There is no way I'm going to allow not signing the request URI and any query 
parameters. That leaves just the body...

EHL

> -----Original Message-----
> From: Skylar Woodward [mailto:sky...@kiva.org]
> Sent: Monday, February 07, 2011 11:43 PM
> To: Eran Hammer-Lahav
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] draft-hammer-oauth-v2-mac-token-02
> 
> Here's a thought:
> 
>       signed_content="request,query,body"
> 
> If not included, it defaults to "request,query". It's non-breaking (except for
> the implied removal of bodyhash), allows for either body or query content to
> be omitted from the signature, and looks less ugly than bodyhash=true.  If
> you prefer, the value of this attribute could be one of a predefined string
> (request_query, request_query_body, request, etc.) rather than individual
> parsed elements.
> 
> On Feb 7, 2011, at 6:26 PM, Eran Hammer-Lahav wrote:
> 
> > Yeah...
> >
> > I struggled with that. There is no reason to include the body hash with the
> request other than to indicate a body hash is included in the normalized
> request string. It's just that an attribute like 'bodyhash=true' is so ugly...
> >
> > I'm still thinking about this.
> >
> > EHL
> >
> >> -----Original Message-----
> >> From: Skylar Woodward [mailto:sky...@kiva.org]
> >> Sent: Monday, February 07, 2011 9:25 AM
> >> To: Eran Hammer-Lahav; OAuth WG
> >> Subject: Re: [OAUTH-WG] draft-hammer-oauth-v2-mac-token-02
> >>
> >> On body-hash...
> >>
> >> Having completed a trial implementation, it seems redundant, and
> >> potentially problematic, to include the body-hash in the
> >> Authentication header. The danger is that implementors may neglect to
> >> recalculate the hash themselves, reusing the value (even if
> >> incorrect) provided by the client. Why not just require the provider
> >> to calculate this and validate it by comparing the final signature?
> >> This way it's clearer for everyone what the expectations are in validating
> the signature.
> >>
> >> I propose either a flag (eg, usebodyhash="1") or an algorithm
> >> (bodyhashalgorithm="sha1"). If this parameter was provided, the
> >> correct hash would be added to the base string for signing. If
> >> omitted (or set false?) then an empty string is used for base string
> element #4.
> >>
> >>
> >> On including parameters for signing...
> >>
> >> I'd retract my suggestion that we'd include parameter-hash in the header.
> >> Instead, I would suggest making parameters optional in calculating
> >> the signature using a flag as with bodyhash. Providers could require
> >> including parameters if so desired. Parameters could be included as
> >> currently defined, or with a hash method similar to entity-body
> >> (which I find both simpler and more congruent).
> >>
> >> Again, the goal in making query parameters optional is to allow
> >> providers to make signature calculation as simple as possible for
> >> clients (so much as it is in line with the security requirements of
> >> the provider) and avoid complexities in implementation such as those that
> tripped up OAuth 1.
> >>
> >>
> >>
> >> On Jan 22, 2011, at 2:09 AM, Eran Hammer-Lahav wrote:
> >>
> >>> http://tools.ietf.org/html/draft-hammer-oauth-v2-mac-token-02
> >>>
> >>> New version includes the following changes:
> >>>
> >>>   o  Added body-hash support.
> >>>   o  Updated OAuth 2.0 reference to -12 and added token type
> >>> registration
> >> template.
> >>>   o  Removed error and error URI attributes (codes were just a
> >>> duplication
> >> of the HTTP status codes).
> >>>
> >>> Feedback would be greatly appreciated.
> >>>
> >>> EHL
> >>>
> >>>
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to