Good that you both raise this point. The refresh token mechanism allows us to 
request new access tokens (and new keying material correspondingly since the 
two are tight together) in a dynamic fashion. If you turn the MAC key into a 
long term secret or use it with multiple resource servers then you obviously 
loose the security benefits. 

All this is documented in Section 5 of 
http://tools.ietf.org/html/draft-tschofenig-oauth-security-00#section-5

On Nov 27, 2012, at 7:59 PM, William Mills wrote:

> Yes!
> 
> The other thing that is better in the OAuth 2 model is the refresh 
> capability, which makes plain text channel token usage more palatable.
> 
> From: "Richer, Justin P." <jric...@mitre.org>
> To: William Mills <wmills_92...@yahoo.com> 
> Cc: "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofe...@nsn.com>; ext 
> Sergey Beryozkin <sberyoz...@gmail.com>; Hannes Tschofenig 
> <hannes.tschofe...@gmx.net>; "oauth@ietf.org" <oauth@ietf.org> 
> Sent: Tuesday, November 27, 2012 9:51 AM
> Subject: Re: [OAUTH-WG] What needs to be done to complete MAC
> 
> An important point to note, that many OAuth1 implementations in the wild 
> screw up, is that you still need TLS between the client and the Authorization 
> Server to protect the token and secret in transit, even if you don't use TLS 
> during the client's calls to the protected resource. Since OAuth2 core 
> mandates TLS at the Token Endpoint explicitly for all token types, that's 
> much more clear to understand (in my opinion) in implementation.
> 
> In case the above is unclear, what I'm trying to say is this: putting a 
> signed token like MAC into the OAuth2 framework will give us the capability 
> of OAuth1 in a clearer, more secure (in the wild) structure. I think it's 
> vitally important that we have this functionality, and while I understand the 
> need for clear use cases, I don't understand the feet-dragging.
> 
>  -- Justin
> 
> On Nov 27, 2012, at 12:32 PM, William Mills wrote:
> 
>> I don't see in that document a significant use case for a signed token, 
>> which is use over clear text channels.  Bearer tokens have similar security 
>> properties to HTTP cookies (minus for the moment the XSRF problem).  Signed 
>> token types can be used over plain text channels without the concern about 
>> re-use of the token by a 3rd party.  Replay protection is still needed but 
>> that's not in scope for the token mechanism itself.
>> 
>> It's always been this simple use case that has been my focus for MAC.
>> 
>> Flickr uses OAuth 1.0a today over HTTP and will for many years to come, we 
>> won't be able to go completely SSL due to the installed base of clients.  
>> Given the dynamic I see in the mobile development community I don't see us 
>> getting all mobile apps into SSL only anytime soon.  MAC and OAuth 1.0 solve 
>> the token security problem for the last hop to the phone/wi-fi device 
>> without SSL for the bulk of the application traffic.
>> 
>> -bill
>> 
>> 
>> From: "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofe...@nsn.com>
>> To: ext Sergey Beryozkin <sberyoz...@gmail.com>; Hannes Tschofenig 
>> <hannes.tschofe...@gmx.net> 
>> Cc: oauth@ietf.org 
>> Sent: Tuesday, November 27, 2012 4:33 AM
>> Subject: Re: [OAUTH-WG] What needs to be done to complete MAC
>> 
>> Hi Sergey, 
>> 
>> I believe we would make faster progress on security topics if could
>> focus on listing security requirements we have and what threats we want
>> to mitigate. The reason why we have not finished this topic is simply
>> because everyone was just talking about specific (but incomplete)
>> solutions. You are unfortunately falling in the same trap as well. 
>> 
>> If you really care about the topic then have a look at the mentioned
>> document and tell us whether the requirements are complete. 
>> Reading through the document you will notice that there a few more
>> considerations to pay attention to than just the few listed below. 
>> 
>> Ciao
>> Hannes
>> 
>> 
>> > -----Original Message-----
>> > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
>> > Of ext Sergey Beryozkin
>> > Sent: Tuesday, November 27, 2012 1:23 PM
>> > To: Hannes Tschofenig
>> > Cc: <oauth@ietf.org>
>> > Subject: Re: [OAUTH-WG] What needs to be done to complete MAC
>> > 
>> > Hi Hannes
>> > On 26/11/12 19:01, Hannes Tschofenig wrote:
>> > > Hi Sergey,
>> > >
>> > > as Phil said it would be helpful for us to receive reviews of this
>> > document:
>> > > http://tools.ietf.org/html/draft-tschofenig-oauth-security-00
>> > >
>> > > The document lists requirements and threats.
>> > 
>> > 
>> > Let me offer two possibly naive reasons why using MAC may help, one of
>> > them is related to the security, another to the ease of HOK support on
>> > the client
>> > 
>> > 1. The most safe way to return MAC token to the client is to use a
>> > two-way TLS due to the mac key also returned to the client. Two-Way
>> TLS
>> > offers a stronger support for getting the client authenticated along
>> the
>> > way too
>> > 
>> > 2. Assuming HOK confirmation matters at all (and I believe it does),
>> > IMHO it is much simpler for a basic client implementation to apply a
>> MAC
>> > signature algo and thus work with the OAuth2 servers expecting HOK
>> > confirmations
>> > 
>> > One more reason is more about facilitating the further migration to
>> 2.0
>> > which I tried to outline in my response to Phil Hunt
>> > 
>> > Thanks, Sergey
>> > 
>> > >
>> > > Ciao
>> > > Hannes
>> > >
>> > > On Nov 26, 2012, at 8:28 PM, Phil Hunt wrote:
>> > >
>> > >> If we want to get this done we have to get agreements on the
>> > requirements for HOK. Several meetings ago (quebec) the group
>> indicated
>> > that mac wasn't appropriate to anyone's needs.
>> > >>
>> > >> Some would argue that OAuth1 users arguably have less security than
>> > the simpler bearer token /tls model in OAuth2. This just shows the
>> real
>> > issue of demonstrated need has not been properly defined and
>> understood.
>> > >>
>> > >> More dialog on use cases is very helpful to moving HOK/MAC/etc
>> > forward.
>> > >>
>> > >> Phil
>> > >>
>> > >> On 2012-11-26, at 10:15, Sergey Beryozkin<sberyoz...@gmail.com>
>> > wrote:
>> > >>
>> > >>> Hi
>> > >>>
>> > >>> What needs to be done to complete the MAC token spec ? Without
>> > having it signed off it will be difficult to get people working with
>> > OAuth 1.0 convinced to move to 2.0.
>> > >>> I'm seeing another user request for getting OAuth 1.0 support
>> > extended further because the user expects it is more secure, and I
>> guess
>> > because it is proven to work for people, and I guess because many
>> OAuth
>> > 1.0 users feel that should stay from OAuth 2.0 because of some bad
>> press.
>> > >>>
>> > >>> Without MAC being completed the division will continue, with even
>> > more misleading anti-OAuth2 posts appearing (though I guess some of
>> the
>> > better posts point to some level of complexity in 2.0).
>> > >>>
>> > >>> Is it a matter of a security expert validating the text, fixing
>> few
>> > typos, and basically signing it off ?
>> > >>>
>> > >>> If someone is interested then I can provide the info offline on
>> how
>> > it MAC supported in our framework to get things tested easily and
>> such...
>> > >>>
>> > >>> Cheers, Sergey
>> > >>>
>> > >>> _______________________________________________
>> > >>> OAuth mailing list
>> > >>> OAuth@ietf.org
>> > >>> https://www.ietf.org/mailman/listinfo/oauth
>> > >> _______________________________________________
>> > >> OAuth mailing list
>> > >> OAuth@ietf.org
>> > >> https://www.ietf.org/mailman/listinfo/oauth
>> > >
>> > 
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to