Eran,
I still don't understand, sorry.
Here is the scenario: When a principal that impersonates the resource
server gets a token (already signed and ready to go, of course) it can
present it to the real resource server and get access to resources.
This is what I thought Torsten meant by "token abuse", and what, for
sure, I meant. I don't see how this threat is addressed. I do think it
must be addressed.
The simplest thing, I believe, is always to require server
authentication. (This will cover the case of the counterfeit servers,
but it would not cover any case in which the token is intercepted or
stolen. For the latter case client authentication must be nundatory.)
Igor
Eran Hammer-Lahav wrote:
-----Original Message-----
From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net]
Sent: Monday, January 10, 2011 1:08 PM
To: Eran Hammer-Lahav
Cc: OAuth WG
Subject: Re: [OAUTH-WG] OAuth MAC token type draft
Eran,
- Authentication schemes
You propose to use the authentication scheme name "OAuth2" for the
WWW-Authenticate header but another scheme name "MAC" for the
authorization header. I've never seen such an asymmetric approach before.
Don't you think people get confused about that? Moreover, the bearer draft
also uses the name "OAuth2" in the authorization header. Why this
difference? Why don't you just add some parameters to the "OAuth2"
scheme?
This was proposed by James Manger and discussed earlier on the list. I'll let
James explain it.
- 6.3. Spoofing by Counterfeit Servers
The protocol does not support server authentication but it should prevent
token abuse by the Counterfeit server, shouldn't it?
It does because the token secret is never sent.
EHL
regards,
Torsten.
Am 09.01.2011 18:18, schrieb Eran Hammer-Lahav:
http://tools.ietf.org/html/draft-hammer-oauth-v2-mac-token
Feedback appreciated, especially for section 3.2.1 (the new normalized
request string) which is an attempt to take the HMAC-SHA1 flow from 1.0a
and simplify it.
No body signature support yet, but will add that in -01.
EHL
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth