On Mar 25, 2010, at 9:09 AM, Subbu Allamaraju wrote:

> Just curious - why can't the client check the Date header?

It can. Once it got a failed response from the first call.

Regards,

- johnk

> 
> Subbu
> 
> 
> On Mar 24, 2010, at 6:26 PM, Paul Lindner <lind...@inuus.com> wrote:
> 
>> Right now if a client with an inaccurate clock makes an OAuth call they are 
>> rejected.   OAuth Problem Reporting includes a mechanism to send the 
>> server's concept of 'now' to the client:
>> 
>> The parameter named oauth_acceptable_timestamps consists of two numbers in 
>> decimal notation, separated by '-' (hyphen). It's the range of timestamps 
>> acceptable to the sender. That is, it means the sender will currently accept 
>> an oauth_timestamp that's not less than the first number and not greater 
>> than the second number.
>> 
>> 
>> With that data a client can maintain a time skew value to translate 
>> localized time to the server's (reliable) time.
>> 
>> We've found that this problem is more widespread than I would have imagined.
>> 
>> On Wed, Mar 24, 2010 at 5:15 PM, Luke Shepard <lshep...@facebook.com> wrote:
>> Hey Paul,
>> 
>> I was just curious, what do you mean by OAuth Problem Reporting and clock 
>> synchronization? I'm not familiar with those.
>> 
>> On Mar 24, 2010, at 4:12 PM, Paul Lindner wrote:
>> 
>> > <hat roles="lurker,enduser">
>> >
>> > Here at LinkedIn we've been following the OAuth developments and we're all 
>> > happy to see progress being made on 2.0.  From our side we'd love to see 
>> > standardization of a number of defacto standards we use in our 
>> > implementation.  Specifically the following:
>> >
>> > * OAuth Problem Reporting  -- If we had not implemented this we would 
>> > probably had half as many devs on our platform.  It's that important and 
>> > I'll contribute what I can on this.
>> > * Responses for throttled responses.  Right now we return a 403 and add 
>> > some descriptive info that the dev ignores :)
>> > * Clock synchronization (covered by problem reporting somewhat..)
>> > * Signaling the correct authz URL to the client (currently using 
>> > xoauth_authorize_url)
>> > * Signaling the expiry time of the token to the client.
>> > * Explicit token invalidation endpoints
>> > * Signaling the client when a user 'declines/cancels' an authz request.
>> >
>> > I'll try to contribute to the process as my limited time allows.
>> >
>> > In any case, congrats for moving forward on this.
>> >
>> > </hat>
>> >
>> > On Mar 24, 2010, at 10:11 AM, Blaine Cook wrote:
>> >
>> >> <chair hat>
>> >>
>> >> Hi all,
>> >>
>> >> Hannes and I have discussed the results of the WG meeting, and while
>> >> there was a lot of good discussion that happened, it seems like the
>> >> next step for the WG is to buckle down and produce a stable draft that
>> >> incorporates all the various proposals, in particular WRAP and OAuth
>> >> 1.0a. David has done an excellent job with his draft, and I'd like to
>> >> see us follow through on that work quickly and effectively to offer
>> >> the various organizations who are looking to ship interoperable
>> >> solutions something to base their work on.
>> >>
>> >> To that end, we'd like to see Eran take up the editing work over the next 
>> >> week.
>> >>
>> >> That work should be premised on re-incorporating the features from
>> >> WRAP that were removed in David's great start at a unified spec.
>> >> Dick's contributions have been invaluable towards reconciling the gap
>> >> between HMAC-based approaches and expiring bearer token approaches,
>> >> and we'd like to see that work be properly credited and evaluated
>> >> along with all of the other aspects of OAuth 1.0a and WRAP.
>> >>
>> >> Our hope is that soon, certainly well before the next OAuth WG meeting
>> >> (virtual or otherwise), we'll have a new RFC-style document that
>> >> satisfies the needs of everyone in the community.
>> >>
>> >> Blaine and Hannes.
>> >>
>> >> </chair hat>
>> >> _______________________________________________
>> >> OAuth mailing list
>> >> OAuth@ietf.org
>> >> https://www.ietf.org/mailman/listinfo/oauth
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to