For #1: Does the use of plain HTTP to talk to protected resources provide significant value when using an AS that requires HTTPS? Or am I misunderstanding, and this use case would also include new modes for non-TLS communication with the AS?
For #2: Would the signature protection just cover HTTP parameters, or would it extend to covering any request data, such as a PUT binary file? Would the integrity protection only cover requests, or would you also have integrity protection of the response? -DW On Aug 9, 2012, at 1:37 PM, Justin Richer <jric...@mitre.org> wrote: > Use case #2: signature protection over plain HTTP parameters > > MAC gives us message-level signing in a way that doesn't require all the > parameters to be packed into an extra structure, like JWT/SAML do. TLS gives > no application-layer verification of integrity of parameters, nor does it > give you the ability to know who presented those parameters (unless you're > doing mutual TLS, which nobody does). MAC gives you a fairly simple way to > protect all parameters on a call to the resource server while still keeping > all of those parameters in their native HTTP forms. > > > Use case #3: generic signed HTTP fetch (not directly addressed by MAC spec as > of today) > > Sometimes you want to create a URL with one service, fix all of the > parameters in that URL, and protect those parameters with a signature. Then > that URL can be passed to an untrusted service who cannot modify any portion > of it. Nor can they re-use the signature portion to protect different > parameters. We do this today with a 2-legged OAuth signature across a service > URL. The "Client" generates the signed URLs and passes them to a user agent > which actually does the fetch to the service. > > > -- Justin > > On 08/09/2012 02:43 PM, William Mills wrote: >> OK, I'll play and start documenting the use cases. >> >> Use case #1: Secure authentication in plain text connections: >> >> Some applications need a secure form authorization, but do not want or need >> the overhead of encrypted connections. HTTP cookies and their ilk are >> replayable credentials and do not satisfy this need. the MAC scheme using >> signed HTTP authorization credentials offer the capability to securely >> authorize a transaction, can offer integrity protection on all or part of an >> HTTP request, and can provide replay protection. >> >> -bill >> >> From: John Bradley <ve7...@ve7jtb.com> >> To: William Mills <wmills_92...@yahoo.com> >> Cc: Dick Hardt <dick.ha...@gmail.com>; "oauth@ietf.org" <oauth@ietf.org> >> Sent: Thursday, August 9, 2012 11:26 AM >> Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01 >> >> In Vancouver the question was asked about the future of the MAC spec due to >> it no linger having a editor. >> >> The Chair and AD indicated a desire to have a document on the use-cases we >> are trying to address before deciding on progressing MAC or starting a new >> document. >> >> Phil Hunt is going to put together a summery of the Vancouver discussion and >> we are going to work on the use-case/problem description document ASAP. >> >> People are welcome to contribute to the use-case document. >> >> Part of the problem with MAC has been that people could never agree on what >> it was protecting against. >> >> I think there is general agreement that one or more proof mechanisms are >> required for access tokens. >> Security for the token endpoint also cannot be ignored. >> >> >> John B. >> >> On 2012-08-09, at 1:53 PM, William Mills wrote: >> >>> MAC fixes the signing problems encountered in OAuth 1.0a, yes there are >>> libraries out there for OAuth 1.0a. MAC fits in to the OAuth 2 auth model >>> and will provide for a single codepath for sites that want to use both >>> Bearer and MAC. >>> >>> From: Dick Hardt <dick.ha...@gmail.com> >>> To: William Mills <wmills_92...@yahoo.com> >>> Cc: "oauth@ietf.org" <oauth@ietf.org> >>> Sent: Thursday, August 9, 2012 10:27 AM >>> Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01 >>> >>> >>> On Aug 9, 2012, at 9:52 AM, William Mills wrote: >>> >>>> I find the idea of starting from scratch frustrating. MAC solves a set of >>>> specific problems and has a well defined use case. It's symmetric key >>>> based which doesn't work for some folks, and the question is do we try to >>>> develop something that supports both PK and SK, or finish the SK use case >>>> and then work on a PK based draft. >>>> >>>> I think it's better to leave them separate and finish out MAC which is >>>> *VERY CLOSE* to being done. >>> >>> Who is interested in MAC? People can use OAuth 1.0 if they prefer that >>> model. >>> >>> For my projects, I prefer the flexibility of a signed or encrypted JWT if I >>> need holder of key. >>> >>> Just my $.02 >>> >>> -- Dick >>> >>> >>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >> >> >> >> >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth