On Tue, Jun 7, 2011 at 4:59 PM, Paul E. Jones <pau...@packetizer.com> wrote: > I fully agree with you that using TLS is usually preferred. That said, we > encounter situations where there were a large number of client/server > interactions and the data conveyed is not confidential information in any > way. Using TLS can significantly decreases server performance, particularly > when there are a number of separate connections that are established and > broken. > > So, we were trying to find a non-TLS solution that still provides a way to > ensure the server can identify the user and that both can verify that data > has not been tampered in flight. (It would still be preferred to establish > security relations with TLS, though we were open to other solutions.)
I don't see the point of having a MAC instead of a cookie for HTTP requests sent without TLS, not unless you cover enough of the request (and response). Of course, you'll want two different cookies -- one for HTTP and one for HTTPS. I think you've just convinced me that this MAC adds no value whatsoever. Nico -- _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth