Thanks Hannes

On Feb 12, 2013, at 12:06 PM, Hannes Tschofenig wrote:

> The transport of the session key from the authorization server is described 
> in Section 5.1 and is called "mac_key". 
> 
> The mechanism to transport the session key from the authorization server to 
> the resource server is not yet described in the document. This has historical 
> reasons: OAuth 1.0 did not separate the authorization server from the 
> resource server in the way OAuth 2.0 does.

but why do not we hit this same issue in the JWS case? In this situation there 
is as well a key for sign... And AS and RS can be as well two different 
entities...

Regards

Antonio



> 
> Ciao
> Hannes
> 
> On Feb 12, 2013, at 12:28 PM, Antonio Sanso wrote:
> 
>> Hi Hannes,
>> 
>> how this session key "differs" from the key described in the current draft 
>> [0]?
>> 
>> Thanks and regards
>> 
>> Antonio
>> 
>> [0] http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-02
>> 
>> On Feb 12, 2013, at 10:44 AM, Hannes Tschofenig wrote:
>> 
>>> Hi Bill, 
>>> 
>>> On Feb 12, 2013, at 11:27 AM, William Mills wrote:
>>> 
>>>> Is key distribution how AS and PR share keys  for token 
>>>> encryption/decryption or specifically about the keys for the HOK tokens?
>>>> 
>>> In order for the client to compute the keyed message digest it needs to 
>>> have the session key. This session key is sent from the authorization 
>>> server to the client and everyone on the call agreed that this has to be 
>>> standardized. 
>>> 
>>> The resource server who receives the message from the client also needs to 
>>> have the session key to verify the message. How the resource server obtains 
>>> this session key was subject for some discussion on the call. I presented 
>>> three different ways of how the resource server is able to obtain that key. 
>>> We have to decide on one mandatory-to-implement mechanism. The open issue 
>>> is which one? 
>>> 
>>>> For the MAC token spec, I don't actually care whether we use JSON or now, 
>>>> but I'm in full agreement that we do NOT duplicate any HTTP info into the 
>>>> JSON.  Just signatures of that stuff.
>>>> 
>>> I believe the folks on the call also agreed with you on that aspect that 
>>> the content of the HTTP message should not be replicated in the JSON 
>>> payload itself. 
>>> 
>>> Ciao
>>> Hannes
>>> 
>>>> From: Hannes Tschofenig <hannes.tschofe...@gmx.net>
>>>> To: IETF oauth WG <oauth@ietf.org> 
>>>> Sent: Tuesday, February 12, 2013 1:10 AM
>>>> Subject: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 
>>>> 11th February 2013
>>>> 
>>>> Here are my notes. 
>>>> 
>>>> Participants:
>>>> 
>>>> * John Bradley
>>>> * Derek Atkins
>>>> * Phil Hunt
>>>> * Prateek Mishra
>>>> * Hannes Tschofenig
>>>> * Mike Jones
>>>> * Antonio Sanso
>>>> * Justin Richer
>>>> 
>>>> Notes: 
>>>> 
>>>> My slides are available here: 
>>>> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>>> 
>>>> Slide #2 summarizes earlier discussions during the conference calls. 
>>>> 
>>>> -- HTTP vs. JSON
>>>> 
>>>> Phil noted that he does not like to use the MAC Token draft as a starting 
>>>> point because it does not re-use any of the work done in the JOSE working 
>>>> group and in particular all the libraries that are available today. He 
>>>> mentioned that earlier attempts to write the MAC Token code lead to 
>>>> problems for implementers. 
>>>> 
>>>> Justin responded that he does not agree with using JSON as a transport 
>>>> mechanism since this would replicate a SOAP style. 
>>>> 
>>>> Phil noted that he wants to send JSON but the signature shall be computed 
>>>> over the HTTP header field. 
>>>> 
>>>> -- Flexibility for the keyed message digest computation
>>>> 
>>>> From earlier discussion it was clear that the conference call participants 
>>>> wanted more flexibility regarding the keyed message digest computation. 
>>>> For this purpose Hannes presented the DKIM based approach, which allows 
>>>> selective header fields to be included in the digest. This is shown in 
>>>> slide #4. 
>>>> 
>>>> After some discussion the conference call participants thought that this 
>>>> would meet their needs. Further investigations would still be useful to 
>>>> determine the degree of failed HMAC calculations due to HTTP proxies 
>>>> modifying the content. 
>>>> 
>>>> -- Key Distribution
>>>> 
>>>> Hannes presented the open issue regarding the choice of key distribution. 
>>>> Slides #6-#8 present three techniques and Hannes asked for feedback 
>>>> regarding the preferred style. Justin and others didn't see the need to 
>>>> decide on one mechanism - they wanted to keep the choice open. Derek 
>>>> indicated that this will not be an acceptable approach. Since the resource 
>>>> server and the authorization server may, in the OAuth 2.0 framework, be 
>>>> entities produced by different vendors there is an interoperability need. 
>>>> Justin responded that he disagrees and that the resource server needs to 
>>>> understand the access token and referred to the recent draft submission 
>>>> for the token introspection endpoint. Derek indicated that the resource 
>>>> server has to understand the content of the access token and the token 
>>>> introspection endpoint just pushes the problem around: the resource server 
>>>> has to send the access token to the authorization server and then the 
>>>> resource server gets the result back (which he t
 hen
>>> a
>>>> gain needs to understand) in order to make a meaningful authorization 
>>>> decision. 
>>>> 
>>>> Everyone agreed that the client must receive the session key from the 
>>>> authorization server and that this approach has to be standardized. It was 
>>>> also agreed that this is a common approach among all three key 
>>>> distribution mechanisms.
>>>> 
>>>> Hannes asked the participants to think about their preference. 
>>>> 
>>>> The questions regarding key naming and the indication for the intended 
>>>> resource server the client wants to talk to have been postponed. 
>>>> 
>>>> Ciao
>>>> Hannes
>>>> 
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>>> 
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to