The transport of the session key from the authorization server is described in 
Section 5.1 and is called "mac_key". 

The mechanism to transport the session key from the authorization server to the 
resource server is not yet described in the document. This has historical 
reasons: OAuth 1.0 did not separate the authorization server from the resource 
server in the way OAuth 2.0 does.

Ciao
Hannes

On Feb 12, 2013, at 12:28 PM, Antonio Sanso wrote:

> Hi Hannes,
> 
> how this session key "differs" from the key described in the current draft 
> [0]?
> 
> Thanks and regards
> 
> Antonio
> 
> [0] http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-02
> 
> On Feb 12, 2013, at 10:44 AM, Hannes Tschofenig wrote:
> 
>> Hi Bill, 
>> 
>> On Feb 12, 2013, at 11:27 AM, William Mills wrote:
>> 
>>> Is key distribution how AS and PR share keys  for token 
>>> encryption/decryption or specifically about the keys for the HOK tokens?
>>> 
>> In order for the client to compute the keyed message digest it needs to have 
>> the session key. This session key is sent from the authorization server to 
>> the client and everyone on the call agreed that this has to be standardized. 
>> 
>> The resource server who receives the message from the client also needs to 
>> have the session key to verify the message. How the resource server obtains 
>> this session key was subject for some discussion on the call. I presented 
>> three different ways of how the resource server is able to obtain that key. 
>> We have to decide on one mandatory-to-implement mechanism. The open issue is 
>> which one? 
>> 
>>> For the MAC token spec, I don't actually care whether we use JSON or now, 
>>> but I'm in full agreement that we do NOT duplicate any HTTP info into the 
>>> JSON.  Just signatures of that stuff.
>>> 
>> I believe the folks on the call also agreed with you on that aspect that the 
>> content of the HTTP message should not be replicated in the JSON payload 
>> itself. 
>> 
>> Ciao
>> Hannes
>> 
>>> From: Hannes Tschofenig <hannes.tschofe...@gmx.net>
>>> To: IETF oauth WG <oauth@ietf.org> 
>>> Sent: Tuesday, February 12, 2013 1:10 AM
>>> Subject: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 
>>> 11th February 2013
>>> 
>>> Here are my notes. 
>>> 
>>> Participants:
>>> 
>>> * John Bradley
>>> * Derek Atkins
>>> * Phil Hunt
>>> * Prateek Mishra
>>> * Hannes Tschofenig
>>> * Mike Jones
>>> * Antonio Sanso
>>> * Justin Richer
>>> 
>>> Notes: 
>>> 
>>> My slides are available here: 
>>> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>> 
>>> Slide #2 summarizes earlier discussions during the conference calls. 
>>> 
>>> -- HTTP vs. JSON
>>> 
>>> Phil noted that he does not like to use the MAC Token draft as a starting 
>>> point because it does not re-use any of the work done in the JOSE working 
>>> group and in particular all the libraries that are available today. He 
>>> mentioned that earlier attempts to write the MAC Token code lead to 
>>> problems for implementers. 
>>> 
>>> Justin responded that he does not agree with using JSON as a transport 
>>> mechanism since this would replicate a SOAP style. 
>>> 
>>> Phil noted that he wants to send JSON but the signature shall be computed 
>>> over the HTTP header field. 
>>> 
>>> -- Flexibility for the keyed message digest computation
>>> 
>>> From earlier discussion it was clear that the conference call participants 
>>> wanted more flexibility regarding the keyed message digest computation. For 
>>> this purpose Hannes presented the DKIM based approach, which allows 
>>> selective header fields to be included in the digest. This is shown in 
>>> slide #4. 
>>> 
>>> After some discussion the conference call participants thought that this 
>>> would meet their needs. Further investigations would still be useful to 
>>> determine the degree of failed HMAC calculations due to HTTP proxies 
>>> modifying the content. 
>>> 
>>> -- Key Distribution
>>> 
>>> Hannes presented the open issue regarding the choice of key distribution. 
>>> Slides #6-#8 present three techniques and Hannes asked for feedback 
>>> regarding the preferred style. Justin and others didn't see the need to 
>>> decide on one mechanism - they wanted to keep the choice open. Derek 
>>> indicated that this will not be an acceptable approach. Since the resource 
>>> server and the authorization server may, in the OAuth 2.0 framework, be 
>>> entities produced by different vendors there is an interoperability need. 
>>> Justin responded that he disagrees and that the resource server needs to 
>>> understand the access token and referred to the recent draft submission for 
>>> the token introspection endpoint. Derek indicated that the resource server 
>>> has to understand the content of the access token and the token 
>>> introspection endpoint just pushes the problem around: the resource server 
>>> has to send the access token to the authorization server and then the 
>>> resource server gets the result back (which he th
 en
>> a
>>> gain needs to understand) in order to make a meaningful authorization 
>>> decision. 
>>> 
>>> Everyone agreed that the client must receive the session key from the 
>>> authorization server and that this approach has to be standardized. It was 
>>> also agreed that this is a common approach among all three key distribution 
>>> mechanisms.
>>> 
>>> Hannes asked the participants to think about their preference. 
>>> 
>>> The questions regarding key naming and the indication for the intended 
>>> resource server the client wants to talk to have been postponed. 
>>> 
>>> Ciao
>>> Hannes
>>> 
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to