Mike,

On 7 Sep 2011, at 21:17, Michael Thomas wrote:

> On 09/07/2011 12:56 PM, Kristoph wrote:
>> Mike,
>> 
>> I am an implementer of this specification. I am struggling to understand 
>> what it is you are trying to communicate.
>> 
>> The only thing I can discern is that you believe there is a large cadre of 
>> software architects / developers who you think have the skill to read and 
>> understand this specification, design and implement an OAuth 2.0 server, and 
>> yet not understand that a rogue embedded UA would compromise the end users 
>> credentials. Is that basically your concern?
>>   
> 
> I think that the fine point of a rogue embedded UA will be lost on
> people, yes. Especially those who are specing out the higher level
> authentication service deployment.

I've been observing this thread as well as the OAuth mailing list without 
participating for some time and I think what you write above gets to the heart 
of the matter.

I have some sympathy for the issue you are trying to raise but it is a common 
issue across many security protocols and the document to discuss it in is not 
the protocol specification which (IME in IETF) is typically focussed on how to 
implement (inter-operably) the protocol itself, not on best practices for 
deploying an implementation of the protocol.

IMO articulating the concerns you have are best placed either in the "threats" 
document (which I will admit I have not read) or a separate informational 
document (or possibly a BCP if there is sufficient deployment experience).

Your original e-mail that started this thread was not targeted at a specific 
document and my interpretation is that some of the hostility you have 
experienced is due to a frustration that your request is seen as a potential 
obstacle to getting the protocol specification out the door because the issue 
you want to discuss is not directly related to how a developer might implement 
the protocol.

If I may be so bold, could I suggest that you propose some text that 
articulates the issue that you would like to see documented and then the group 
can assess that text on its merits and try to reach consensus on which 
document, if any, it is best placed to reside within.

At the risk of offending you or others, I would suggest that if you're not 
willing to propose text for whatever reason then I'd suggest we put an end to 
this thread as it is reminding me of this Dilbert cartoon: 
http://www.dilbert.com/2010-12-22/

Regards
Ben


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to