Not deeply acquainted with the Flickr scenario, but it occurs to me to ask:
If OAuth 1.0 is working well for them, why don’t they just keep using it?
 I.e. if there’s already a good solution in place for people who require
secure authn/authz over insecure channels, why would we go the extra work
of duplicating that in OAuth 2 territory? -T

On Fri, Feb 15, 2013 at 8:09 AM, William Mills <wmills_92...@yahoo.com>wrote:

> I'll repeat the use case for Flickr, which requires OAuth 1.0a type
> capabilites that OAuth 2 does not provide.  Simply stating "move to HTTPS"
> is not a viable response here.
>
>   ------------------------------
> *From:* Torsten Lodderstedt <tors...@lodderstedt.net>
> *To:* William Mills <wmills_92...@yahoo.com>
> *Cc:* Mike Jones <michael.jo...@microsoft.com>; Justin Richer <
> jric...@mitre.org>; Phil Hunt <phil.h...@oracle.com>; IETF oauth WG <
> oauth@ietf.org>
> *Sent:* Friday, February 15, 2013 7:22 AM
> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
> Call - 11th February 2013
>
> Hi Bill,
>
> I think one needs to compare the costs/impact of HTTPS on one side and the
> implementation of integrity protection and replay detection on the other.
> We had this discussion several times.
>
> regards,
> Torsten.
>
> Am 15.02.2013 um 08:08 schrieb William Mills <wmills_92...@yahoo.com>:
>
> I fundamentally disagree with that too.  OAuth 2 is the *framework*, one
> which supports multiple token types.  Bearer tokens were the first
> credential type defined.
>
> OAuth 1.0a also requires HTTPS transport for authentication and getting
> the token.
>
> There are  real use cases for tokens usable over plain text with integrity
> protection.
>
> -bill
>
>   ------------------------------
> *From:* Torsten Lodderstedt <tors...@lodderstedt.net>
> *To:* William Mills <wmills_92...@yahoo.com>
> *Cc:* Mike Jones <michael.jo...@microsoft.com>; Justin Richer <
> jric...@mitre.org>; Phil Hunt <phil.h...@oracle.com>; IETF oauth WG <
> oauth@ietf.org>
> *Sent:* Thursday, February 14, 2013 10:05 PM
> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
> Call - 11th February 2013
>
> Hi Bill,
>
> OAuth 2.0 took a different direction by relying on HTTPS to provide the
> basic protection. So the need to have a token, which can be used for
> service requests over plain HTTP is arguable. My understanding of this
> activity was, the intend is to provide additional protection on top of
> HTTPS.
>
> regards,
> Torsten.
>
> Am 15.02.2013 um 02:31 schrieb William Mills <wmills_92...@yahoo.com>:
>
> I disagree with "That was the impediment to OAuth 1.0 adoption that OAuth
> 2.0 solved in the first place.", unless "solving" means does not address
> the need for it at all.
>
> OAuth 2 does several good things, but it still lacks a defined token type
> that is safe to user over plain text HTTP.  1.0a solved that.
>
>   ------------------------------
> *From:* Mike Jones <michael.jo...@microsoft.com>
> *To:* Justin Richer <jric...@mitre.org>; Phil Hunt <phil.h...@oracle.com>
> *Cc:* IETF oauth WG <oauth@ietf.org>
> *Sent:* Thursday, February 14, 2013 1:44 PM
> *Subject:* Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference
> Call - 11th February 2013
>
> I'm in favor of reusing the JWT work that this WG is also doing. :-)
>
> I'm pretty skeptical of us inventing another custom scheme for signing
> HTTP headers.  That was the impediment to OAuth 1.0 adoption that OAuth 2.0
> solved in the first place.
>
>                 -- Mike
>
> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of
> Justin Richer
> Sent: Tuesday, February 12, 2013 9:35 AM
> To: Phil Hunt
> Cc: IETF oauth WG
> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call
> - 11th February 2013
>
> That's my reading of it as well, Phil, thanks for providing the
> clarification. One motivator behind using a JSON-based token is to be able
> to re-use some of the great work that the JOSE group is doing but apply it
> to an HTTP payload.
>
> What neither of us want is a token type that requires stuffing all query,
> header, and other parameters *into* the JSON object itself, which would be
> a more SOAPy approach.
>
>   -- Justin
>
> On 02/12/2013 12:30 PM, Phil Hunt wrote:
> > Clarification.  I think Justin and I were in agreement that we don't
> want to see a format that requires JSON payloads.  We are both interested
> in a JSON token used in the authorization header that could be based on a
> computed signature of some combination of http headers and body if possible.
> >
> > Phil
> >
> > @independentid
> > www.independentid.com
> > phil.h...@oracle.com
> >
> >
> >
> >
> >
> > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
> >
> >> Here are my notes.
> >>
> >> Participants:
> >>
> >> * John Bradley
> >> * Derek Atkins
> >> * Phil Hunt
> >> * Prateek Mishra
> >> * Hannes Tschofenig
> >> * Mike Jones
> >> * Antonio Sanso
> >> * Justin Richer
> >>
> >> Notes:
> >>
> >> My slides are available here:
> >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
> >>
> >> Slide #2 summarizes earlier discussions during the conference calls.
> >>
> >> -- HTTP vs. JSON
> >>
> >> Phil noted that he does not like to use the MAC Token draft as a
> starting point because it does not re-use any of the work done in the JOSE
> working group and in particular all the libraries that are available today.
> He mentioned that earlier attempts to write the MAC Token code lead to
> problems for implementers.
> >>
> >> Justin responded that he does not agree with using JSON as a transport
> mechanism since this would replicate a SOAP style.
> >>
> >> Phil noted that he wants to send JSON but the signature shall be
> computed over the HTTP header field.
> >>
> >> -- Flexibility for the keyed message digest computation
> >>
> >>  From earlier discussion it was clear that the conference call
> participants wanted more flexibility regarding the keyed message digest
> computation. For this purpose Hannes presented the DKIM based approach,
> which allows selective header fields to be included in the digest. This is
> shown in slide #4.
> >>
> >> After some discussion the conference call participants thought that
> this would meet their needs. Further investigations would still be useful
> to determine the degree of failed HMAC calculations due to HTTP proxies
> modifying the content.
> >>
> >> -- Key Distribution
> >>
> >> Hannes presented the open issue regarding the choice of key
> >> distribution. Slides #6-#8 present three techniques and Hannes asked
> >> for feedback regarding the preferred style. Justin and others didn't
> >> see the need to decide on one mechanism - they wanted to keep the
> >> choice open. Derek indicated that this will not be an acceptable
> >> approach. Since the resource server and the authorization server may,
> >> in the OAuth 2.0 framework, be entities produced by different vendors
> >> there is an interoperability need. Justin responded that he disagrees
> >> and that the resource server needs to understand the access token and
> >> referred to the recent draft submission for the token introspection
> >> endpoint. Derek indicated that the resource server has to understand
> >> the content of the access token and the token introspection endpoint
> >> just pushes the problem around: the resource server has to send the
> >> access token to the authorization server and then the resource server
> >> gets the result back (which he the
> n
> >    a
> >> gain needs to understand) in order to make a meaningful authorization
> decision.
> >>
> >> Everyone agreed that the client must receive the session key from the
> authorization server and that this approach has to be standardized. It was
> also agreed that this is a common approach among all three key distribution
> mechanisms.
> >>
> >> Hannes asked the participants to think about their preference.
> >>
> >> The questions regarding key naming and the indication for the intended
> resource server the client wants to talk to have been postponed.
> >>
> >> Ciao
> >> Hannes
> >>
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>  _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to