> -----Original Message-----
> From: Peter Wolanin [mailto:peter.wola...@acquia.com]
> Sent: Wednesday, May 04, 2011 8:54 PM
> To: Eran Hammer-Lahav
> Cc: oauth@ietf.org
> Subject: Re: OAuth v2 Mac token spec
> 
> Can you give an example of a setup where the hash cannot be calculated?

Large file upload which is read from disk as it is being transmitted.

> I think to be secure, the question of whether or not the body hash must be
> included in the request should be specified in 2. Issuing MAC Credentials
> 
> For example, as an added aspect of the algorithm, or a separate parameter.
> Essentially something like bodyhash: required, versus
> bodyhash: optional?  Obviously it should be omitted if there is no body (e.g.
> for a GET request).  By including it in #2, it's certainly clear that some 
> clients
> that cannot generate the body hash could not authenticate with any servers
> that require it, but at least this would be known in advance.

We can allow the server to indicate its requirements, but that adds more 
complexity and requires a round trip (pre-fetch or failed) to determine. I am 
not a fan of this approach.

EHL
 
> As a side note, we currently interact with or maintain several services which
> use HMAC auth and in one case (a spam blocking service) the inclusion of the
> message content in the HMAC (similar to using the body hash) is omitted in
> favor of simply doing a HMAC over the URL nonce and time since the
> consequence of a MITM attack is relatively unimportant.
> 
> -Peter
> On Mon, Apr 11, 2011 at 7:21 PM, Eran Hammer-Lahav
> <e...@hueniverse.com> wrote:
> >
> >
> >> -----Original Message-----
> >> From: Peter Wolanin [mailto:peter.wola...@acquia.com]
> >> Sent: Sunday, February 27, 2011 6:59 AM
> >
> >> I was a little unclear in the spec whether the client can choose not
> >> to include the body hash in the signature.  I'd hope that the spec
> >> ends up clearly requiring the client to always send it even if a
> >> given server may or may not validate the body hash.  Our current
> >> implementations include the body directly in the HMAC calculation,
> >> but considering your current draft I appreciate the extra flexibility
> >> provided by signing over the body hash rather than the body itself.
> >
> > Yes, we need to figure out when the client is required to include it. The
> issue is that in some deployments, it is not possible for the client to 
> calculate
> this value at the point where the header is set.
> >
> >> A downside to the MAC spec for OAuth2 is, as far as I can see, you
> >> have to send your client secret in the request if you ever need to
> >> refresh your OAuth token?  I see in some recent messages liek
> >> http://www.ietf.org/mail- archive/web/oauth/current/msg05214.html
> >> some discussion that suggests I'm mistaken?
> >
> > Nope. Refresh does not require the access token or its secret. Just the
> refresh code.
> >
> >> Also, as stated in section 7.3, there seems to be no provision for
> >> ensuring response authenticity except relying on SSL. We have been
> >> using protocols that include in the response an HMAC of the response
> >> body calculated to include the client-supplied nonce.  Obviously one
> >> could add such a response header without breaking the protocol, but
> >> I'd like to see an option in the MAC credentials an added field that
> >> specifies whether the server is expected to provide such a response
> >> HMAC and a standardized name and construction for such a response
> header.
> >
> > I will add this later, once the current bits are stable.
> >
> > EHL
> >
> 
> 
> 
> --
> Peter M. Wolanin, Ph.D.      : Momentum Specialist,  Acquia. Inc.
> peter.wola...@acquia.com : 978-296-5247
> 
> "Get a free, hosted Drupal 7 site: http://www.drupalgardens.com";
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to