Right now if a client with an inaccurate clock makes an OAuth call they are
rejected.   OAuth Problem
Reporting<http://oauth.pbworks.com/ProblemReporting>includes a
mechanism to send the server's concept of 'now' to the client:

The parameter named *oauth_acceptable_timestamps* consists of two numbers in
decimal notation, separated by '-' (hyphen). It's the range of timestamps
acceptable to the sender. That is, it means the sender will currently accept
an oauth_timestamp that's not less than the first number and not greater
than the second number.

With that data a client can maintain a time skew value to translate
localized time to the server's (reliable) time.

We've found that this problem is more widespread than I would have imagined.

On Wed, Mar 24, 2010 at 5:15 PM, Luke Shepard <lshep...@facebook.com> wrote:

> Hey Paul,
>
> I was just curious, what do you mean by OAuth Problem Reporting and clock
> synchronization? I'm not familiar with those.
>
> On Mar 24, 2010, at 4:12 PM, Paul Lindner wrote:
>
> > <hat roles="lurker,enduser">
> >
> > Here at LinkedIn we've been following the OAuth developments and we're
> all happy to see progress being made on 2.0.  From our side we'd love to see
> standardization of a number of defacto standards we use in our
> implementation.  Specifically the following:
> >
> > * OAuth Problem Reporting  -- If we had not implemented this we would
> probably had half as many devs on our platform.  It's that important and
> I'll contribute what I can on this.
> > * Responses for throttled responses.  Right now we return a 403 and add
> some descriptive info that the dev ignores :)
> > * Clock synchronization (covered by problem reporting somewhat..)
> > * Signaling the correct authz URL to the client (currently using
> xoauth_authorize_url)
> > * Signaling the expiry time of the token to the client.
> > * Explicit token invalidation endpoints
> > * Signaling the client when a user 'declines/cancels' an authz request.
> >
> > I'll try to contribute to the process as my limited time allows.
> >
> > In any case, congrats for moving forward on this.
> >
> > </hat>
> >
> > On Mar 24, 2010, at 10:11 AM, Blaine Cook wrote:
> >
> >> <chair hat>
> >>
> >> Hi all,
> >>
> >> Hannes and I have discussed the results of the WG meeting, and while
> >> there was a lot of good discussion that happened, it seems like the
> >> next step for the WG is to buckle down and produce a stable draft that
> >> incorporates all the various proposals, in particular WRAP and OAuth
> >> 1.0a. David has done an excellent job with his draft, and I'd like to
> >> see us follow through on that work quickly and effectively to offer
> >> the various organizations who are looking to ship interoperable
> >> solutions something to base their work on.
> >>
> >> To that end, we'd like to see Eran take up the editing work over the
> next week.
> >>
> >> That work should be premised on re-incorporating the features from
> >> WRAP that were removed in David's great start at a unified spec.
> >> Dick's contributions have been invaluable towards reconciling the gap
> >> between HMAC-based approaches and expiring bearer token approaches,
> >> and we'd like to see that work be properly credited and evaluated
> >> along with all of the other aspects of OAuth 1.0a and WRAP.
> >>
> >> Our hope is that soon, certainly well before the next OAuth WG meeting
> >> (virtual or otherwise), we'll have a new RFC-style document that
> >> satisfies the needs of everyone in the community.
> >>
> >> Blaine and Hannes.
> >>
> >> </chair hat>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to