Just curious - why can't the client check the Date header?

Subbu


On Mar 24, 2010, at 6:26 PM, Paul Lindner <lind...@inuus.com> wrote:

Right now if a client with an inaccurate clock makes an OAuth call they are rejected. OAuth Problem Reporting includes a mechanism to send the server's concept of 'now' to the client:

The parameter named oauth_acceptable_timestamps consists of two numbers in decimal notation, separated by '-' (hyphen). It's the range of timestamps acceptable to the sender. That is, it means the sender will currently accept an oauth_timestamp that's not less than the first number and not greater than the second number.


With that data a client can maintain a time skew value to translate localized time to the server's (reliable) time.

We've found that this problem is more widespread than I would have imagined.

On Wed, Mar 24, 2010 at 5:15 PM, Luke Shepard <lshep...@facebook.com> wrote:
Hey Paul,

I was just curious, what do you mean by OAuth Problem Reporting and clock synchronization? I'm not familiar with those.

On Mar 24, 2010, at 4:12 PM, Paul Lindner wrote:

> <hat roles="lurker,enduser">
>
> Here at LinkedIn we've been following the OAuth developments and we're all happy to see progress being made on 2.0. From our side we'd love to see standardization of a number of defacto standards we use in our implementation. Specifically the following:
>
> * OAuth Problem Reporting -- If we had not implemented this we would probably had half as many devs on our platform. It's that important and I'll contribute what I can on this. > * Responses for throttled responses. Right now we return a 403 and add some descriptive info that the dev ignores :)
> * Clock synchronization (covered by problem reporting somewhat..)
> * Signaling the correct authz URL to the client (currently using xoauth_authorize_url)
> * Signaling the expiry time of the token to the client.
> * Explicit token invalidation endpoints
> * Signaling the client when a user 'declines/cancels' an authz request.
>
> I'll try to contribute to the process as my limited time allows.
>
> In any case, congrats for moving forward on this.
>
> </hat>
>
> On Mar 24, 2010, at 10:11 AM, Blaine Cook wrote:
>
>> <chair hat>
>>
>> Hi all,
>>
>> Hannes and I have discussed the results of the WG meeting, and while
>> there was a lot of good discussion that happened, it seems like the
>> next step for the WG is to buckle down and produce a stable draft that >> incorporates all the various proposals, in particular WRAP and OAuth >> 1.0a. David has done an excellent job with his draft, and I'd like to
>> see us follow through on that work quickly and effectively to offer
>> the various organizations who are looking to ship interoperable
>> solutions something to base their work on.
>>
>> To that end, we'd like to see Eran take up the editing work over the next week.
>>
>> That work should be premised on re-incorporating the features from
>> WRAP that were removed in David's great start at a unified spec.
>> Dick's contributions have been invaluable towards reconciling the gap
>> between HMAC-based approaches and expiring bearer token approaches,
>> and we'd like to see that work be properly credited and evaluated
>> along with all of the other aspects of OAuth 1.0a and WRAP.
>>
>> Our hope is that soon, certainly well before the next OAuth WG meeting
>> (virtual or otherwise), we'll have a new RFC-style document that
>> satisfies the needs of everyone in the community.
>>
>> Blaine and Hannes.
>>
>> </chair hat>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to