Perhaps it's enough if in the spec we make clear that we are also defining a 
scheme usable for other things.  I don't think that's quite spelled out.  Then 
other specs just refer to the specific section like we're pulling in the 
WWW-Authenticate part from another spec. 

> -----Original Message-----
> From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] 
> Sent: Thursday, July 01, 2010 11:42 AM
> To: Marius Scurtescu
> Cc: William Mills; Rob Richards; oauth@ietf.org
> Subject: RE: [OAUTH-WG] Versioning
> 
> It was and this approach was rejected by this group as 
> confusing. At this point, it's specification is so short, it 
> can live anywhere.
> 
> EHL
> 
> > -----Original Message-----
> > From: Marius Scurtescu [mailto:mscurte...@google.com]
> > Sent: Thursday, July 01, 2010 11:28 AM
> > To: Eran Hammer-Lahav
> > Cc: William Mills; Rob Richards; oauth@ietf.org
> > Subject: Re: [OAUTH-WG] Versioning
> > 
> > On Thu, Jul 1, 2010 at 11:19 AM, Eran Hammer-Lahav 
> > <e...@hueniverse.com> wrote:
> > > I think HTTP authentication schemes should be generally 
> useful. In 
> > > this
> > case, OAuth defines a few ways to obtain an token, and a 
> few ways to 
> > use a token with HTTP resources. What it doesn't do is say anything 
> > useful about the token itself, or implies that the tokens 
> are "OAuth 
> > tokens" (i.e. that the nature of the token is bound to the 
> OAuth protocol).
> > >
> > > I can envision use cases where someone wants to use 
> existing tokens
> > (obtained via other means than those provided by OAuth) to access 
> > protected resources. What about using a token as currently 
> defined is 
> > OAuth-specific?
> > >
> > > In other words, the scheme name is generic because OAuth 
> tokens are
> > generic and for the most part left undefined. Naming the 
> scheme OAuth 
> > implies that there is a link between the token properties 
> and how they 
> > are obtained, and the current protocol does not specify any 
> such link. 
> > The same applies to using HTTP Basic for client 
> credentials, not to log-in an end-user.
> > 
> > Sure, but then I think the "Token" scheme needs its own standalone 
> > spec and not be defined as part of the OAuth 2 spec.
> > 
> > Marius
> > 
> > >
> > > EHL
> > >
> > >> -----Original Message-----
> > >> From: William Mills [mailto:wmi...@yahoo-inc.com]
> > >> Sent: Thursday, July 01, 2010 11:08 AM
> > >> To: Eran Hammer-Lahav; Rob Richards; oauth@ietf.org
> > >> Subject: RE: [OAUTH-WG] Versioning
> > >>
> > >> Why is using the string "Token" better than "OAuth2"?  
> 1.0 used "Oauth".
> > >>
> > >>
> > >> If it's purely a question of aesthetics, I prefer 
> "Oauth_2" to "Token"
> > >> because I feel it's clearer and more descriptive.
> > >>
> > >> > -----Original Message-----
> > >> > From: Eran Hammer-Lahav [mailto:e...@hueniverse.com]
> > >> > Sent: Thursday, July 01, 2010 11:00 AM
> > >> > To: William Mills; Rob Richards; oauth@ietf.org
> > >> > Subject: RE: [OAUTH-WG] Versioning
> > >> >
> > >> > Why is a version better than a new scheme name? 
> Version is only 
> > >> > helpful when the protocol is practically the same with 
> some minor 
> > >> > changes, and if that is the case, extensibility alone 
> should be 
> > >> > enough.
> > >> >
> > >> > EHL
> > >> >
> > >> > > -----Original Message-----
> > >> > > From: William Mills [mailto:wmi...@yahoo-inc.com]
> > >> > > Sent: Thursday, July 01, 2010 10:49 AM
> > >> > > To: Eran Hammer-Lahav; Rob Richards; oauth@ietf.org
> > >> > > Subject: RE: [OAUTH-WG] Versioning
> > >> > >
> > >> > > My feeling on this is that versioning explicitly in the
> > >> > protocol adds
> > >> > > clarity and some small level of compatibility.  
> Different auth 
> > >> > > and token endpoints are easy, what's harder is supporting 
> > >> > > multiple protocols on the same protected resource.  
> It's on the 
> > >> > > protected resource I'd like to see some clearer protocol 
> > >> > > version spec
> > >> > so I'm not
> > >> > > having to figure out from the variable names which 
> protocol it is.
> > >> > >
> > >> > > > -----Original Message-----
> > >> > > > From: oauth-boun...@ietf.org 
> [mailto:oauth-boun...@ietf.org] 
> > >> > > > On Behalf Of Eran Hammer-Lahav
> > >> > > > Sent: Thursday, July 01, 2010 9:36 AM
> > >> > > > To: Rob Richards; OAuth WG (oauth@ietf.org)
> > >> > > > Subject: Re: [OAUTH-WG] Versioning
> > >> > > >
> > >> > > > Hi Rob,
> > >> > > >
> > >> > > > > -----Original Message-----
> > >> > > > > From: Rob Richards [mailto:rricha...@cdatazone.org]
> > >> > > > > Sent: Thursday, July 01, 2010 3:26 AM
> > >> > > > > To: OAuth WG (oauth@ietf.org); Eran Hammer-Lahav
> > >> > > > > Subject: Versioning
> > >> > > > >
> > >> > > > > Versioning is still something that needs to be addressed
> > >> > > > before being
> > >> > > > > being able to consider the draft core complete.
> > >> > > >
> > >> > > > Versioning rarely works because when you define it, you
> > >> > have no idea
> > >> > > > what the requirements will be for the next version. A
> > >> > good example
> > >> > > > is the OAuth 1.0 version parameter. When we worked 
> to revised 
> > >> > > > 1.0 into 1.0a, we had a long debate on changing 
> the protocol 
> > >> > > > version number. We had a hard time agreeing on what the 
> > >> > > > version meant and what was it a version
> > >> > > > *of*: the signature method or the token flow.
> > >> > > >
> > >> > > > If this protocol will require significant changes in the
> > >> > future that
> > >> > > > go beyond its extensibility support, such a new version
> > >> > will need to
> > >> > > > use different endpoints (token or end-user authorization) 
> > >> > > > and/or different HTTP authentication scheme.
> > >> > > >
> > >> > > > If you want to discuss versioning, you must provide your 
> > >> > > > requirements for such a feature, and clearly show how
> > >> > they are not
> > >> > > > served by the current extensibility proposal.
> > >> > > >
> > >> > > > > On this I'm still of the opinion that at the very
> > >> > minimum you will
> > >> > > > > need to require an oauth_version parameter for 
> the resource
> > >> > > > endpoints,
> > >> > > > > if not also for the others as well.
> > >> > > >
> > >> > > > I think the difficulty of differentiating a 1.0 from a
> > >> > 2.0 protected
> > >> > > > resource request is exaggerated. As said before, 
> you can tell 
> > >> > > > the difference based on the presence of other parameter 
> > >> > > > (oauth_signature_method), or by examining the 
> provided token 
> > >> > > > (assuming you issue different tokens for each version).
> > >> > The argument
> > >> > > > that a 2.0 request can also be a malformed 1.0 request is
> > >> > silly. I
> > >> > > > have yet to hear about that level of incompetence 
> for a 1.0 
> > >> > > > developer (and I've heard about a lot) - omitting every
> > >> > other required parameter.
> > >> > > >
> > >> > > > At most, I'm open to renaming the oauth_token parameter
> > >> > to something
> > >> > > > else (oauth_access_token, oauth.token, oauth-token,
> > >> > > > etc.) but I think even that is not needed.
> > >> > > >
> > >> > > > EHL
> > >> > > > _______________________________________________
> > >> > > > OAuth mailing list
> > >> > > > OAuth@ietf.org
> > >> > > > https://www.ietf.org/mailman/listinfo/oauth
> > >> > > >
> > >> >
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> > >
> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to