On Oct 27, 2010, at 8:09 PM, Freeman, Tim wrote:

> The questions currently interesting to me about use cases are:
> 
> * The only use cases that made sense to me about signatures used them for 
> auditability, where they enabled blame to be properly placed after 
> information leaked to the wrong people.  People were proposing use cases that 
> claimed that signatures improved privacy, that is, the ability to keep the 
> information out of the hands of the wrong people.  So far as I know all use 
> cases where signatures improved privacy seemed to fall apart after a few 
> minutes inspection.  Do we agree that signatures improve auditability but not 
> privacy, or does someone still believe in a use case where signatures improve 
> privacy?

For Kiva, our use case would be something along the lines of "secondary 
protection mechanism."   To access certain types of data we want client 
authentication (ie, identification) to request and use tokens. The 
specification w/o signatures depends only on SSL to protect secrets, passwords, 
and tokens and thus client identity. By requesting signed requests we have a 
second mechanism on top of SSL to protect secrets in the event that request is 
leaked to an improper endpoint - as secrets are never sent over the wire. To 
reuse some of Zachary's language, we're combining two solutions to solve one 
problem.

We agree of course, that SSL, properly used - with no human error, is enough to 
secure the secrets between the two parties. However, secondary protection 
mechanisms are popular in the financial world - site keys, RSA fobs, shared 
secrets, IP-filtering, SMS-issued pins. Though any one mechanism is enough, a 
second mechanism makes things even more difficult for clever attackers (and 
careless developers). Given the options available to us, shared secrets 
confirmed though the use of signatures offer the most attractive balance of 
protection vs. ease of deployment (many of our partners are in developing 
countries which offer logistical and technological challenges to other methods).

That said, I don't advocate requiring signatures as a part of the spec (our 
needs/preferences are possibly too unique?), but I would like them included. 
Thus, if some non-political use cases drive signatures to be added, we'd 
certainly like to adopt the common standard. In lack of a published standard 
for signatures, we'll add our own layer additional layers of protection onto 
the spec as others have done. (OAuth 1.0a signatures suit us in lack of a 
simpler new standard for 2.0, especially given the amount of published works 
related to doing them correctly.)

skylar

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to