Clarification.  I think Justin and I were in agreement that we don't want to 
see a format that requires JSON payloads.  We are both interested in a JSON 
token used in the authorization header that could be based on a computed 
signature of some combination of http headers and body if possible.

Phil

@independentid
www.independentid.com
phil.h...@oracle.com





On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:

> Here are my notes. 
> 
> Participants:
> 
> * John Bradley
> * Derek Atkins
> * Phil Hunt
> * Prateek Mishra
> * Hannes Tschofenig
> * Mike Jones
> * Antonio Sanso
> * Justin Richer
> 
> Notes: 
> 
> My slides are available here: 
> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
> 
> Slide #2 summarizes earlier discussions during the conference calls. 
> 
> -- HTTP vs. JSON
> 
> Phil noted that he does not like to use the MAC Token draft as a starting 
> point because it does not re-use any of the work done in the JOSE working 
> group and in particular all the libraries that are available today. He 
> mentioned that earlier attempts to write the MAC Token code lead to problems 
> for implementers. 
> 
> Justin responded that he does not agree with using JSON as a transport 
> mechanism since this would replicate a SOAP style. 
> 
> Phil noted that he wants to send JSON but the signature shall be computed 
> over the HTTP header field. 
> 
> -- Flexibility for the keyed message digest computation
> 
> From earlier discussion it was clear that the conference call participants 
> wanted more flexibility regarding the keyed message digest computation. For 
> this purpose Hannes presented the DKIM based approach, which allows selective 
> header fields to be included in the digest. This is shown in slide #4. 
> 
> After some discussion the conference call participants thought that this 
> would meet their needs. Further investigations would still be useful to 
> determine the degree of failed HMAC calculations due to HTTP proxies 
> modifying the content. 
> 
> -- Key Distribution
> 
> Hannes presented the open issue regarding the choice of key distribution. 
> Slides #6-#8 present three techniques and Hannes asked for feedback regarding 
> the preferred style. Justin and others didn't see the need to decide on one 
> mechanism - they wanted to keep the choice open. Derek indicated that this 
> will not be an acceptable approach. Since the resource server and the 
> authorization server may, in the OAuth 2.0 framework, be entities produced by 
> different vendors there is an interoperability need. Justin responded that he 
> disagrees and that the resource server needs to understand the access token 
> and referred to the recent draft submission for the token introspection 
> endpoint. Derek indicated that the resource server has to understand the 
> content of the access token and the token introspection endpoint just pushes 
> the problem around: the resource server has to send the access token to the 
> authorization server and then the resource server gets the result back (which 
> he then
  a
> gain needs to understand) in order to make a meaningful authorization 
> decision. 
> 
> Everyone agreed that the client must receive the session key from the 
> authorization server and that this approach has to be standardized. It was 
> also agreed that this is a common approach among all three key distribution 
> mechanisms.
> 
> Hannes asked the participants to think about their preference. 
> 
> The questions regarding key naming and the indication for the intended 
> resource server the client wants to talk to have been postponed. 
> 
> Ciao
> Hannes
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to