On 09/07/2011 10:22 AM, Phil Hunt wrote:
You should read the threat model document. This document has more editorial on 
these kinds of issues.

This seems reasonable to me, and thank you so much for departing
from what seems to be standard working group mode by dealing with
this like an adult.

It seems to me that there are some usability problems that while
not being unique to oauth, really aren't that much like what
we usually run into with on-the-wire protocols.  Documents in
the security area have typically not dealt with usability issues
even when, perhaps, they should, given their impact on how
secure a technology is in the field.  Getting that into a threat
model document sounds about right to me.

Melinda
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to