Agree with Torsten -- I would hate for us to repeat the
"anonymous/anonymous" thing that Google implemented for OAuth1.

 -- Justin

On Thu, 2011-06-16 at 15:42 -0400, Torsten Lodderstedt wrote:
> -1 making client authentication required at the access token endpoint
> 
> Client authentication is useful in some situations to raise the security 
> level. But requiring it will either keep out native apps or force there 
> developers to use useless/insecure secrets (I would call this "pseudo 
> security").
> 
> +1 making the client authentication required for certain client types.
> 
> for a definition of client types and there respective security 
> properties see http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-10
> 
> In my opinion, the security considerations section already gives a clear 
> guideline when client authentication should be used and when the authz 
> server should rely on other mechanims.
> 
> regards,
> Torsten.
> 
> Am 16.06.2011 17:08, schrieb Thomas Hardjono:
> > Apologies for the late response.
> >
> >
> >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> >> Of Eran Hammer-Lahav
> >> Sent: Wednesday, June 15, 2011 1:27 PM
> >> To: OAuth WG
> >> Subject: [OAUTH-WG] Client authentication requirement
> >>
> >> Client authentication has been one of the main problem areas in OAuth
> >> 1.0 and 2.0 does nothing to resolve it (arguably, it makes it more
> >> confusing).
> >>
> >> Because of the desire to allow any client type in any deployment
> >> environment, we ended up with a barely defined client authentication
> >> model. We offer password-based client authentication using HTTP Basic
> >> (and an alternative parameter), but leave it optional.
> > I would to suggest that perhaps we need a better definition of the "client" 
> > by way of identifying one or two (or three) types of clients and listing 
> > their respective security properties/capabilities. For example, if a client 
> > can/cannot keep cryptographic keys (secrets), then say so. Similarly, if a 
> > client can do TLS but cannot do proper X509 processing, then list this, 
> > etc. etc.
> >
> > In this way developers can at least map (in the minds) which client type 
> > matches their deployment scenario, based on the best-match capabilities 
> > list.
> >
> >
> >> I would like to go back to requiring client authentication for the
> >> access token endpoint, using HTTP Basic or other schemes. To leave the
> >> door open for clients incapable of authenticating to use the endpoint,
> >> we will add a security consideration section discussing the
> >> ramifications of using the access token endpoint without client
> >> authentication.
> >>
> >> This suggestions is linked to the topic of refresh tokens which I'll
> >> post separately.
> >>
> >> EHL
> > +1 agree that client authentication (to access token endpoint) should be 
> > made a requirement.
> >
> > /thomas/
> >
> >
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to