Hi David,

I have a couple of questions/comments:

§2 - The flows use shared secrets for client authentication only. What about adding support for public-key-based signatures for that purpose as an alternative? That's one of the use cases on http://trac.tools.ietf.org/wg/oauth/trac/wiki/SignaturesWhy

§2.4 - Looks like a POST-Request in combination with a password-based user authentication. What about using a standard BASIC Authorization Header instead of oauth_username and oauth_password? In that way, existing code for BASIC-Authentication can easily be ported to OAUTH.

§3
- Why is the parameter oauth_client_secret required for refreshing access tokens? Use cases 2.2 and 2.3 do not require the client to use (possess) a secret. Does this imply such client are not entitled to refresh tokens? I would suggest to simply remove this parameter.

- Why is the refresh method the only way to obtain token secrets? This forces every client needing a token secret to perform two calls (and get a useless access token in the first call). I would suggest to add the parameter oauth_want_secret to all flows in §2.

- "If an access token secret is included in the response, the protected resource MUST NOT allow the use of the corresponding access token without its secret .... " Why is that neccessary?

- response value oauth_signature_methods: Why is it the obligation of an autorization server to know the signature methods a protected resource supports? IMHO this is a question of the protocol between client and protected resource and the client should pass in to the request the desired signature method. In that way the authorization server is able to create adequate secret.

§4.1 Why do you want to enforce such a strong coupling between bearer tokens and TLS per spec? I would recommend to split protocol definition and security considerations as in RFC2617. There, BASIC authentication is defined without any references to transport security mechanisms and the relevant considerations/recommandations are discussed in the security consideration section. IMHO this would simplify the specification because bearer token requests and requests w/ access tokens + signature would just be variant of the same protocol definition.

§4.2.2 The WWW-Authenticate header does not give the client any hint what signature methods to use. How shall the client that information obtain?

regards,
Torsten.





_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to