SGTM -- I think the tradeoff is interoperable and simple hop-based integrity
protection (assuming existing TLS libraries exist) vs. more complicated but
full end to end integrity protection (and libraries need to be written).

On Tue, Mar 16, 2010 at 7:11 AM, Torsten Lodderstedt <
tors...@lodderstedt.net> wrote:

>  Hi John,
>
> following your arguments, I could add "integrity protection of complete
> HTTP requests in an interoperable way" the the "pro HTTPS" section?
>
> regards,
> Torsten.
>
> Am 16.03.2010 07:22, schrieb John Panzer:
>
> I'm confused by one "pro" for signatures:
>
>  "Protect integrity of whole request - authorization data and payload when
> communicating over unsecure channel"
>
>  I do not believe there is an existing concrete proposal that will protect
> the whole request, unless you add additional restrictions on the request
> types -- e.g., only HTTP GET or POST with form-encoded data variables only.
>
>  If the assertion is that signatures will actually provide integrity for
> arbitrary HTTP request bodies as well as the URL, authority, and HTTP
> method:   I would like to see at least one concrete proposal that will
> accomplish this.   IIRC there's only one that I think is possibly
> implementable in an interoperable way, and it supports only JSON payloads.
>  In other words, anyone using body signing would need to wrap their data in
> JSON to do it.  (This is not necessarily the worst thing in the world, of
> course, but it is something to be taken into account when listing pros and
> cons.)
>
> On Mon, Mar 15, 2010 at 3:50 PM, Torsten Lodderstedt <
> tors...@lodderstedt.net> wrote:
>
>> Hi all,
>>
>> I composed a detailed summary at
>> http://trac.tools.ietf.org/wg/oauth/trac/wiki/SignaturesWhy. Please
>> review it.
>>
>> @Zachary: I also added some of your recent notes.
>>
>> regards,
>> Torsten.
>>
>>  I volunteer to write it up.
>>
>> <hat type='chair'/>
>>
>> On 3/4/10 1:00 PM, Blaine Cook wrote:
>>
>>
>>  One of the things that's been a primary focus of both today's WG call
>> and last week's call is what are the specific use cases for
>> signatures?
>>
>> - Why are signatures needed?
>> - What do signatures need to protect?
>>
>> Let's try to outline the use cases! Please reply here, so that we have
>> a good idea of what they are as we move towards the Anaheim WG.
>>
>>
>>  This was a valuable thread. Perhaps someone could write up a summary of
>> the points raised, either on the list or at the wiki?
>>
>> Peter
>>
>>
>>
>>
>> _______________________________________________
>> OAuth mailing listoa...@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> _______________________________________________
>> OAuth mailing listoa...@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to