No change then. But the security considerations section must reflect this. EHL
> -----Original Message----- > From: Justin Richer [mailto:jric...@mitre.org] > Sent: Monday, March 28, 2011 10:05 AM > To: Eran Hammer-Lahav > Cc: Phil Hunt; OAuth WG > Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt > > What about non-http return uri's, or client-localhost, such as > > someapp://app/?code=foo > > http://localhost:87345/?code=foo > > HTTPS makes sense when you're talking between two web servers, but it > seems to fall apart otherwise. I think SHOULD is appropriate here. > > -- Justin > > > On Fri, 2011-03-25 at 16:03 -0400, Eran Hammer-Lahav wrote: > > Unless someone has an objection, I'll make the change from SHOULD to > MUST. > > > > EHL > > > > > -----Original Message----- > > > From: Phil Hunt [mailto:phil.h...@oracle.com] > > > Sent: Friday, March 25, 2011 12:42 PM > > > To: Eran Hammer-Lahav > > > Cc: OAuth WG; Chuck & Mara Mortimore > > > Subject: Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-13.txt > > > > > > Regarding the message: http://www.ietf.org/mail- > > > archive/web/oauth/current/msg05762.html (sorry I somehow lost the > > > message in my email). > > > > > > This issue is theft of the authorization code during the redirect. > > > Authenticating the client is an important feature and goes a long > > > way, but it is not sufficient since in many cases, the > > > client_id/client_secret will likely be hard coded and relatively > > > easy to deduce (e.g. mobile client apps). Of course a strong client > > > authentication won't have this issue. This makes many consumer > > > situations very susceptible to an attack where the authorization code is > intercepted. > > > > > > For more information look at the SAML Artifact issues in section 6.5 > > > (specifically stolen artifact, replay, etc) of this document: > > > http://docs.oasis- > > > open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf > > > > > > There are a number of remediations suggested (small lifetime, single > > > use), but the foundational one is confidentiality of the exchange > > > (TLS). Hence the recommendation that the return of an authorization > > > code be kept secure with a MUST for TLS. > > > > > > Phil > > > phil.h...@oracle.com > > > > > > > > > > > > > > > On 2011-03-24, at 7:22 PM, Chuck Mortimore wrote: > > > > > > > > > > > On Mar 24, 2011, at 6:36 PM, "Eran Hammer-Lahav" > > > <e...@hueniverse.com> wrote: > > > > > > > >> > > > >>> -----Original Message----- > > > >>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On > > > >>> Behalf Of Chuck Mortimore > > > >>> Sent: Monday, March 14, 2011 6:10 PM > > > >> > > > >>> 1) I'd vote for dropping the following from 1.4.2. In turn I'd > > > >>> discuss > some > > > of > > > >>> the security considerations, such as difficulty of protecting a > > > >>> client_secret in almost all use-cases of this profile. > > > >>> > > > >>> "Implicit grants improve the responsiveness and efficiency of some > > > >>> clients (such as a client implemented as an in-browser application) > > > >>> since it reduces the number of round trips required to obtain an > > > >>> access token." > > > >> > > > >> Why drop it? What about it isn't accurate? > > > > > > > > It's accurate, but my opinion is it sends the wrong message. It's > > > > clearly > the > > > less secure of the response types. By positioning it as the most > > > performant people may find that attractive and make the wrong security > decision. > > > > > > > > > > > >> > > > >>> 2) Section 2.1, we should MUST TLS even for Authorization Code. > > > >> > > > >> Why? What's the attack vector? > > > > > > > > See Phils comment on past experience with artifact bindings. Spec > > > > should > > > default for security always on, and let deployments that don't want > > > to use HTTPs simply be non-conformant. > > > > > > > >> > > > >>> 3) Section 4.1.3 - not clear to me why redirect_uri is REQUIRED > > > >>> since in 4.1.1 it's "REQUIRED unless" > > > >> > > > >> The client should always confirm where the code was sent to. It > > > >> can omit > > > the redirection is one was provided but should tell the server where > > > it went to. This is more consistent on the verification side, but if > > > the original flow designers want to chime in (Dick, Brian, etc.?), I'm > > > open > to change this. > > > >> > > > >>> 4) Section 4.2.2 - when did we drop refresh_token? I assume this > goes > > > >>> back to disagreement on how best to handle native clients. I'd > > > >>> prefer it to simply reference 5.1 and leave what is issued up to > > > >>> the security profile of the particular deployment as to what is > > > >>> issued. > > > >> > > > >> -08 June 2010. > > > >> > > > >> This has been decided for a long time. I'm not eager to change it. > > > > > > > > Thanks - I can live with it. Unfortunately we still seem to be > > > > fragmenting on > > > the native client approach. Good topic for IIW I suspect > > > > > > > > -cmort > > > > > > > >> > > > >> EHL > > > >> > > > >> > > > > _______________________________________________ > > > > OAuth mailing list > > > > OAuth@ietf.org > > > > https://www.ietf.org/mailman/listinfo/oauth > > > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth