On Tue, Jun 7, 2011 at 4:59 PM, Paul E. Jones <pau...@packetizer.com> wrote:
> I fully agree with you that using TLS is usually preferred.  That said, we 
> encounter situations where there were a large number of client/server 
> interactions and the data conveyed is not confidential information in any 
> way.  Using TLS can significantly decreases server performance, particularly 
> when there are a number of separate connections that are established and 
> broken.
>
> So, we were trying to find a non-TLS solution that still provides a way to 
> ensure the server can identify the user and that both can verify that data 
> has not been tampered in flight.  (It would still be preferred to establish 
> security relations with TLS, though we were open to other solutions.)

I don't see the point of having a MAC instead of a cookie for HTTP
requests sent without TLS, not unless you cover enough of the request
(and response).  Of course, you'll want two different cookies -- one
for HTTP and one for HTTPS.

I think you've just convinced me that this MAC adds no value whatsoever.

Nico
--
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to