These could be solved and the whole normalization process thrown out by
just restating the string that you signed. It's then up to the server to
decide if they want to reparse and validate the request or not, but it
gets around url rewriter problems, which I've had definite trouble with
in my deployments.

Most of the signature problems I've seen in OAuth1.0 stem from the fact
that the client and the server effectively have to guess the base string
that the other signed by rebuilding it based on the best information
that they have. This is all well and good when you've got a custom
internet-facing endpoint and you have complete control over the whole
stack, but URL rewriters (for example) wreak havoc with these
assumptions. For instance, in my Elgg implementation of OAuth, I had to
put in workaround code to tell it to ignore some extra input variables
that Elgg sets on all requests. By the time it gets to my code, I have
no way of telling if the system injected them or if they're in the
original URI request at all, so I have to make my best guess and go with
that.

Yes, it inflates the request size to copy the base string over
explicitly, but that's a particular cost I'd be willing to pay for such
explicit clarity.

 -- Justin

On Mon, 2011-05-09 at 22:15 -0400, Peter Wolanin wrote:
> I think it's perfectly reasonably - if inside the service you need to
> rewrite the URI, it's not hard to preserve the original as an extra
> header or ENV.
> 
> We have a HMAC-sha1 implementation in production where the load
> balancer (nginx) may rewrite the URI before passing it to a java app
> that authenticates the request, so the original URI is set as a new
> header and used to calculate the HMAC in java.
> 
> -Peter
> 
> On Mon, Apr 18, 2011 at 3:26 PM, Eran Hammer-Lahav <e...@hueniverse.com> 
> wrote:
> > I would like to drop all the request URI parameters normalization logic and
> > just use the raw request URI instead. A year ago during the discussion on my
> > Token authentication scheme (which had that behavior specified), some people
> > raised the issue that access to the raw request URI isn’t always possible on
> > the client or server. This feels like a limitation that is no longer a real
> > problem for any modern web development environment.
> >
> >
> >
> > If you know of actual deployment issues with using the raw request URI
> > instead of the parameter parsing and sorting voodoo, please let me know.
> > Otherwise, the next draft will drop that entire section.
> >
> >
> >
> > EHL
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> >
> 
> 
> 


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to