Dear Mr. Hammer-Lahav

regarding http://tools.ietf.org/html/draft-hammer-oauth-v2-mac-token-02

I was quite happy to find this, since I had overlooked it before and
it define the sort of robust HMAC-based auth we have been using for
our APIs in various forms, but has the advantage of being a standard
that if implemented would make our future implementations much more
standardized.

I was a little unclear in the spec whether the client can choose not
to include the body hash in the signature.  I'd hope that the spec
ends up clearly requiring the client to always send it even if a given
server may or may not validate the body hash.  Our current
implementations include the body directly in the HMAC calculation, but
considering your current draft I appreciate the extra flexibility
provided by signing over the body hash rather than the body itself.

A downside to the MAC spec for OAuth2 is, as far as I can see, you
have to send your client secret in the request if you ever need to
refresh your OAuth token?  I see in some recent messages liek
http://www.ietf.org/mail-archive/web/oauth/current/msg05214.html  some
discussion that suggests I'm mistaken?

Also, as stated in section 7.3, there seems to be no provision for
ensuring response authenticity except relying on SSL. We have been
using protocols that include in the response an HMAC of the response
body calculated to include the client-supplied nonce.  Obviously one
could add such a response header without breaking the protocol, but
I'd like to see an option in the MAC credentials an added field that
specifies whether the server is expected to provide such a response
HMAC and a standardized name and construction for such a response
header.

-Peter

--
Peter M. Wolanin, Ph.D.      : Momentum Specialist,  Acquia. Inc.
peter.wola...@acquia.com : 978-296-5247

"Get a free, hosted Drupal 7 site: http://www.drupalgardens.com";
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to