________________________________
From: Hannes Tschofenig <hannes.tschofe...@gmx.net>
To: William Mills <wmills_92...@yahoo.com> 
Cc: Hannes Tschofenig <hannes.tschofe...@gmx.net>; John Bradley 
<ve7...@ve7jtb.com>; "oauth@ietf.org" <oauth@ietf.org> 
Sent: Friday, August 10, 2012 12:01 AM
Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01

Hi Bill, 

thanks for the feedback. Let's have a look at this use case: 

You need to provide me a bit more information regarding your use case. Could 
you please explain 

1) Who is authenticated to whom?


wjm> the client is authenticated to the server.

2) What plaintext connection are you talking about? 

wjm> generally an HTTP connection to a webservice

3) What is the problem with encrypted connections? Is this again the "TLS has 
so bad performance" argument? 


wjm>  Yes, annoying but true.  This may change, but we do business with enough 
folks that refuse SSL that this is a real problem.

4) Since you are talking about cookies and making them more secure are you 
trying to come up with a general solution to better cookie security - a topic 
others are working on as well. 

wjm>  No, I'm pointing out the problems with a simple replayable credential 
like cookies as a comparison.

5) What is the threat you are concerned about? 

wjm> The vulnerability of plaintext connections: theft of credentials and 
tampering. 

Ciao
Hannes

PS: I would heavily argue against standardize a security mechanism that offers 
weaker protection than bearer when the entire argument has always been "Bearer 
is so insecure and we need something stronger."

On Aug 9, 2012, at 9:43 PM, William Mills wrote:

> OK, I'll play and start documenting the use cases.  
> 
> Use case #1: Secure authentication in plain text connections:
> 
> Some applications need a secure form authorization, but do not want or need 
> the overhead of encrypted connections.  HTTP cookies and their ilk are 
> replayable credentials and do not satisfy this need.   the MAC scheme using 
> signed HTTP authorization credentials offer the capability to securely 
> authorize a transaction, can offer integrity protection on all or part of an 
> HTTP request, and can provide replay protection.
> 
> -bill
> 
> From: John Bradley <ve7...@ve7jtb.com>
> To: William Mills <wmills_92...@yahoo.com> 
> Cc: Dick Hardt <dick.ha...@gmail.com>; "oauth@ietf.org" <oauth@ietf.org> 
> Sent: Thursday, August 9, 2012 11:26 AM
> Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
> 
> In Vancouver the question was asked about the future of the MAC spec due to 
> it no linger having a editor.
> 
> The Chair and AD indicated a desire to have a document on the use-cases we 
> are trying to address before deciding on progressing MAC or starting a new 
> document.
> 
> Phil Hunt is going to put together a summery of the Vancouver discussion and 
> we are going to work on the use-case/problem description document ASAP.
> 
> People are welcome to contribute to the use-case document.
> 
> Part of the problem with MAC has been that people could never agree on what 
> it was protecting against.  
> 
> I think there is general agreement that one or more proof mechanisms are 
> required for access tokens.
> Security for the token endpoint also cannot be ignored. 
> 
> 
> John B.
>  
> On 2012-08-09, at 1:53 PM, William Mills wrote:
> 
>> MAC fixes the signing problems encountered in OAuth 1.0a, yes there are 
>> libraries out there for OAuth 1.0a.  MAC fits in to the OAuth 2 auth model 
>> and will provide for a single codepath for sites that want to use both 
>> Bearer and MAC.
>> 
>> From: Dick Hardt <dick.ha...@gmail.com>
>> To: William Mills <wmills_92...@yahoo.com> 
>> Cc: "oauth@ietf.org" <oauth@ietf.org> 
>> Sent: Thursday, August 9, 2012 10:27 AM
>> Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
>> 
>> 
>> On Aug 9, 2012, at 9:52 AM, William Mills wrote:
>> 
>>> I find the idea of starting from scratch frustrating.  MAC solves a set of 
>>> specific problems and has a well defined use case.  It's symmetric key 
>>> based which doesn't work for some folks, and the question is do we try to 
>>> develop something that supports both PK and SK, or finish the SK use case 
>>> and then work on a PK based draft.
>>> 
>>> I think it's better to leave them separate and finish out MAC which is 
>>> *VERY CLOSE* to being done.
>> 
>> Who is interested in MAC? People can use OAuth 1.0 if they prefer that 
>> model. 
>> 
>> For my projects, I prefer the flexibility of a signed or encrypted JWT if I 
>> need holder of key.
>> 
>> Just my $.02
>> 
>> -- Dick  
>> 
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to