As far the authentication goes, what I had in mind was that the network provider could authenticate the end-user. Alternatively, an application (not necessarily the USIM) on the smart card could hold the secret and perform all cryptographic operations (what Thomas calls crypto-store). In either case, only the provider and the card would share the secret.

Igor

Torsten Lodderstedt wrote:
in my opinion, the problem with client authentication is more the secure distribution of the secret than the storage. How should a USIM help here?

regards,
Torsten.



Thomas Hardjono <hardj...@mit.edu> schrieb:

    Thanks Igor,

    If you bring smartcards into the picture, then it's a different
    ballgame :)

    If mobile phones are assumed to have smartcards (which is increasingly
    true today via USIMs), then OAUTH can assume that native apps (running
    on the phones) may have access to crypto-store. In this case the text
    in Section 9 of draft-16 would needs changes/clarifications.

    /thomas/


    __________

    > -----Original Message-----
    > From: Igor Faynberg [mailto:igor.faynb...@alcatel-lucent.com]
    > Sent: Thursday, June 02, 2011 3:31 PM
    > To: Thomas Hardjono
    > Cc: Torsten Lodderstedt; OAuth WG
    > Subject: Re: [OAUTH-WG] review of draft-ietf-oauth-v2-16
> > Actually, for the devices that use smart cards (mobile devices, in
    > particular), this assumption is quite appropriate.>

    > Igor
> > Thomas Hardjono wrote:
    > >> ....
    > > ...
    > >
    > > However, there is indeed the assumption in Kerberos/RFC4120 (and
    in
    > the original Needham-Schroeder protocol) that the "client" can keep
    > secrets.
    > >
    > > /thomas/
    > >
    > >
    > >
    > >
    ------------------------------------------------------------------------

    > >
    > >
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to