On Tue, Apr 6, 2010 at 12:39 PM, Torsten Lodderstedt <
tors...@lodderstedt.net> wrote:

> Hi Blaine,
>
>  My take on this is that MUSTs MAY be ignored. ;-)
>>
>> To echo John's concerns here, the worst-case scenario is that client
>> libraries implement "no SSL present" as a gentle reminder warning with
>> a flag (possibly the default) to disable those HTTPS warnings. Clients
>>
>>
> I don't understand your objections. If a resource provider decides to
> support HTTPS only, no client w/o HTTPS support can connect thus
> circumventing this policy.


It is possible to 'support' HTTPS but not check certificates.  Would that be
acceptable to servers supporting HTTPS only?  (No.)


>
>  that behave in that way should be flagged as non-compliant and
>> publicly humiliated.
>>
> agreed :-)
>
>  If we just write SHOULD for HTTPS/secure channel
>> support, then those clients are acting "properly."
>>
>>
> Why not explicitly state in the spec that HTTPS support is a MUST HAVE for
> libraries?


This would also mirror the existing de facto situation for web browsers, all
of which support HTTPS on demand.


>
>  If WRAP is aiming to just be a replacement for Cookie auth, then why
>> don't we just add a redirection profile for issuing cookies? They work
>> now, refreshing them is built-in, etc, etc. Instead, what we're trying
>> to do is build something better, more secure, and more aligned with
>> the sorts of behaviours we see and want to encourage on the web.
>>
>>
> There are a variety of deployment scenarios for OAuth2 (e.g. internet
> small/large, intranet) as well as replay countermeasures (encryption,
> short-living tokens, restricted permissions, ...). Can we really
> anticipate/consider all of them and select HTTPS as the only solution? Even
> the spec for BASIC-Authentication (http://www.ietf.org/rfc/rfc2617.txt)
> does not force a certain mean of transport protection. It just recommends to
> consider security enhancements:
>
> ---- from http://www.ietf.org/rfc/rfc2617.txt
>
>   The Basic authentication scheme is not a secure method of user
>   authentication, nor does it in any way protect the entity, which is
>   transmitted in cleartext across the physical network used as the
>   carrier. HTTP does not prevent additional authentication schemes and
>   encryption mechanisms from being employed to increase security or the
>   addition of enhancements (such as schemes to use one-time passwords)
>   to Basic authentication.
>
>   The most serious flaw in Basic authentication is that it results in
>   the essentially cleartext transmission of the user's password over
>   the physical network. It is this problem which Digest Authentication
>   attempts to address.
>
>   Because Basic authentication involves the cleartext transmission of
>   passwords it SHOULD NOT be used (without enhancements) to protect
>   sensitive or valuable information.
>
> ----
> HTTPS is state of the art and should from in my opinion be the
> _recommended_ option. This leaves implementors enough freedom to use other
> security measures where neccessary/sufficient/applicable.
>
> regards,
> Torsten.
>
>  b.
>>
>> On 6 April 2010 11:54, John Panzer<jpan...@google.com>  wrote:
>>
>>
>>> My $.02:  SHOULD is okay, as long as all clients MUST support HTTPS.
>>>  E.g.,
>>> SHOULD for service providers, MUST support for clients.
>>> Otherwise, you will end up with clients that don't support https or don't
>>> do
>>> it properly.  (E.g., don't bother to check certificates.)  Which hurts
>>> security for service providers that do want SSL.
>>>
>>> On Tue, Apr 6, 2010 at 11:48 AM, Torsten Lodderstedt
>>> <tors...@lodderstedt.net>  wrote:
>>>
>>>
>>>> +1  for the standard should recommand HTTPS or comparable means of
>>>> transport protection but not require it.
>>>>
>>>> This requirement does not result in any benefit for the specification by
>>>> itself (e.g. simplification). Therefore, the decision to use HTTPS or
>>>> any
>>>> other means should be up to the service providers based on its security
>>>> considerations.
>>>>
>>>> One of the biggest differences between OAuth2 and WRAP is that OAuth2
>>>> requires that Protected Resources be accessed using HTTPS if no
>>>> signature is
>>>> being used. Bullet Point #2 in Section 1.2 says:
>>>>
>>>>    4.  Don't allow bearer tokens without either SSL and/or signatures.
>>>>        While some providers may offer this ability, they should be out
>>>>        of spec for doing so though technically it won't break the flows.
>>>>
>>>> While I personally think that requiring SSL is a fantastic idea, and
>>>> it’s
>>>> very hard for me to argue against it, however....
>>>>
>>>> One of the goals for WRAP was to define a standard AuthZ interface for
>>>> APIs which matched what we currently have on the Web. WRAP protected
>>>> APIs
>>>> are intended to be a replacement for screen scraping.
>>>>
>>>> On the web, almost all websites implement Cookie Auth. Specifically,
>>>> when
>>>> you log into a website, the browser is issued a bearer token, called a
>>>> Cookie, and the browser is able to access Protected Resources by using
>>>> the
>>>> Cookie as the credential.
>>>>
>>>> The WRAP access token is intended to be a direct replacement for the
>>>> HTTP
>>>> Cookie. A client should be able to present its bearer token (a WRAP
>>>> Access
>>>> Token or an HTTP Cookie) without having to sign the request.
>>>>
>>>> While I certainly think that requiring SSL would be a huge improvement
>>>> in
>>>> internet security, HTTP does not require SSL, and since WRAP was
>>>> intended to
>>>> be a replacement for HTTP Cookie Auth, then OAuth2 should also not
>>>> require
>>>> HTTPS.
>>>>
>>>> Yes, dropping the SSL requirement isn’t optimal, but again the intent
>>>> with
>>>> WRAP was to replace HTTP Cookie auth, and it should be up to the service
>>>> provider to require HTTPS when applicable.
>>>>
>>>> Allen
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>>
>>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>
>>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to