AS would still be required to be HTTPS as per the spec.

________________________________
 From: David Waite <da...@alkaline-solutions.com>
To: oauth@ietf.org 
Sent: Thursday, August 9, 2012 4:02 PM
Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
 

For #1:
Does the use of plain HTTP to talk to protected resources provide significant 
value when using an AS that requires HTTPS? Or am I misunderstanding, and this 
use case would also include new modes for non-TLS communication with the AS?

For #2:
Would the signature protection just cover HTTP parameters, or would it extend 
to covering any request data, such as a PUT binary file? Would the integrity 
protection only cover requests, or would you also have integrity protection of 
the response?

-DW

On Aug 9, 2012, at 1:37 PM, Justin Richer <jric...@mitre.org> wrote:

Use case #2: signature protection over plain HTTP parameters
>
>MAC gives us message-level signing in a way that doesn't require
      all the parameters to be packed into an extra structure, like
      JWT/SAML do. TLS gives no application-layer verification of
      integrity of parameters, nor does it give you the ability to know
      who presented those parameters (unless you're doing mutual TLS,
      which nobody does). MAC gives you a fairly simple way to protect
      all parameters on a call to the resource server while still
      keeping all of those parameters in their native HTTP forms.
>
>
>Use case #3: generic signed HTTP fetch (not directly addressed by
      MAC spec as of today)
>
>Sometimes you want to create a URL with one service, fix all of
      the parameters in that URL, and protect those parameters with a
      signature. Then that URL can be passed to an untrusted service who
      cannot modify any portion of it. Nor can they re-use the signature
      portion to protect different parameters. We do this today with a
      2-legged OAuth signature across a service URL. The "Client"
      generates the signed URLs and passes them to a user agent which
      actually does the fetch to the service.
>
>
> -- Justin
>
>On 08/09/2012 02:43 PM, William Mills wrote:
>
>OK, I'll play and start documenting the use cases.  
>>
>>
>>Use case #1: Secure authentication in plain text connections:
>>
>>
>>Some applications need a secure form authorization, but do not want or need 
>>the overhead of encrypted connections.  HTTP cookies and their ilk are 
>>replayable credentials and do not satisfy this need.   the MAC scheme using 
>>signed HTTP authorization credentials offer the capability to securely 
>>authorize a transaction, can offer integrity protection on all or part of an 
>>HTTP request, and can provide replay protection.
>>
>>
>>-bill
>>
>>
>>
>>________________________________
>> From: John Bradley <ve7...@ve7jtb.com>
>>To: William Mills <wmills_92...@yahoo.com> 
>>Cc: Dick Hardt <dick.ha...@gmail.com>; "oauth@ietf.org" <oauth@ietf.org> 
>>Sent: Thursday, August 9, 2012 11:26 AM
>>Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
>> 
>>
>>In Vancouver the question was asked about the future of the MAC spec due to 
>>it no linger having a editor. 
>>
>>
>>The Chair and AD indicated a desire to have a document on the use-cases we 
>>are trying to address before deciding on progressing MAC or starting a new 
>>document.
>>
>>
>>Phil Hunt is going to put together a summery of the Vancouver discussion and 
>>we are going to work on the use-case/problem description document ASAP.
>>
>>
>>People are welcome to contribute to the use-case document.
>>
>>
>>Part of the problem with MAC has been that people could never agree on what 
>>it was protecting against.  
>>
>>
>>I think there is general agreement that one or more proof mechanisms are 
>>required for access tokens.
>>Security for the token endpoint also cannot be ignored. 
>>
>>
>>
>>
>>John B.
>> 
>>
>>On 2012-08-09, at 1:53 PM, William Mills wrote:
>>
>>MAC fixes the signing problems encountered in OAuth 1.0a, yes there are 
>>libraries out there for OAuth 1.0a.  MAC fits in to the OAuth 2 auth model 
>>and will provide for a single codepath for sites that want to use both Bearer 
>>and MAC.
>>>
>>>
>>>
>>>________________________________
>>> From: Dick Hardt <dick.ha...@gmail.com>
>>>To: William Mills <wmills_92...@yahoo.com> 
>>>Cc: "oauth@ietf.org" <oauth@ietf.org> 
>>>Sent: Thursday, August 9, 2012 10:27 AM
>>>Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
>>> 
>>>
>>>
>>>
>>>On Aug 9, 2012, at 9:52 AM, William Mills wrote:
>>>
>>>I find the idea of starting from scratch frustrating.  MAC solves a set of 
>>>specific problems and has a well defined use case.  It's symmetric key based 
>>>which doesn't work for some folks, and the question is do we try to develop 
>>>something that supports both PK and SK, or finish the SK use case and then 
>>>work on a PK based draft.
>>>>
>>>>
>>>>I think it's better to leave them separate and finish out MAC which is 
>>>>*VERY CLOSE* to being done.
>>>
>>>Who is interested in MAC? People can use OAuth 1.0 if they prefer that 
>>>model. 
>>>
>>>
>>>For my projects, I prefer the flexibility of a signed or encrypted JWT if I 
>>>need holder of key.
>>>
>>>
>>>Just my $.02
>>>
>>>
>>>-- Dick  
>>>
>>>
>>>
_______________________________________________
>>>OAuth mailing list
>>>OAuth@ietf.org
>>>https://www.ietf.org/mailman/listinfo/oauth
>>>
>>
>>
>>
>>
>>
>>_______________________________________________
OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth 
>
_______________________________________________
>OAuth mailing list
>OAuth@ietf.org
>https://www.ietf.org/mailman/listinfo/oauth
>

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to