Those reasons make sense to me, thanks for enumerating.

On Aug 10, 2012, at 9:25 AM, Justin Richer wrote:

> The reason is simple: to benefit from the rest of the improvements in the 
> OAuth2 framework. These are just the ones off the top of my head:
> 
> 1) Multiple means for getting a token (all the flows are now available)
> 2) No request tokens
> 3) No reliance on per-client secrets (though, addendum, I think the MAC spec 
> should be augmented to use them if present)
> 4) Ability to integrate with many different extensions to OAuth2, both now 
> and in the future
> 
> -- Justin
> 
> On 08/10/2012 12:18 PM, Dick Hardt wrote:
>> As an implementor, I would pick a signed JWT over OAuth 1.0A. Just saying.
>> 
>> Given that, there is also a clear need for signing an HTTP(S) request as 
>> some sites are choosing OAuth 1.0A over OAuth 2.0 because they don't want to 
>> use bearer tokens.
>> 
>> I never followed what MAC solved that OAuth 1.0A did not solve. Would 
>> someone elaborate? We do have an RFC for signing requests, there are lots of 
>> libraries already. Why the desire to reinvent OAuth 1.0A?
>> 
>> -- Dick
>> 
>> On Aug 10, 2012, at 8:00 AM, Rob Richards wrote:
>> 
>>> I think you nailed it which that statement. Up until now it as been back 
>>> and forth about one or the other. Personally I prefer to used layered 
>>> security and not relying on a single point of attack. It's unrealistic to 
>>> say everyone is going to want/need/be able to use (take your pick) 
>>> signed/encrypted JWT. MAC at least offers an alternative, less complicated 
>>> solution.
>>> 
>>> Rob
>>> 
>>> On 8/10/12 10:41 AM, Richer, Justin P. wrote:
>>>> What about security in depth? Signing + TLS is more secure than either 
>>>> alone, isn't it?
>>>> 
>>>>  -- Justin
>>>> 
>>>> On Aug 10, 2012, at 3:01 AM, Hannes Tschofenig wrote:
>>>> 
>>>>> Hi Bill,
>>>>> 
>>>>> thanks for the feedback. Let's have a look at this use case:
>>>>> 
>>>>> You need to provide me a bit more information regarding your use case. 
>>>>> Could you please explain
>>>>> 
>>>>> 1) Who is authenticated to whom?
>>>>> 2) What plaintext connection are you talking about?
>>>>> 3) What is the problem with encrypted connections? Is this again the "TLS 
>>>>> has so bad performance" argument?
>>>>> 4) Since you are talking about cookies and making them more secure are 
>>>>> you trying to come up with a general solution to better cookie security - 
>>>>> a topic others are working on as well.
>>>>> 5) What is the threat you are concerned about?
>>>>> 
>>>>> Ciao
>>>>> Hannes
>>>>> 
>>>>> PS: I would heavily argue against standardize a security mechanism that 
>>>>> offers weaker protection than bearer when the entire argument has always 
>>>>> been "Bearer is so insecure and we need something stronger."
>>>>> 
>>>>> On Aug 9, 2012, at 9:43 PM, William Mills wrote:
>>>>> 
>>>>>> OK, I'll play and start documenting the use cases.
>>>>>> 
>>>>>> Use case #1: Secure authentication in plain text connections:
>>>>>> 
>>>>>> Some applications need a secure form authorization, but do not want or 
>>>>>> need the overhead of encrypted connections.  HTTP cookies and their ilk 
>>>>>> are replayable credentials and do not satisfy this need.   the MAC 
>>>>>> scheme using signed HTTP authorization credentials offer the capability 
>>>>>> to securely authorize a transaction, can offer integrity protection on 
>>>>>> all or part of an HTTP request, and can provide replay protection.
>>>>>> 
>>>>>> -bill
>>>>>> 
>>>>>> From: John Bradley <ve7...@ve7jtb.com>
>>>>>> To: William Mills <wmills_92...@yahoo.com>
>>>>>> Cc: Dick Hardt <dick.ha...@gmail.com>; "oauth@ietf.org" <oauth@ietf.org>
>>>>>> Sent: Thursday, August 9, 2012 11:26 AM
>>>>>> Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
>>>>>> 
>>>>>> In Vancouver the question was asked about the future of the MAC spec due 
>>>>>> to it no linger having a editor.
>>>>>> 
>>>>>> The Chair and AD indicated a desire to have a document on the use-cases 
>>>>>> we are trying to address before deciding on progressing MAC or starting 
>>>>>> a new document.
>>>>>> 
>>>>>> Phil Hunt is going to put together a summery of the Vancouver discussion 
>>>>>> and we are going to work on the use-case/problem description document 
>>>>>> ASAP.
>>>>>> 
>>>>>> People are welcome to contribute to the use-case document.
>>>>>> 
>>>>>> Part of the problem with MAC has been that people could never agree on 
>>>>>> what it was protecting against.
>>>>>> 
>>>>>> I think there is general agreement that one or more proof mechanisms are 
>>>>>> required for access tokens.
>>>>>> Security for the token endpoint also cannot be ignored.
>>>>>> 
>>>>>> 
>>>>>> John B.
>>>>>> 
>>>>>> On 2012-08-09, at 1:53 PM, William Mills wrote:
>>>>>> 
>>>>>>> MAC fixes the signing problems encountered in OAuth 1.0a, yes there are 
>>>>>>> libraries out there for OAuth 1.0a.  MAC fits in to the OAuth 2 auth 
>>>>>>> model and will provide for a single codepath for sites that want to use 
>>>>>>> both Bearer and MAC.
>>>>>>> 
>>>>>>> From: Dick Hardt <dick.ha...@gmail.com>
>>>>>>> To: William Mills <wmills_92...@yahoo.com>
>>>>>>> Cc: "oauth@ietf.org" <oauth@ietf.org>
>>>>>>> Sent: Thursday, August 9, 2012 10:27 AM
>>>>>>> Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
>>>>>>> 
>>>>>>> 
>>>>>>> On Aug 9, 2012, at 9:52 AM, William Mills wrote:
>>>>>>> 
>>>>>>>> I find the idea of starting from scratch frustrating.  MAC solves a 
>>>>>>>> set of specific problems and has a well defined use case.  It's 
>>>>>>>> symmetric key based which doesn't work for some folks, and the 
>>>>>>>> question is do we try to develop something that supports both PK and 
>>>>>>>> SK, or finish the SK use case and then work on a PK based draft.
>>>>>>>> 
>>>>>>>> I think it's better to leave them separate and finish out MAC which is 
>>>>>>>> *VERY CLOSE* to being done.
>>>>>>> Who is interested in MAC? People can use OAuth 1.0 if they prefer that 
>>>>>>> model.
>>>>>>> 
>>>>>>> For my projects, I prefer the flexibility of a signed or encrypted JWT 
>>>>>>> if I need holder of key.
>>>>>>> 
>>>>>>> Just my $.02
>>>>>>> 
>>>>>>> -- Dick
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to