[Trimming the CC to just the OAuth WG.]

On Wed, Jun 8, 2011 at 8:53 PM, Robert Sayre <say...@gmail.com> wrote:
> On Wed, Jun 8, 2011 at 10:32 AM, Eran Hammer-Lahav <e...@hueniverse.com> 
> wrote:
>>> -----Original Message-----
>>> From: Tim [mailto:tim-proje...@sentinelchicken.org]
>>> Sent: Wednesday, June 08, 2011 8:32 AM
>>
>>> At risk of repeating myself: Why not just adapt HTTP Digest for OAuth?
>>> That is not just rhetorical, it is a genuine question.  What is HTTP Digest
>>> missing that you need?
>
> Digest has a bunch of problems. See this document
>
> http://tools.ietf.org/html/draft-ietf-httpbis-security-properties-05#section-2.2.2
>
> for a short tour of them.
>
>> The latest version of this draft:
>>
>> http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-00
>>
>> Includes a Design Constraints section which tries to explain this:
>>
>>   Unlike the HTTP Digest authentication scheme, this mechanism does not
>>   require interacting with the server to prevent replay attacks.
>>   Instead, the client provides both a nonce and a timestamp, which the
>>   server can use to prevent replay attacks using a bounded amount of
>>   storage.
>
> It's not obvious to me why the mechanism in the draft is better than a
> server-generated nonce and/or opaque string, as found in Digest.

Maybe I'm not completely clear how a mechanism with a server-supplied
nonce would work.  How do you avoid having to make a round-trip to the
server for every request?

> The mechanism in the draft can be bitten by clock skew problems, and
> having the server send a nonce doesn't necessarily require an
> unbounded amount of storage. I'm sorry if I've missed previous
> discussion on this issue, but could someone explain?

I think we've handled most of the clock skew problems by using
relative time rather than absolute time.  I'd certainly consider a
mechanism with a server-supplied nonce if you have one in mind.

>>   Also unlike Digest, this mechanism is not intended to
>>   protect the user's password itself because the client and server both
>>   have access to the key material in the clear.  Instead, servers
>>   should issue a short-lived derivative credential for this mechanism
>>   during the initial TLS setup phase.
>
> That makes sense. I'm having trouble reconciling the Design
> Constraints section (1.1) with the section on Entropy of MAC Keys
> (7.5). How long are these keys supposed to be around in practice?

I'd recommend using a MAC key of roughly the same length as the block
size of the MAC.  For example, for hmac-sha-1, I'd use 20 bytes.

> Also, Adam wrote "this mechanism is for folks who cannot or will not
> deploy TLS". How does that statement fit here?

Often the issues surrounding deploying TLS revolve around third-party
integrations, such as advertisements.  This mechanism side-steps those
issues, albeit providing less security than TLS.

Adam
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to