =
and dismissal of other - more important - security requirements. If the =
majority of members will confirm that they will not allow clients to =
register or provide a non HTTPS callback (excluding localhost), I will =
be much more inclined to support a MUST here. But without that, I don't =
want to write text knowing it will be ignored by many deployments.
>>=20
>> Also, what should be the policy regarding non http/https schemes? =
What if the callback is using a local application handler which triggers =
sending the code over an insecure channel? This is another example where =
an explanation is much more valuable than a normative MUST.
>>=20
>> EHL
>>=20
>>=20
>>=20
>>> -----Original Message-----
>>> From: Phil Hunt [mailto:phil.hunt@oracle.com]
>>> Sent: Thursday, March 31, 2011 10:30 AM
>>> To: Eran Hammer-Lahav
>>> Cc: Skylar Woodward; Dick Hardt; OAuth WG
>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>=20
>>> +1
>>>=20
>>> I agree this is not just about setting one TLS setting to mandatory.
>>>=20
>>> I believe we need language that is simple and clear.  Terms like =
SHOULD are
>>> loopholes that create risk as they are too broad. They also have =
served to
>>> make the security considerations incredibly long and complex since =
we had
>>> to explain all the risks exposed. In this respect, I think the =
overall
>>> specification needs to be tightened up considerably in order to get =
back to a
>>> simple specification.
>>>=20
>>> Folks this is an AUTHORIZATION protocol! Our default position =
'should' be
>>> that TLS is a MUST unless it can be demonstrated why there is =
absolutely no
>>> risk to turning it off.  For example, I agree that if a redirect =
end-point is local,
>>> it does not need to be on. There are relatively few exceptions.
>>>=20
>>> In my opinion, most OAuth sites in production today do not do enough =
to
>>> protect authorization codes and are currently open to relatively =
simple
>>> hijacking attacks. The current OAuth usage in my opinion is not only =
a mark of
>>> success of OAuth but rather a demonstration that tightening =
requirements is
>>> critical to keeping OAuth successful.
>>>=20
>>> As deployers of OAuth come on board supporting higher-risk data =
(e.g.
>>> financial, trading, etc) the tolerance for OAuth failures will be =
low.  We've got
>>> a good acceptance now, and I would not like to see it jeopardized by =
some
>>> deployers taking short-cuts because of lack of effort or lack of =
proper funds
>>> to support a secure deployment. If I were a charity, the last thing =
I would
>>> want is to risk the confidentiality of my donors.
>>>=20
>>> If however, there is a strong community here that disagrees because =
they
>>> don't see any risk, then maybe there is a strong case to be made for =
a second
>>> RFC that defines a tighter set of requirements ("Secure OAuth"). In =
a sense,
>>> this is starting to happen now with regards to security =
considerations - they
>>> are just too long.  I would rather avoid this if we can.
>>>=20
>>> Phil
>>> phil.hunt@oracle.com
>>>=20
>>>=20
>>>=20
>>>=20
>>> On 2011-03-31, at 9:42 AM, Eran Hammer-Lahav wrote:
>>>=20
>>>> It is important to distinguish between securing the resource server =
and
>>> securing the client. I think this is where this conversation has =
been somewhat
>>> broken.
>>>>=20
>>>> If the client is user-agent based or web server based, it MUST user =
TLS
>>> 100% of the time when authenticating its users or delivering any =
scripts that
>>> may have access to any OAuth credentials (tokens, code, etc.). This =
goes far
>>> beyond just securing the redirection call.
>>>>=20
>>>> For example, a JS client running in the browser will not leak the =
access
>>> token received from the authorization server using the implicit =
grant because
>>> it is delivered over TLS and is in the fragment which will not be =
send to the
>>> server containing the script. However, if that script is served =
without TLS, it
>>> can be manipulated by a MITM and changed to send the access token
>>> anywhere.
>>>>=20
>>>> Same with server based clients using cookies for their own user
>>> authentication. If they don't use TLS exclusively, sessions can be =
hijacked and
>>> any protected resources they have access to are now potentially
>>> compromised.
>>>>=20
>>>> IOW, if the client isn't perfect all around, securing the =
redirection URI does
>>> not increase its security. It's like putting an armed guard at one =
entrance to a
>>> building with 100 other wide-open doors. It is hypocritical and =
irresponsible
>>> to create the illusion of client security by focusing solely on the =
redirection
>>> URI.
>>>>=20
>>>> IMO, a strong warning with a comprehensive explanation of the =
overall
>>> client security model will do much more good than putting horse =
blinds on
>>> and pretending that what the client does right after the callback is =
'not
>>> OAuth' and something we should not care about.
>>>>=20
>>>> A MUST use TLS focused narrowly on the redirection URI does not =
make
>>> the web better. At best, it make one door secure, but it also has =
the
>>> potential of creating a false sense of security which is typically =
where things
>>> go terribly wrong.
>>>>=20
>>>> BTW, a profile of OAuth used primarily for login such as the =
proposed
>>> OpenID Connect, should make the callback use of TLS required. In =
that
>>> context, it is a logical extension of the server's use of TLS to =
provide a secure
>>> login experience.
>>>>=20
>>>> EHL
>>>>=20
>>>>> -----Original Message-----
>>>>> From: Skylar Woodward [mailto:skylar@kiva.org]
>>>>> Sent: Thursday, March 31, 2011 7:32 AM
>>>>> To: Dick Hardt
>>>>> Cc: Eran Hammer-Lahav; OAuth WG
>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>>>=20
>>>>> A requirement for TLS on the callback would make OAuth prohibitive
>>>>> for many of our developers. The developers are usually volunteers =
and
>>>>> they are already donating their own resources to help a non-profit
>>>>> (from which US law mandates the developers cannot profit). In =
other
>>>>> cases the developers are small firms operating in developing =
counties
>>>>> where establishing and maintaing a valid certificate may still be =
a
>>> imperfect art.
>>>>>=20
>>>>> In short, a requirement like this puts the nail in the coffin of =
many
>>>>> would-be efforts to help out.
>>>>>=20
>>>>> So as Dick identifies here, we have sufficient security around the
>>>>> authorization grant by tying it client credentials.  I would thus =
be
>>>>> opposed to the term "MUST."  I also think it's helpful to have the
>>>>> language limit the SHOULD to the non-user-agent cases. There's no
>>>>> reason we should suggest a callback URI designed for client-side
>>>>> intercept to use an HTTPS url - so this is in the spirit of Phil's
>>>>> response to Justin's comment on limiting the scope of SHOULD.
>>>>>=20
>>>>> skylar
>>>>>=20
>>>>>=20
>>>>>=20
>>>>> On Mar 30, 2011, at 11:19 AM, Dick Hardt wrote:
>>>>>=20
>>>>>> Thanks for pointing out my misunderstanding. I was thinking =
client
>>>>>> in the
>>>>> sense of the side of TLS initiating a request.
>>>>>>=20
>>>>>> I agree that requiring TLS on the callback is an unexpected =
change.
>>>>>>=20
>>>>>> I recall reviewing the security implications of an unsecured
>>>>>> callback as being
>>>>> nominal if the authorization grant is linked to the client =
credentials.
>>>>>>=20
>>>>>>=20
>>>>>> On 2011-03-29, at 10:07 PM, Eran Hammer-Lahav wrote:
>>>>>>=20
>>>>>>> I think you got this backwards. We're talking about forcing
>>>>>>> developers
>>>>> using the Facebook (or any other service) API to deploy their own =
TLS
>>>>> endpoint for the incoming callback (via redirection). Every =
developer
>>>>> will need to get a cert and deploy an HTTPS endpoint.
>>>>>>>=20
>>>>>>> That's has never been discussed.
>>>>>>>=20
>>>>>>> EHL
>>>>>>>=20
>>>>>>> From: Dick Hardt [mailto:dick.hardt@gmail.com]
>>>>>>> Sent: Tuesday, March 29, 2011 9:02 PM
>>>>>>> To: Eran Hammer-Lahav
>>>>>>> Cc: WG
>>>>>>> Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
>>>>>>>=20
>>>>>>>=20
>>>>>>> On 2011-03-29, at 4:40 PM, Eran Hammer-Lahav wrote:
>>>>>>>=20
>>>>>>>=20
>>>>>>> To clarify, I am not opposed to mandating TLS on the callback, =
just
>>>>>>> that if
>>>>> we do, we can't ship the protocol the way it is without coming up
>>>>> with some other alternative that does not require TLS deployment =
on the
>>> client side.
>>>>> OAuth 1.0 has no such requirement and adding it in 2.0 is =
completely
>>>>> unexpected by the community at large.
>>>>>>>=20
>>>>>>> I only recall the concern with TLS to be on the server side, not
>>>>>>> the client
>>>>> side -- and I don't think that it is unexpected at all.
>>>>>>>=20
>>>>>>>=20
>>>>>>>=20
>>>>>>> It would be helpful to hear from some companies with large 1.0 =
or
>>>>>>> 2.0
>>>>> deployment on this matter? Anyone from Google, Facebook, Yahoo,
>>>>> Twitter, etc.?
>>>>>>>=20
>>>>>>> When working on OAuth-WRAP, I talked to all of those companies
>>>>>>> about
>>>>> using TLS, and only Facebook said that they wanted an option to be
>>>>> able to not require TLS. Since then, all Facebook's new APIs which
>>>>> are essentially using OAuth 2.0 run on TLS.
>>>>>>>=20
>>>>>>>=20
>>>>>>>=20
>>>>>>=20
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From fcorella@pomcor.com  Thu Mar 31 11:57:32 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 382F73A6B99 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:57:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.525
X-Spam-Level: 
X-Spam-Status: No, score=-2.525 tagged_above=-999 required=5 tests=[AWL=0.073,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7S8Ne69TyhP7 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 11:57:31 -0700 (PDT)
Received: from web55804.mail.re3.yahoo.com (web55804.mail.re3.yahoo.com [216.252.110.50]) by core3.amsl.com (Postfix) with SMTP id CC57D3A6B91 for <oauth@ietf.org>; Thu, 31 Mar 2011 11:57:30 -0700 (PDT)
Received: (qmail 42566 invoked by uid 60001); 31 Mar 2011 18:59:08 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1301597948; bh=9Frui6oCv4YV0RZcLg4vs9BCjUQ6YcauEcBQlIf6Muw=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=rUW8HyDkVcqPqRFwmt8JaIARcpcB450sVH8gtfLLLS2XYB/n/t7cg6LgRCAx9ym9UB/BCOf7OioMsd6jElKEMT8OJNlPZRxJ2Je70zEIG5cFWsew9EygIcbCAneB6t6uF3cjdbBLCJTO9y9Lq2qRnadDkB+w0BtOoZZOLX/ONNg=
Message-ID: <555181.42430.qm@web55804.mail.re3.yahoo.com>
X-YMail-OSG: S_EmV24VM1lpAoqAvtRvWxcgiBBWvjUVLjuHtUh1b9HDXEG 1TS1z.dx_zqTc8hdECQjb.MW.M2ts.Omxxzo.QjPUZMGoOm1klXNOwSr9Ua3 JyHa3VHNOLIha6qJJW0vDE0q.SmaQ8u_x7wEW6I9QudfUcc9TsWSYe0qJwTz zaIClrmCYhBTDFWWOzAe4WH3wOLVxZJGTlHphN6Ph15QueUugduqQ9wtPpgb SphVprDbV.BGXrEyghB1hXIIEc4GRffB_cQzygXNwxqyjsjvmNJRQSutw_nv mIKtHaQJGAt2VIDquPWeCQn9h9lbfK92CJEFVUm6_IIkm87LPLqZ.wNRpkKI 26cgnn8gf.RJ3qhmoEq832BUgoYpC0k_e6VKE_AlOX_AStDo0ckLvkCG4H05 w_XyG_vUzLxo-
Received: from [67.91.91.101] by web55804.mail.re3.yahoo.com via HTTP; Thu, 31 Mar 2011 11:59:08 PDT
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/12.0.2 YahooMailWebService/0.8.109.295617
Date: Thu, 31 Mar 2011 11:59:08 -0700 (PDT)
From: Francisco Corella <fcorella@pomcor.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, Torsten Lodderstedt <torsten@lodderstedt.net>
In-Reply-To: <4D92D407.9010308@lodderstedt.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1591462599-1301597948=:42430"
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 18:57:32 -0000

--0-1591462599-1301597948=:42430
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Hi Torsten,

> We are discussing TLS right now as a mean to prevent
> impersonation of the end-user's session on the client
> site. Correct? It's definitely a good advice to protect
> session from being highjacked that way. But I'm wondering
> whether this really belongs into the scope of OAuth?
>=20
> BTW: It's covered in http://tools.ietf.org/html/draft-lodderstedt-oauth-s=
ecurity-01#section-4.4.1.6.

I'm not sure you undertand the attack.=A0 In the section
4.4.1.6 that you reference you propose the following
countermeasure:

>=A0=A0=A0 o=A0 The authorization server shall require the client to authen=
ticate
>=A0=A0=A0=A0=A0=A0 with a secret, so the binding of the authorization code=
 to a
>=A0=A0=A0=A0=A0=A0 certain client can be validated in a reliable way (see
>=A0=A0=A0=A0=A0=A0 Section 5.2.4.4).

This is not a countermeasure.=A0 CLIENT AUTHENTICATION DOES
NOTHING TO MITIGATE THE ATTACK.

You should read again the attack descriptions I described in
the discussion we had back in early January:
http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html
http://www.ietf.org/mail-archive/web/oauth/current/msg04900.html
and those I sent recently:
http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html
and the attack scneraio that George Fletcher described:
http://www.ietf.org/mail-archive/web/oauth/current/msg05825.html

The security considerations section that you have just proposed
fails to explain the issue.

Regarding those security considerations, I also wanted to
point out that the section on session fixation does not make
sense.=A0 What session fixation attack are you talking about?
There was a session fixation vulnerability in the original
version of OAuth 1.0, but it was due to the fact that the
client obtained the temporary credentials (token request and
secret, analogous to the current authorization code) in a
direct request to the server before redirecting the user's
browser to the server for user authentication.=A0 The server
created a session when it provided the temporary credentials
to the client, and the attacker fixated that session by
using a fake client to redirect the user to the server with
the request token issued to the attacker, which referred the
server to the attacker's session.=A0 IN OAUTH 2.0 THIS
SESSSION FIXATION VULNERABILITY IS NOT AN ISSUE BECAUSE THE
DIRECT REQUEST TO OBTAIN TEMPORARY CREDENTIALS HAS BEEN
ELIMINATED.

Francisco


--0-1591462599-1301597948=:42430
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">Hi Torsten,<br><br>&gt; We are discussing TLS=
 right now as a mean to prevent<br>&gt; impersonation of the end-user's ses=
sion on the client<br>&gt; site. Correct? It's definitely a good advice to =
protect<br>&gt; session from being highjacked that way. But I'm wondering<b=
r>&gt; whether this really belongs into the scope of OAuth?<br>&gt; <br>&gt=
; BTW: It's covered in http://tools.ietf.org/html/draft-lodderstedt-oauth-s=
ecurity-01#section-4.4.1.6.<br><br>I'm not sure you undertand the attack.&n=
bsp; In the section<br>4.4.1.6 that you reference you propose the following=
<br>countermeasure:<br><br>&gt;&nbsp;&nbsp;&nbsp; o&nbsp; The authorization=
 server shall require the client to authenticate<br>&gt;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; with a secret, so the binding of the authorization code t=
o a<br>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; certain client can be
 validated in a reliable way (see<br>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p; Section 5.2.4.4).<br><br>This is not a countermeasure.&nbsp; CLIENT AUTH=
ENTICATION DOES<br>NOTHING TO MITIGATE THE ATTACK.<br><br>You should read a=
gain the attack descriptions I described in<br>the discussion we had back i=
n early January:<br><a href=3D"http://www.ietf.org/mail-archive/web/oauth/c=
urrent/msg04894.html">http://www.ietf.org/mail-archive/web/oauth/current/ms=
g04894.html</a><br><a href=3D"http://www.ietf.org/mail-archive/web/oauth/cu=
rrent/msg04900.html">http://www.ietf.org/mail-archive/web/oauth/current/msg=
04900.html</a><br>and those I sent recently:<br><a href=3D"http://www.ietf.=
org/mail-archive/web/oauth/current/msg04894.html">http://www.ietf.org/mail-=
archive/web/oauth/current/msg04894.html</a><br>and the attack scneraio that=
 George Fletcher described:<br><a
 href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg05825.html">=
http://www.ietf.org/mail-archive/web/oauth/current/msg05825.html</a><br><br=
>The security considerations section that you have just proposed<br>fails t=
o explain the issue.<br><br>Regarding those security considerations, I also=
 wanted to<br>point out that the section on session fixation does not make<=
br>sense.&nbsp; What session fixation attack are you talking about?<br>Ther=
e was a session fixation vulnerability in the original<br>version of OAuth =
1.0, but it was due to the fact that the<br>client obtained the temporary c=
redentials (token request and<br>secret, analogous to the current authoriza=
tion code) in a<br>direct request to the server before redirecting the user=
's<br>browser to the server for user authentication.&nbsp; The server<br>cr=
eated a session when it provided the temporary credentials<br>to the client=
, and the attacker fixated that session by<br>using a fake client to
 redirect the user to the server with<br>the request token issued to the at=
tacker, which referred the<br>server to the attacker's session.&nbsp; IN OA=
UTH 2.0 THIS<br>SESSSION FIXATION VULNERABILITY IS NOT AN ISSUE BECAUSE THE=
<br>DIRECT REQUEST TO OBTAIN TEMPORARY CREDENTIALS HAS BEEN<br>ELIMINATED.<=
br><br>Francisco<br><br></td></tr></table>
--0-1591462599-1301597948=:42430--

From hannes.tschofenig@gmx.net  Thu Mar 31 12:11:55 2011
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7B94D28C0D8 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 12:11:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.414
X-Spam-Level: 
X-Spam-Status: No, score=-102.414 tagged_above=-999 required=5 tests=[AWL=0.185, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B7N8UbVrbtMK for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 12:11:54 -0700 (PDT)
Received: from mailout-de.gmx.net (mailout-de.gmx.net [213.165.64.23]) by core3.amsl.com (Postfix) with SMTP id 551AE3A6B9E for <oauth@ietf.org>; Thu, 31 Mar 2011 12:11:54 -0700 (PDT)
Received: (qmail invoked by alias); 31 Mar 2011 19:13:31 -0000
Received: from dhcp-924f.meeting.ietf.org (EHLO dhcp-924f.meeting.ietf.org) [130.129.10.79] by mail.gmx.net (mp047) with SMTP; 31 Mar 2011 21:13:31 +0200
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX18mHnBdNrYmArYlvWxuji4ZbfyUmOnOStahCZzAB2 /OhZ91NqoF57O7
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
Date: Thu, 31 Mar 2011 21:13:28 +0200
Message-Id: <4718054E-15B8-4FD9-8C8F-2633A943F1A6@gmx.net>
To: OAuth WG <oauth@ietf.org>
Mime-Version: 1.0 (Apple Message framework v1084)
X-Mailer: Apple Mail (2.1084)
X-Y-GMX-Trusted: 0
Subject: [OAUTH-WG] Agenda Update
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 19:11:55 -0000

After a chat with Blaine we have an updated agenda proposal:

First, we need to cover our working group items:=20

=96draft-ietf-oauth-v2
=95Security Consideration Section (Torsten)
=95Error Code registry (Mike)
=95Client Assertion Credentials (Mike)
=95Anything else?
=96draft-ietf-oauth-v2-bearer
=95Open issues?
=96draft-ietf-oauth-saml2-bearer
=95Open issues?

Then, we jump into the presentations of the individual submissions:

=95OAuth Security (Torsten)
=95JSON Web Token (Mike)
=95Use Cases (Zachary)
=95Simple Web Discovery (Mike)
=95Dynamic Client Registration (Thomas, if time permits)
=95Token Revocation (Torsten, if time permits)
=95Chain Grant Type (Hannes on behalf of Phil, if time permits)

Then, we will solicit your feedback on the rechartering. The feedback =
from the presentations earlier will be taken into consideration.=20

Hope that works for you!

Ciao
Hannes & Blaine




From torsten@lodderstedt.net  Thu Mar 31 13:03:46 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A217C28C0FC for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 13:03:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.248
X-Spam-Level: 
X-Spam-Status: No, score=-2.248 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4F06VkLpuTXn for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 13:03:45 -0700 (PDT)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.31.36]) by core3.amsl.com (Postfix) with ESMTP id 1E6053A6AA4 for <oauth@ietf.org>; Thu, 31 Mar 2011 13:03:44 -0700 (PDT)
Received: from [130.129.66.195] by smtprelay02.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Q5O7O-0002iu-Tq; Thu, 31 Mar 2011 22:05:23 +0200
Message-ID: <4D94DE84.1030503@lodderstedt.net>
Date: Thu, 31 Mar 2011 22:05:24 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: fcorella@pomcor.com
References: <555181.42430.qm@web55804.mail.re3.yahoo.com>
In-Reply-To: <555181.42430.qm@web55804.mail.re3.yahoo.com>
Content-Type: multipart/alternative; boundary="------------040703020807080009060806"
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 20:03:46 -0000

This is a multi-part message in MIME format.
--------------040703020807080009060806
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Hi Francisco,

Am 31.03.2011 20:59, schrieb Francisco Corella:
> Hi Torsten,
>
> > We are discussing TLS right now as a mean to prevent
> > impersonation of the end-user's session on the client
> > site. Correct? It's definitely a good advice to protect
> > session from being highjacked that way. But I'm wondering
> > whether this really belongs into the scope of OAuth?
> >
> > BTW: It's covered in 
> http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.4.1.6.
>
> I'm not sure you undertand the attack.  In the section
>

Then you should probably precisely describe the attack you want to talk 
about. I refered to MITM.

> 4.4.1.6 that you reference you propose the following
> countermeasure:
>
> >    o  The authorization server shall require the client to authenticate
> >       with a secret, so the binding of the authorization code to a
> >       certain client can be validated in a reliable way (see
> >       Section 5.2.4.4).
>
> This is not a countermeasure.  CLIENT AUTHENTICATION DOES
> NOTHING TO MITIGATE THE ATTACK.
>

I'm not sure you read the description carefully enough. It also states 
that the redirect_uri shall be authenticated:

"The browser shall be utilized to authenticate the redirect_uri of
       the client using server authentication"

--> MITM

Moreover, 
http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.4.1.2 
requires

"Authorization server as well as the client MUST ensure that these
       transmissions are protected using transport-layer mechanisms such
       as TLS or SSL (see Section 5.1.1)."

--> Wiretapping

>
> You should read again the attack descriptions I described in
> the discussion we had back in early January:
> http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html
> http://www.ietf.org/mail-archive/web/oauth/current/msg04900.html
> and those I sent recently:
> http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html
> and the attack scneraio that George Fletcher described:
> http://www.ietf.org/mail-archive/web/oauth/current/msg05825.html
>
> The security considerations section that you have just proposed
> fails to explain the issue.
>

Any proposal of better text is welcome.

>
> Regarding those security considerations, I also wanted to
> point out that the section on session fixation does not make
> sense.  What session fixation attack are you talking about?
> There was a session fixation vulnerability in the original
> version of OAuth 1.0, but it was due to the fact that the
> client obtained the temporary credentials (token request and
> secret, analogous to the current authorization code) in a
> direct request to the server before redirecting the user's
> browser to the server for user authentication.  The server
> created a session when it provided the temporary credentials
> to the client, and the attacker fixated that session by
> using a fake client to redirect the user to the server with
> the request token issued to the attacker, which referred the
> server to the attacker's session.  IN OAUTH 2.0 THIS
> SESSSION FIXATION VULNERABILITY IS NOT AN ISSUE BECAUSE THE
> DIRECT REQUEST TO OBTAIN TEMPORARY CREDENTIALS HAS BEEN
> ELIMINATED.
>

I would suggest you calm down a bit and describe what is wrong with the 
description.

regards,
Torsten.

>
> Francisco
>

--------------040703020807080009060806
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#ffffff">
    Hi Francisco,<br>
    <br>
    Am 31.03.2011 20:59, schrieb Francisco Corella:
    <blockquote cite="mid:555181.42430.qm@web55804.mail.re3.yahoo.com"
      type="cite">
      <table border="0" cellpadding="0" cellspacing="0">
        <tbody>
          <tr>
            <td style="font: inherit;" valign="top">Hi Torsten,<br>
              <br>
              &gt; We are discussing TLS right now as a mean to prevent<br>
              &gt; impersonation of the end-user's session on the client<br>
              &gt; site. Correct? It's definitely a good advice to
              protect<br>
              &gt; session from being highjacked that way. But I'm
              wondering<br>
              &gt; whether this really belongs into the scope of OAuth?<br>
              &gt; <br>
              &gt; BTW: It's covered in
<a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.4.1.6">http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.4.1.6</a>.<br>
              <br>
              I'm not sure you undertand the attack.&nbsp; In the section<br>
            </td>
          </tr>
        </tbody>
      </table>
    </blockquote>
    <br>
    Then you should probably precisely describe the attack you want to
    talk about. I refered to MITM.<br>
    <br>
    <blockquote cite="mid:555181.42430.qm@web55804.mail.re3.yahoo.com"
      type="cite">
      <table border="0" cellpadding="0" cellspacing="0">
        <tbody>
          <tr>
            <td style="font: inherit;" valign="top">4.4.1.6 that you
              reference you propose the following<br>
              countermeasure:<br>
              <br>
              &gt;&nbsp;&nbsp;&nbsp; o&nbsp; The authorization server shall require the
              client to authenticate<br>
              &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; with a secret, so the binding of the
              authorization code to a<br>
              &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; certain client can be validated in a reliable
              way (see<br>
              &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Section 5.2.4.4).<br>
              <br>
              This is not a countermeasure.&nbsp; CLIENT AUTHENTICATION DOES<br>
              NOTHING TO MITIGATE THE ATTACK.<br>
            </td>
          </tr>
        </tbody>
      </table>
    </blockquote>
    <br>
    I'm not sure you read the description carefully enough. It also
    states that the redirect_uri shall be authenticated:<br>
    <br>
    "The browser shall be utilized to authenticate the redirect_uri of<br>
    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the client using server authentication"<br>
    <br>
    --&gt; MITM<br>
    <br>
    Moreover,
    <a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.4.1.2">http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.4.1.2</a>
    requires <br>
    <br>
    "Authorization server as well as the client MUST ensure that these<br>
    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; transmissions are protected using transport-layer mechanisms
    such<br>
    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; as TLS or SSL (see Section 5.1.1)."<br>
    <br>
    --&gt; Wiretapping<br>
    <br>
    <blockquote cite="mid:555181.42430.qm@web55804.mail.re3.yahoo.com"
      type="cite">
      <table border="0" cellpadding="0" cellspacing="0">
        <tbody>
          <tr>
            <td style="font: inherit;" valign="top"><br>
              You should read again the attack descriptions I described
              in<br>
              the discussion we had back in early January:<br>
              <a moz-do-not-send="true"
                href="http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html">http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html</a><br>
              <a moz-do-not-send="true"
                href="http://www.ietf.org/mail-archive/web/oauth/current/msg04900.html">http://www.ietf.org/mail-archive/web/oauth/current/msg04900.html</a><br>
              and those I sent recently:<br>
              <a moz-do-not-send="true"
                href="http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html">http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html</a><br>
              and the attack scneraio that George Fletcher described:<br>
              <a moz-do-not-send="true"
                href="http://www.ietf.org/mail-archive/web/oauth/current/msg05825.html">http://www.ietf.org/mail-archive/web/oauth/current/msg05825.html</a><br>
              <br>
              The security considerations section that you have just
              proposed<br>
              fails to explain the issue.<br>
            </td>
          </tr>
        </tbody>
      </table>
    </blockquote>
    <br>
    Any proposal of better text is welcome.<br>
    <br>
    <blockquote cite="mid:555181.42430.qm@web55804.mail.re3.yahoo.com"
      type="cite">
      <table border="0" cellpadding="0" cellspacing="0">
        <tbody>
          <tr>
            <td style="font: inherit;" valign="top"><br>
              Regarding those security considerations, I also wanted to<br>
              point out that the section on session fixation does not
              make<br>
              sense.&nbsp; What session fixation attack are you talking
              about?<br>
              There was a session fixation vulnerability in the original<br>
              version of OAuth 1.0, but it was due to the fact that the<br>
              client obtained the temporary credentials (token request
              and<br>
              secret, analogous to the current authorization code) in a<br>
              direct request to the server before redirecting the user's<br>
              browser to the server for user authentication.&nbsp; The server<br>
              created a session when it provided the temporary
              credentials<br>
              to the client, and the attacker fixated that session by<br>
              using a fake client to redirect the user to the server
              with<br>
              the request token issued to the attacker, which referred
              the<br>
              server to the attacker's session.&nbsp; IN OAUTH 2.0 THIS<br>
              SESSSION FIXATION VULNERABILITY IS NOT AN ISSUE BECAUSE
              THE<br>
              DIRECT REQUEST TO OBTAIN TEMPORARY CREDENTIALS HAS BEEN<br>
              ELIMINATED.<br>
            </td>
          </tr>
        </tbody>
      </table>
    </blockquote>
    <br>
    I would suggest you calm down a bit and describe what is wrong with
    the description.<br>
    <br>
    regards,<br>
    Torsten.<br>
    <br>
    <blockquote cite="mid:555181.42430.qm@web55804.mail.re3.yahoo.com"
      type="cite">
      <table border="0" cellpadding="0" cellspacing="0">
        <tbody>
          <tr>
            <td style="font: inherit;" valign="top"><br>
              Francisco<br>
              <br>
            </td>
          </tr>
        </tbody>
      </table>
    </blockquote>
  </body>
</html>

--------------040703020807080009060806--

From fcorella@pomcor.com  Thu Mar 31 13:05:19 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B7FD428C0FB for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 13:05:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.53
X-Spam-Level: 
X-Spam-Status: No, score=-2.53 tagged_above=-999 required=5 tests=[AWL=0.068,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YiNHkrQL4Us3 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 13:05:19 -0700 (PDT)
Received: from web55807.mail.re3.yahoo.com (web55807.mail.re3.yahoo.com [216.252.110.53]) by core3.amsl.com (Postfix) with SMTP id CA5BE3A6AA4 for <oauth@ietf.org>; Thu, 31 Mar 2011 13:05:18 -0700 (PDT)
Received: (qmail 78128 invoked by uid 60001); 31 Mar 2011 20:06:56 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1301602016; bh=vjl9D0gEBfza80B0F1hm+DIMFnxts/otMU17QsFlqFI=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=dVw31vLnvWDPOyA4AaRVh47ZuEcVtpldy5Bil1NpeBoxSd8IlVYA6keURpgsc463ixmAUNj5mM7UTYhtVluCcJLdFE4Pca+Icb8z8R7vOcl61CiNxvTZayUBfnmDb4zi/fQJElWgDx2G739kk/7ieBfh1tF5g0UU5o99sZ/jmOM=
Message-ID: <847617.78000.qm@web55807.mail.re3.yahoo.com>
X-YMail-OSG: Ztel414VM1k2IFNhbh2xQCz1T_e5L6JKLIpzHh2ZFzaKNvb .LgR2vUstPApjELtJMreMO.8V9PLgTTG_pcFSA.smzR_2Z7wGeuHLhI_R3q9 ewo1_qUPOs5VhDBzCd3XRdEePfsLPAZz7xX29zmCBcUUpqExaP.H4nJuT4pw dUBXahtlAK5XYnyEpw23WcfCVkIYqAr3IB_vnwv1Kir2rTy0awS1yHY9Rm25 b3MiE9T6VKxgXLb5SjUjK0miMvsj9Ry36FVu3_ohktmjKLpfyWvBxoBtrOgG c284Vjnma78.GZHwcoCM4cH0PaeAEvKmbko8mkqeMAJTiwJ10DzBX_Ak7rCG SfPcucKCuKLf_SdBVoVO3WltW4dQuxWz9jGPuarqTAMMGDhFy6u4I2G4fO9J bDhmL
Received: from [67.91.91.101] by web55807.mail.re3.yahoo.com via HTTP; Thu, 31 Mar 2011 13:06:56 PDT
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/12.0.2 YahooMailWebService/0.8.109.295617
Date: Thu, 31 Mar 2011 13:06:56 -0700 (PDT)
From: Francisco Corella <fcorella@pomcor.com>
To: Phil Hunt <phil.hunt@oracle.com>, Skylar Woodward <skylar@kiva.org>
In-Reply-To: <805FC67B-CCDA-49DE-A569-15B4C942E07D@kiva.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-947153483-1301602016=:78000"
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 20:05:19 -0000

--0-947153483-1301602016=:78000
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Skylar,

> So, imagine a website secured inside a corporate
> firewall. This service needs to access the provider's
> services via OAuth and thus exposes one callback open to the
> world for purposes of the OAuth handshake. The redirect URI
> is HTTP since the corporation is having trouble acquiring or
> setting up a certificate for HTTPS - in any case, the
> provider does not requrire it. In this case, the auth code
> flows into the firewall via HTTP, but is further validated
> by client credentials over TLS in access token
> requests. Valid tokens return to the web application inside
> the corporate firewall over TLS and the information is still
> secure from outside threats. So, my point is that the use of
> client credentials (always kept secret and inside the
> firewall) secures the auth code exchange and use of HTTP
> doesn't create a vulnerability.

That is simply not true.=A0 CLIENT CREDENTIALS DON'T HELP.=A0 If
the user is outside the firewall and the callback URI is not
protected by TLS, the attacker intercepts the authorization
code outside the firewall and submits it to the client
through the firewall.=A0 The client exchanges it for the
access token, uses the access token to get protected
resources, and sends those resources to the attacker
outside the firewall.

Francisco


--0-947153483-1301602016=:78000
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">Skylar,<br><br>&gt; So, imagine a website sec=
ured inside a corporate<br>&gt; firewall. This service needs to access the =
provider's<br>&gt; services via OAuth and thus exposes one callback open to=
 the<br>&gt; world for purposes of the OAuth handshake. The redirect URI<br=
>&gt; is HTTP since the corporation is having trouble acquiring or<br>&gt; =
setting up a certificate for HTTPS - in any case, the<br>&gt; provider does=
 not requrire it. In this case, the auth code<br>&gt; flows into the firewa=
ll via HTTP, but is further validated<br>&gt; by client credentials over TL=
S in access token<br>&gt; requests. Valid tokens return to the web applicat=
ion inside<br>&gt; the corporate firewall over TLS and the information is s=
till<br>&gt; secure from outside threats. So, my point is that the use of<b=
r>&gt; client credentials (always kept secret and inside the<br>&gt; firewa=
ll)
 secures the auth code exchange and use of HTTP<br>&gt; doesn't create a vu=
lnerability.<br><br>That is simply not true.&nbsp; CLIENT CREDENTIALS DON'T=
 HELP.&nbsp; If<br>the user is outside the firewall and the callback URI is=
 not<br>protected by TLS, the attacker intercepts the authorization<br>code=
 outside the firewall and submits it to the client<br>through the firewall.=
&nbsp; The client exchanges it for the<br>access token, uses the access tok=
en to get protected<br>resources, and sends those resources to the attacker=
<br>outside the firewall.<br><br>Francisco<br><br></td></tr></table>
--0-947153483-1301602016=:78000--

From phil.hunt@oracle.com  Thu Mar 31 13:38:41 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5142228C11E for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 13:38:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.558
X-Spam-Level: 
X-Spam-Status: No, score=-6.558 tagged_above=-999 required=5 tests=[AWL=0.040,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tEeis843hqFn for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 13:38:40 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 3B8A228C101 for <oauth@ietf.org>; Thu, 31 Mar 2011 13:38:40 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2VKeHip030858 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 31 Mar 2011 20:40:19 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2VKeG3M008014 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 31 Mar 2011 20:40:17 GMT
Received: from abhmt014.oracle.com (abhmt014.oracle.com [141.146.116.23]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2VKeGWS013377; Thu, 31 Mar 2011 15:40:16 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 31 Mar 2011 13:40:16 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-7--973216153
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <847617.78000.qm@web55807.mail.re3.yahoo.com>
Date: Thu, 31 Mar 2011 13:40:14 -0700
Message-Id: <C9552FAE-0A13-46D2-8D6E-36FE1E236B1C@oracle.com>
References: <847617.78000.qm@web55807.mail.re3.yahoo.com>
To: fcorella@pomcor.com
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090208.4D94E6B1.0064:SCFSTAT5015188,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 20:38:41 -0000

--Apple-Mail-7--973216153
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

I have to agree. In OAuth, client credentials are dramatically weakened =
by the number of clients sharing the same credential.

If the hacker has the same client with the same credentials (such as the =
case with mobile client apps), then use of client credentials when =
exchanging for an access token has minimal security value if any.  =
However, if only one client can have the client credential, then it does =
add security value and Skylar's scenario may be valid.=20

IMO using client credentials alone is insufficient to validate a =
particular client instances right to use an authorization code that =
could be leaked.

I have been pushing the TLS thing for several days on the list, and I =
agree there is strong push-back.  Let's explore some other alternatives.

What if we had some other means of positively linking specific =
requesting clients to a returned authorization token that does not rely =
solely on the client credential (since they are shared by multiple =
instances).  This would help prevent an eavesdropper from hijacking an =
authorization. Would this be a better way to simplify?

Phil
phil.hunt@oracle.com




On 2011-03-31, at 1:06 PM, Francisco Corella wrote:

> Skylar,
>=20
> > So, imagine a website secured inside a corporate
> > firewall. This service needs to access the provider's
> > services via OAuth and thus exposes one callback open to the
> > world for purposes of the OAuth handshake. The redirect URI
> > is HTTP since the corporation is having trouble acquiring or
> > setting up a certificate for HTTPS - in any case, the
> > provider does not requrire it. In this case, the auth code
> > flows into the firewall via HTTP, but is further validated
> > by client credentials over TLS in access token
> > requests. Valid tokens return to the web application inside
> > the corporate firewall over TLS and the information is still
> > secure from outside threats. So, my point is that the use of
> > client credentials (always kept secret and inside the
> > firewall) secures the auth code exchange and use of HTTP
> > doesn't create a vulnerability.
>=20
> That is simply not true.  CLIENT CREDENTIALS DON'T HELP.  If
> the user is outside the firewall and the callback URI is not
> protected by TLS, the attacker intercepts the authorization
> code outside the firewall and submits it to the client
> through the firewall.  The client exchanges it for the
> access token, uses the access token to get protected
> resources, and sends those resources to the attacker
> outside the firewall.
>=20
> Francisco
>=20


--Apple-Mail-7--973216153
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">I =
have to agree. In OAuth, client credentials are dramatically weakened by =
the number of clients sharing the same credential.<div><br></div><div>If =
the hacker has the same client with the same credentials (such as the =
case with mobile client apps), then use of client credentials when =
exchanging for an access token has minimal security value if any. =
&nbsp;However, if only one client can have the client credential, then =
it does add security value and Skylar's scenario may be =
valid.&nbsp;</div><div><br></div><div>IMO using client credentials alone =
is insufficient to validate a particular client instances right to use =
an authorization code that could be leaked.</div><div><br></div><div>I =
have been pushing the TLS thing for several days on the list, and I =
agree there is strong push-back. &nbsp;Let's explore some other =
alternatives.</div><div><br></div><div>What if we had some other means =
of positively linking specific requesting clients to a returned =
authorization token that does not rely solely on the client credential =
(since they are shared by multiple instances). &nbsp;This would help =
prevent an eavesdropper from hijacking an authorization. Would this be a =
better way to simplify?</div><div><br></div><div><div>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-31, at 1:06 PM, Francisco Corella =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><table cellspacing=3D"0" cellpadding=3D"0" =
border=3D"0"><tbody><tr><td valign=3D"top" style=3D"font: =
inherit;">Skylar,<br><br>&gt; So, imagine a website secured inside a =
corporate<br>&gt; firewall. This service needs to access the =
provider's<br>&gt; services via OAuth and thus exposes one callback open =
to the<br>&gt; world for purposes of the OAuth handshake. The redirect =
URI<br>&gt; is HTTP since the corporation is having trouble acquiring =
or<br>&gt; setting up a certificate for HTTPS - in any case, the<br>&gt; =
provider does not requrire it. In this case, the auth code<br>&gt; flows =
into the firewall via HTTP, but is further validated<br>&gt; by client =
credentials over TLS in access token<br>&gt; requests. Valid tokens =
return to the web application inside<br>&gt; the corporate firewall over =
TLS and the information is still<br>&gt; secure from outside threats. =
So, my point is that the use of<br>&gt; client credentials (always kept =
secret and inside the<br>&gt; firewall)
 secures the auth code exchange and use of HTTP<br>&gt; doesn't create a =
vulnerability.<br><br>That is simply not true.&nbsp; CLIENT CREDENTIALS =
DON'T HELP.&nbsp; If<br>the user is outside the firewall and the =
callback URI is not<br>protected by TLS, the attacker intercepts the =
authorization<br>code outside the firewall and submits it to the =
client<br>through the firewall.&nbsp; The client exchanges it for =
the<br>access token, uses the access token to get =
protected<br>resources, and sends those resources to the =
attacker<br>outside the =
firewall.<br><br>Francisco<br><br></td></tr></tbody></table></blockquote><=
/div><br></div></body></html>=

--Apple-Mail-7--973216153--

From fcorella@pomcor.com  Thu Mar 31 13:55:24 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 48BAB3A6A88 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 13:55:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.534
X-Spam-Level: 
X-Spam-Status: No, score=-2.534 tagged_above=-999 required=5 tests=[AWL=0.064,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SebJNTiC3pDz for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 13:55:22 -0700 (PDT)
Received: from web55803.mail.re3.yahoo.com (web55803.mail.re3.yahoo.com [216.252.110.49]) by core3.amsl.com (Postfix) with SMTP id 7E7173A69B2 for <oauth@ietf.org>; Thu, 31 Mar 2011 13:55:22 -0700 (PDT)
Received: (qmail 2238 invoked by uid 60001); 31 Mar 2011 20:56:58 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1301605018; bh=xo8jpMfiqnZ8+nGKPzQfTG20M9gypKPU32kjZ9u7h9g=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=aJxAbmZ0yE2jvk+XxrdsoYEqWaCkXiuLP1vCjRm+2ZvhQJD6o3am2CyANEVc5na0xBanMsy80e64Z6i7H+4/fdJj8GWpKFlUHpOr0lZddszgiaaqAsoZlbdcxzBlsHnGmfFGCM1zYPoHGPJl2Edwk3vY8nQPt/FFAOJcUzopEqM=
Message-ID: <334736.1959.qm@web55803.mail.re3.yahoo.com>
X-YMail-OSG: WJplRaEVM1kpkbfZCs8zGZNiUV.Nqt8XKPjIYEurBqYqkGR n0HBaVff9nz6By7z1sNu0lfL7xmft._Qhbtm3TN3ReIaAfA6xwFgol5Fk3DE OcXSQzPfG.a0UwC7LCt1l4VJNyPuJQgApdDmA6ZjiWIdE2vOPpB8w6x5E1Bd z0p7etq0_tOprDQRg_GZ3dSw2ofKBZaSlZgMuw8MsJ_iJ4o6Q4MRLHFHlkzp HJj2ACTSRWWNmeLmwTxF.CFt.jaPyK254EPodtzkatlRArawKJDfBrIy5BH7 77TsQRT9sy3EomT2ffwk9dq6a0IzmlyuviAzqFN80H8J7pEmGzkHX5407RSI oD6gGSOEwNh.KsKGA9gzrLN0QpI6s6JzQ3nBITWuKgCNBChjmVhFSF1Td99C nytP_DX_3a.4-
Received: from [67.91.91.101] by web55803.mail.re3.yahoo.com via HTTP; Thu, 31 Mar 2011 13:56:57 PDT
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/12.0.2 YahooMailWebService/0.8.109.295617
Date: Thu, 31 Mar 2011 13:56:57 -0700 (PDT)
From: Francisco Corella <fcorella@pomcor.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
In-Reply-To: <4D94DE84.1030503@lodderstedt.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-9538972-1301605017=:1959"
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 20:55:24 -0000

--0-9538972-1301605017=:1959
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Hi Torsten,

> > 4.4.1.6 that you reference you propose the following
> > countermeasure:
> >
> > >=A0=A0=A0 o=A0 The authorization server shall require the client to au=
thenticate
> > >=A0=A0=A0=A0=A0=A0 with a secret, so the binding of the authorization =
code to a
> > >=A0=A0=A0=A0=A0=A0 certain client can be validated in a reliable way (=
see
> > >=A0=A0=A0=A0=A0=A0 Section 5.2.4.4).
> >
> > This is not a countermeasure.=A0 CLIENT AUTHENTICATION DOES
> > NOTHING TO MITIGATE THE ATTACK.
>=20
> I'm not sure you read the description carefully enough. It also states th=
at the redirect_uri shall be authenticated:
>=20
> "The browser shall be utilized to authenticate the redirect_uri of
>=A0=A0=A0=A0=A0=A0 the client using server authentication"
>=20
> --> MITM
>=20
> Moreover, http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#=
section-4.4.1.2 requires
>=20
> "Authorization server as well as the client MUST ensure that these
>=A0=A0=A0=A0=A0=A0 transmissions are protected using transport-layer mecha=
nisms such
>=A0=A0=A0=A0=A0=A0 as TLS or SSL (see Section 5.1.1)."
>=20
> --> Wiretapping

I'm very glad you want to require TLS for the callback
endpoint.=A0 But many people in this mailing list believe that
client credentials mitigate the attack.=A0 That belief is
mistaken, and it's causing a lot of confusion.=A0 Your second
countermeasure in section 4.4.1.6,

> > >=A0=A0=A0 o=A0 The authorization server shall require the client to au=
thenticate
> > >=A0=A0=A0=A0=A0=A0 with a secret, so the binding of the authorization =
code to a
> > >=A0=A0=A0=A0=A0=A0 certain client can be validated in a reliable way (=
see
> > >=A0=A0=A0=A0=A0=A0 Section 5.2.4.4).

indicates that you believe that too.=A0 I'm trying to dispel that
misconception.

> >
> > You should read again the attack descriptions I described in
> > the discussion we had back in early January:
> > http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html
> > http://www.ietf.org/mail-archive/web/oauth/current/msg04900.html
> > and those I sent recently:
> > http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html
> > and the attack scneraio that George Fletcher described:
> > http://www.ietf.org/mail-archive/web/oauth/current/msg05825.html
> >
> > The security considerations section that you have just proposed
> > fails to explain the issue.
>=20
> Any proposal of better text is welcome.

Here is some text: "If the redirect URI is not protected by
TLS and is not local to the host where the user's browser is
running, an attacker who intercepts the authorization code
as it is sent by the browser to the callback endpoint can
gain access to protected resources by submitting the
authorization code to the client.=A0 The client will exchange
the authorization code for an access token and use the
access token to access protected resources for the benefit
of the attacker, delivering protected resources to the
attacker, or modifying protected resources as directed by
the attacker.=A0 If OAuth is used by the client to delegate
authentication to a social site (e.g. as in the
implementation of the "Facebook Login" button), the attacker
can use the intercapted authorization code to log in to the
client as the user."

> > Regarding those security considerations, I also wanted to
> > point out that the section on session fixation does not make
> > sense.=A0 What session fixation attack are you talking about?
> > There was a session fixation vulnerability in the original
> > version of OAuth 1.0, but it was due to the fact that the
> > client obtained the temporary credentials (token request and
> > secret, analogous to the current authorization code) in a
> > direct request to the server before redirecting the user's
> > browser to the server for user authentication.=A0 The server
> > created a session when it provided the temporary credentials
> > to the client, and the attacker fixated that session by
> > using a fake client to redirect the user to the server with
> > the request token issued to the attacker, which referred the
> > server to the attacker's session.=A0 IN OAUTH 2.0 THIS
> > SESSSION FIXATION VULNERABILITY IS NOT AN ISSUE BECAUSE THE
> > DIRECT REQUEST TO OBTAIN TEMPORARY CREDENTIALS HAS BEEN
> > ELIMINATED.
>=20
> I would suggest you calm down a bit and describe what is
> wrong with the description.

What's wrong with the session fixation section is that it
addresses a problem that does not exist, unless there is a
session fixation attack that I'm not aware of.=A0 If there is
such an attack, it should be described.=A0 Telling
implementors "do this" or "don't do that" without
explanation is not helpful.

Regards,

Francisco


=0A            =0A          =0A        =0A      =0A    =0A  =0A
--0-9538972-1301605017=:1959
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">Hi Torsten,<br><br>&gt; &gt; 4.4.1.6 that you=
 reference you propose the following<br>&gt; &gt; countermeasure:<br>&gt; &=
gt;<br>&gt; &gt; &gt;&nbsp;&nbsp;&nbsp; o&nbsp; The authorization server sh=
all require the client to authenticate<br>&gt; &gt; &gt;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp; with a secret, so the binding of the authorization code t=
o a<br>&gt; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; certain client ca=
n be validated in a reliable way (see<br>&gt; &gt; &gt;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp; Section 5.2.4.4).<br>&gt; &gt;<br>&gt; &gt; This is not a =
countermeasure.&nbsp; CLIENT AUTHENTICATION DOES<br>&gt; &gt; NOTHING TO MI=
TIGATE THE ATTACK.<br>&gt; <br>&gt; I'm not sure you read the description c=
arefully enough. It also states that the redirect_uri shall be authenticate=
d:<br>&gt; <br>&gt; "The browser shall be utilized to authenticate the
 redirect_uri of<br>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the client usi=
ng server authentication"<br>&gt; <br>&gt; --&gt; MITM<br>&gt; <br>&gt; Mor=
eover, http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#secti=
on-4.4.1.2 requires<br>&gt; <br>&gt; "Authorization server as well as the c=
lient MUST ensure that these<br>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; tr=
ansmissions are protected using transport-layer mechanisms such<br>&gt;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; as TLS or SSL (see Section 5.1.1)."<br>&gt=
; <br>&gt; --&gt; Wiretapping<br><br>I'm very glad you want to require TLS =
for the callback<br>endpoint.&nbsp; But many people in this mailing list be=
lieve that<br>client credentials mitigate the attack.&nbsp; That belief is<=
br>mistaken, and it's causing a lot of confusion.&nbsp; Your second<br>coun=
termeasure in section 4.4.1.6,<br><br>&gt; &gt; &gt;&nbsp;&nbsp;&nbsp; o&nb=
sp; The authorization server shall require the client to
 authenticate<br>&gt; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; with a =
secret, so the binding of the authorization code to a<br>&gt; &gt; &gt;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; certain client can be validated in a relia=
ble way (see<br>&gt; &gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Section =
5.2.4.4).<br><br>indicates that you believe that too.&nbsp; I'm trying to d=
ispel that<br>misconception.<br><br>&gt; &gt;<br>&gt; &gt; You should read =
again the attack descriptions I described in<br>&gt; &gt; the discussion we=
 had back in early January:<br>&gt; &gt; http://www.ietf.org/mail-archive/w=
eb/oauth/current/msg04894.html<br>&gt; &gt; http://www.ietf.org/mail-archiv=
e/web/oauth/current/msg04900.html<br>&gt; &gt; and those I sent recently:<b=
r>&gt; &gt; http://www.ietf.org/mail-archive/web/oauth/current/msg04894.htm=
l<br>&gt; &gt; and the attack scneraio that George Fletcher described:<br>&=
gt; &gt;
 http://www.ietf.org/mail-archive/web/oauth/current/msg05825.html<br>&gt; &=
gt;<br>&gt; &gt; The security considerations section that you have just pro=
posed<br>&gt; &gt; fails to explain the issue.<br>&gt; <br>&gt; Any proposa=
l of better text is welcome.<br><br>Here is some text: "If the redirect URI=
 is not protected by<br>TLS and is not local to the host where the user's b=
rowser is<br>running, an attacker who intercepts the authorization code<br>=
as it is sent by the browser to the callback endpoint can<br>gain access to=
 protected resources by submitting the<br>authorization code to the client.=
&nbsp; The client will exchange<br>the authorization code for an access tok=
en and use the<br>access token to access protected resources for the benefi=
t<br>of the attacker, delivering protected resources to the<br>attacker, or=
 modifying protected resources as directed by<br>the attacker.&nbsp; If OAu=
th is used by the client to delegate<br>authentication to a social
 site (e.g. as in the<br>implementation of the "Facebook Login" button), th=
e attacker<br>can use the intercapted authorization code to log in to the<b=
r>client as the user."<br><br>&gt; &gt; Regarding those security considerat=
ions, I also wanted to<br>&gt; &gt; point out that the section on session f=
ixation does not make<br>&gt; &gt; sense.&nbsp; What session fixation attac=
k are you talking about?<br>&gt; &gt; There was a session fixation vulnerab=
ility in the original<br>&gt; &gt; version of OAuth 1.0, but it was due to =
the fact that the<br>&gt; &gt; client obtained the temporary credentials (t=
oken request and<br>&gt; &gt; secret, analogous to the current authorizatio=
n code) in a<br>&gt; &gt; direct request to the server before redirecting t=
he user's<br>&gt; &gt; browser to the server for user authentication.&nbsp;=
 The server<br>&gt; &gt; created a session when it provided the temporary c=
redentials<br>&gt; &gt; to the client, and the attacker fixated that
 session by<br>&gt; &gt; using a fake client to redirect the user to the se=
rver with<br>&gt; &gt; the request token issued to the attacker, which refe=
rred the<br>&gt; &gt; server to the attacker's session.&nbsp; IN OAUTH 2.0 =
THIS<br>&gt; &gt; SESSSION FIXATION VULNERABILITY IS NOT AN ISSUE BECAUSE T=
HE<br>&gt; &gt; DIRECT REQUEST TO OBTAIN TEMPORARY CREDENTIALS HAS BEEN<br>=
&gt; &gt; ELIMINATED.<br>&gt; <br>&gt; I would suggest you calm down a bit =
and describe what is<br>&gt; wrong with the description.<br><br>What's wron=
g with the session fixation section is that it<br>addresses a problem that =
does not exist, unless there is a<br>session fixation attack that I'm not a=
ware of.&nbsp; If there is<br>such an attack, it should be described.&nbsp;=
 Telling<br>implementors "do this" or "don't do that" without<br>explanatio=
n is not helpful.<br><br>Regards,<br><br>Francisco<br><br><blockquote style=
=3D"border-left: 2px solid rgb(16, 16, 255); margin-left: 5px;
 padding-left: 5px;"><div id=3D"yiv101616379"><blockquote type=3D"cite"><ta=
ble border=3D"0" cellpadding=3D"0" cellspacing=3D"0"><tbody><tr><td style=
=3D"font: inherit;" valign=3D"top"><br>=0A            </td>=0A          </t=
r>=0A        </tbody>=0A      </table>=0A    </blockquote>=0A  =0A</div></b=
lockquote></td></tr></table>
--0-9538972-1301605017=:1959--

From dick.hardt@gmail.com  Thu Mar 31 13:58:56 2011
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C870928C101 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 13:58:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[AWL=0.001,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a-Wz2UBLncSs for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 13:58:55 -0700 (PDT)
Received: from mail-pw0-f44.google.com (mail-pw0-f44.google.com [209.85.160.44]) by core3.amsl.com (Postfix) with ESMTP id D21AB28C0EC for <oauth@ietf.org>; Thu, 31 Mar 2011 13:58:55 -0700 (PDT)
Received: by pwi5 with SMTP id 5so644204pwi.31 for <oauth@ietf.org>; Thu, 31 Mar 2011 14:00:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:subject:mime-version:content-type:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to:x-mailer; bh=NUXIBwMuSzSuA3jMoqhRUNZKk/Ko6+bR3d6gGgq0zwo=; b=GXyOWmOjgs/EpyMBNMTxUJJDV2fb0l9K9Z8+UnbH6f6ZfeKu4y8fYE57db6BKBJe8D KBJaM60LieX9Xr0w2b0KpND4F7iBZm5i7VFukl3g1l7MRXEnbWL5I1tK11tIav+6gXnb 0oTWrrxQF+CJiW5vC5ybbsEvWXVMWrC41HtoU=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; b=SEziYf2/Xc3o5ftXixf5DDvp6dishNRhf59yAYtJzZaYtNFe00gCFuF/deAT9mDp7N EXn5KN/aX48+iJqDA65zk+O89Y1wB0Amb4jC5/5RT/hT9+eZoONJNUkkJOHKeqBm/25I HKwkN/FCQjAkzFegMgktZzgmHvNY1NdDJEjPA=
Received: by 10.142.150.32 with SMTP id x32mr2405954wfd.287.1301605235779; Thu, 31 Mar 2011 14:00:35 -0700 (PDT)
Received: from [192.168.1.16] (c-24-5-83-209.hsd1.ca.comcast.net [24.5.83.209]) by mx.google.com with ESMTPS id m10sm1946959wfl.23.2011.03.31.14.00.33 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 31 Mar 2011 14:00:34 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Dick Hardt <dick.hardt@gmail.com>
In-Reply-To: <BDA696B1-585A-4B44-89BE-E0FCA87BB496@kiva.org>
Date: Thu, 31 Mar 2011 14:00:31 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <EDADAD1A-9E46-45B3-8348-06FB787D980F@gmail.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465643051D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <607231.23702.qm@web55806.mail.re3.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E723446564305E6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <90C41DD21FB7C64BB94121FBBC2E723446564305EA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <970B20B3-F536-4C7E-89D3-66E91228DFAF@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723446564305FF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A47CFA4D-4D78-4237-9593-A3A23D39820E@gmail.com> <BDA696B1-585A-4B44-89BE-E0FCA87BB496@kiva.org>
To: Skylar Woodward <skylar@kiva.org>
X-Mailer: Apple Mail (2.1084)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 20:58:56 -0000

On 2011-03-31, at 7:32 AM, Skylar Woodward wrote:

> A requirement for TLS on the callback would make OAuth prohibitive for =
many of our developers. The developers are usually volunteers and they =
are already donating their own resources to help a non-profit (from =
which US law mandates the developers cannot profit). In other cases the =
developers are small firms operating in developing counties where =
establishing and maintaing a valid certificate may still be a imperfect =
art.
>=20
> In short, a requirement like this puts the nail in the coffin of many =
would-be efforts to help out.
>=20
> So as Dick identifies here, we have sufficient security around the =
authorization grant by tying it client credentials.  I would thus be =
opposed to the term "MUST."  I also think it's helpful to have the =
language limit the SHOULD to the non-user-agent cases. There's no reason =
we should suggest a callback URI designed for client-side intercept to =
use an HTTPS url - so this is in the spirit of Phil's response to =
Justin's comment on limiting the scope of SHOULD.

Unfortunately I was mistaken. The attack that Francisco is discussing =
and George summarized is NOT dealt with by the client credentials.

Summary: If authorized by Alice, client.com can expose information to =
the Attacker about Alice that is stored at resource.com.

If the Attacker can intercept the authorization code (and likely any =
session management between Alice and content.com), client.com does not =
realize that it is being presented by the Attacker since it is common =
that the only identity that client.com has about the user is from =
resource.com, there is no way for resource.com to know they are not =
acting on behalf of Alice, even though the session is with the Attacker.=20=


The Attacker now has access to Alice's resources at resource.com via =
client.com

The attack is enabled because there is no means for client.com to =
authenticate the user, and is often using resource.com to authenticate.

-- Dick=

From Michael.Jones@microsoft.com  Thu Mar 31 14:03:25 2011
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6BED628C101 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 14:03:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.584
X-Spam-Level: 
X-Spam-Status: No, score=-10.584 tagged_above=-999 required=5 tests=[AWL=0.016, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2QDAxt75XI8f for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 14:03:24 -0700 (PDT)
Received: from smtp.microsoft.com (mailb.microsoft.com [131.107.115.215]) by core3.amsl.com (Postfix) with ESMTP id 98E0E28C0DE for <oauth@ietf.org>; Thu, 31 Mar 2011 14:03:24 -0700 (PDT)
Received: from TK5EX14HUBC107.redmond.corp.microsoft.com (157.54.80.67) by TK5-EXGWY-E802.partners.extranet.microsoft.com (10.251.56.168) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 14:05:04 -0700
Received: from TK5EX14MBXC203.redmond.corp.microsoft.com ([169.254.3.38]) by TK5EX14HUBC107.redmond.corp.microsoft.com ([157.54.80.67]) with mapi id 14.01.0270.002; Thu, 31 Mar 2011 14:05:04 -0700
From: Mike Jones <Michael.Jones@microsoft.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, OAuth WG <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Agenda Update
Thread-Index: AQHL79fC9xzeMdi1d0WS+Hm6TkRs+pRH7Zsg
Date: Thu, 31 Mar 2011 21:05:03 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943252C462C@TK5EX14MBXC203.redmond.corp.microsoft.com>
References: <4718054E-15B8-4FD9-8C8F-2633A943F1A6@gmx.net>
In-Reply-To: <4718054E-15B8-4FD9-8C8F-2633A943F1A6@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [157.54.123.12]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Agenda Update
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 21:03:25 -0000

To this, I'd like to add discussion of draft-jones-oauth-jwt-bearer -- the =
JWT equivalent of draft-ietf-oauth-saml2-bearer.  In specific, I'd like us =
to consider taking this up as a working group item.

Thanks and see you in the morning!

				-- Mike

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of H=
annes Tschofenig
Sent: Thursday, March 31, 2011 12:13 PM
To: OAuth WG
Subject: [OAUTH-WG] Agenda Update

After a chat with Blaine we have an updated agenda proposal:

First, we need to cover our working group items:=20

-draft-ietf-oauth-v2
*Security Consideration Section (Torsten) *Error Code registry (Mike) *Clie=
nt Assertion Credentials (Mike) *Anything else?
-draft-ietf-oauth-v2-bearer
*Open issues?
-draft-ietf-oauth-saml2-bearer
*Open issues?

Then, we jump into the presentations of the individual submissions:

*OAuth Security (Torsten)
*JSON Web Token (Mike)
*Use Cases (Zachary)
*Simple Web Discovery (Mike)
*Dynamic Client Registration (Thomas, if time permits) *Token Revocation (T=
orsten, if time permits) *Chain Grant Type (Hannes on behalf of Phil, if ti=
me permits)

Then, we will solicit your feedback on the rechartering. The feedback from =
the presentations earlier will be taken into consideration.=20

Hope that works for you!

Ciao
Hannes & Blaine



_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


From fcorella@pomcor.com  Thu Mar 31 14:14:57 2011
Return-Path: <fcorella@pomcor.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0022228C11E for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 14:14:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.537
X-Spam-Level: 
X-Spam-Status: No, score=-2.537 tagged_above=-999 required=5 tests=[AWL=0.061,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2mkQ0I7rOFPu for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 14:14:56 -0700 (PDT)
Received: from web55805.mail.re3.yahoo.com (web55805.mail.re3.yahoo.com [216.252.110.51]) by core3.amsl.com (Postfix) with SMTP id E3D7428C101 for <oauth@ietf.org>; Thu, 31 Mar 2011 14:14:55 -0700 (PDT)
Received: (qmail 85519 invoked by uid 60001); 31 Mar 2011 21:16:33 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1301606193; bh=cR2Svjblnv2pJOf2a45WhIFFrAtI1kMGqhplb5/7Dhs=; h=Message-ID:X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=lYzPSQzZdfGe43aMg4twvcK6WEqzdbTlPDjnOkPqtlRux5HrabH9iN5fkxHurFT8FdHVch0p6Y03OXua9+pvT7ZQSAd9gu68cP9MuH3dSM/5+sgvedEbGBvXImYO19m+3992rKTvyhpHjM4aTluKL3/MokAC5jjQEe8Ynfgwbfs=
Message-ID: <343968.81215.qm@web55805.mail.re3.yahoo.com>
X-YMail-OSG: kRRXov0VM1mag1UpQ7rFetgW1Swu6UT6nvqQR4QHHptfh2L RvuTK4ENks2g56v1WNLp8GBDbhv_Z9D_td.ixgrGSepVv6dr9I4IAc1deK06 3UL1oF3Gzp4S3ORQLPZPzetGGKw8RN6bWb9SRH9h4AUAkhf10XK.Br4i_TT8 _m.0sPBY_KfCFtp.bKF9TaDaofFy9.gXwlWKakK_v9e5uIg3U5gNHbQfvt56 Py78njD21JEl3cu66viXWmrfCf1MoUTLiveytQXPXNXlXvm7rFya1vhSaHS8 ls9viDmon5cK0r4_76fnDDvHGPadY8XYXlPP9tUi.tXUrDmgslLhKjqiaHud hJrj62UnOjxu1UyDPg0KABvbyGThFm3.S8W8th7MjS2NHfRAFoyiA.bxfyP_ XxZQTnPt3Wao-
Received: from [67.91.91.101] by web55805.mail.re3.yahoo.com via HTTP; Thu, 31 Mar 2011 14:16:33 PDT
X-RocketYMMF: francisco_corella
X-Mailer: YahooMailClassic/12.0.2 YahooMailWebService/0.8.109.295617
Date: Thu, 31 Mar 2011 14:16:33 -0700 (PDT)
From: Francisco Corella <fcorella@pomcor.com>
To: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <C9552FAE-0A13-46D2-8D6E-36FE1E236B1C@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-710027294-1301606193=:81215"
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: fcorella@pomcor.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 21:14:57 -0000

--0-710027294-1301606193=:81215
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

Skylar's scenario is not valid even if only one client has the client crede=
ntial, for the reason explained in my reply to Skylar, below.

=A0Francisco

--- On Thu, 3/31/11, Phil Hunt <phil.hunt@oracle.com> wrote:

From: Phil Hunt <phil.hunt@oracle.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
To: fcorella@pomcor.com
Cc: "Skylar Woodward" <skylar@kiva.org>, "OAuth WG" <oauth@ietf.org>, "Kare=
n P. Lewison" <kplewison@pomcor.com>
Date: Thursday, March 31, 2011, 8:40 PM

I have to agree. In OAuth, client credentials are dramatically weakened by =
the number of clients sharing the same credential.
If the hacker has the same client with the same credentials (such as the ca=
se with mobile client apps), then use of client credentials when exchanging=
 for an access token has minimal security value if any. =A0However, if only=
 one client can have the client credential, then it does add security value=
 and Skylar's scenario may be valid.=A0
IMO using client credentials alone is insufficient to validate a particular=
 client instances right to use an authorization code that could be leaked.
I have been pushing the TLS thing for several days on the list, and I agree=
 there is strong push-back. =A0Let's explore some other alternatives.
What if we had some other means of positively linking specific requesting c=
lients to a returned authorization token that does not rely solely on the c=
lient credential (since they are shared by multiple instances). =A0This wou=
ld help prevent an eavesdropper from hijacking an authorization. Would this=
 be a better way to simplify?
=0APhilphil.hunt@oracle.com


=0A=0A
On 2011-03-31, at 1:06 PM, Francisco Corella wrote:
Skylar,

> So, imagine a website secured inside a corporate
> firewall. This service needs to access the provider's
> services via OAuth and thus exposes one callback open to the
> world for purposes of the OAuth handshake. The redirect URI
> is HTTP since the corporation is having trouble acquiring or
> setting up a certificate for HTTPS - in any case, the
> provider does not requrire it. In this case, the auth code
> flows into the firewall via HTTP, but is further validated
> by client credentials over TLS in access token
> requests. Valid tokens return to the web application inside
> the corporate firewall over TLS and the information is still
> secure from outside threats. So, my point is that the use of
> client credentials (always kept secret and inside the
> firewall)=0A secures the auth code exchange and use of HTTP
> doesn't create a vulnerability.

That is simply not true.=A0 CLIENT CREDENTIALS DON'T HELP.=A0 If
the user is outside the firewall and the callback URI is not
protected by TLS, the attacker intercepts the authorization
code outside the firewall and submits it to the client
through the firewall.=A0 The client exchanges it for the
access token, uses the access token to get protected
resources, and sends those resources to the attacker
outside the firewall.

Francisco



--0-710027294-1301606193=:81215
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable

<table cellspacing=3D"0" cellpadding=3D"0" border=3D"0" ><tr><td valign=3D"=
top" style=3D"font: inherit;">Skylar's scenario is not valid even if only o=
ne client has the client credential, for the reason explained in my reply t=
o Skylar, below.<br><br>&nbsp;Francisco<br><br>--- On <b>Thu, 3/31/11, Phil=
 Hunt <i>&lt;phil.hunt@oracle.com&gt;</i></b> wrote:<br><blockquote style=
=3D"border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left=
: 5px;"><br>From: Phil Hunt &lt;phil.hunt@oracle.com&gt;<br>Subject: Re: [O=
AUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt<br>To: fcorella@pomcor.com<br>C=
c: "Skylar Woodward" &lt;skylar@kiva.org&gt;, "OAuth WG" &lt;oauth@ietf.org=
&gt;, "Karen P. Lewison" &lt;kplewison@pomcor.com&gt;<br>Date: Thursday, Ma=
rch 31, 2011, 8:40 PM<br><br><div id=3D"yiv943852990">I have to agree. In O=
Auth, client credentials are dramatically weakened by the number of clients=
 sharing the same credential.<div><br></div><div>If the hacker has the same=
 client
 with the same credentials (such as the case with mobile client apps), then=
 use of client credentials when exchanging for an access token has minimal =
security value if any. &nbsp;However, if only one client can have the clien=
t credential, then it does add security value and Skylar's scenario may be =
valid.&nbsp;</div><div><br></div><div>IMO using client credentials alone is=
 insufficient to validate a particular client instances right to use an aut=
horization code that could be leaked.</div><div><br></div><div>I have been =
pushing the TLS thing for several days on the list, and I agree there is st=
rong push-back. &nbsp;Let's explore some other alternatives.</div><div><br>=
</div><div>What if we had some other means of positively linking specific r=
equesting clients to a returned authorization token that does not rely sole=
ly on the client credential (since they are shared by multiple instances). =
&nbsp;This would help prevent an eavesdropper from hijacking an
 authorization. Would this be a better way to simplify?</div><div><br></div=
><div><div>=0A<span class=3D"yiv943852990Apple-style-span" style=3D"border-=
collapse: separate; color: rgb(0, 0, 0); font-family: Helvetica; font-size:=
 medium; font-style: normal; font-variant: normal; font-weight: normal; let=
ter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; tex=
t-transform: none; white-space: normal; widows: 2; word-spacing: 0px;"><spa=
n class=3D"yiv943852990Apple-style-span" style=3D"border-collapse: separate=
; color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; font-styl=
e: normal; font-variant: normal; font-weight: normal; letter-spacing: norma=
l; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none;=
 white-space: normal; widows: 2; word-spacing: 0px;"><div style=3D"word-wra=
p: break-word;"><span class=3D"yiv943852990Apple-style-span" style=3D"borde=
r-collapse: separate; color: rgb(0, 0, 0); font-family: Helvetica; font-siz=
e: 12px; font-style: normal; font-variant: normal; font-weight: normal; let=
ter-spacing: normal;
 line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; w=
hite-space: normal; widows: 2; word-spacing: 0px;"><div style=3D"word-wrap:=
 break-word;"><div><div><div>Phil</div><div><a rel=3D"nofollow" ymailto=3D"=
mailto:phil.hunt@oracle.com" target=3D"_blank" href=3D"/mc/compose?to=3Dphi=
l.hunt@oracle.com">phil.hunt@oracle.com</a></div></div></div></div></span><=
br class=3D"yiv943852990Apple-interchange-newline"></div></span><br class=
=3D"yiv943852990Apple-interchange-newline"></span><br class=3D"yiv943852990=
Apple-interchange-newline">=0A</div>=0A<br><div><div>On 2011-03-31, at 1:06=
 PM, Francisco Corella wrote:</div><br class=3D"yiv943852990Apple-interchan=
ge-newline"><blockquote type=3D"cite"><table border=3D"0" cellpadding=3D"0"=
 cellspacing=3D"0"><tbody><tr><td style=3D"font: inherit;" valign=3D"top">S=
kylar,<br><br>&gt; So, imagine a website secured inside a corporate<br>&gt;=
 firewall. This service needs to access the provider's<br>&gt; services via=
 OAuth and thus exposes one callback open to the<br>&gt; world for purposes=
 of the OAuth handshake. The redirect URI<br>&gt; is HTTP since the corpora=
tion is having trouble acquiring or<br>&gt; setting up a certificate for HT=
TPS - in any case, the<br>&gt; provider does not requrire it. In this case,=
 the auth code<br>&gt; flows into the firewall via HTTP, but is further val=
idated<br>&gt; by client credentials over TLS in access token<br>&gt; reque=
sts. Valid tokens return to the web application inside<br>&gt; the corporat=
e firewall over TLS and the information is
 still<br>&gt; secure from outside threats. So, my point is that the use of=
<br>&gt; client credentials (always kept secret and inside the<br>&gt; fire=
wall)=0A secures the auth code exchange and use of HTTP<br>&gt; doesn't cre=
ate a vulnerability.<br><br>That is simply not true.&nbsp; CLIENT CREDENTIA=
LS DON'T HELP.&nbsp; If<br>the user is outside the firewall and the callbac=
k URI is not<br>protected by TLS, the attacker intercepts the authorization=
<br>code outside the firewall and submits it to the client<br>through the f=
irewall.&nbsp; The client exchanges it for the<br>access token, uses the ac=
cess token to get protected<br>resources, and sends those resources to the =
attacker<br>outside the firewall.<br><br>Francisco<br><br></td></tr></tbody=
></table></blockquote></div><br></div></div></blockquote></td></tr></table>
--0-710027294-1301606193=:81215--

From eran@hueniverse.com  Thu Mar 31 14:42:00 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 80D7D28C10C for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 14:42:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.635
X-Spam-Level: 
X-Spam-Status: No, score=-2.635 tagged_above=-999 required=5 tests=[AWL=-0.036, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dnNUvPiDyLxL for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 14:41:59 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 17BBB28C0EC for <oauth@ietf.org>; Thu, 31 Mar 2011 14:41:59 -0700 (PDT)
Received: (qmail 704 invoked from network); 31 Mar 2011 21:43:38 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 31 Mar 2011 21:43:38 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Thu, 31 Mar 2011 14:43:34 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Anthony Nadalin <tonynad@microsoft.com>, Mike Jones <Michael.Jones@microsoft.com>, OAuth WG <oauth@ietf.org>
Date: Thu, 31 Mar 2011 14:43:26 -0700
Thread-Topic: Error extensibility proposal
Thread-Index: AcvuWqe3yWo/PW+8SwCPaTggrIuHzwBdpvawAABenpAABmlkcA==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664D6D0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4E1F6AAD24975D4BA5B1680429673943252C24FD@TK5EX14MBXC203.redmond.corp.microsoft.com> <B26C1EF377CB694EAB6BDDC8E624B6E7114E7C60@SN1PRD0302MB100.namprd03.prod.outlook.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E7114E7C60@SN1PRD0302MB100.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 21:42:00 -0000

'PROPER' REQUIRES USE CASES AND REQUIREMENTS!

You have to show how the proposal does not satisfy you requirements. It ful=
ly satisfies all the requirements presented to the working group.

EHL


> -----Original Message-----
> From: Anthony Nadalin [mailto:tonynad@microsoft.com]
> Sent: Thursday, March 31, 2011 11:40 AM
> To: Mike Jones; Eran Hammer-Lahav; OAuth WG
> Subject: RE: Error extensibility proposal
>=20
> I also object, an error registry the proper approach here.
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Mike Jones
> Sent: Thursday, March 31, 2011 11:31 AM
> To: Eran Hammer-Lahav; OAuth WG
> Subject: Re: [OAUTH-WG] Error extensibility proposal
>=20
> I object to this proposal on two grounds:
>=20
> First, changing some of the "error" return codes to HTTP numbers is an
> unnecessary and unsolicited breaking change at a time that we should be
> stabilizing the spec.
>=20
> Second, the OAuth Errors registry is simpler and follows IETF standard
> practices.  I know of no other specification where a parameters registry =
is
> overloaded in this manner.  Please incorporate the OAuth Errors registry =
into
> the framework specification in lieu of this proposal.
>=20
> 				Thank you,
> 				-- Mike
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Eran Hammer-Lahav
> Sent: Tuesday, March 29, 2011 4:02 PM
> To: OAuth WG
> Subject: [OAUTH-WG] Error extensibility proposal
>=20
> *** Requirements
>=20
> The following proposal is based on two requirements:
>=20
> 1. Provide a way to return an OAuth error response for error situations o=
ther
> then 400 and 401. For example, if the server is temporarily unavailable, =
it will
> return an HTTP 503 status. However, it is often desirable to still return=
 a
> response body using the same format as any other error. This makes client
> development easier, having to always check for a single error code.
>=20
> 2. Allow extensions modifying the behavior of the authorization and token
> endpoints via additional request/response parameters to define additional
> error codes to go along with the new functionality. For example, the UX
> extension defines the 'display' parameter. It could define a matching
> 'unsupported_display' error response.
>=20
> No other use cases were identified for error extensibility. Note that thi=
s
> proposal is strictly limited to error resulting from the authorization an=
d token
> endpoints. No other endpoints are included (in particular, protected
> resources are not covered by this proposal).
>=20
> *** Design goals
>=20
> The proposal was specifically designed to be minimalistic, tailored to th=
e
> specific use cases defined, and as effortless as possible. This avoids de=
fining
> error codes identical to existing HTTP status codes, as well as bind new =
errors
> to specific extension parameters. Since the error is useless without
> understanding the extension, this method guarantees that those developing
> and implementing extensions will present it as a complete unit.
>=20
> *** Proposal
>=20
> - Non 400/401 responses
>=20
> If the HTTP response status code is 4xx (other than 400/401) or 5xx, the
> 'error' parameter SHOULD be set to the HTTP status code. For example:
>=20
>      HTTP/1.1 503 Service Unavailable
>      Content-Type: application/json
>      Cache-Control: no-store
>=20
>      {
>        "error":"503"
>      }
>=20
> This will also enable passing HTTP status codes such as 503 via the redir=
ection
> response which is currently not possible. It will allow the authorization=
 server
> to indicate a 503 situation without defining another error code that has =
the
> exact same meaning.
>=20
> - Extension errors
>=20
> Instead of defining an additional error registry, I propose we add a sing=
le field
> to the 'OAuth parameters registry' template:
>=20
>     Additional error codes:
>         Additional error codes related to the parameter usage. Error code=
s
> SHOULD begin with the parameter name
>         when possible (e.g. 'example_invalid' error code for use with the
> 'example' parameter).
>=20
> Error collisions are unlikely because when a new extension is authored, t=
he
> registry is reviewed for potential conflicts. Since the errors are extens=
ion-
> specific, collisions only matter if two extensions are to be used togethe=
r. In
> that case, the review process will identify any potential problems. And s=
ince
> the errors are meaningless without understanding the extension, a registr=
y
> with a random list of errors is not very helpful.
>=20
> *** Feedback
>=20
> Please send any feedback, comments, support, and objections by 3/1 (so it
> can be included or not in -14).
>=20
> EHL
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20


From eran@hueniverse.com  Thu Mar 31 15:49:43 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A51753A67F4 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 15:49:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.635
X-Spam-Level: 
X-Spam-Status: No, score=-2.635 tagged_above=-999 required=5 tests=[AWL=-0.036, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6OhvwVun37yY for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 15:49:43 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 10C693A6825 for <oauth@ietf.org>; Thu, 31 Mar 2011 15:49:42 -0700 (PDT)
Received: (qmail 5279 invoked from network); 31 Mar 2011 22:51:21 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 31 Mar 2011 22:51:21 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 31 Mar 2011 15:51:05 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Mike Jones <Michael.Jones@microsoft.com>, OAuth WG <oauth@ietf.org>
Date: Thu, 31 Mar 2011 15:50:57 -0700
Thread-Topic: Error extensibility proposal
Thread-Index: AcvuWqe3yWo/PW+8SwCPaTggrIuHzwBdpvawAAjtXNA=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664D6EF@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4E1F6AAD24975D4BA5B1680429673943252C24FD@TK5EX14MBXC203.redmond.corp.microsoft.com>
In-Reply-To: <4E1F6AAD24975D4BA5B1680429673943252C24FD@TK5EX14MBXC203.redmond.corp.microsoft.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 22:49:43 -0000

> -----Original Message-----
> From: Mike Jones [mailto:Michael.Jones@microsoft.com]
> Sent: Thursday, March 31, 2011 11:31 AM
> To: Eran Hammer-Lahav; OAuth WG
> Subject: RE: Error extensibility proposal
>=20
> I object to this proposal on two grounds:
>=20
> First, changing some of the "error" return codes to HTTP numbers is an
> unnecessary and unsolicited breaking change at a time that we should be
> stabilizing the spec.

No errors were changed!

Merely, a few potential errors were added, some match your very own example=
s! To call this breaking changes is untrue and ridiculous. In particular co=
ming from someone advocating error extensibility. You have to see the total=
 absurdity of your argument here.

> Second, the OAuth Errors registry is simpler

How is it simpler? It requires double registration for all the use cases ra=
ised while my proposal makes it a trivial matter (just adding a field to an=
 existing registration request).

> and follows IETF standard practices.

Both are registries and both common IETF practice. If you are going to use =
process arguments, you need to make sure they are both accurate and complet=
e.

>  I know of no other specification where a parameters registry is
> overloaded in this manner.

This is not overloading anything. Again, get your facts right.

The use cases clearly show that there are only two kinds of additional erro=
rs required: matching HTTP codes to non 400/401 cases and those related to =
extensions which are all implemented via the introduction of additional par=
ameters. In this case, the error is merely an attribute of the parameter ad=
ded, nothing more.

If you show a valid use case for other requirements, such that require the =
registration of an error without a matching HTTP code or an extension param=
eter, I'll reconsider the design proposed.

Since you have failed to even defend your own examples previously posted, I=
'm going to ignore this objection on the ground that it is without merit.

EHL

From mscurtescu@google.com  Thu Mar 31 16:07:15 2011
Return-Path: <mscurtescu@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 53FD53A6B73 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 16:07:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level: 
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id at-At+T-4xXX for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 16:07:14 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [74.125.121.67]) by core3.amsl.com (Postfix) with ESMTP id 5637D3A69B7 for <oauth@ietf.org>; Thu, 31 Mar 2011 16:07:14 -0700 (PDT)
Received: from hpaq1.eem.corp.google.com (hpaq1.eem.corp.google.com [172.25.149.1]) by smtp-out.google.com with ESMTP id p2VN8rI8020389 for <oauth@ietf.org>; Thu, 31 Mar 2011 16:08:53 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1301612933; bh=yerAgkVLLHlJlxmE3ywbNZ5No5A=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=mU1kSiWYW6vZuaO4JW5Nf08QP6yHm9MI7D4Y1gQQl57y4+zThr8sAViq+SF9IBanv NLAlf8SxPLdj671ajufwA==
Received: from yic15 (yic15.prod.google.com [10.243.65.143]) by hpaq1.eem.corp.google.com with ESMTP id p2VN8pA8020482 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Thu, 31 Mar 2011 16:08:52 -0700
Received: by yic15 with SMTP id 15so1334240yic.8 for <oauth@ietf.org>; Thu, 31 Mar 2011 16:08:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=hhMFxaSAF/9A9gX3lvTXGXAmfwi9BNjX+Jw2rT4X4Js=; b=k1DnwSaNVmeWvfzOW5mOvnv33VZeeFxMu2qhcKOMgOEcMyw/rU6fuKxqX1c31YtA6J TX0/hSMJKA9c+ml5q/MA==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; b=swAhZAHYntJZv0CYVy9mNy1ro9JTDhJro475gmQTM6vGP6ySRFl8rL7jtCRfyqLl2d 1CYeiXnXJ/bgQ9Zq7pGQ==
Received: by 10.101.83.11 with SMTP id k11mr2483925anl.38.1301612931136; Thu, 31 Mar 2011 16:08:51 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.100.34.4 with HTTP; Thu, 31 Mar 2011 16:08:31 -0700 (PDT)
In-Reply-To: <4D7FC17F.1050301@lodderstedt.net>
References: <AANLkTi=yvALug6xBkA4z=Rx1KEDsuVBAis5dbsaq-Xpx@mail.gmail.com> <4D7FC17F.1050301@lodderstedt.net>
From: Marius Scurtescu <mscurtescu@google.com>
Date: Thu, 31 Mar 2011 16:08:31 -0700
Message-ID: <BANLkTikvRONz-H2+BSy+LagQZALnU_Gu6Q@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Content-Type: text/plain; charset=ISO-8859-1
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Google launched OAuth 2 v10 support
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 23:07:15 -0000

On Tue, Mar 15, 2011 at 12:43 PM, Torsten Lodderstedt
<torsten@lodderstedt.net> wrote:
> Congratulation!
>
> I've got some questions:
> - do you support the token_type parameter for the revocation endpoint?

No, we don't. At this point I think our implementations is compliant
with your latest draft, I will double check that.


> - where can one find a documentation of the native app support?

The public documentation was updated:
http://code.google.com/apis/accounts/docs/OAuth2.html#IA


> - what is your approach to native apps and client secrects?

We are issuing secrets for native apps as well, but don't really
expect it to be secret. Makes it easier for libraries and registration
to have a uniform approach.



Marius

From mscurtescu@google.com  Thu Mar 31 16:40:32 2011
Return-Path: <mscurtescu@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 800D13A6AC9 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 16:40:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level: 
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P0GytpVFo+JL for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 16:40:31 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.44.51]) by core3.amsl.com (Postfix) with ESMTP id 9ACA93A69BE for <oauth@ietf.org>; Thu, 31 Mar 2011 16:40:31 -0700 (PDT)
Received: from kpbe20.cbf.corp.google.com (kpbe20.cbf.corp.google.com [172.25.105.84]) by smtp-out.google.com with ESMTP id p2VNgAjo026239 for <oauth@ietf.org>; Thu, 31 Mar 2011 16:42:10 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1301614931; bh=ko4zY+3enX4BZAqhOhNHO+DnkHU=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=Zmtkdx2XcIuhSTnL8bk2YSmaDZklE+rDCe240fZyfVho3JV1T8djBAhxT5La45q7H 8+eazWOczoJUQMyxuLOHQ==
Received: from gyg8 (gyg8.prod.google.com [10.243.50.136]) by kpbe20.cbf.corp.google.com with ESMTP id p2VNfpRK002180 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Thu, 31 Mar 2011 16:42:09 -0700
Received: by gyg8 with SMTP id 8so1310635gyg.38 for <oauth@ietf.org>; Thu, 31 Mar 2011 16:42:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=ldqcgBKoCYD1YTtP4mboMcpuPA8cBrgykxsmWd1YYD8=; b=ntDg+81AkjL/AG9fuz3fHX+9apgVo5VBry12Rs3pn11P2fCYhD9u87Lgh1HY0vYpfO 3iahRs8czMhjMQth5Cig==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; b=LNA9BVYgisMrJTXQ97AoSBQSvsBc6A9Ax5JCFUm+RG9NX+F9rHVfjnFGaU4DrKrMDf hC4vQPfGCDmmpk1+wwhA==
Received: by 10.101.83.11 with SMTP id k11mr2502426anl.38.1301614929153; Thu, 31 Mar 2011 16:42:09 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.100.34.4 with HTTP; Thu, 31 Mar 2011 16:41:49 -0700 (PDT)
In-Reply-To: <4D8A5054.4050006@lodderstedt.net>
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com> <AANLkTimGjiCGk5dpA=YVzq5vDkLR2+caSz=pZ5WiZO9H@mail.gmail.com> <3C84AD7A-F00F-43EC-AAD3-AD2DCFB46B0E@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432BB0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4D84F7E2.6090305@redhat.com> <16B9A882-6204-4CBD-B7E3-1D806AF5056C@oracle.com> <4D8A5054.4050006@lodderstedt.net>
From: Marius Scurtescu <mscurtescu@google.com>
Date: Thu, 31 Mar 2011 16:41:49 -0700
Message-ID: <BANLkTiniuuRXtkzLubgOjVursVtOGjFe6A@mail.gmail.com>
To: Torsten Lodderstedt <torsten@lodderstedt.net>
Content-Type: text/plain; charset=ISO-8859-1
X-System-Of-Record: true
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 23:40:32 -0000

On Wed, Mar 23, 2011 at 12:56 PM, Torsten Lodderstedt
<torsten@lodderstedt.net> wrote:
> Hi Phil,
>
> looks even better now :-)
>
> As already pointed out
> (http://www.ietf.org/mail-archive/web/oauth/current/msg05599.html), "Have
> client credentials? No" does not automatically imply usage of implicit
> grant. The client could also use the authorization code (for various
> reasons).

+1, no client credentials does not necessarily imply the implicit grant.

Marius

From phil.hunt@oracle.com  Thu Mar 31 16:44:58 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4789D3A69BE for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 16:44:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.559
X-Spam-Level: 
X-Spam-Status: No, score=-6.559 tagged_above=-999 required=5 tests=[AWL=0.040,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aWJb7Dpu0qB8 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 16:44:57 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 7C8A53A69AE for <oauth@ietf.org>; Thu, 31 Mar 2011 16:44:57 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2VNkYXj003467 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 31 Mar 2011 23:46:36 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2VNkY1F018719 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 31 Mar 2011 23:46:34 GMT
Received: from abhmt005.oracle.com (abhmt005.oracle.com [141.146.116.14]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2VNkXxq020175; Thu, 31 Mar 2011 18:46:34 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 31 Mar 2011 16:46:33 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <BANLkTiniuuRXtkzLubgOjVursVtOGjFe6A@mail.gmail.com>
Date: Thu, 31 Mar 2011 16:46:30 -0700
Content-Transfer-Encoding: 7bit
Message-Id: <86D49D6E-B80E-41CE-B7B7-521FB35E4583@oracle.com>
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com> <AANLkTimGjiCGk5dpA=YVzq5vDkLR2+caSz=pZ5WiZO9H@mail.gmail.com> <3C84AD7A-F00F-43EC-AAD3-AD2DCFB46B0E@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432BB0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4D84F7E2.6090305@redhat.com> <16B9A882-6204-4CBD-B7E3-1D806AF5056C@oracle.com> <4D8A5054.4050006@lodderstedt.net> <BANLkTiniuuRXtkzLubgOjVursVtOGjFe6A@mail.gmail.com>
To: Marius Scurtescu <mscurtescu@google.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt356.oracle.com [141.146.40.156]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090208.4D95125A.0106:SCFSTAT5015188,ss=1,fgs=0
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 23:44:58 -0000

Thanks, I'll put it on the next version.

Phil
phil.hunt@oracle.com




On 2011-03-31, at 4:41 PM, Marius Scurtescu wrote:

> On Wed, Mar 23, 2011 at 12:56 PM, Torsten Lodderstedt
> <torsten@lodderstedt.net> wrote:
>> Hi Phil,
>> 
>> looks even better now :-)
>> 
>> As already pointed out
>> (http://www.ietf.org/mail-archive/web/oauth/current/msg05599.html), "Have
>> client credentials? No" does not automatically imply usage of implicit
>> grant. The client could also use the authorization code (for various
>> reasons).
> 
> +1, no client credentials does not necessarily imply the implicit grant.
> 
> Marius


From phil.hunt@oracle.com  Thu Mar 31 16:55:13 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C5A9B3A69C7 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 16:55:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.559
X-Spam-Level: 
X-Spam-Status: No, score=-6.559 tagged_above=-999 required=5 tests=[AWL=0.040,  BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BUqBhyn7JGZa for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 16:55:11 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id A61903A6949 for <oauth@ietf.org>; Thu, 31 Mar 2011 16:55:10 -0700 (PDT)
Received: from acsinet15.oracle.com (acsinet15.oracle.com [141.146.126.227]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p2VNumYH019231 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 31 Mar 2011 23:56:49 GMT
Received: from acsmt357.oracle.com (acsmt357.oracle.com [141.146.40.157]) by acsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p2VNulDv013325 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 31 Mar 2011 23:56:47 GMT
Received: from abhmt007.oracle.com (abhmt007.oracle.com [141.146.116.16]) by acsmt357.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p2VNulkX018121; Thu, 31 Mar 2011 18:56:47 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 31 Mar 2011 16:56:46 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <BANLkTiniuuRXtkzLubgOjVursVtOGjFe6A@mail.gmail.com>
Date: Thu, 31 Mar 2011 16:56:45 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <7616C235-2913-4EE0-A710-F47A4CC9E424@oracle.com>
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com> <AANLkTimGjiCGk5dpA=YVzq5vDkLR2+caSz=pZ5WiZO9H@mail.gmail.com> <3C84AD7A-F00F-43EC-AAD3-AD2DCFB46B0E@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432BB0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4D84F7E2.6090305@redhat.com> <16B9A882-6204-4CBD-B7E3-1D806AF5056C@oracle.com> <4D8A5054.4050006@lodderstedt.net> <BANLkTiniuuRXtkzLubgOjVursVtOGjFe6A@mail.gmail.com>
To: Marius Scurtescu <mscurtescu@google.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt357.oracle.com [141.146.40.157]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090204.4D9514C0.007A:SCFSTAT5015188,ss=1,fgs=0
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Mar 2011 23:55:13 -0000

Done.=20

It isn't quite what the flow shows in the earlier diagram. I was =
originally avoiding client type and trying to focus on section 4 =
options.

But this should be a better diagram.

=
http://independentidentity.blogspot.com/2011/03/oauth-flows-extended.html

Phil
phil.hunt@oracle.com




On 2011-03-31, at 4:41 PM, Marius Scurtescu wrote:

> On Wed, Mar 23, 2011 at 12:56 PM, Torsten Lodderstedt
> <torsten@lodderstedt.net> wrote:
>> Hi Phil,
>>=20
>> looks even better now :-)
>>=20
>> As already pointed out
>> (http://www.ietf.org/mail-archive/web/oauth/current/msg05599.html), =
"Have
>> client credentials? No" does not automatically imply usage of =
implicit
>> grant. The client could also use the authorization code (for various
>> reasons).
>=20
> +1, no client credentials does not necessarily imply the implicit =
grant.
>=20
> Marius


From eran@hueniverse.com  Thu Mar 31 17:09:01 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 45CCE3A6B80 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:09:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.634
X-Spam-Level: 
X-Spam-Status: No, score=-2.634 tagged_above=-999 required=5 tests=[AWL=-0.036, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ury19b9VA4Nn for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:08:53 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 6E5953A6B5C for <oauth@ietf.org>; Thu, 31 Mar 2011 17:08:53 -0700 (PDT)
Received: (qmail 18657 invoked from network); 1 Apr 2011 00:10:33 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 1 Apr 2011 00:10:33 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 31 Mar 2011 17:09:55 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Thu, 31 Mar 2011 17:09:46 -0700
Thread-Topic: Authorization code security issue (reframed)
Thread-Index: Acvv+wI1L/vvFZKrSlidkCd6NFPOZw==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664D700@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234465664D700P3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: [OAUTH-WG] Authorization code security issue (reframed)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 00:09:01 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234465664D700P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

(The previous thread is became completely inaccessible to anyone not follow=
ing it carefully for the past week or so. For the sake of reaching a conclu=
sion, I am going to sum up the issue and try to start over with a more narr=
ow focus.)

* The security issue is very simple:

The authorization code is the only artifact binding the resource owner gran=
ting access at the authorization endpoint to the resource owner being redir=
ected back to the client. OAuth 1.0a added the verification code for this s=
ole purpose. If the authorization code is intercepted by a MITM (e.g. fake =
airport wifi), the attacker can take over the session and pretend to be the=
 real resource owner. Since the client has no way to detect this, it will g=
rant the attacker access to the client application which usually includes d=
ata obtain via the access token (received using the compromise authorizatio=
n code).

The attack does not give the attacker any direct access to the access token=
, the client credentials, or anything other than the client application its=
elf. However, the client application is typically considered an extension o=
f the resource server.

Another variation of this attack is related to the implicit grant (user-age=
nt flow). If a MITM can intercept the response in figure 4 step E, it can m=
anipulate the script to obtain the access token (and any secret or other pr=
operties is included).

In other words, the client redirection URI must use a secure channel to com=
pletely prevent these issues.

However, it is important to note that this is not OAuth specific. It is a g=
eneral security concern regarding all other aspects of the client if it is =
not fully secure. For example, if the client uses insecure cookies or provi=
des authentication via other means not using TLS. If the client is insecure=
, well, it's insecure including its OAuth redirection endpoint.

* The two solutions

The debate is which of the following two language alternative we want to in=
clude in the specification:

1. Include a normative MUST use TLS for the client redirection URI endpoint=
.
2. Include a normative SHOULD use TLS for the client redirection URI endpoi=
nt with strong language explaining the various attacks possible if the endp=
oint is not made secure.

Both options reflect the same security issue, but *communicate* the *same* =
solution differently. Since this is just a specification (no standard polic=
e), this is just a manual, not an actual defense.

--- You can stop reading here if you are short on time. This should give yo=
u all the information you need to know ---


* The difficulty

There is no debate that this is a valid security concern, and that the only=
 solution is to apply a MITM protection (i.e. TLS).

However, given the current web landscape and OAuth history (or any other we=
b API), requiring TLS is an unexpected change to the *ecosystem*. From unof=
ficial discussions I had with Yahoo!, Facebook, and Google today, all three=
 indicated they have no plans to enforce such a restriction. None of the ma=
jor OAuth 1.0 providers today enforce such a requirement, even though the e=
xact same issue is present in OAuth 1.0a.

The challenge is to find the right *language* balance between reflecting re=
ality and reflecting the ideal security configuration. This is not a questi=
on of what is appropriate in certain situation, or the unique attack vector=
s of individual deployments. It is about how we talk about security, and ho=
w to best push the web towards better security without pushing too hard too=
 fast.

To me, the challenge is how to effectively communicate the issue, without f=
orcing companies to knowingly violate the specification. The problem with t=
hat is that experience shows it's a slippery slope. Once you are no longer =
fully compliant, it is easier to let other MUSTs slide.

In the consumer web space - which originated and is still the primary audie=
nce for this work (no matter how much the enterprise folks here protest) - =
enforcing such a requirement on client developers is impractical. Very few =
providers can afford to alienate their developers by making such a requirem=
ent today. It will also completely undo all the other work done to make thi=
s specification more accessible and easier to deploy. Hands down, deploying=
 server-side TLS is much harder for client developers than figuring OAuth 1=
.0 signatures.

EHL















--_000_90C41DD21FB7C64BB94121FBBC2E7234465664D700P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:249583143;
	mso-list-type:hybrid;
	mso-list-template-ids:149032632 67698703 67698713 67698715 67698703 676987=
13 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>(The prev=
ious thread is became completely inaccessible to anyone not following it ca=
refully for the past week or so. For the sake of reaching a conclusion, I a=
m going to sum up the issue and try to start over with a more narrow focus.=
)<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt=
;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span>=
</p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calib=
ri","sans-serif";color:#1F497D'>* The security issue is very simple:<o:p></=
o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fa=
mily:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p c=
lass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","san=
s-serif";color:#1F497D'>The authorization code is the only artifact binding=
 the resource owner granting access at the authorization endpoint to the re=
source owner being redirected back to the client. OAuth 1.0a added the veri=
fication code for this sole purpose. If the authorization code is intercept=
ed by a MITM (e.g. fake airport wifi), the attacker can take over the sessi=
on and pretend to be the real resource owner. Since the client has no way t=
o detect this, it will grant the attacker access to the client application =
which usually includes data obtain via the access token (received using the=
 compromise authorization code).<o:p></o:p></span></p><p class=3DMsoNormal>=
<span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1=
F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>The attack d=
oes not give the attacker any direct access to the access token, the client=
 credentials, or anything other than the client application itself. However=
, the client application is typically considered an extension of the resour=
ce server.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-si=
ze:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:=
p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fami=
ly:"Calibri","sans-serif";color:#1F497D'>Another variation of this attack i=
s related to the implicit grant (user-agent flow). If a MITM can intercept =
the response in figure 4 step E, it can manipulate the script to obtain the=
 access token (and any secret or other properties is included).<o:p></o:p><=
/span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:=
"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>In other words, the client redirection URI must use a s=
ecure channel to completely prevent these issues.<o:p></o:p></span></p><p c=
lass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","san=
s-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F4=
97D'>However, it is important to note that this is not OAuth specific. It i=
s a general security concern regarding all other aspects of the client if i=
t is not fully secure. For example, if the client uses insecure cookies or =
provides authentication via other means not using TLS. If the client is ins=
ecure, well, it&#8217;s insecure including its OAuth redirection endpoint.<=
o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;f=
ont-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></=
p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri=
","sans-serif";color:#1F497D'>* The two solutions<o:p></o:p></span></p><p c=
lass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","san=
s-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F4=
97D'>The debate is which of the following two language alternative we want =
to include in the specification:<o:p></o:p></span></p><p class=3DMsoNormal>=
<span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1=
F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>1. Include a=
 normative MUST use TLS for the client redirection URI endpoint.<o:p></o:p>=
</span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family=
:"Calibri","sans-serif";color:#1F497D'>2. Include a normative SHOULD use TL=
S for the client redirection URI endpoint with strong language explaining t=
he various attacks possible if the endpoint is not made secure.<o:p></o:p><=
/span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:=
"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>Both options reflect the same security issue, but *<b>c=
ommunicate</b>* the *<b>same</b>* solution differently. Since this is just =
a specification (no standard police), this is just a manual, not an actual =
defense.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size=
:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p>=
</span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family=
:"Calibri","sans-serif";color:#1F497D'>--- You can stop reading here if you=
 are short on time. This should give you all the information you need to kn=
ow ---<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:1=
1.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></=
span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"=
Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>* The difficulty<o:p></o:p></span></p><p class=3DMsoNor=
mal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";colo=
r:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'=
font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>There is=
 no debate that this is a valid security concern, and that the only solutio=
n is to apply a MITM protection (i.e. TLS).<o:p></o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
>However, given the current web landscape and OAuth history (or any other w=
eb API), requiring TLS is an unexpected change to the *<b>ecosystem</b>*. F=
rom unofficial discussions I had with Yahoo!, Facebook, and Google today, a=
ll three indicated they have no plans to enforce such a restriction. None o=
f the major OAuth 1.0 providers today enforce such a requirement, even thou=
gh the exact same issue is present in OAuth 1.0a.<o:p></o:p></span></p><p c=
lass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","san=
s-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F4=
97D'>The challenge is to find the right *<b>language</b>* balance between r=
eflecting reality and reflecting the ideal security configuration. This is =
not a question of what is appropriate in certain situation, or the unique a=
ttack vectors of individual deployments. It is about how we talk about secu=
rity, and how to best push the web towards better security without pushing =
too hard too fast.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D=
'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&n=
bsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;f=
ont-family:"Calibri","sans-serif";color:#1F497D'>To me, the challenge is ho=
w to effectively communicate the issue, without forcing companies to knowin=
gly violate the specification. The problem with that is that experience sho=
ws it&#8217;s a slippery slope. Once you are no longer fully compliant, it =
is easier to let other MUSTs slide.<o:p></o:p></span></p><p class=3DMsoNorm=
al><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color=
:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>In the co=
nsumer web space &#8211; which originated and is still the primary audience=
 for this work (no matter how much the enterprise folks here protest) &#821=
1; enforcing such a requirement on client developers is impractical. Very f=
ew providers can afford to alienate their developers by making such a requi=
rement today. It will also completely undo all the other work done to make =
this specification more accessible and easier to deploy. Hands down, deploy=
ing server-side TLS is much harder for client developers than figuring OAut=
h 1.0 signatures.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'=
font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nb=
sp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;fo=
nt-family:"Calibri","sans-serif";color:#1F497D'>EHL<o:p></o:p></span></p><p=
 class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","s=
ans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal>=
<span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1=
F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;<=
/o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-f=
amily:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><=
span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F=
497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-=
size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</=
o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fa=
mily:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p c=
lass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","san=
s-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F4=
97D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-s=
ize:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o=
:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fam=
ily:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p cl=
ass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans=
-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><sp=
an style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F49=
7D'><o:p>&nbsp;</o:p></span></p></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234465664D700P3PW5EX1MB01E_--

From stpeter@stpeter.im  Thu Mar 31 17:25:09 2011
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7E3403A6B2D for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:25:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.477
X-Spam-Level: 
X-Spam-Status: No, score=-102.477 tagged_above=-999 required=5 tests=[AWL=0.122, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Oa5WJTgFf1Qt for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:25:07 -0700 (PDT)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id D91783A6AD8 for <oauth@ietf.org>; Thu, 31 Mar 2011 17:25:06 -0700 (PDT)
Received: from dhcp-4596.meeting.ietf.org (dhcp-4596.meeting.ietf.org [130.129.69.150]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 8A2A840022; Thu, 31 Mar 2011 18:28:40 -0600 (MDT)
Message-ID: <4D951BC4.3070608@stpeter.im>
Date: Fri, 01 Apr 2011 02:26:44 +0200
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
X-Enigmail-Version: 1.1.1
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms040407050000060105060703"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 00:25:09 -0000

This is a cryptographically signed message in MIME format.

--------------ms040407050000060105060703
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/30/11 1:01 AM, Eran Hammer-Lahav wrote:

> Please send any feedback, comments, support, and objections by 3/1

I think you meant 4/1. :)

> (so it can be included or not in -14).

Given how busy things are during IETF week, I'm sure that many people
who are in Prague for the meeting might not have time to review the
proposal in 48 hours or less. I know I won't have time to double-check
the list threads and document history on this point until next week.

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms040407050000060105060703
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms040407050000060105060703--

From phil.hunt@oracle.com  Thu Mar 31 17:41:15 2011
Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F309A3A6B2D for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:41:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.56
X-Spam-Level: 
X-Spam-Status: No, score=-6.56 tagged_above=-999 required=5 tests=[AWL=0.038,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0DLTGuq8iYGR for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:41:11 -0700 (PDT)
Received: from rcsinet10.oracle.com (rcsinet10.oracle.com [148.87.113.121]) by core3.amsl.com (Postfix) with ESMTP id 565E83A6AD0 for <oauth@ietf.org>; Thu, 31 Mar 2011 17:41:11 -0700 (PDT)
Received: from rcsinet15.oracle.com (rcsinet15.oracle.com [148.87.113.117]) by rcsinet10.oracle.com (Switch-3.4.2/Switch-3.4.2) with ESMTP id p310gnkn016277 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 1 Apr 2011 00:42:50 GMT
Received: from acsmt356.oracle.com (acsmt356.oracle.com [141.146.40.156]) by rcsinet15.oracle.com (Switch-3.4.2/Switch-3.4.1) with ESMTP id p310gm4T021822 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 1 Apr 2011 00:42:48 GMT
Received: from abhmt015.oracle.com (abhmt015.oracle.com [141.146.116.24]) by acsmt356.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id p310glIK020867; Thu, 31 Mar 2011 19:42:48 -0500
Received: from [192.168.1.8] (/24.85.235.164) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 31 Mar 2011 17:42:46 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/alternative; boundary=Apple-Mail-11--958665560
From: Phil Hunt <phil.hunt@oracle.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465664D700@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Thu, 31 Mar 2011 17:42:45 -0700
Message-Id: <D116E2D6-52B3-423A-8036-7CE29BCF86D5@oracle.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465664D700@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
X-Source-IP: acsmt356.oracle.com [141.146.40.156]
X-Auth-Type: Internal IP
X-CT-RefId: str=0001.0A090206.4D951F89.0034:SCFSTAT5015188,ss=1,fgs=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authorization code security issue (reframed)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 00:41:15 -0000

--Apple-Mail-11--958665560
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Sadly, see below.

Phil
phil.hunt@oracle.com




On 2011-03-31, at 5:09 PM, Eran Hammer-Lahav wrote:

> (The previous thread is became completely inaccessible to anyone not =
following it carefully for the past week or so. For the sake of reaching =
a conclusion, I am going to sum up the issue and try to start over with =
a more narrow focus.)
> =20
> * The security issue is very simple:
> =20
> The authorization code is the only artifact binding the resource owner =
granting access at the authorization endpoint to the resource owner =
being redirected back to the client. OAuth 1.0a added the verification =
code for this sole purpose. If the authorization code is intercepted by =
a MITM (e.g. fake airport wifi), the attacker can take over the session =
and pretend to be the real resource owner. Since the client has no way =
to detect this, it will grant the attacker access to the client =
application which usually includes data obtain via the access token =
(received using the compromise authorization code).
> =20
> The attack does not give the attacker any direct access to the access =
token, the client credentials, or anything other than the client =
application itself. However, the client application is typically =
considered an extension of the resource server.
> =20
> Another variation of this attack is related to the implicit grant =
(user-agent flow). If a MITM can intercept the response in figure 4 step =
E, it can manipulate the script to obtain the access token (and any =
secret or other properties is included).
> =20
> In other words, the client redirection URI must use a secure channel =
to completely prevent these issues.
> =20
> However, it is important to note that this is not OAuth specific. It =
is a general security concern regarding all other aspects of the client =
if it is not fully secure. For example, if the client uses insecure =
cookies or provides authentication via other means not using TLS. If the =
client is insecure, well, it=92s insecure including its OAuth =
redirection endpoint.
> =20
> * The two solutions
> =20
> The debate is which of the following two language alternative we want =
to include in the specification:
> =20
> 1. Include a normative MUST use TLS for the client redirection URI =
endpoint.

WITH the exception that if the redirection URI is local, the redirection =
only has to be passed back to the user-agent securely. There is NO need =
for the client app to implement server-side TLS.  This is an important =
exception and makes 1 specific compared to 2 (too broad).

> 2. Include a normative SHOULD use TLS for the client redirection URI =
endpoint with strong language explaining the various attacks possible if =
the endpoint is not made secure.
> =20
> Both options reflect the same security issue, but *communicate* the =
*same* solution differently. Since this is just a specification (no =
standard police), this is just a manual, not an actual defense.

Totally disagree.
> =20
> --- You can stop reading here if you are short on time. This should =
give you all the information you need to know ---
> =20
> =20
> * The difficulty
> =20
> There is no debate that this is a valid security concern, and that the =
only solution is to apply a MITM protection (i.e. TLS).
> =20
> However, given the current web landscape and OAuth history (or any =
other web API), requiring TLS is an unexpected change to the =
*ecosystem*. =46rom unofficial discussions I had with Yahoo!, Facebook, =
and Google today, all three indicated they have no plans to enforce such =
a restriction. None of the major OAuth 1.0 providers today enforce such =
a requirement, even though the exact same issue is present in OAuth =
1.0a.

> =20
> The challenge is to find the right *language* balance between =
reflecting reality and reflecting the ideal security configuration. This =
is not a question of what is appropriate in certain situation, or the =
unique attack vectors of individual deployments. It is about how we talk =
about security, and how to best push the web towards better security =
without pushing too hard too fast.
> =20
> To me, the challenge is how to effectively communicate the issue, =
without forcing companies to knowingly violate the specification. The =
problem with that is that experience shows it=92s a slippery slope. Once =
you are no longer fully compliant, it is easier to let other MUSTs =
slide.
> =20
> In the consumer web space =96 which originated and is still the =
primary audience for this work (no matter how much the enterprise folks =
here protest) =96 enforcing such a requirement on client developers is =
impractical. Very few providers can afford to alienate their developers =
by making such a requirement today. It will also completely undo all the =
other work done to make this specification more accessible and easier to =
deploy. Hands down, deploying server-side TLS is much harder for client =
developers than figuring OAuth 1.0 signatures.
> =20
> EHL

Respectfully, -1=20

It may be true for the current group of social media apps using OAuth =
that the biggest risk is someone making a practical joke update. For =
that, your corporate management obviously don't see the value of =
protecting their customers. They've stated this publicly many times =
(directly and indirectly). Completely understandable and I would agree =
on their position for just the moment.=20

BUT, for those of you getting into gradually more personal information =
and getting into real financial and legal consequences, I'm betting your =
risk profiles are already changing dramatically. Many on the list in a =
couple short years have stated that TLS is now no big deal. So why kill =
security now? TLS and OAuth are likely THE back bone of REST services =
going forwards. Why doom the specification now?=20

For the vast quantity of new adopters, such as business, financial, =
telecom, medical, etc, this would be a MAJOR deviation from basic =
security practices. Let me put it this way, would you want your broker =
company using OAuth without MITM protection?  If so, I'll be happy to =
meet with you in a local coffee shop some time.  :-)

None of this should be new to anyone. This is hardly idealism.

The bottom line, and I do apologize, but the fact is that the current =
spec won't stand up to security review and that puts a total road block =
out there against using OAuth at this time.

My apologies to the list. I've sent far far too many messages detailing =
the importance of this issue. Let me know what the group consensus is. =
I'm prepared to work for, as Eran puts it, "an idealistic" fix or drop =
it.



> =20
> =20
> =20
> =20
> =20
> =20
> =20
> =20
> =20
> =20
> =20
> =20
> =20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail-11--958665560
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
">Sadly, see below.<div><br><div>
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
font-style: normal; font-variant: normal; font-weight: normal; =
letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; color: rgb(0, 0, 0); font-family: =
Helvetica; font-size: 12px; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; "><div style=3D"word-wrap: =
break-word; -webkit-nbsp-mode: space; -webkit-line-break: =
after-white-space; "><div><div><div>Phil</div><div><a =
href=3D"mailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a></div></div><=
/div></div></span><br class=3D"Apple-interchange-newline"></div></span><br=
 class=3D"Apple-interchange-newline"></span><br =
class=3D"Apple-interchange-newline">
</div>
<br><div><div>On 2011-03-31, at 5:09 PM, Eran Hammer-Lahav =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; font-family: Helvetica; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: =
normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">(The =
previous thread is became completely inaccessible to anyone not =
following it carefully for the past week or so. For the sake of reaching =
a conclusion, I am going to sum up the issue and try to start over with =
a more narrow focus.)<o:p></o:p></span></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); "><o:p>&nbsp;</o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">* The security issue is very =
simple:<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">The =
authorization code is the only artifact binding the resource owner =
granting access at the authorization endpoint to the resource owner =
being redirected back to the client. OAuth 1.0a added the verification =
code for this sole purpose. If the authorization code is intercepted by =
a MITM (e.g. fake airport wifi), the attacker can take over the session =
and pretend to be the real resource owner. Since the client has no way =
to detect this, it will grant the attacker access to the client =
application which usually includes data obtain via the access token =
(received using the compromise authorization =
code).<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">The =
attack does not give the attacker any direct access to the access token, =
the client credentials, or anything other than the client application =
itself. However, the client application is typically considered an =
extension of the resource server.<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">Another variation of this attack is related to the implicit grant =
(user-agent flow). If a MITM can intercept the response in figure 4 step =
E, it can manipulate the script to obtain the access token (and any =
secret or other properties is included).<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">In =
other words, the client redirection URI must use a secure channel to =
completely prevent these issues.<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">However, it is important to note that this is not OAuth specific. It =
is a general security concern regarding all other aspects of the client =
if it is not fully secure. For example, if the client uses insecure =
cookies or provides authentication via other means not using TLS. If the =
client is insecure, well, it=92s insecure including its OAuth =
redirection endpoint.<o:p></o:p></span></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); "><o:p>&nbsp;</o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">* The two =
solutions<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">The =
debate is which of the following two language alternative we want to =
include in the specification:<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">1. =
Include a normative MUST use TLS for the client redirection URI =
endpoint.</span></div></div></div></span></blockquote><div><br></div>WITH =
the exception that if the redirection URI is local, the redirection only =
has to be passed back to the user-agent securely. There is NO need for =
the client app to implement server-side TLS. &nbsp;This is an important =
exception and makes 1 specific compared to 2 (too =
broad).</div><div><br><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p></o:p></span></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif; "><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">2. Include =
a normative SHOULD use TLS for the client redirection URI endpoint with =
strong language explaining the various attacks possible if the endpoint =
is not made secure.<o:p></o:p></span></div><div style=3D"margin-top: =
0in; margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; =
font-size: 12pt; font-family: 'Times New Roman', serif; "><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125); "><o:p>&nbsp;</o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); ">Both options reflect the same =
security issue, but *<b>communicate</b>* the *<b>same</b>* solution =
differently. Since this is just a specification (no standard police), =
this is just a manual, not an actual =
defense.</span></div></div></div></span></blockquote><div><br></div>Totall=
y disagree.<br><blockquote type=3D"cite"><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; orphans: 2; text-indent: 0px; =
text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p></o:p></span></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif; "><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">--- =
You can stop reading here if you are short on time. This should give you =
all the information you need to know ---<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">* The =
difficulty<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">There =
is no debate that this is a valid security concern, and that the only =
solution is to apply a MITM protection (i.e. =
TLS).<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">However, given the current web landscape and OAuth history (or any =
other web API), requiring TLS is an unexpected change to the =
*<b>ecosystem</b>*. =46rom unofficial discussions I had with Yahoo!, =
Facebook, and Google today, all three indicated they have no plans to =
enforce such a restriction. None of the major OAuth 1.0 providers today =
enforce such a requirement, even though the exact same issue is present =
in OAuth =
1.0a.</span></div></div></div></span></blockquote></div><div><blockquote =
type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; font-family: Helvetica; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: =
normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">The =
challenge is to find the right *<b>language</b>* balance between =
reflecting reality and reflecting the ideal security configuration. This =
is not a question of what is appropriate in certain situation, or the =
unique attack vectors of individual deployments. It is about how we talk =
about security, and how to best push the web towards better security =
without pushing too hard too fast.<o:p></o:p></span></div><div =
style=3D"margin-top: 0in; margin-right: 0in; margin-bottom: 0.0001pt; =
margin-left: 0in; font-size: 12pt; font-family: 'Times New Roman', =
serif; "><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">To =
me, the challenge is how to effectively communicate the issue, without =
forcing companies to knowingly violate the specification. The problem =
with that is that experience shows it=92s a slippery slope. Once you are =
no longer fully compliant, it is easier to let other MUSTs =
slide.<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); ">In =
the consumer web space =96 which originated and is still the primary =
audience for this work (no matter how much the enterprise folks here =
protest) =96 enforcing such a requirement on client developers is =
impractical. Very few providers can afford to alienate their developers =
by making such a requirement today. It will also completely undo all the =
other work done to make this specification more accessible and easier to =
deploy. Hands down, deploying server-side TLS is much harder for client =
developers than figuring OAuth 1.0 =
signatures.<o:p></o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
">EHL</span></div></div></div></span></blockquote><div><br></div><div><spa=
n class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div><div>Respectfully, =
-1&nbsp;</div><div><br></div><div>It&nbsp;may be true for the current =
group of social media apps using OAuth that the biggest risk is someone =
making a practical joke update. For that, your corporate management =
obviously don't see the value of protecting their customers. They've =
stated this publicly many times (directly and indirectly). Completely =
understandable and I would agree on their position for just the =
moment.&nbsp;</div><div><br></div><div>BUT, for those of you getting =
into gradually more personal information and getting into real financial =
and legal consequences, I'm betting your risk profiles are already =
changing dramatically. Many on the list in a couple short years have =
stated that TLS is now no big deal. So why kill security now? TLS and =
OAuth are likely THE back bone of REST services going forwards. Why doom =
the specification now?&nbsp;</div><div><br></div><div>For the vast =
quantity of new adopters, such as business, financial, telecom, medical, =
etc, this would be a MAJOR deviation from basic security practices. Let =
me put it this way, would you want your broker company using OAuth =
without MITM protection? &nbsp;If so, I'll be happy to meet with you in =
a local coffee shop some time. &nbsp;:-)</div><div><br></div><div>None =
of this should be new to anyone. This is hardly =
idealism.</div><div><br></div><div>The bottom line, and I do apologize, =
but the fact is that the current spec won't stand up to security review =
and that puts a total road block out there against using OAuth at this =
time.</div><div><br></div><div>My apologies to the list. I've sent far =
far too many messages detailing the importance of this issue. Let me =
know what the group consensus is. I'm prepared to work for, as Eran puts =
it, "an idealistic" fix or drop =
it.</div><div><br></div></div><div><blockquote type=3D"cite"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-family: Helvetica; font-style: normal; font-variant: normal; =
font-weight: normal; letter-spacing: normal; line-height: normal; =
orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; =
-webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p></o:p></span></div></div></div></span></blockquote></div></div></di=
v></span></div><div><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; font-family: Helvetica; font-style: =
normal; font-variant: normal; font-weight: normal; letter-spacing: =
normal; line-height: normal; orphans: 2; text-indent: 0px; =
text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; =
-webkit-border-horizontal-spacing: 0px; -webkit-border-vertical-spacing: =
0px; -webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p></o:p></span></div><div style=3D"margin-top: 0in; margin-right: =
0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: 12pt; =
font-family: 'Times New Roman', serif; "><font class=3D"Apple-style-span" =
color=3D"#1F497D" face=3D"Calibri, sans-serif" size=3D"4"><span =
class=3D"Apple-style-span" style=3D"font-size: =
15px;"><br></span></font></div></div></div></span></div><blockquote =
type=3D"cite"><span class=3D"Apple-style-span" style=3D"border-collapse: =
separate; font-family: Helvetica; font-style: normal; font-variant: =
normal; font-weight: normal; letter-spacing: normal; line-height: =
normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: =
normal; widows: 2; word-spacing: 0px; -webkit-border-horizontal-spacing: =
0px; -webkit-border-vertical-spacing: 0px; =
-webkit-text-decorations-in-effect: none; -webkit-text-size-adjust: =
auto; -webkit-text-stroke-width: 0px; font-size: medium; "><div =
lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div class=3D"WordSection1" =
style=3D"page: WordSection1; "><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div><div style=3D"margin-top: 0in; =
margin-right: 0in; margin-bottom: 0.0001pt; margin-left: 0in; font-size: =
12pt; font-family: 'Times New Roman', serif; "><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125); =
"><o:p>&nbsp;</o:p></span></div></div>____________________________________=
___________<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" =
style=3D"color: blue; text-decoration: underline; =
">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" style=3D"color: =
blue; text-decoration: underline; =
">https://www.ietf.org/mailman/listinfo/oauth</a><br></div></span></blockq=
uote></div><br></div></body></html>=

--Apple-Mail-11--958665560--

From cmortimore@salesforce.com  Thu Mar 31 17:43:55 2011
Return-Path: <cmortimore@salesforce.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 87B123A6A8F for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:43:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ju+N24UZ0PzZ for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:43:53 -0700 (PDT)
Received: from exprod8og113.obsmtp.com (exprod8og113.obsmtp.com [64.18.3.26]) by core3.amsl.com (Postfix) with SMTP id 509B13A69C9 for <oauth@ietf.org>; Thu, 31 Mar 2011 17:43:53 -0700 (PDT)
Received: from exsfm-hub4.internal.salesforce.com ([204.14.239.239]) by exprod8ob113.postini.com ([64.18.7.12]) with SMTP ID DSNKTZUgLHwadNnEA4HRn36xut+WUd/2vlR9@postini.com; Thu, 31 Mar 2011 17:45:33 PDT
Received: from EXSFM-MB01.internal.salesforce.com ([10.1.127.46]) by exsfm-hub4.internal.salesforce.com ([10.1.127.8]) with mapi; Thu, 31 Mar 2011 17:45:32 -0700
From: Chuck Mortimore <cmortimore@salesforce.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Date: Thu, 31 Mar 2011 17:45:20 -0700
Thread-Topic: [OAUTH-WG] Authorization code security issue (reframed)
Thread-Index: AcvwBhsF9AoHr9yNQciMJwh95GmWYg==
Message-ID: <10C3E318-4053-4CD9-B20B-518341FF1E75@salesforce.com>
References: <90C41DD21FB7C64BB94121FBBC2E7234465664D700@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465664D700@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_10C3E31840534CD9B20B518341FF1E75salesforcecom_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authorization code security issue (reframed)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 00:43:55 -0000

--_000_10C3E31840534CD9B20B518341FF1E75salesforcecom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_10C3E31840534CD9B20B518341FF1E75salesforcecom_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWw+PGJvZHkgYmdjb2xvcj0iI0ZGRkZGRiI+PGRpdj5UaGFua3MgRXJhbi4gJm5ic3A7V2Vs
bCBwdXQuICZuYnNwOzwvZGl2PjxkaXY+PGJyPjwvZGl2PjxkaXY+QXMgb25lIG9mIHRoZSBvcmln
aW5hbCBhZHZvY2F0ZXMgb2YgTVVTVCwgSSdsbCBvZmZlciBhIGJpdCBvZiBiYWNrZ3JvdW5kIG9u
IHdoYXQgd2UndmUgZG9uZS9zZWVuIGluIG91ciAxLjBhIGFuZCAyZDEwIGRlcGxveW1lbnRzPGJy
Pjxicj48L2Rpdj48ZGl2Piogd2Ugb25seSBibG9jayBIVFRQIChhbmQgamF2YXNjcmlwdDopLiAm
bmJzcDtPdGhlciBzY2hlbWVzIG5vdCB1c2luZyBUTFMgYXJlIGFsbG93ZWQ8L2Rpdj48ZGl2Piog
d2UndmUgc2VlbiAxLjAgc2lnbmF0dXJlcyBiZWluZyBtdWNoIGhhcmRlciBmb3IgZGV2ZWxvcGVy
cyB0aGFuIFRMUy4gVGhhdCB2aWV3cG9pbnQgaXMgbGlrZWx5IHNrZXdlZCBieSBhIGdvb2QgZGVh
bCBvZiBvdXIgY2xpZW50cyBydW5uaW5nIG9uIGNsb3VkIHBsYXRmb3JtcyBvciBwcm92aWRlcnMg
d2hlcmUgVExTIGlzIGVpdGhlciBlc3NlbnRpYWxseSBmcmVlIG9yIHByZS1leGlzdGluZzwvZGl2
PjxkaXY+KiBUTFMgaGFzIGJlZW4gYSBsYXJnZSBwYWluIHBvaW50IGZvciBpbml0aWFsIGRldmVs
b3BlciBleHBlcmllbmNlLCBlc3BlY2lhbGx5IHdoZW4gcnVubmluZyBvbiBsb2NhbGhvc3QuICZu
YnNwO0Vub3VnaCB3aGVyZSB3ZSd2ZSBjb25zaWRlcmVkIHJlbGF4aW5nIGZvciBsb2NhbGhvc3Qg
b25seS4mbmJzcDs8L2Rpdj48ZGl2Pjxicj48L2Rpdj48ZGl2PldlIGRvIGNvbnNpZGVyIHRoaXMg
YmVzdCBwcmFjdGljZSwgYnV0IHJlY29nbml6ZSB3ZSdyZSBpbiBhIGRpZmZlcmVudCBidXNpbmVz
cyB0aGFuIG1hbnkgaGVyZS4gJm5ic3A7SWYgbm8gb25lIHBsYW5zIHRvIGRlcGxveSBpbiB0aGlz
IHdheSwgdGhhbiBJIGFncmVlIEknZCByYXRoZXIgc2VlIHN0cm9uZyBsYW5ndWFnZSBjbGVhcmx5
IGFydGljdWxhdGluZyB0aGUgcmlza3MgJm5ic3A7IFByZWZlcmFibHkgdGhpcyBsYW5ndWFnZSB3
b3VsZCBiZSBpbmxpbmUgcmF0aGVyIHRoYW4gcHVyZWx5IGluIHNlY3VyaXR5IGNvbnNpZGVyYXRp
b25zLi4uYXQgbGVhc3QgYSBzdW1tYXJ5IG9mIHRoZSByaXNrLiAmbmJzcDs8L2Rpdj48ZGl2Pjxi
cj4tIGNtb3J0PC9kaXY+PGRpdj48YnI+T24gTWFyIDMxLCAyMDExLCBhdCA1OjEwIFBNLCAiRXJh
biBIYW1tZXItTGFoYXYiICZsdDs8YSBocmVmPSJtYWlsdG86ZXJhbkBodWVuaXZlcnNlLmNvbSI+
ZXJhbkBodWVuaXZlcnNlLmNvbTwvYT4mZ3Q7IHdyb3RlOjxicj48YnI+PC9kaXY+PGRpdj48L2Rp
dj48YmxvY2txdW90ZSB0eXBlPSJjaXRlIj48ZGl2PjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m
YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMx
RjQ5N0QiPihUaGUgcHJldmlvdXMgdGhyZWFkIGlzIGJlY2FtZSBjb21wbGV0ZWx5IGluYWNjZXNz
aWJsZSB0byBhbnlvbmUgbm90IGZvbGxvd2luZyBpdCBjYXJlZnVsbHkgZm9yIHRoZSBwYXN0IHdl
ZWsgb3Igc28uIEZvciB0aGUgc2FrZSBvZiByZWFjaGluZyBhIGNvbmNsdXNpb24sIEkgYW0gZ29p
bmcgdG8gc3VtIHVwIHRoZSBpc3N1ZSBhbmQgdHJ5IHRvIHN0YXJ0IG92ZXIgd2l0aCBhIG1vcmUg
bmFycm93IGZvY3VzLik8bzpwPjwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9v
OnA+PC9zcGFuPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl
OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYm
cXVvdDs7Y29sb3I6IzFGNDk3RCI+KiBUaGUgc2VjdXJpdHkgaXNzdWUgaXMgdmVyeSBzaW1wbGU6
PG86cD48L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fu
cy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m
YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMx
RjQ5N0QiPlRoZSBhdXRob3JpemF0aW9uIGNvZGUgaXMgdGhlIG9ubHkgYXJ0aWZhY3QgYmluZGlu
ZyB0aGUgcmVzb3VyY2Ugb3duZXIgZ3JhbnRpbmcgYWNjZXNzIGF0IHRoZSBhdXRob3JpemF0aW9u
IGVuZHBvaW50IHRvIHRoZSByZXNvdXJjZSBvd25lciBiZWluZyByZWRpcmVjdGVkIGJhY2sgdG8g
dGhlIGNsaWVudC4gT0F1dGggMS4wYSBhZGRlZCB0aGUgdmVyaWZpY2F0aW9uIGNvZGUgZm9yIHRo
aXMgc29sZSBwdXJwb3NlLiBJZiB0aGUgYXV0aG9yaXphdGlvbiBjb2RlIGlzIGludGVyY2VwdGVk
IGJ5IGEgTUlUTSAoZS5nLiBmYWtlIGFpcnBvcnQgd2lmaSksIHRoZSBhdHRhY2tlciBjYW4gdGFr
ZSBvdmVyIHRoZSBzZXNzaW9uIGFuZCBwcmV0ZW5kIHRvIGJlIHRoZSByZWFsIHJlc291cmNlIG93
bmVyLiBTaW5jZSB0aGUgY2xpZW50IGhhcyBubyB3YXkgdG8gZGV0ZWN0IHRoaXMsIGl0IHdpbGwg
Z3JhbnQgdGhlIGF0dGFja2VyIGFjY2VzcyB0byB0aGUgY2xpZW50IGFwcGxpY2F0aW9uIHdoaWNo
IHVzdWFsbHkgaW5jbHVkZXMgZGF0YSBvYnRhaW4gdmlhIHRoZSBhY2Nlc3MgdG9rZW4gKHJlY2Vp
dmVkIHVzaW5nIHRoZSBjb21wcm9taXNlIGF1dGhvcml6YXRpb24gY29kZSkuPG86cD48L286cD48
L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu
MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90
Oztjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9Ik1z
b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPlRoZSBh
dHRhY2sgZG9lcyBub3QgZ2l2ZSB0aGUgYXR0YWNrZXIgYW55IGRpcmVjdCBhY2Nlc3MgdG8gdGhl
IGFjY2VzcyB0b2tlbiwgdGhlIGNsaWVudCBjcmVkZW50aWFscywgb3IgYW55dGhpbmcgb3RoZXIg
dGhhbiB0aGUgY2xpZW50IGFwcGxpY2F0aW9uIGl0c2VsZi4gSG93ZXZlciwgdGhlIGNsaWVudCBh
cHBsaWNhdGlvbiBpcyB0eXBpY2FsbHkgY29uc2lkZXJlZCBhbiBleHRlbnNpb24gb2YgdGhlIHJl
c291cmNlIHNlcnZlci48bzpwPjwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9v
OnA+PC9zcGFuPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl
OjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYm
cXVvdDs7Y29sb3I6IzFGNDk3RCI+QW5vdGhlciB2YXJpYXRpb24gb2YgdGhpcyBhdHRhY2sgaXMg
cmVsYXRlZCB0byB0aGUgaW1wbGljaXQgZ3JhbnQgKHVzZXItYWdlbnQgZmxvdykuIElmIGEgTUlU
TSBjYW4gaW50ZXJjZXB0IHRoZSByZXNwb25zZSBpbiBmaWd1cmUgNCBzdGVwIEUsIGl0IGNhbiBt
YW5pcHVsYXRlIHRoZSBzY3JpcHQgdG8gb2J0YWluIHRoZSBhY2Nlc3MgdG9rZW4gKGFuZCBhbnkg
c2VjcmV0IG9yIG90aGVyIHByb3BlcnRpZXMgaXMgaW5jbHVkZWQpLjxvOnA+PC9vOnA+PC9zcGFu
PjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtm
b250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29s
b3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli
cmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5JbiBvdGhlciB3
b3JkcywgdGhlIGNsaWVudCByZWRpcmVjdGlvbiBVUkkgbXVzdCB1c2UgYSBzZWN1cmUgY2hhbm5l
bCB0byBjb21wbGV0ZWx5IHByZXZlbnQgdGhlc2UgaXNzdWVzLjxvOnA+PC9vOnA+PC9zcGFuPjwv
cD48cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250
LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6
IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkm
cXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5Ib3dldmVyLCBpdCBp
cyBpbXBvcnRhbnQgdG8gbm90ZSB0aGF0IHRoaXMgaXMgbm90IE9BdXRoIHNwZWNpZmljLiBJdCBp
cyBhIGdlbmVyYWwgc2VjdXJpdHkgY29uY2VybiByZWdhcmRpbmcgYWxsIG90aGVyIGFzcGVjdHMg
b2YgdGhlIGNsaWVudCBpZiBpdCBpcyBub3QgZnVsbHkgc2VjdXJlLiBGb3IgZXhhbXBsZSwgaWYg
dGhlIGNsaWVudCB1c2VzIGluc2VjdXJlIGNvb2tpZXMgb3IgcHJvdmlkZXMgYXV0aGVudGljYXRp
b24gdmlhIG90aGVyIG1lYW5zIG5vdCB1c2luZyBUTFMuIElmIHRoZSBjbGllbnQgaXMgaW5zZWN1
cmUsIHdlbGwsIGl04oCZcyBpbnNlY3VyZSBpbmNsdWRpbmcgaXRzIE9BdXRoIHJlZGlyZWN0aW9u
IGVuZHBvaW50LjxvOnA+PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh
biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7
LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48
L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEu
MHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90
Oztjb2xvcjojMUY0OTdEIj4qIFRoZSB0d28gc29sdXRpb25zPG86cD48L286cD48L3NwYW4+PC9w
PjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQt
ZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjoj
MUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPlRoZSBkZWJhdGUgaXMg
d2hpY2ggb2YgdGhlIGZvbGxvd2luZyB0d28gbGFuZ3VhZ2UgYWx0ZXJuYXRpdmUgd2Ugd2FudCB0
byBpbmNsdWRlIGluIHRoZSBzcGVjaWZpY2F0aW9uOjxvOnA+PC9vOnA+PC9zcGFuPjwvcD48cCBj
bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls
eTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3
RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss
JnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj4xLiBJbmNsdWRlIGEgbm9ybWF0
aXZlIE1VU1QgdXNlIFRMUyBmb3IgdGhlIGNsaWVudCByZWRpcmVjdGlvbiBVUkkgZW5kcG9pbnQu
PG86cD48L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fu
cy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj4yLiBJbmNsdWRlIGEgbm9ybWF0aXZlIFNIT1VM
RCB1c2UgVExTIGZvciB0aGUgY2xpZW50IHJlZGlyZWN0aW9uIFVSSSBlbmRwb2ludCB3aXRoIHN0
cm9uZyBsYW5ndWFnZSBleHBsYWluaW5nIHRoZSB2YXJpb3VzIGF0dGFja3MgcG9zc2libGUgaWYg
dGhlIGVuZHBvaW50IGlzIG5vdCBtYWRlIHNlY3VyZS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+PHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5
N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh
biBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7
LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+Qm90aCBvcHRpb25zIHJlZmxl
Y3QgdGhlIHNhbWUgc2VjdXJpdHkgaXNzdWUsIGJ1dCAqPGI+Y29tbXVuaWNhdGU8L2I+KiB0aGUg
KjxiPnNhbWU8L2I+KiBzb2x1dGlvbiBkaWZmZXJlbnRseS4gU2luY2UgdGhpcyBpcyBqdXN0IGEg
c3BlY2lmaWNhdGlvbiAobm8gc3RhbmRhcmQgcG9saWNlKSwgdGhpcyBpcyBqdXN0IGEgbWFudWFs
LCBub3QgYW4gYWN0dWFsIGRlZmVuc2UuPG86cD48L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJN
c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj48bzpw
PiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtz
YW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPi0tLSBZb3UgY2FuIHN0b3AgcmVhZGluZyBo
ZXJlIGlmIHlvdSBhcmUgc2hvcnQgb24gdGltZS4gVGhpcyBzaG91bGQgZ2l2ZSB5b3UgYWxsIHRo
ZSBpbmZvcm1hdGlvbiB5b3UgbmVlZCB0byBrbm93IC0tLTxvOnA+PC9vOnA+PC9zcGFuPjwvcD48
cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZh
bWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFG
NDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVv
dDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpw
Pjwvc3Bhbj48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTox
MS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1
b3Q7O2NvbG9yOiMxRjQ5N0QiPiogVGhlIGRpZmZpY3VsdHk8bzpwPjwvbzpwPjwvc3Bhbj48L3A+
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m
YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMx
RjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1
b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+VGhlcmUgaXMgbm8gZGVi
YXRlIHRoYXQgdGhpcyBpcyBhIHZhbGlkIHNlY3VyaXR5IGNvbmNlcm4sIGFuZCB0aGF0IHRoZSBv
bmx5IHNvbHV0aW9uIGlzIHRvIGFwcGx5IGEgTUlUTSBwcm90ZWN0aW9uIChpLmUuIFRMUykuPG86
cD48L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250
LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1z
ZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PHAg
Y2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1p
bHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5
N0QiPkhvd2V2ZXIsIGdpdmVuIHRoZSBjdXJyZW50IHdlYiBsYW5kc2NhcGUgYW5kIE9BdXRoIGhp
c3RvcnkgKG9yIGFueSBvdGhlciB3ZWIgQVBJKSwgcmVxdWlyaW5nIFRMUyBpcyBhbiB1bmV4cGVj
dGVkIGNoYW5nZSB0byB0aGUgKjxiPmVjb3N5c3RlbTwvYj4qLiBGcm9tIHVub2ZmaWNpYWwgZGlz
Y3Vzc2lvbnMgSSBoYWQgd2l0aCBZYWhvbyEsIEZhY2Vib29rLCBhbmQgR29vZ2xlIHRvZGF5LCBh
bGwgdGhyZWUgaW5kaWNhdGVkIHRoZXkgaGF2ZSBubyBwbGFucyB0byBlbmZvcmNlIHN1Y2ggYSBy
ZXN0cmljdGlvbi4gTm9uZSBvZiB0aGUgbWFqb3IgT0F1dGggMS4wIHByb3ZpZGVycyB0b2RheSBl
bmZvcmNlIHN1Y2ggYSByZXF1aXJlbWVudCwgZXZlbiB0aG91Z2ggdGhlIGV4YWN0IHNhbWUgaXNz
dWUgaXMgcHJlc2VudCBpbiBPQXV0aCAxLjBhLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFz
cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom
cXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+
PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1
b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5UaGUgY2hhbGxlbmdlIGlzIHRvIGZp
bmQgdGhlIHJpZ2h0ICo8Yj5sYW5ndWFnZTwvYj4qIGJhbGFuY2UgYmV0d2VlbiByZWZsZWN0aW5n
IHJlYWxpdHkgYW5kIHJlZmxlY3RpbmcgdGhlIGlkZWFsIHNlY3VyaXR5IGNvbmZpZ3VyYXRpb24u
IFRoaXMgaXMgbm90IGEgcXVlc3Rpb24gb2Ygd2hhdCBpcyBhcHByb3ByaWF0ZSBpbiBjZXJ0YWlu
IHNpdHVhdGlvbiwgb3IgdGhlIHVuaXF1ZSBhdHRhY2sgdmVjdG9ycyBvZiBpbmRpdmlkdWFsIGRl
cGxveW1lbnRzLiBJdCBpcyBhYm91dCBob3cgd2UgdGFsayBhYm91dCBzZWN1cml0eSwgYW5kIGhv
dyB0byBiZXN0IHB1c2ggdGhlIHdlYiB0b3dhcmRzIGJldHRlciBzZWN1cml0eSB3aXRob3V0IHB1
c2hpbmcgdG9vIGhhcmQgdG9vIGZhc3QuPG86cD48L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJN
c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90
O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj48bzpw
PiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtz
YW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPlRvIG1lLCB0aGUgY2hhbGxlbmdlIGlzIGhv
dyB0byBlZmZlY3RpdmVseSBjb21tdW5pY2F0ZSB0aGUgaXNzdWUsIHdpdGhvdXQgZm9yY2luZyBj
b21wYW5pZXMgdG8ga25vd2luZ2x5IHZpb2xhdGUgdGhlIHNwZWNpZmljYXRpb24uIFRoZSBwcm9i
bGVtIHdpdGggdGhhdCBpcyB0aGF0IGV4cGVyaWVuY2Ugc2hvd3MgaXTigJlzIGEgc2xpcHBlcnkg
c2xvcGUuIE9uY2UgeW91IGFyZSBubyBsb25nZXIgZnVsbHkgY29tcGxpYW50LCBpdCBpcyBlYXNp
ZXIgdG8gbGV0IG90aGVyIE1VU1RzIHNsaWRlLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFz
cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTom
cXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+
PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0
eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1
b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj5JbiB0aGUgY29uc3VtZXIgd2ViIHNw
YWNlIOKAkyB3aGljaCBvcmlnaW5hdGVkIGFuZCBpcyBzdGlsbCB0aGUgcHJpbWFyeSBhdWRpZW5j
ZSBmb3IgdGhpcyB3b3JrIChubyBtYXR0ZXIgaG93IG11Y2ggdGhlIGVudGVycHJpc2UgZm9sa3Mg
aGVyZSBwcm90ZXN0KSDigJMgZW5mb3JjaW5nIHN1Y2ggYSByZXF1aXJlbWVudCBvbiBjbGllbnQg
ZGV2ZWxvcGVycyBpcyBpbXByYWN0aWNhbC4gVmVyeSBmZXcgcHJvdmlkZXJzIGNhbiBhZmZvcmQg
dG8gYWxpZW5hdGUgdGhlaXIgZGV2ZWxvcGVycyBieSBtYWtpbmcgc3VjaCBhIHJlcXVpcmVtZW50
IHRvZGF5LiBJdCB3aWxsIGFsc28gY29tcGxldGVseSB1bmRvIGFsbCB0aGUgb3RoZXIgd29yayBk
b25lIHRvIG1ha2UgdGhpcyBzcGVjaWZpY2F0aW9uIG1vcmUgYWNjZXNzaWJsZSBhbmQgZWFzaWVy
IHRvIGRlcGxveS4gSGFuZHMgZG93biwgZGVwbG95aW5nIHNlcnZlci1zaWRlIFRMUyBpcyBtdWNo
IGhhcmRlciBmb3IgY2xpZW50IGRldmVsb3BlcnMgdGhhbiBmaWd1cmluZyBPQXV0aCAxLjAgc2ln
bmF0dXJlcy48bzpwPjwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g
c3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90Oywm
cXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9z
cGFuPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw
dDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7
Y29sb3I6IzFGNDk3RCI+RUhMPG86cD48L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGli
cmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNw
OzwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQt
c2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNl
cmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD48cCBj
bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWls
eTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3
RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDss
JnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwv
c3Bhbj48L3A+PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4w
cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7
O2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFzcz0iTXNv
Tm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtD
YWxpYnJpJnF1b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+PG86cD4m
bmJzcDs8L286cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJm
b250LXNpemU6MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fu
cy1zZXJpZiZxdW90Oztjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1m
YW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMx
RjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj48
c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1
b3Q7LCZxdW90O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286
cD48L3NwYW4+PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6
MTEuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZx
dW90Oztjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1
b3Q7Q2FsaWJyaSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPjxv
OnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD48cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjExLjBwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LCZxdW90
O3NhbnMtc2VyaWYmcXVvdDs7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+
PC9wPjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0O2Zv
bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssJnF1b3Q7c2Fucy1zZXJpZiZxdW90Oztjb2xv
cjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+PHAgY2xhc3M9Ik1zb05vcm1h
bCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJy
aSZxdW90OywmcXVvdDtzYW5zLXNlcmlmJnF1b3Q7O2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7
PC9vOnA+PC9zcGFuPjwvcD48L2Rpdj48L2Rpdj48L2Jsb2NrcXVvdGU+PGJsb2NrcXVvdGUgdHlw
ZT0iY2l0ZSI+PGRpdj48c3Bhbj5fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fXzwvc3Bhbj48YnI+PHNwYW4+T0F1dGggbWFpbGluZyBsaXN0PC9zcGFuPjxicj48
c3Bhbj48YSBocmVmPSJtYWlsdG86T0F1dGhAaWV0Zi5vcmciPk9BdXRoQGlldGYub3JnPC9hPjwv
c3Bhbj48YnI+PHNwYW4+PGEgaHJlZj0iaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0
aW5mby9vYXV0aCI+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9vYXV0aDwv
YT48L3NwYW4+PGJyPjwvZGl2PjwvYmxvY2txdW90ZT48L2JvZHk+PC9odG1sPg==

--_000_10C3E31840534CD9B20B518341FF1E75salesforcecom_--

From mscurtescu@google.com  Thu Mar 31 17:59:10 2011
Return-Path: <mscurtescu@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 908233A6B73 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:59:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.357
X-Spam-Level: 
X-Spam-Status: No, score=-105.357 tagged_above=-999 required=5 tests=[AWL=-0.620, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, SARE_LWSHORTT=1.24, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OCOAx95F5RWQ for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:59:09 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.44.51]) by core3.amsl.com (Postfix) with ESMTP id 584483A6B65 for <oauth@ietf.org>; Thu, 31 Mar 2011 17:59:09 -0700 (PDT)
Received: from kpbe14.cbf.corp.google.com (kpbe14.cbf.corp.google.com [172.25.105.78]) by smtp-out.google.com with ESMTP id p3110mcb000878 for <oauth@ietf.org>; Thu, 31 Mar 2011 18:00:48 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1301619649; bh=nuWgCI8Pye3HhNMNfx9etb6uQMk=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=BzUSjHh6huj0NwUZeXvyb3qzFDjOu8QcR97kcwXTPEwlGlA65meIfV7GBph1vKZIL q10/jQ762MML2Y9HTvVgQ==
Received: from ywi6 (ywi6.prod.google.com [10.192.9.6]) by kpbe14.cbf.corp.google.com with ESMTP id p3110aWD031960 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Thu, 31 Mar 2011 18:00:47 -0700
Received: by ywi6 with SMTP id 6so1178633ywi.3 for <oauth@ietf.org>; Thu, 31 Mar 2011 18:00:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=11TPPEKLs4VYIoyl6IObYspa/Dh1n1UWzvLKCQ/3TDw=; b=Y84WUvfi9v7WsuTPw84MSGJDpSQF6gfy0sqwT3yvyuS1shC8WPfIYPNal1jvpXw7mb hIKtSJK5s8SWectOtaMw==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; b=q1zJHLChx/Yg6gKh7WmLMVY/iVSJzSU+MjVeTQ9uKZqEJ6FAy+Tbc6Vwgg9KUKndny uZAEn7AF5bSONiUNChVA==
Received: by 10.101.66.2 with SMTP id t2mr2478940ank.60.1301619647107; Thu, 31 Mar 2011 18:00:47 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.100.34.4 with HTTP; Thu, 31 Mar 2011 18:00:27 -0700 (PDT)
In-Reply-To: <7616C235-2913-4EE0-A710-F47A4CC9E424@oracle.com>
References: <22FB565B-A701-4502-818F-15164D9E201A@oracle.com> <AANLkTimGjiCGk5dpA=YVzq5vDkLR2+caSz=pZ5WiZO9H@mail.gmail.com> <3C84AD7A-F00F-43EC-AAD3-AD2DCFB46B0E@oracle.com> <90C41DD21FB7C64BB94121FBBC2E7234464F432BB0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4D84F7E2.6090305@redhat.com> <16B9A882-6204-4CBD-B7E3-1D806AF5056C@oracle.com> <4D8A5054.4050006@lodderstedt.net> <BANLkTiniuuRXtkzLubgOjVursVtOGjFe6A@mail.gmail.com> <7616C235-2913-4EE0-A710-F47A4CC9E424@oracle.com>
From: Marius Scurtescu <mscurtescu@google.com>
Date: Thu, 31 Mar 2011 18:00:27 -0700
Message-ID: <BANLkTi=XyF25vB6qKX2q8iOpEaZ1yQx9Jw@mail.gmail.com>
To: Phil Hunt <phil.hunt@oracle.com>
Content-Type: text/plain; charset=ISO-8859-1
X-System-Of-Record: true
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Flowchart for legs of OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 00:59:10 -0000

On Thu, Mar 31, 2011 at 4:56 PM, Phil Hunt <phil.hunt@oracle.com> wrote:
> Done.
>
> It isn't quite what the flow shows in the earlier diagram. I was originally avoiding client type and trying to focus on section 4 options.
>
> But this should be a better diagram.
>
> http://independentidentity.blogspot.com/2011/03/oauth-flows-extended.html

A native app with no client secret is still advised to use the
implicit grant, which is wrong IMO.

The right question I think is "does the client need long term offline access"?

JavaScript clients typically don't need offline access (only with the
user at the browser). Some native apps and web apps could be OK with a
short term offline access, one off import for example.

Marius

From eran@hueniverse.com  Thu Mar 31 17:59:27 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9BAFF3A6B65 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:59:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.635
X-Spam-Level: 
X-Spam-Status: No, score=-2.635 tagged_above=-999 required=5 tests=[AWL=-0.036, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id saqvcL3MEHP0 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 17:59:26 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 11A6A3A6B80 for <oauth@ietf.org>; Thu, 31 Mar 2011 17:59:26 -0700 (PDT)
Received: (qmail 9192 invoked from network); 1 Apr 2011 01:01:05 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 1 Apr 2011 01:01:05 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 31 Mar 2011 18:01:05 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Peter Saint-Andre <stpeter@stpeter.im>
Date: Thu, 31 Mar 2011 18:00:57 -0700
Thread-Topic: [OAUTH-WG] Error extensibility proposal
Thread-Index: AcvwA4B00M8n8MF8QGKokzYHobGCPgABIP9Q
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664D708@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4D951BC4.3070608@stpeter.im>
In-Reply-To: <4D951BC4.3070608@stpeter.im>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 00:59:27 -0000
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From mscurtescu@google.com  Thu Mar 31 18:05:30 2011
Return-Path: <mscurtescu@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 52EB13A6B73 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 18:05:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.915
X-Spam-Level: 
X-Spam-Status: No, score=-105.915 tagged_above=-999 required=5 tests=[AWL=0.062, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4M6ssDLE9nrf for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 18:05:29 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.44.51]) by core3.amsl.com (Postfix) with ESMTP id 58D2D3A6AD8 for <oauth@ietf.org>; Thu, 31 Mar 2011 18:05:29 -0700 (PDT)
Received: from hpaq3.eem.corp.google.com (hpaq3.eem.corp.google.com [172.25.149.3]) by smtp-out.google.com with ESMTP id p31178Dt020593 for <oauth@ietf.org>; Thu, 31 Mar 2011 18:07:08 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1301620029; bh=wYTHfDg/cGfDhf3dQo9IdmXiVbg=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type:Content-Transfer-Encoding; b=j1Ci/xOodUysNYlA+RrJ2JJcc/5OMU2w0yCnLPoYqnZCpAFtsq/SVXwxADvZphMkI r3vAyyojlxzvLSe7+f/3w==
Received: from gwaa18 (gwaa18.prod.google.com [10.200.27.18]) by hpaq3.eem.corp.google.com with ESMTP id p31176Gj023489 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Thu, 31 Mar 2011 18:07:07 -0700
Received: by gwaa18 with SMTP id a18so1547728gwa.33 for <oauth@ietf.org>; Thu, 31 Mar 2011 18:07:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:content-transfer-encoding; bh=b0L265tFKEXM+gbBGdurke3k35zvKtj8i1WUWh18NcY=; b=MUouOPjpqUQPNdtrsfzOo39YZ6G9bb/KKm2VC+QArq8Nw0dz94pQ1ZJTOj0JlKZeWJ aBBgYZm04IFOI1qCtfPw==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; b=uOxwiG9a685SmyO1holgHb18pcGL+H658yRAw6fS00yOkE/qPX/0WnB4pYM5LUpuF4 xRymm0xILoIKiFI66AQw==
Received: by 10.101.83.11 with SMTP id k11mr2548042anl.38.1301620026147; Thu, 31 Mar 2011 18:07:06 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.100.34.4 with HTTP; Thu, 31 Mar 2011 18:06:46 -0700 (PDT)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
From: Marius Scurtescu <mscurtescu@google.com>
Date: Thu, 31 Mar 2011 18:06:46 -0700
Message-ID: <BANLkTinfcQzMWDgwOxM+t6SdBQqwiohsSQ@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 01:05:30 -0000

On Tue, Mar 29, 2011 at 4:01 PM, Eran Hammer-Lahav <eran@hueniverse.com> wr=
ote:
> *** Requirements
>
> The following proposal is based on two requirements:
>
> 1. Provide a way to return an OAuth error response for error situations o=
ther then 400 and 401. For example, if the server is temporarily unavailabl=
e, it will return an HTTP 503 status. However, it is often desirable to sti=
ll return a response body using the same format as any other error. This ma=
kes client development easier, having to always check for a single error co=
de.
>
> 2. Allow extensions modifying the behavior of the authorization and token=
 endpoints via additional request/response parameters to define additional =
error codes to go along with the new functionality. For example, the UX ext=
ension defines the 'display' parameter. It could define a matching 'unsuppo=
rted_display' error response.
>
> No other use cases were identified for error extensibility. Note that thi=
s proposal is strictly limited to error resulting from the authorization an=
d token endpoints. No other endpoints are included (in particular, protecte=
d resources are not covered by this proposal).
>
> *** Design goals
>
> The proposal was specifically designed to be minimalistic, tailored to th=
e specific use cases defined, and as effortless as possible. This avoids de=
fining error codes identical to existing HTTP status codes, as well as bind=
 new errors to specific extension parameters. Since the error is useless wi=
thout understanding the extension, this method guarantees that those develo=
ping and implementing extensions will present it as a complete unit.
>
> *** Proposal
>
> - Non 400/401 responses
>
> If the HTTP response status code is 4xx (other than 400/401) or 5xx, the =
'error' parameter SHOULD be set to the HTTP status code. For example:
>
> =A0 =A0 HTTP/1.1 503 Service Unavailable
> =A0 =A0 Content-Type: application/json
> =A0 =A0 Cache-Control: no-store
>
> =A0 =A0 {
> =A0 =A0 =A0 "error":"503"
> =A0 =A0 }
>
> This will also enable passing HTTP status codes such as 503 via the redir=
ection response which is currently not possible. It will allow the authoriz=
ation server to indicate a 503 situation without defining another error cod=
e that has the exact same meaning.
>
> - Extension errors
>
> Instead of defining an additional error registry, I propose we add a sing=
le field to the 'OAuth parameters registry' template:
>
> =A0 =A0Additional error codes:
> =A0 =A0 =A0 =A0Additional error codes related to the parameter usage. Err=
or codes SHOULD begin with the parameter name
> =A0 =A0 =A0 =A0when possible (e.g. 'example_invalid' error code for use w=
ith the 'example' parameter).
>
> Error collisions are unlikely because when a new extension is authored, t=
he registry is reviewed for potential conflicts. Since the errors are exten=
sion-specific, collisions only matter if two extensions are to be used toge=
ther. In that case, the review process will identify any potential problems=
. And since the errors are meaningless without understanding the extension,=
 a registry with a random list of errors is not very helpful.
>

Many error codes (if not most) are not parameter specific. Will this
lead to the registration of fake parameter names just to be used as
error prefixes?

If we are going down this route, why don't we require extensions to
register just a prefix?

Marius

From eran@hueniverse.com  Thu Mar 31 18:14:15 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5443828C0E8 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 18:14:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.634
X-Spam-Level: 
X-Spam-Status: No, score=-2.634 tagged_above=-999 required=5 tests=[AWL=-0.036, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hfIJxztKyhlP for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 18:14:06 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id DD4CA3A69CB for <oauth@ietf.org>; Thu, 31 Mar 2011 18:14:05 -0700 (PDT)
Received: (qmail 30232 invoked from network); 1 Apr 2011 01:15:46 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 1 Apr 2011 01:15:45 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 31 Mar 2011 18:15:46 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Phil Hunt <phil.hunt@oracle.com>
Date: Thu, 31 Mar 2011 18:15:36 -0700
Thread-Topic: [OAUTH-WG] Authorization code security issue (reframed)
Thread-Index: AcvwBbsw6uRcdGN2Tk6IS8/bGg9z4QAAqBpA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664D70B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E7234465664D700@P3PW5EX1MB01.EX1.SECURESERVER.NET> <D116E2D6-52B3-423A-8036-7CE29BCF86D5@oracle.com>
In-Reply-To: <D116E2D6-52B3-423A-8036-7CE29BCF86D5@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E7234465664D70BP3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authorization code security issue (reframed)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 01:14:15 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E7234465664D70BP3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

The point of this message is to help people choose between the two options,=
 not to promote one over the other. I have tried to present a balanced view=
, given that a MUST is the easy way out (specification wise) since it moves=
 the problem elsewhere.

Not sure what you 'totally disagree' with regarding the two options. Clearl=
y, both options state that TLS is required in order to prevent this kind of=
 attack, they just communicate this differently (one saying you have to use=
 it, the other that you should and here is why). The end result is the same=
, since a MUST is not going to cause those who can't enforce it obey. I'm n=
ot dismissing the importance of this message, just that these *are* the two=
 options and they both provide the *same* technical solution. It's a politi=
cal difference (conformance where interop is of no real consequence).

As for the added exception to #1, it is pretty meaningless. TLS is required=
 to avoid this attack for any communication that may be susceptible to a MI=
TM attach. This is not limited to HTTP over non-localhost. There are other =
URI scheme out there which result in an insecure channel. Given that there =
is nothing HTTP specific to the redirection URI, the exception has to be pr=
etty narrow, and not focused on HTTP + localhost or custom schemes. It must=
 be framed that the MUST can only be ignored if the communication is safe f=
rom MITM (and we can give localhost HTTP as one example).

EHL



From: Phil Hunt [mailto:phil.hunt@oracle.com]
Sent: Thursday, March 31, 2011 5:43 PM
To: Eran Hammer-Lahav
Cc: OAuth WG
Subject: Re: [OAUTH-WG] Authorization code security issue (reframed)

Sadly, see below.

Phil
phil.hunt@oracle.com<mailto:phil.hunt@oracle.com>




On 2011-03-31, at 5:09 PM, Eran Hammer-Lahav wrote:


(The previous thread is became completely inaccessible to anyone not follow=
ing it carefully for the past week or so. For the sake of reaching a conclu=
sion, I am going to sum up the issue and try to start over with a more narr=
ow focus.)

* The security issue is very simple:

The authorization code is the only artifact binding the resource owner gran=
ting access at the authorization endpoint to the resource owner being redir=
ected back to the client. OAuth 1.0a added the verification code for this s=
ole purpose. If the authorization code is intercepted by a MITM (e.g. fake =
airport wifi), the attacker can take over the session and pretend to be the=
 real resource owner. Since the client has no way to detect this, it will g=
rant the attacker access to the client application which usually includes d=
ata obtain via the access token (received using the compromise authorizatio=
n code).

The attack does not give the attacker any direct access to the access token=
, the client credentials, or anything other than the client application its=
elf. However, the client application is typically considered an extension o=
f the resource server.

Another variation of this attack is related to the implicit grant (user-age=
nt flow). If a MITM can intercept the response in figure 4 step E, it can m=
anipulate the script to obtain the access token (and any secret or other pr=
operties is included).

In other words, the client redirection URI must use a secure channel to com=
pletely prevent these issues.

However, it is important to note that this is not OAuth specific. It is a g=
eneral security concern regarding all other aspects of the client if it is =
not fully secure. For example, if the client uses insecure cookies or provi=
des authentication via other means not using TLS. If the client is insecure=
, well, it's insecure including its OAuth redirection endpoint.

* The two solutions

The debate is which of the following two language alternative we want to in=
clude in the specification:

1. Include a normative MUST use TLS for the client redirection URI endpoint=
.

WITH the exception that if the redirection URI is local, the redirection on=
ly has to be passed back to the user-agent securely. There is NO need for t=
he client app to implement server-side TLS.  This is an important exception=
 and makes 1 specific compared to 2 (too broad).


2. Include a normative SHOULD use TLS for the client redirection URI endpoi=
nt with strong language explaining the various attacks possible if the endp=
oint is not made secure.

Both options reflect the same security issue, but *communicate* the *same* =
solution differently. Since this is just a specification (no standard polic=
e), this is just a manual, not an actual defense.

Totally disagree.


--- You can stop reading here if you are short on time. This should give yo=
u all the information you need to know ---


* The difficulty

There is no debate that this is a valid security concern, and that the only=
 solution is to apply a MITM protection (i.e. TLS).

However, given the current web landscape and OAuth history (or any other we=
b API), requiring TLS is an unexpected change to the *ecosystem*. From unof=
ficial discussions I had with Yahoo!, Facebook, and Google today, all three=
 indicated they have no plans to enforce such a restriction. None of the ma=
jor OAuth 1.0 providers today enforce such a requirement, even though the e=
xact same issue is present in OAuth 1.0a.

The challenge is to find the right *language* balance between reflecting re=
ality and reflecting the ideal security configuration. This is not a questi=
on of what is appropriate in certain situation, or the unique attack vector=
s of individual deployments. It is about how we talk about security, and ho=
w to best push the web towards better security without pushing too hard too=
 fast.

To me, the challenge is how to effectively communicate the issue, without f=
orcing companies to knowingly violate the specification. The problem with t=
hat is that experience shows it's a slippery slope. Once you are no longer =
fully compliant, it is easier to let other MUSTs slide.

In the consumer web space - which originated and is still the primary audie=
nce for this work (no matter how much the enterprise folks here protest) - =
enforcing such a requirement on client developers is impractical. Very few =
providers can afford to alienate their developers by making such a requirem=
ent today. It will also completely undo all the other work done to make thi=
s specification more accessible and easier to deploy. Hands down, deploying=
 server-side TLS is much harder for client developers than figuring OAuth 1=
.0 signatures.

EHL

Respectfully, -1

It may be true for the current group of social media apps using OAuth that =
the biggest risk is someone making a practical joke update. For that, your =
corporate management obviously don't see the value of protecting their cust=
omers. They've stated this publicly many times (directly and indirectly). C=
ompletely understandable and I would agree on their position for just the m=
oment.

BUT, for those of you getting into gradually more personal information and =
getting into real financial and legal consequences, I'm betting your risk p=
rofiles are already changing dramatically. Many on the list in a couple sho=
rt years have stated that TLS is now no big deal. So why kill security now?=
 TLS and OAuth are likely THE back bone of REST services going forwards. Wh=
y doom the specification now?

For the vast quantity of new adopters, such as business, financial, telecom=
, medical, etc, this would be a MAJOR deviation from basic security practic=
es. Let me put it this way, would you want your broker company using OAuth =
without MITM protection?  If so, I'll be happy to meet with you in a local =
coffee shop some time.  :-)

None of this should be new to anyone. This is hardly idealism.

The bottom line, and I do apologize, but the fact is that the current spec =
won't stand up to security review and that puts a total road block out ther=
e against using OAuth at this time.

My apologies to the list. I've sent far far too many messages detailing the=
 importance of this issue. Let me know what the group consensus is. I'm pre=
pared to work for, as Eran puts it, "an idealistic" fix or drop it.















_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_90C41DD21FB7C64BB94121FBBC2E7234465664D70BP3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.apple-style-span
	{mso-style-name:apple-style-span;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>The point=
 of this message is to help people choose between the two options, not to p=
romote one over the other. I have tried to present a balanced view, given t=
hat a MUST is the easy way out (specification wise) since it moves the prob=
lem elsewhere.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'fon=
t-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;=
</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-=
family:"Calibri","sans-serif";color:#1F497D'>Not sure what you &#8216;total=
ly disagree&#8217; with regarding the two options. Clearly, both options st=
ate that TLS is required in order to prevent this kind of attack, they just=
 communicate this differently (one saying you have to use it, the other tha=
t you should and here is why). The end result is the same, since a MUST is =
not going to cause those who can&#8217;t enforce it obey. I&#8217;m not dis=
missing the importance of this message, just that these *<b>are</b>* the tw=
o options and they both provide the *<b>same</b>* technical solution. It&#8=
217;s a political difference (conformance where interop is of no real conse=
quence).<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size=
:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p>=
</span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family=
:"Calibri","sans-serif";color:#1F497D'>As for the added exception to #1, it=
 is pretty meaningless. TLS is required to avoid this attack for any commun=
ication that may be susceptible to a MITM attach. This is not limited to HT=
TP over non-localhost. There are other URI scheme out there which result in=
 an insecure channel. Given that there is nothing HTTP specific to the redi=
rection URI, the exception has to be pretty narrow, and not focused on HTTP=
 + localhost or custom schemes. It must be framed that the MUST can only be=
 ignored if the communication is safe from MITM (and we can give localhost =
HTTP as one example).<o:p></o:p></span></p><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p=
>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0p=
t;font-family:"Calibri","sans-serif";color:#1F497D'>EHL<o:p></o:p></span></=
p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri=
","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNor=
mal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";colo=
r:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'=
font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nb=
sp;</o:p></span></p><div style=3D'border:none;border-left:solid blue 1.5pt;=
padding:0in 0in 0in 4.0pt'><div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span styl=
e=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><s=
pan style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> Phil Hunt=
 [mailto:phil.hunt@oracle.com] <br><b>Sent:</b> Thursday, March 31, 2011 5:=
43 PM<br><b>To:</b> Eran Hammer-Lahav<br><b>Cc:</b> OAuth WG<br><b>Subject:=
</b> Re: [OAUTH-WG] Authorization code security issue (reframed)<o:p></o:p>=
</span></p></div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=
=3DMsoNormal>Sadly, see below.<o:p></o:p></p><div><p class=3DMsoNormal><o:p=
>&nbsp;</o:p></p><div><div><div><div><div><div><p class=3DMsoNormal><span s=
tyle=3D'font-size:9.0pt;font-family:"Helvetica","sans-serif";color:black'>P=
hil<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span style=3D'fon=
t-size:9.0pt;font-family:"Helvetica","sans-serif";color:black'><a href=3D"m=
ailto:phil.hunt@oracle.com">phil.hunt@oracle.com</a><o:p></o:p></span></p><=
/div></div></div></div><p class=3DMsoNormal><span style=3D'font-size:13.5pt=
;font-family:"Helvetica","sans-serif";color:black'><o:p>&nbsp;</o:p></span>=
</p></div><p class=3DMsoNormal><span style=3D'font-size:13.5pt;font-family:=
"Helvetica","sans-serif";color:black'><br><br></span><o:p></o:p></p></div><=
p class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
2011-03-31, at 5:09 PM, Eran Hammer-Lahav wrote:<o:p></o:p></p></div><p cla=
ss=3DMsoNormal><br><br><o:p></o:p></p><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
>(The previous thread is became completely inaccessible to anyone not follo=
wing it carefully for the past week or so. For the sake of reaching a concl=
usion, I am going to sum up the issue and try to start over with a more nar=
row focus.)</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span styl=
e=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nb=
sp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'fon=
t-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>* The secur=
ity issue is very simple:</span><o:p></o:p></p></div><div><p class=3DMsoNor=
mal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";colo=
r:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><spa=
n style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The authorization code is the only artifact binding the resource owner g=
ranting access at the authorization endpoint to the resource owner being re=
directed back to the client. OAuth 1.0a added the verification code for thi=
s sole purpose. If the authorization code is intercepted by a MITM (e.g. fa=
ke airport wifi), the attacker can take over the session and pretend to be =
the real resource owner. Since the client has no way to detect this, it wil=
l grant the attacker access to the client application which usually include=
s data obtain via the access token (received using the compromise authoriza=
tion code).</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span styl=
e=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nb=
sp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'fon=
t-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>The attack =
does not give the attacker any direct access to the access token, the clien=
t credentials, or anything other than the client application itself. Howeve=
r, the client application is typically considered an extension of the resou=
rce server.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span styl=
e=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nb=
sp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'fon=
t-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Another var=
iation of this attack is related to the implicit grant (user-agent flow). I=
f a MITM can intercept the response in figure 4 step E, it can manipulate t=
he script to obtain the access token (and any secret or other properties is=
 included).</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span styl=
e=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nb=
sp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'fon=
t-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>In other wo=
rds, the client redirection URI must use a secure channel to completely pre=
vent these issues.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><sp=
an style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F49=
7D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=
=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Howe=
ver, it is important to note that this is not OAuth specific. It is a gener=
al security concern regarding all other aspects of the client if it is not =
fully secure. For example, if the client uses insecure cookies or provides =
authentication via other means not using TLS. If the client is insecure, we=
ll, it&#8217;s insecure including its OAuth redirection endpoint.</span><o:=
p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt=
;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p>=
</p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fa=
mily:"Calibri","sans-serif";color:#1F497D'>* The two solutions</span><o:p><=
/o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;fo=
nt-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p=
></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-famil=
y:"Calibri","sans-serif";color:#1F497D'>The debate is which of the followin=
g two language alternative we want to include in the specification:</span><=
o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0=
pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:=
p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-=
family:"Calibri","sans-serif";color:#1F497D'>1. Include a normative MUST us=
e TLS for the client redirection URI endpoint.</span><o:p></o:p></p></div><=
/div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNor=
mal>WITH the exception that if the redirection URI is local, the redirectio=
n only has to be passed back to the user-agent securely. There is NO need f=
or the client app to implement server-side TLS. &nbsp;This is an important =
exception and makes 1 specific compared to 2 (too broad).<o:p></o:p></p></d=
iv><div><p class=3DMsoNormal><br><br><o:p></o:p></p><div><div><p class=3DMs=
oNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";=
color:#1F497D'>2. Include a normative SHOULD use TLS for the client redirec=
tion URI endpoint with strong language explaining the various attacks possi=
ble if the endpoint is not made secure.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3D=
MsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif=
";color:#1F497D'>Both options reflect the same security issue, but *<b>comm=
unicate</b>* the *<b>same</b>* solution differently. Since this is just a s=
pecification (no standard police), this is just a manual, not an actual def=
ense.</span><o:p></o:p></p></div></div><div><p class=3DMsoNormal><o:p>&nbsp=
;</o:p></p></div><p class=3DMsoNormal>Totally disagree.<br><br><o:p></o:p><=
/p><div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fami=
ly:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div>=
<div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Cali=
bri","sans-serif";color:#1F497D'>--- You can stop reading here if you are s=
hort on time. This should give you all the information you need to know ---=
</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-s=
ize:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><=
o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0=
pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:=
p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-=
family:"Calibri","sans-serif";color:#1F497D'>* The difficulty</span><o:p></=
o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;fon=
t-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p>=
</div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family=
:"Calibri","sans-serif";color:#1F497D'>There is no debate that this is a va=
lid security concern, and that the only solution is to apply a MITM protect=
ion (i.e. TLS).</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D=
'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>However=
, given the current web landscape and OAuth history (or any other web API),=
 requiring TLS is an unexpected change to the *<b>ecosystem</b>*. From unof=
ficial discussions I had with Yahoo!, Facebook, and Google today, all three=
 indicated they have no plans to enforce such a restriction. None of the ma=
jor OAuth 1.0 providers today enforce such a requirement, even though the e=
xact same issue is present in OAuth 1.0a.</span><o:p></o:p></p></div></div>=
</div><div><blockquote style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div>=
<div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Cali=
bri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'>The challenge is to find the right *<b>language</b=
>* balance between reflecting reality and reflecting the ideal security con=
figuration. This is not a question of what is appropriate in certain situat=
ion, or the unique attack vectors of individual deployments. It is about ho=
w we talk about security, and how to best push the web towards better secur=
ity without pushing too hard too fast.</span><o:p></o:p></p></div><div><p c=
lass=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","san=
s-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DM=
soNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"=
;color:#1F497D'>To me, the challenge is how to effectively communicate the =
issue, without forcing companies to knowingly violate the specification. Th=
e problem with that is that experience shows it&#8217;s a slippery slope. O=
nce you are no longer fully compliant, it is easier to let other MUSTs slid=
e.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span=
><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11=
.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>In the consumer web =
space &#8211; which originated and is still the primary audience for this w=
ork (no matter how much the enterprise folks here protest) &#8211; enforcin=
g such a requirement on client developers is impractical. Very few provider=
s can afford to alienate their developers by making such a requirement toda=
y. It will also completely undo all the other work done to make this specif=
ication more accessible and easier to deploy. Hands down, deploying server-=
side TLS is much harder for client developers than figuring OAuth 1.0 signa=
tures.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'=
font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</=
span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-siz=
e:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>EHL</span><o:p><=
/o:p></p></div></div></blockquote><div><p class=3DMsoNormal><o:p>&nbsp;</o:=
p></p></div><div><div><div><div><p class=3DMsoNormal><span style=3D'font-si=
ze:13.5pt;font-family:"Helvetica","sans-serif"'>Respectfully, -1&nbsp;<o:p>=
</o:p></span></p></div><div><p class=3DMsoNormal><span style=3D'font-size:1=
3.5pt;font-family:"Helvetica","sans-serif"'><o:p>&nbsp;</o:p></span></p></d=
iv><div><p class=3DMsoNormal><span style=3D'font-size:13.5pt;font-family:"H=
elvetica","sans-serif"'>It&nbsp;may be true for the current group of social=
 media apps using OAuth that the biggest risk is someone making a practical=
 joke update. For that, your corporate management obviously don't see the v=
alue of protecting their customers. They've stated this publicly many times=
 (directly and indirectly). Completely understandable and I would agree on =
their position for just the moment.&nbsp;<o:p></o:p></span></p></div><div><=
p class=3DMsoNormal><span style=3D'font-size:13.5pt;font-family:"Helvetica"=
,"sans-serif"'><o:p>&nbsp;</o:p></span></p></div><div><p class=3DMsoNormal>=
<span style=3D'font-size:13.5pt;font-family:"Helvetica","sans-serif"'>BUT, =
for those of you getting into gradually more personal information and getti=
ng into real financial and legal consequences, I'm betting your risk profil=
es are already changing dramatically. Many on the list in a couple short ye=
ars have stated that TLS is now no big deal. So why kill security now? TLS =
and OAuth are likely THE back bone of REST services going forwards. Why doo=
m the specification now?&nbsp;<o:p></o:p></span></p></div><div><p class=3DM=
soNormal><span style=3D'font-size:13.5pt;font-family:"Helvetica","sans-seri=
f"'><o:p>&nbsp;</o:p></span></p></div><div><p class=3DMsoNormal><span style=
=3D'font-size:13.5pt;font-family:"Helvetica","sans-serif"'>For the vast qua=
ntity of new adopters, such as business, financial, telecom, medical, etc, =
this would be a MAJOR deviation from basic security practices. Let me put i=
t this way, would you want your broker company using OAuth without MITM pro=
tection? &nbsp;If so, I'll be happy to meet with you in a local coffee shop=
 some time. &nbsp;:-)<o:p></o:p></span></p></div><div><p class=3DMsoNormal>=
<span style=3D'font-size:13.5pt;font-family:"Helvetica","sans-serif"'><o:p>=
&nbsp;</o:p></span></p></div><div><p class=3DMsoNormal><span style=3D'font-=
size:13.5pt;font-family:"Helvetica","sans-serif"'>None of this should be ne=
w to anyone. This is hardly idealism.<o:p></o:p></span></p></div><div><p cl=
ass=3DMsoNormal><span style=3D'font-size:13.5pt;font-family:"Helvetica","sa=
ns-serif"'><o:p>&nbsp;</o:p></span></p></div><div><p class=3DMsoNormal><spa=
n style=3D'font-size:13.5pt;font-family:"Helvetica","sans-serif"'>The botto=
m line, and I do apologize, but the fact is that the current spec won't sta=
nd up to security review and that puts a total road block out there against=
 using OAuth at this time.<o:p></o:p></span></p></div><div><p class=3DMsoNo=
rmal><span style=3D'font-size:13.5pt;font-family:"Helvetica","sans-serif"'>=
<o:p>&nbsp;</o:p></span></p></div><div><p class=3DMsoNormal><span style=3D'=
font-size:13.5pt;font-family:"Helvetica","sans-serif"'>My apologies to the =
list. I've sent far far too many messages detailing the importance of this =
issue. Let me know what the group consensus is. I'm prepared to work for, a=
s Eran puts it, &quot;an idealistic&quot; fix or drop it.<o:p></o:p></span>=
</p></div><div><p class=3DMsoNormal><span style=3D'font-size:13.5pt;font-fa=
mily:"Helvetica","sans-serif"'><o:p>&nbsp;</o:p></span></p></div></div></di=
v></div><div><div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></di=
v></div><blockquote style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><di=
v><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri=
","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p cla=
ss=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-=
serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMso=
Normal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";c=
olor:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><=
span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F=
497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span sty=
le=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&n=
bsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'fo=
nt-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</sp=
an><o:p></o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:=
11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p>=
</o:p></p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;f=
ont-family:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></=
p></div><div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-fami=
ly:"Calibri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div>=
<div><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Cali=
bri","sans-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3D=
MsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif=
";color:#1F497D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNorma=
l><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:=
#1F497D'>&nbsp;</span><o:p></o:p></p></div><p class=3DMsoNormal><span style=
=3D'font-size:13.5pt;font-family:"Helvetica","sans-serif"'>________________=
_______________________________<br>OAuth mailing list<br><a href=3D"mailto:=
OAuth@ietf.org">OAuth@ietf.org</a><br><a href=3D"https://www.ietf.org/mailm=
an/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:=
p></span></p></div></blockquote></div><p class=3DMsoNormal><o:p>&nbsp;</o:p=
></p></div></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E7234465664D70BP3PW5EX1MB01E_--

From mscurtescu@google.com  Thu Mar 31 18:33:43 2011
Return-Path: <mscurtescu@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 37D183A6ADB for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 18:33:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level: 
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fKz8faHnL0-0 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 18:33:41 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [74.125.121.67]) by core3.amsl.com (Postfix) with ESMTP id EE0E03A6AD2 for <oauth@ietf.org>; Thu, 31 Mar 2011 18:33:40 -0700 (PDT)
Received: from kpbe13.cbf.corp.google.com (kpbe13.cbf.corp.google.com [172.25.105.77]) by smtp-out.google.com with ESMTP id p311ZJSC022379 for <oauth@ietf.org>; Thu, 31 Mar 2011 18:35:19 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1301621720; bh=gh37q5bupkWfVeK3KMqMSmOitO0=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type:Content-Transfer-Encoding; b=kLcDRUdDqJU+y75iDY6Hezcd1r86lwG2cWLalbk84zuHw6Vc0cqYmia0hppqL8/Mo fvkjMjDti68I2B1kawJAg==
Received: from gyd8 (gyd8.prod.google.com [10.243.49.200]) by kpbe13.cbf.corp.google.com with ESMTP id p311Y41w022135 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Thu, 31 Mar 2011 18:35:18 -0700
Received: by gyd8 with SMTP id 8so1476384gyd.0 for <oauth@ietf.org>; Thu, 31 Mar 2011 18:35:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:content-transfer-encoding; bh=pDa2SKt3zo4l/L7HoSgQAMYakAfxGEO/msN7GVYetBs=; b=bysYPhohBI6ACTT4IOzDloz4Bzk5ND5dLram6k9fBmaDnN4hHDjpdzTJSShodJu12g fl0AvZNbWXNJvPZGZ0vw==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; b=UsPlYCNin5CEMZSGT8383saJGc7geP6ksOrETaTVpFFSzTUcxSXaEWjAd7WR6YL76t HFxzBGY1dRUlRfN5zeXA==
Received: by 10.101.206.10 with SMTP id i10mr2529589anq.82.1301621716090; Thu, 31 Mar 2011 18:35:16 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.100.34.4 with HTTP; Thu, 31 Mar 2011 18:34:56 -0700 (PDT)
In-Reply-To: <AANLkTikNk-aYy-tFua09yBCexiwUtNDBtt+ESzxitV7C@mail.gmail.com>
References: <AANLkTikNk-aYy-tFua09yBCexiwUtNDBtt+ESzxitV7C@mail.gmail.com>
From: Marius Scurtescu <mscurtescu@google.com>
Date: Thu, 31 Mar 2011 18:34:56 -0700
Message-ID: <BANLkTimJuhVwHyFq-U=8cYMR6jZUUWLc7Q@mail.gmail.com>
To: Greg Brockman <gdb@mit.edu>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] OAuth without HTTP redirects
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 01:33:43 -0000

Hi Greg,

Google is working on a pure JavaScript flow which does not involve redirect=
s.

Marius



On Thu, Mar 17, 2011 at 12:20 PM, Greg Brockman <gdb@mit.edu> wrote:
> Hi,
>
> I notice that the current OAuth2 draft seems to have browser redirects
> baked in rather deeply. =A0Are there any plans to add support for flows
> that don't involve HTTP redirects? =A0For example, it seems at the
> moment that pure JavaScript applications aren't well-supported, as the
> resource owner must be redirected to the authorization endpoint, thus
> leaving the JS app. =A0Now of course trying to do the OAuth flow from
> within the JS app (say by displaying the authorization endpoint within
> an iframe) might expose phishing attacks, but one could imagine e.g. a
> plugin that integrates with the browser in order to provide a
> relatively unforgeable OAuth authorization endpoint.
>
> More generally, does this sound like a use-case that OAuth would be
> interested in supporting?
>
> Thanks,
>
> - gdb
>
> (Reposting from oauth@googlegroups.com as this seems a more appropriate f=
orum.)
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

From eran@hueniverse.com  Thu Mar 31 18:42:21 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 856123A6ADB for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 18:42:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.634
X-Spam-Level: 
X-Spam-Status: No, score=-2.634 tagged_above=-999 required=5 tests=[AWL=-0.035, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a9Y5auTF+yyN for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 18:42:20 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 349543A6AD2 for <oauth@ietf.org>; Thu, 31 Mar 2011 18:42:20 -0700 (PDT)
Received: (qmail 9078 invoked from network); 1 Apr 2011 01:43:59 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 1 Apr 2011 01:43:59 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 31 Mar 2011 18:43:45 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Marius Scurtescu <mscurtescu@google.com>
Date: Thu, 31 Mar 2011 18:43:37 -0700
Thread-Topic: [OAUTH-WG] Error extensibility proposal
Thread-Index: AcvwCSGX4sPlhCP4SsuHYy9a+u9X9wAAbAEw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664D714@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BANLkTinfcQzMWDgwOxM+t6SdBQqwiohsSQ@mail.gmail.com>
In-Reply-To: <BANLkTinfcQzMWDgwOxM+t6SdBQqwiohsSQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 01:42:21 -0000

Hi Marius,

> -----Original Message-----
> From: Marius Scurtescu [mailto:mscurtescu@google.com]
> Sent: Thursday, March 31, 2011 6:07 PM

> Many error codes (if not most) are not parameter specific.

Like what? After a long debate, not a single use case was presented for a n=
ew error code that is not:

1. overlapping with an existing HTTP code (4xx, 5xx)
2. directly relates to an extension parameter

Present new use cases and I'll reconsider. This proposal is 100% fit for th=
e given requirements.
=20
> Will this lead to the registration of fake parameter names just to be use=
d as error prefixes?

No. If there is an actual need to define a new error code that is not relat=
ed to at least one extension, I agree that we need a different solution (we=
 can always use the ability to update the RFC). But I have not seen any suc=
h need.

In fact, I argue that such additional generic error codes are bad for inter=
operability. If every client implements the same set of error codes defined=
 in v2, we know that they will all interop well when it comes to an error c=
ondition. If the error is the result of an extension, the client must under=
stand that extension to understand any additional error code. Nothing but e=
xtension parameter can change the behavior of this protocol. We don't have =
other extension points that can produce such a change. No change - no new e=
rror conditions.

Another example of error code extensibility is the need to express more spe=
cific error conditions related to extension grant types. It might be necess=
ary to express why a grant type was rejected, beyond just 'invalid_grand'. =
However, *replacing* 'invalid_grant' with a more specific error code would =
be bad for interoperability because it will break existing libraries design=
ed to be extensible but do not offer a fully extensible error code handler =
(just not likely). The right solution would be to define an additional, gra=
nt-type-specific response parameter that will provide sub-meaning to the 'i=
nvalid_grant' code.

In this case, no new error codes are even registered, just an extension res=
ponse parameter.

> If we are going down this route, why don't we require extensions to regis=
ter
> just a prefix?

What route? Registering a prefix is a good idea if we expect a flood of ext=
ension parameters. I'm not.

<rant>
The bottom line is that this proposal is purposely not creating an open-end=
ed registry that will end up being as counter-productive as the OAuth 1.0 e=
rror codes wiki page. It is design to put the least amount of process and h=
urdle in the way of developer extending the protocol.

I am happy to suggest alternatives or even adopt Mike Jones' proposal for a=
n error registry if only someone can present a *single* use case that defin=
es a new requirement not covered by this proposal. Give me just *one* examp=
le where this is incomplete. But short of that, discussing the shortcoming =
of a proposal without clear requirements is a total waste of time.

Extensibility is where most protocol fuck up (pardon my language). It is wh=
ere crap enters the protocol, pollutes the flow, and breaks interop. We can=
 define experimental features - that's fine because if they fail they just =
don't get adopted. But unchecked extensibility is how you end up with WS-*,=
 and SOAP, and a never ending list of crap that offers no shred of interop =
because it was extended beyond recognition.
</rant>

EHL




From tonynad@microsoft.com  Thu Mar 31 19:05:55 2011
Return-Path: <tonynad@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9535C3A6ADB for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 19:05:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.398
X-Spam-Level: 
X-Spam-Status: No, score=-7.398 tagged_above=-999 required=5 tests=[AWL=0.069,  BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, UNRESOLVED_TEMPLATE=3.132]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZmqPPxPu4ojQ for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 19:05:54 -0700 (PDT)
Received: from smtp.microsoft.com (mail3.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id 4A1E03A6AD2 for <oauth@ietf.org>; Thu, 31 Mar 2011 19:05:54 -0700 (PDT)
Received: from TK5EX14MLTC101.redmond.corp.microsoft.com (157.54.79.178) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Thu, 31 Mar 2011 19:07:34 -0700
Received: from ch1outboundpool.messaging.microsoft.com (157.54.51.114) by mail.microsoft.com (157.54.79.178) with Microsoft SMTP Server (TLS) id 14.1.270.2; Thu, 31 Mar 2011 19:07:33 -0700
Received: from mail33-ch1-R.bigfish.com (216.32.181.169) by CH1EHSOBE009.bigfish.com (10.43.70.59) with Microsoft SMTP Server id 14.1.225.8; Fri, 1 Apr 2011 02:07:33 +0000
Received: from mail33-ch1 (localhost.localdomain [127.0.0.1])	by mail33-ch1-R.bigfish.com (Postfix) with ESMTP id 17AF412A060B	for <oauth@ietf.org.FOPE.CONNECTOR.OVERRIDE>; Fri,  1 Apr 2011 02:07:33 +0000 (UTC)
X-SpamScore: -42
X-BigFish: PS-42(zz9371P542N1432NzzdafM1202h1082kzz1033IL8275dhz31h2a8h668h61h)
X-Spam-TCS-SCL: 0:0
X-Forefront-Antispam-Report: KIP:(null); UIP:(null); IPV:SKI; H:SN1PRD0302HT002.namprd03.prod.outlook.com; R:internal; EFV:INT
Received: from mail33-ch1 (localhost.localdomain [127.0.0.1]) by mail33-ch1 (MessageSwitch) id 1301623652504899_25113; Fri,  1 Apr 2011 02:07:32 +0000 (UTC)
Received: from CH1EHSMHS016.bigfish.com (snatpool1.int.messaging.microsoft.com [10.43.68.254])	by mail33-ch1.bigfish.com (Postfix) with ESMTP id 78CB214A004C;	Fri,  1 Apr 2011 02:07:32 +0000 (UTC)
Received: from SN1PRD0302HT002.namprd03.prod.outlook.com (65.55.94.9) by CH1EHSMHS016.bigfish.com (10.43.70.16) with Microsoft SMTP Server (TLS) id 14.1.225.8; Fri, 1 Apr 2011 02:07:31 +0000
Received: from SN1PRD0302MB100.namprd03.prod.outlook.com ([169.254.10.226]) by SN1PRD0302HT002.namprd03.prod.outlook.com ([10.14.149.46]) with mapi id 14.01.0225.027; Fri, 1 Apr 2011 02:07:30 +0000
From: Anthony Nadalin <tonynad@microsoft.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, Mike Jones <Michael.Jones@microsoft.com>, OAuth WG <oauth@ietf.org>
Thread-Topic: Error extensibility proposal
Thread-Index: AcvuWqe3yWo/PW+8SwCPaTggrIuHzwBdpvawAABenpAABmlkcAAIZqwg
Date: Fri, 1 Apr 2011 02:07:29 +0000
Message-ID: <B26C1EF377CB694EAB6BDDC8E624B6E7114E7E66@SN1PRD0302MB100.namprd03.prod.outlook.com>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4E1F6AAD24975D4BA5B1680429673943252C24FD@TK5EX14MBXC203.redmond.corp.microsoft.com> <B26C1EF377CB694EAB6BDDC8E624B6E7114E7C60@SN1PRD0302MB100.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234465664D6D0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465664D6D0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [130.129.69.198]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OrganizationHeadersPreserved: SN1PRD0302HT002.namprd03.prod.outlook.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%HUENIVERSE.COM$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-FOPE-CONNECTOR: Id%59$Dn%IETF.ORG$RO%2$TLS%6$FQDN%131.107.125.5$TlsDn%
X-OriginatorOrg: microsoft.com
X-CrossPremisesHeadersPromoted: TK5EX14MLTC101.redmond.corp.microsoft.com
X-CrossPremisesHeadersFiltered: TK5EX14MLTC101.redmond.corp.microsoft.com
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 02:05:55 -0000

I have not seen your explanation of why an error registry does not satisfy =
the requirements as originally proposed in the bearer token. Your proposal =
recognizes the need to have a registry which is good but then you conflate =
parameters registry with an error registry, not all errors will be paramete=
r driven. So your proposal will confuse those that will just want to regist=
er errors like they do with the other specifications today (they know how t=
o do this), this seems very odd to have to do it your proposed way. Can you=
 point me to other specifications that have done it your proposed way?
=20
-----Original Message-----
From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]=20
Sent: Thursday, March 31, 2011 2:43 PM
To: Anthony Nadalin; Mike Jones; OAuth WG
Subject: RE: Error extensibility proposal

'PROPER' REQUIRES USE CASES AND REQUIREMENTS!

You have to show how the proposal does not satisfy you requirements. It ful=
ly satisfies all the requirements presented to the working group.

EHL


> -----Original Message-----
> From: Anthony Nadalin [mailto:tonynad@microsoft.com]
> Sent: Thursday, March 31, 2011 11:40 AM
> To: Mike Jones; Eran Hammer-Lahav; OAuth WG
> Subject: RE: Error extensibility proposal
>=20
> I also object, an error registry the proper approach here.
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf=20
> Of Mike Jones
> Sent: Thursday, March 31, 2011 11:31 AM
> To: Eran Hammer-Lahav; OAuth WG
> Subject: Re: [OAUTH-WG] Error extensibility proposal
>=20
> I object to this proposal on two grounds:
>=20
> First, changing some of the "error" return codes to HTTP numbers is an=20
> unnecessary and unsolicited breaking change at a time that we should=20
> be stabilizing the spec.
>=20
> Second, the OAuth Errors registry is simpler and follows IETF standard=20
> practices.  I know of no other specification where a parameters=20
> registry is overloaded in this manner.  Please incorporate the OAuth=20
> Errors registry into the framework specification in lieu of this proposal=
.
>=20
> 				Thank you,
> 				-- Mike
>=20
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf=20
> Of Eran Hammer-Lahav
> Sent: Tuesday, March 29, 2011 4:02 PM
> To: OAuth WG
> Subject: [OAUTH-WG] Error extensibility proposal
>=20
> *** Requirements
>=20
> The following proposal is based on two requirements:
>=20
> 1. Provide a way to return an OAuth error response for error=20
> situations other then 400 and 401. For example, if the server is=20
> temporarily unavailable, it will return an HTTP 503 status. However,=20
> it is often desirable to still return a response body using the same=20
> format as any other error. This makes client development easier, having t=
o always check for a single error code.
>=20
> 2. Allow extensions modifying the behavior of the authorization and=20
> token endpoints via additional request/response parameters to define=20
> additional error codes to go along with the new functionality. For=20
> example, the UX extension defines the 'display' parameter. It could=20
> define a matching 'unsupported_display' error response.
>=20
> No other use cases were identified for error extensibility. Note that=20
> this proposal is strictly limited to error resulting from the=20
> authorization and token endpoints. No other endpoints are included (in=20
> particular, protected resources are not covered by this proposal).
>=20
> *** Design goals
>=20
> The proposal was specifically designed to be minimalistic, tailored to=20
> the specific use cases defined, and as effortless as possible. This=20
> avoids defining error codes identical to existing HTTP status codes,=20
> as well as bind new errors to specific extension parameters. Since the=20
> error is useless without understanding the extension, this method=20
> guarantees that those developing and implementing extensions will present=
 it as a complete unit.
>=20
> *** Proposal
>=20
> - Non 400/401 responses
>=20
> If the HTTP response status code is 4xx (other than 400/401) or 5xx,=20
> the 'error' parameter SHOULD be set to the HTTP status code. For example:
>=20
>      HTTP/1.1 503 Service Unavailable
>      Content-Type: application/json
>      Cache-Control: no-store
>=20
>      {
>        "error":"503"
>      }
>=20
> This will also enable passing HTTP status codes such as 503 via the=20
> redirection response which is currently not possible. It will allow=20
> the authorization server to indicate a 503 situation without defining=20
> another error code that has the exact same meaning.
>=20
> - Extension errors
>=20
> Instead of defining an additional error registry, I propose we add a=20
> single field to the 'OAuth parameters registry' template:
>=20
>     Additional error codes:
>         Additional error codes related to the parameter usage. Error=20
> codes SHOULD begin with the parameter name
>         when possible (e.g. 'example_invalid' error code for use with=20
> the 'example' parameter).
>=20
> Error collisions are unlikely because when a new extension is=20
> authored, the registry is reviewed for potential conflicts. Since the=20
> errors are extension- specific, collisions only matter if two=20
> extensions are to be used together. In that case, the review process=20
> will identify any potential problems. And since the errors are=20
> meaningless without understanding the extension, a registry with a random=
 list of errors is not very helpful.
>=20
> *** Feedback
>=20
> Please send any feedback, comments, support, and objections by 3/1 (so=20
> it can be included or not in -14).
>=20
> EHL
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
>=20






From mscurtescu@google.com  Thu Mar 31 19:19:58 2011
Return-Path: <mscurtescu@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E93B23A6ADF for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 19:19:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level: 
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hACGauCJQQMz for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 19:19:57 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [74.125.121.67]) by core3.amsl.com (Postfix) with ESMTP id 897B73A6ADE for <oauth@ietf.org>; Thu, 31 Mar 2011 19:19:57 -0700 (PDT)
Received: from kpbe15.cbf.corp.google.com (kpbe15.cbf.corp.google.com [172.25.105.79]) by smtp-out.google.com with ESMTP id p312Larq010181 for <oauth@ietf.org>; Thu, 31 Mar 2011 19:21:36 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1301624496; bh=Nq7iok6KJLyO13ixFzSxskJQkIw=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type:Content-Transfer-Encoding; b=FvF85ZlpsfVaUkUFiz93t4p/xhYhE04KFaR/32AI17j0ifgjnomMu4ooqk0bKqnxJ 4DFlQe0DrBBfNgYLNZ2tw==
Received: from yia28 (yia28.prod.google.com [10.243.65.28]) by kpbe15.cbf.corp.google.com with ESMTP id p312LYAb014464 (version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT) for <oauth@ietf.org>; Thu, 31 Mar 2011 19:21:34 -0700
Received: by yia28 with SMTP id 28so1619582yia.35 for <oauth@ietf.org>; Thu, 31 Mar 2011 19:21:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type:content-transfer-encoding; bh=q04tHV5sdVCP+2uLUPFjnYWuHTow3AyQWfbbwIrbhLI=; b=YAq7vFi1ibeFt8+Oh5hVBEe3e+QBS4JY6SAfXZn7yf5LYcI75c8MPr6G+7FN02dKpk UUKWK6lHPyu2d+lqN4HA==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; b=cLXsNgJWz7J79/a+7atrXoKDCQf5XqPKX3nCg3optE//UBaG2w7bGPcCXMKjq22m1m qcuCVuWO3NOk028RzqPg==
Received: by 10.101.66.2 with SMTP id t2mr2520946ank.60.1301624494097; Thu, 31 Mar 2011 19:21:34 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.100.34.4 with HTTP; Thu, 31 Mar 2011 19:21:13 -0700 (PDT)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234465664D714@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BANLkTinfcQzMWDgwOxM+t6SdBQqwiohsSQ@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234465664D714@P3PW5EX1MB01.EX1.SECURESERVER.NET>
From: Marius Scurtescu <mscurtescu@google.com>
Date: Thu, 31 Mar 2011 19:21:13 -0700
Message-ID: <BANLkTimMFVcmjRgxKR3HNBBXwav6YhBGEg@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 02:19:59 -0000

Maybe I don't understand how you want to deal with errors, sorry if
you have to repeat the same argument.

Here are a couple of examples.

JavaScript clients need to be able to get new access tokens without
user interaction (after an initial consent). The solution is to define
an immediate mode through an extension. The client sends a parameter
immediate=3Dtrue which tells the server that no UI should be shown.
Either an access token is returned immediately or a specific error
code. This error code must tell the client that it does need to popup
a UI and try again. In this case the error code could be
immediate_failed, which conforms to your prefix requirement, but I
think only by luck.

Another example is the device profile. The profile defines a new grant
type, the device is repeatedly checking the token endpoint to see if
the user has approved or not. Two special error codes are required for
this to work: authorization_pending and slow_down. No meaningful
parameter prefix can be used in this case. See:
http://tools.ietf.org/html/draft-recordon-oauth-v2-device-00#section-1.6


Marius



On Thu, Mar 31, 2011 at 6:43 PM, Eran Hammer-Lahav <eran@hueniverse.com> wr=
ote:
> Hi Marius,
>
>> -----Original Message-----
>> From: Marius Scurtescu [mailto:mscurtescu@google.com]
>> Sent: Thursday, March 31, 2011 6:07 PM
>
>> Many error codes (if not most) are not parameter specific.
>
> Like what? After a long debate, not a single use case was presented for a=
 new error code that is not:
>
> 1. overlapping with an existing HTTP code (4xx, 5xx)
> 2. directly relates to an extension parameter
>
> Present new use cases and I'll reconsider. This proposal is 100% fit for =
the given requirements.
>
>> Will this lead to the registration of fake parameter names just to be us=
ed as error prefixes?
>
> No. If there is an actual need to define a new error code that is not rel=
ated to at least one extension, I agree that we need a different solution (=
we can always use the ability to update the RFC). But I have not seen any s=
uch need.
>
> In fact, I argue that such additional generic error codes are bad for int=
eroperability. If every client implements the same set of error codes defin=
ed in v2, we know that they will all interop well when it comes to an error=
 condition. If the error is the result of an extension, the client must und=
erstand that extension to understand any additional error code. Nothing but=
 extension parameter can change the behavior of this protocol. We don't hav=
e other extension points that can produce such a change. No change - no new=
 error conditions.
>
> Another example of error code extensibility is the need to express more s=
pecific error conditions related to extension grant types. It might be nece=
ssary to express why a grant type was rejected, beyond just 'invalid_grand'=
. However, *replacing* 'invalid_grant' with a more specific error code woul=
d be bad for interoperability because it will break existing libraries desi=
gned to be extensible but do not offer a fully extensible error code handle=
r (just not likely). The right solution would be to define an additional, g=
rant-type-specific response parameter that will provide sub-meaning to the =
'invalid_grant' code.
>
> In this case, no new error codes are even registered, just an extension r=
esponse parameter.
>
>> If we are going down this route, why don't we require extensions to regi=
ster
>> just a prefix?
>
> What route? Registering a prefix is a good idea if we expect a flood of e=
xtension parameters. I'm not.
>
> <rant>
> The bottom line is that this proposal is purposely not creating an open-e=
nded registry that will end up being as counter-productive as the OAuth 1.0=
 error codes wiki page. It is design to put the least amount of process and=
 hurdle in the way of developer extending the protocol.
>
> I am happy to suggest alternatives or even adopt Mike Jones' proposal for=
 an error registry if only someone can present a *single* use case that def=
ines a new requirement not covered by this proposal. Give me just *one* exa=
mple where this is incomplete. But short of that, discussing the shortcomin=
g of a proposal without clear requirements is a total waste of time.
>
> Extensibility is where most protocol fuck up (pardon my language). It is =
where crap enters the protocol, pollutes the flow, and breaks interop. We c=
an define experimental features - that's fine because if they fail they jus=
t don't get adopted. But unchecked extensibility is how you end up with WS-=
*, and SOAP, and a never ending list of crap that offers no shred of intero=
p because it was extended beyond recognition.
> </rant>
>
> EHL
>
>
>
>

From skylar@kiva.org  Thu Mar 31 22:01:32 2011
Return-Path: <skylar@kiva.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2C1623A6BEC for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 22:01:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jORzUSU00uUP for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 22:01:30 -0700 (PDT)
Received: from na3sys010aog113.obsmtp.com (na3sys010aog113.obsmtp.com [74.125.245.94]) by core3.amsl.com (Postfix) with SMTP id 5CF593A6BEB for <oauth@ietf.org>; Thu, 31 Mar 2011 22:01:29 -0700 (PDT)
Received: from source ([209.85.220.169]) (using TLSv1) by na3sys010aob113.postini.com ([74.125.244.12]) with SMTP ID DSNKTZVcjTBumQb5ikZj8AaM7xlM5J64SOqS@postini.com; Thu, 31 Mar 2011 22:03:10 PDT
Received: by vxk20 with SMTP id 20so3129660vxk.0 for <oauth@ietf.org>; Thu, 31 Mar 2011 22:03:08 -0700 (PDT)
Received: by 10.52.97.199 with SMTP id ec7mr4789826vdb.142.1301634188677; Thu, 31 Mar 2011 22:03:08 -0700 (PDT)
Received: from [142.131.211.134] ([142.131.211.134]) by mx.google.com with ESMTPS id es1sm528422vdb.35.2011.03.31.22.03.06 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 31 Mar 2011 22:03:06 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Skylar Woodward <skylar@kiva.org>
In-Reply-To: <555181.42430.qm@web55804.mail.re3.yahoo.com>
Date: Fri, 1 Apr 2011 01:03:04 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <5D31024C-1CBE-46E0-8074-6BD8F5157DE7@kiva.org>
References: <555181.42430.qm@web55804.mail.re3.yahoo.com>
To: fcorella@pomcor.com
X-Mailer: Apple Mail (2.1084)
Cc: OAuth WG <oauth@ietf.org>, "Karen P. Lewison" <kplewison@pomcor.com>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 05:01:32 -0000

Francisco, correct me if I'm wrong, but in your discussion you assume =
that the application is incapable of keeping secrets from the public =
(eg, mobile, desktop apps, etc.).  According to the spec, those =
applications should never receive client credentials to begin with.  =
They can't keep secrets so they aren't issued any. Obfuscating secrets =
in binary code doesn't count - if the tokens in question are outside a =
secured firewall, they aren't secrets.

George's attack is a MITM attack which can be expensive or difficult to =
pull off, but a possibility. At the least, it's a security consideration =
of why a callback *should* use TLS.

Someone speak up if George's scenario is flawed or I'm misunderstanding =
it.  My understanding is this:

- Bob uses (web) client C to access provider P.
- Mallory has set up a MITM attack between client C and Bob's computer.
- Mallory also uses client to C and starts an an approval process from =
the client to provider P
- Bob sends a request over HTTPS to provider P with client ID for C.
- Provider P responds to his request with a redirect to an =
authentication code.
- Meanwhile, Mallory does not continue with the auth flow at provider P. =
Instead, he waits for Bob.
- Bob's browser performs the redirect sent from provider P back to =
client C (over HTTP).
- Mallory intercepts the clear-text request from Bob's computer and does =
not pass the request on to client C.
- Mallory uses the auth code from Bob (and any state information) to =
forge a redirect request to client C on his own session.
- Client C requests an access token from provider P for Bob's account =
using it's secured client credentials.
- Mallory now has credentials for Bob on client C.  Bob has a dead or =
invalid auth handshake which was interrupted by Mallory (and not passed =
on to P to avoid replay detection).

(NOTE: I wrote this before the other examples, so apologies if it =
repeats the example Dick made).


On Mar 31, 2011, at 2:59 PM, Francisco Corella wrote:

> Hi Torsten,
>=20
> > We are discussing TLS right now as a mean to prevent
> > impersonation of the end-user's session on the client
> > site. Correct? It's definitely a good advice to protect
> > session from being highjacked that way. But I'm wondering
> > whether this really belongs into the scope of OAuth?
> >=20
> > BTW: It's covered in =
http://tools.ietf.org/html/draft-lodderstedt-oauth-security-01#section-4.4=
.1.6.
>=20
> I'm not sure you undertand the attack.  In the section
> 4.4.1.6 that you reference you propose the following
> countermeasure:
>=20
> >    o  The authorization server shall require the client to =
authenticate
> >       with a secret, so the binding of the authorization code to a
> >       certain client can be validated in a reliable way (see
> >       Section 5.2.4.4).
>=20
> This is not a countermeasure.  CLIENT AUTHENTICATION DOES
> NOTHING TO MITIGATE THE ATTACK.
>=20
> You should read again the attack descriptions I described in
> the discussion we had back in early January:
> http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html
> http://www.ietf.org/mail-archive/web/oauth/current/msg04900.html
> and those I sent recently:
> http://www.ietf.org/mail-archive/web/oauth/current/msg04894.html
> and the attack scneraio that George Fletcher described:
> http://www.ietf.org/mail-archive/web/oauth/current/msg05825.html
>=20
> The security considerations section that you have just proposed
> fails to explain the issue.
>=20
> Regarding those security considerations, I also wanted to
> point out that the section on session fixation does not make
> sense.  What session fixation attack are you talking about?
> There was a session fixation vulnerability in the original
> version of OAuth 1.0, but it was due to the fact that the
> client obtained the temporary credentials (token request and
> secret, analogous to the current authorization code) in a
> direct request to the server before redirecting the user's
> browser to the server for user authentication.  The server
> created a session when it provided the temporary credentials
> to the client, and the attacker fixated that session by
> using a fake client to redirect the user to the server with
> the request token issued to the attacker, which referred the
> server to the attacker's session.  IN OAUTH 2.0 THIS
> SESSSION FIXATION VULNERABILITY IS NOT AN ISSUE BECAUSE THE
> DIRECT REQUEST TO OBTAIN TEMPORARY CREDENTIALS HAS BEEN
> ELIMINATED.
>=20
> Francisco
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From skylar@kiva.org  Thu Mar 31 22:17:38 2011
Return-Path: <skylar@kiva.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4DB4F3A67F1 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 22:17:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P0gLzVK1cr+e for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 22:17:37 -0700 (PDT)
Received: from na3sys010aog109.obsmtp.com (na3sys010aog109.obsmtp.com [74.125.245.86]) by core3.amsl.com (Postfix) with SMTP id 1BD043A67E1 for <oauth@ietf.org>; Thu, 31 Mar 2011 22:17:36 -0700 (PDT)
Received: from source ([209.85.220.179]) (using TLSv1) by na3sys010aob109.postini.com ([74.125.244.12]) with SMTP ID DSNKTZVgVMwPaYUHn/Fu+r/6i3WYn66n8uG3@postini.com; Thu, 31 Mar 2011 22:19:17 PDT
Received: by vxi40 with SMTP id 40so2349636vxi.10 for <oauth@ietf.org>; Thu, 31 Mar 2011 22:19:16 -0700 (PDT)
Received: by 10.52.76.193 with SMTP id m1mr4769628vdw.204.1301635155877; Thu, 31 Mar 2011 22:19:15 -0700 (PDT)
Received: from [142.131.211.134] ([142.131.211.134]) by mx.google.com with ESMTPS id b24sm996321vby.7.2011.03.31.22.19.14 (version=TLSv1/SSLv3 cipher=OTHER); Thu, 31 Mar 2011 22:19:15 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset=us-ascii
From: Skylar Woodward <skylar@kiva.org>
In-Reply-To: <847617.78000.qm@web55807.mail.re3.yahoo.com>
Date: Fri, 1 Apr 2011 01:19:13 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <3F048A31-6B9E-4260-9E07-AECAEFE038EE@kiva.org>
References: <847617.78000.qm@web55807.mail.re3.yahoo.com>
To: fcorella@pomcor.com
X-Mailer: Apple Mail (2.1084)
Cc: "Karen P. Lewison" <kplewison@pomcor.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 05:17:38 -0000

Right, but just so we are clear, the only case you are discussing here =
is the MITM attack, which George, I and others have recently outlined.

I'm not outright opposed to the language requiring TLS for the redirect =
URI, but the consequence is that some providers may need to find =
workarounds or (breaking?) exceptions to this rule. In reality the OAuth =
process will be much more paranoid than most provider websites serving =
the same information, but for the purposes of the spec, it's not =
necessarily a bad thing. It just means some people might need to bend =
the rules to serve there customers until all of the web gets to a higher =
level TSL competency and dependence on signature authorities.

So, if MITM is the only attack then for this case, we're sure that all =
other aspects of the exchange are similarly protected from MITM as well?

I think for some providers, the risk of MITM in this case will be so low =
as to not trump the value of the data protected (or the availability of =
that data through other or more cost-effective means). Still it doesn't =
mean the OAuth spec has to settle for less - we had the same argument =
around Bearer tokens. In the worst case, clients unable to set up HTTPS =
endpoints could be forced to require OOB flows (where the auth code must =
be manually transferred by the user from the provider into the client =
app) if they still wanted a fully spec-complient deployment.

skylar


On Mar 31, 2011, at 4:06 PM, Francisco Corella wrote:

> Skylar,
>=20
> > So, imagine a website secured inside a corporate
> > firewall. This service needs to access the provider's
> > services via OAuth and thus exposes one callback open to the
> > world for purposes of the OAuth handshake. The redirect URI
> > is HTTP since the corporation is having trouble acquiring or
> > setting up a certificate for HTTPS - in any case, the
> > provider does not requrire it. In this case, the auth code
> > flows into the firewall via HTTP, but is further validated
> > by client credentials over TLS in access token
> > requests. Valid tokens return to the web application inside
> > the corporate firewall over TLS and the information is still
> > secure from outside threats. So, my point is that the use of
> > client credentials (always kept secret and inside the
> > firewall) secures the auth code exchange and use of HTTP
> > doesn't create a vulnerability.
>=20
> That is simply not true.  CLIENT CREDENTIALS DON'T HELP.  If
> the user is outside the firewall and the callback URI is not
> protected by TLS, the attacker intercepts the authorization
> code outside the firewall and submits it to the client
> through the firewall.  The client exchanges it for the
> access token, uses the access token to get protected
> resources, and sends those resources to the attacker
> outside the firewall.
>=20
> Francisco
>=20


From eran@hueniverse.com  Thu Mar 31 22:49:43 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 779373A6BF3 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 22:49:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.634
X-Spam-Level: 
X-Spam-Status: No, score=-2.634 tagged_above=-999 required=5 tests=[AWL=-0.035, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9wRCWi5tig9b for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 22:49:33 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id E1A5A28C0F3 for <oauth@ietf.org>; Thu, 31 Mar 2011 22:49:26 -0700 (PDT)
Received: (qmail 25381 invoked from network); 1 Apr 2011 05:49:54 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 1 Apr 2011 05:49:53 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 31 Mar 2011 22:49:09 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Marius Scurtescu <mscurtescu@google.com>
Date: Thu, 31 Mar 2011 22:48:59 -0700
Thread-Topic: [OAUTH-WG] Error extensibility proposal
Thread-Index: AcvwE5g6OX5ehtxcSy6jxJsq00V4fgAFtJpQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664D72F@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BANLkTinfcQzMWDgwOxM+t6SdBQqwiohsSQ@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234465664D714@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BANLkTimMFVcmjRgxKR3HNBBXwav6YhBGEg@mail.gmail.com>
In-Reply-To: <BANLkTimMFVcmjRgxKR3HNBBXwav6YhBGEg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 05:49:43 -0000

> -----Original Message-----
> From: Marius Scurtescu [mailto:mscurtescu@google.com]
> Sent: Thursday, March 31, 2011 7:21 PM
> To: Eran Hammer-Lahav
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] Error extensibility proposal
>=20
> Maybe I don't understand how you want to deal with errors, sorry if you
> have to repeat the same argument.

This is helpful.

> JavaScript clients need to be able to get new access tokens without user
> interaction (after an initial consent). The solution is to define an imme=
diate
> mode through an extension. The client sends a parameter immediate=3Dtrue
> which tells the server that no UI should be shown.
> Either an access token is returned immediately or a specific error code. =
This
> error code must tell the client that it does need to popup a UI and try a=
gain.
> In this case the error code could be immediate_failed, which conforms to
> your prefix requirement, but I think only by luck.

The prefix is just a useful suggestion. No need to produce convoluted gramm=
ar just to fit the parameter name it. But it usually works out given that t=
he error operates with relation to the parameter.

This examples seems to fit my proposal perfectly.

> Another example is the device profile. The profile defines a new grant ty=
pe,
> the device is repeatedly checking the token endpoint to see if the user h=
as
> approved or not. Two special error codes are required for this to work:
> authorization_pending and slow_down. No meaningful parameter prefix can
> be used in this case. See:
> http://tools.ietf.org/html/draft-recordon-oauth-v2-device-00#section-1.6

Ah, a new use case!

So here we have new errors coming out of the use of an extension grant type=
. As currently drafted, the device grant type (which will need to be assign=
ed a URI) does not introduce any new request or response parameter to the t=
oken endpoint, so my proposal does not satisfy this use case.

This does provide a compelling use case for introducing an error registry, =
separate from the parameters registry. However, it is still directly linked=
 to another extension point (grant type).

I'll combine Mike Jones' proposal with mine and repost.

Thanks for that!

EHL











From eran@hueniverse.com  Thu Mar 31 23:03:48 2011
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 221563A6BEB for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 23:03:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.634
X-Spam-Level: 
X-Spam-Status: No, score=-2.634 tagged_above=-999 required=5 tests=[AWL=-0.035, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KD98VzLc7cim for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 23:03:43 -0700 (PDT)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id D9C9D3A6BEA for <oauth@ietf.org>; Thu, 31 Mar 2011 23:03:41 -0700 (PDT)
Received: (qmail 27497 invoked from network); 1 Apr 2011 06:05:21 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 1 Apr 2011 06:05:21 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 31 Mar 2011 23:05:21 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Anthony Nadalin <tonynad@microsoft.com>, Mike Jones <Michael.Jones@microsoft.com>, OAuth WG <oauth@ietf.org>
Date: Thu, 31 Mar 2011 23:05:12 -0700
Thread-Topic: Error extensibility proposal
Thread-Index: AcvuWqe3yWo/PW+8SwCPaTggrIuHzwBdpvawAABenpAABmlkcAAIZqwgAAikXHA=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E7234465664D732@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723446564305D9@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4E1F6AAD24975D4BA5B1680429673943252C24FD@TK5EX14MBXC203.redmond.corp.microsoft.com> <B26C1EF377CB694EAB6BDDC8E624B6E7114E7C60@SN1PRD0302MB100.namprd03.prod.outlook.com> <90C41DD21FB7C64BB94121FBBC2E7234465664D6D0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <B26C1EF377CB694EAB6BDDC8E624B6E7114E7E66@SN1PRD0302MB100.namprd03.prod.outlook.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E7114E7E66@SN1PRD0302MB100.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Error extensibility proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 06:03:48 -0000

> -----Original Message-----
> From: Anthony Nadalin [mailto:tonynad@microsoft.com]
> Sent: Thursday, March 31, 2011 7:07 PM
> To: Eran Hammer-Lahav; Mike Jones; OAuth WG
> Subject: RE: Error extensibility proposal
>=20
> I have not seen your explanation of why an error registry does not satisf=
y the
> requirements as originally proposed in the bearer token. Your proposal
> recognizes the need to have a registry which is good but then you conflat=
e
> parameters registry with an error registry, not all errors will be parame=
ter
> driven. So your proposal will confuse those that will just want to regist=
er
> errors like they do with the other specifications today (they know how to=
 do
> this), this seems very odd to have to do it your proposed way. Can you po=
int
> me to other specifications that have done it your proposed way?

This is exactly what I want to prevent. There should not be a way to add ne=
w error codes without adding some other extension. New errors must be speci=
fic to new flows not currently specified in the v2 specification.

If someone fully implements v2 and nothing else, they should NEVER receive =
an unexpected error, just because someone decided to be creative. This is w=
hy we have this working group and put so much effort into building consensu=
s. What is a v2 client supposed to do with an unknown error response? Displ=
ay a 500 error to the user? In previous posts you expressed much concern fo=
r the client developer and this seems to be in line with that concern. It i=
s unreasonable to expect client developers to constantly keep up to date wi=
th a growing error registry.

A practical example for this restriction is the huge difference in the leve=
l of consensus required to add error codes to v2 now (while in draft), comp=
ared to requests to register new codes later via the registry process. We u=
sed to have more error codes and through the working group process narrowed=
 the selection. Based on the registry rules, the few people who still want =
those error codes can simply reintroduce them (all they need is a stable do=
cument to reference, no RFC required). The DE will not be able to block suc=
h a request if it is well formed. This is not something I want to enable.

My proposal ties new errors to new parameters because that was the only sou=
rce of new errors we had use cases for. Marius just brought up the device g=
rant type as another example, and that is a use case my proposal does not c=
over. It does, however, fits my criteria for valid new error codes.

I will combine Mike Jones' proposal with mine and resubmit for review.

EHL
=20
> -----Original Message-----
> From: Eran Hammer-Lahav [mailto:eran@hueniverse.com]
> Sent: Thursday, March 31, 2011 2:43 PM
> To: Anthony Nadalin; Mike Jones; OAuth WG
> Subject: RE: Error extensibility proposal
>=20
> 'PROPER' REQUIRES USE CASES AND REQUIREMENTS!
>=20
> You have to show how the proposal does not satisfy you requirements. It
> fully satisfies all the requirements presented to the working group.
>=20
> EHL
>=20
>=20
> > -----Original Message-----
> > From: Anthony Nadalin [mailto:tonynad@microsoft.com]
> > Sent: Thursday, March 31, 2011 11:40 AM
> > To: Mike Jones; Eran Hammer-Lahav; OAuth WG
> > Subject: RE: Error extensibility proposal
> >
> > I also object, an error registry the proper approach here.
> >
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > Of Mike Jones
> > Sent: Thursday, March 31, 2011 11:31 AM
> > To: Eran Hammer-Lahav; OAuth WG
> > Subject: Re: [OAUTH-WG] Error extensibility proposal
> >
> > I object to this proposal on two grounds:
> >
> > First, changing some of the "error" return codes to HTTP numbers is an
> > unnecessary and unsolicited breaking change at a time that we should
> > be stabilizing the spec.
> >
> > Second, the OAuth Errors registry is simpler and follows IETF standard
> > practices.  I know of no other specification where a parameters
> > registry is overloaded in this manner.  Please incorporate the OAuth
> > Errors registry into the framework specification in lieu of this propos=
al.
> >
> > 				Thank you,
> > 				-- Mike
> >
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > Of Eran Hammer-Lahav
> > Sent: Tuesday, March 29, 2011 4:02 PM
> > To: OAuth WG
> > Subject: [OAUTH-WG] Error extensibility proposal
> >
> > *** Requirements
> >
> > The following proposal is based on two requirements:
> >
> > 1. Provide a way to return an OAuth error response for error
> > situations other then 400 and 401. For example, if the server is
> > temporarily unavailable, it will return an HTTP 503 status. However,
> > it is often desirable to still return a response body using the same
> > format as any other error. This makes client development easier, having=
 to
> always check for a single error code.
> >
> > 2. Allow extensions modifying the behavior of the authorization and
> > token endpoints via additional request/response parameters to define
> > additional error codes to go along with the new functionality. For
> > example, the UX extension defines the 'display' parameter. It could
> > define a matching 'unsupported_display' error response.
> >
> > No other use cases were identified for error extensibility. Note that
> > this proposal is strictly limited to error resulting from the
> > authorization and token endpoints. No other endpoints are included (in
> > particular, protected resources are not covered by this proposal).
> >
> > *** Design goals
> >
> > The proposal was specifically designed to be minimalistic, tailored to
> > the specific use cases defined, and as effortless as possible. This
> > avoids defining error codes identical to existing HTTP status codes,
> > as well as bind new errors to specific extension parameters. Since the
> > error is useless without understanding the extension, this method
> > guarantees that those developing and implementing extensions will
> present it as a complete unit.
> >
> > *** Proposal
> >
> > - Non 400/401 responses
> >
> > If the HTTP response status code is 4xx (other than 400/401) or 5xx,
> > the 'error' parameter SHOULD be set to the HTTP status code. For exampl=
e:
> >
> >      HTTP/1.1 503 Service Unavailable
> >      Content-Type: application/json
> >      Cache-Control: no-store
> >
> >      {
> >        "error":"503"
> >      }
> >
> > This will also enable passing HTTP status codes such as 503 via the
> > redirection response which is currently not possible. It will allow
> > the authorization server to indicate a 503 situation without defining
> > another error code that has the exact same meaning.
> >
> > - Extension errors
> >
> > Instead of defining an additional error registry, I propose we add a
> > single field to the 'OAuth parameters registry' template:
> >
> >     Additional error codes:
> >         Additional error codes related to the parameter usage. Error
> > codes SHOULD begin with the parameter name
> >         when possible (e.g. 'example_invalid' error code for use with
> > the 'example' parameter).
> >
> > Error collisions are unlikely because when a new extension is
> > authored, the registry is reviewed for potential conflicts. Since the
> > errors are extension- specific, collisions only matter if two
> > extensions are to be used together. In that case, the review process
> > will identify any potential problems. And since the errors are
> > meaningless without understanding the extension, a registry with a
> random list of errors is not very helpful.
> >
> > *** Feedback
> >
> > Please send any feedback, comments, support, and objections by 3/1 (so
> > it can be included or not in -14).
> >
> > EHL
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> >
> >
>=20
>=20
>=20
>=20


From torsten@lodderstedt.net  Thu Mar 31 23:39:43 2011
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 81E1A3A6A28 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 23:39:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level: 
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id luM80RhPcyr2 for <oauth@core3.amsl.com>; Thu, 31 Mar 2011 23:39:41 -0700 (PDT)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.18.13]) by core3.amsl.com (Postfix) with ESMTP id 0C45F3A6999 for <oauth@ietf.org>; Thu, 31 Mar 2011 23:39:40 -0700 (PDT)
Received: from [130.129.66.195] by smtprelay01.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1Q5Y2Q-0004qd-5y; Fri, 01 Apr 2011 08:41:19 +0200
Message-ID: <4D957375.5050708@lodderstedt.net>
Date: Fri, 01 Apr 2011 08:40:53 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.15) Gecko/20110303 Thunderbird/3.1.9
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <4718054E-15B8-4FD9-8C8F-2633A943F1A6@gmx.net>
In-Reply-To: <4718054E-15B8-4FD9-8C8F-2633A943F1A6@gmx.net>
Content-Type: multipart/mixed; boundary="------------080609020500090804050508"
X-Df-Sender: torsten@lodderstedt-online.de
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Agenda Update
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2011 06:39:43 -0000

This is a multi-part message in MIME format.
--------------080609020500090804050508
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit

new slide for my first part

Am 31.03.2011 21:13, schrieb Hannes Tschofenig:
> After a chat with Blaine we have an updated agenda proposal:
>
> First, we need to cover our working group items:
>
> –draft-ietf-oauth-v2
> •Security Consideration Section (Torsten)
> •Error Code registry (Mike)
> •Client Assertion Credentials (Mike)
> •Anything else?
> –draft-ietf-oauth-v2-bearer
> •Open issues?
> –draft-ietf-oauth-saml2-bearer
> •Open issues?
>
> Then, we jump into the presentations of the individual submissions:
>
> •OAuth Security (Torsten)
> •JSON Web Token (Mike)
> •Use Cases (Zachary)
> •Simple Web Discovery (Mike)
> •Dynamic Client Registration (Thomas, if time permits)
> •Token Revocation (Torsten, if time permits)
> •Chain Grant Type (Hannes on behalf of Phil, if time permits)
>
> Then, we will solicit your feedback on the rechartering. The feedback from the presentations earlier will be taken into consideration.
>
> Hope that works for you!
>
> Ciao
> Hannes&  Blaine
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--------------080609020500090804050508
Content-Type: application/pdf;
 name="ietf-80-oauth-sec-cons.pdf"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
 filename="ietf-80-oauth-sec-cons.pdf"
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--------------080609020500090804050508--
