Sorry. I have to disagree. The way 1.0 is written, it is not a shortcut to turn 
it into a token for 2. 

Phil

Sent from my phone.

On 2013-02-15, at 13:04, William Mills <wmills_92...@yahoo.com> wrote:

> >I've brought it up before, but I think it might be worthwhile, at least as 
> >an exercise, to define a method to get OAuth1-style tokens from an OAuth2 
> >token endpoint. You'd defer to OAuth1 for how to use them >with a protected 
> >resource.
> 
> YES!
> 
> From: Justin Richer <jric...@mitre.org>
> To: Tim Bray <twb...@google.com> 
> Cc: William Mills <wmills_92...@yahoo.com>; IETF oauth WG <oauth@ietf.org> 
> Sent: Friday, February 15, 2013 12:54 PM
> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 
> 11th February 2013
> 
> So that you can fetch and manage all your tokens using the same code     
> paths as the OAuth2 services. The "get a token" part will be identical to 
> Oauth2 Bearer (except for some details of what comes back from the token 
> endpoint, of course), it's the "use a token" bit that really changes and is 
> up in the air. You get to use scopes, and state, and refresh tokens, and all 
> the other good stuff.
> 
> I've brought it up before, but I think it might be worthwhile, at least as an 
> exercise, to define a method to get OAuth1-style tokens from an OAuth2 token 
> endpoint. You'd defer to OAuth1 for how to use them with a protected resource.
> 
>  -- Justin
> 
> On 02/15/2013 11:49 AM, Tim Bray wrote:
>> Not deeply acquainted with the Flickr scenario, but it occurs to me to ask: 
>> If OAuth 1.0 is working well for them, why don’t they just keep using it?  
>> I.e. if there’s already a good solution in place for people who require 
>> secure authn/authz over insecure channels, why would we go the extra work of 
>> duplicating that in OAuth 2 territory? -T
>> 
>> On Fri, Feb 15, 2013 at 8:09 AM, William Mills <wmills_92...@yahoo.com> 
>> wrote:
>> I'll repeat the use case for Flickr, which requires OAuth 1.0a type 
>> capabilites that OAuth 2 does not provide.  Simply stating "move to HTTPS" 
>> is not a viable response here.  
>> 
>> From: Torsten Lodderstedt <tors...@lodderstedt.net>
>> To: William Mills <wmills_92...@yahoo.com> 
>> Cc: Mike Jones <michael.jo...@microsoft.com>; Justin Richer 
>> <jric...@mitre.org>; Phil Hunt <phil.h...@oracle.com>; IETF oauth WG 
>> <oauth@ietf.org>                       
>> Sent: Friday, February 15, 2013 7:22 AM
>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 
>> 11th February 2013
>> 
>> Hi Bill,
>> 
>> I think one needs to compare the costs/impact of HTTPS on one side and the 
>> implementation of integrity protection and replay detection on the other. We 
>> had this discussion several times.
>> 
>> regards,
>> Torsten.
>> 
>> Am 15.02.2013 um 08:08 schrieb William Mills                         
>> <wmills_92...@yahoo.com>:
>> 
>>> I fundamentally disagree with that too.  OAuth 2 is the *framework*, one 
>>> which supports multiple token types.  Bearer tokens were the first 
>>> credential type defined.
>>> 
>>> OAuth 1.0a also requires HTTPS transport for authentication and getting the 
>>> token.
>>> 
>>> There are  real use cases for tokens usable                                 
>>> over plain text with integrity protection.
>>> 
>>> -bill
>>> 
>>> From: Torsten Lodderstedt <tors...@lodderstedt.net>
>>> To: William Mills <wmills_92...@yahoo.com> 
>>> Cc: Mike Jones <michael.jo...@microsoft.com>; Justin Richer 
>>> <jric...@mitre.org>; Phil Hunt <phil.h...@oracle.com>; IETF oauth WG 
>>> <oauth@ietf.org> 
>>> Sent: Thursday, February 14, 2013 10:05 PM
>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call 
>>> - 11th February 2013
>>> 
>>> Hi Bill,
>>> 
>>> OAuth 2.0 took a different direction by relying on HTTPS to provide the 
>>> basic protection. So the need to have a token, which can be used for 
>>> service requests over plain HTTP is arguable. My understanding of this 
>>> activity was, the intend is to provide                                      
>>>  additional protection on top of HTTPS.
>>> 
>>> regards,
>>> Torsten.
>>> 
>>> Am 15.02.2013 um 02:31 schrieb William Mills <wmills_92...@yahoo.com>:
>>> 
>>>> I disagree with "That was the impediment to OAuth 1.0 adoption that OAuth 
>>>> 2.0 solved in the first place.", unless "solving" means does not address 
>>>> the need for it at all.
>>>> 
>>>> OAuth 2 does several good things, but it still lacks a defined token type 
>>>> that is safe to user over plain text HTTP.  1.0a solved that.
>>>> 
>>>> From: Mike Jones <michael.jo...@microsoft.com>
>>>> To: Justin Richer <jric...@mitre.org>; Phil Hunt <phil.h...@oracle.com> 
>>>> Cc: IETF oauth WG <oauth@ietf.org> 
>>>> Sent: Thursday, February 14, 2013 1:44 PM
>>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call 
>>>> - 11th February 2013
>>>> 
>>>> I'm in favor of reusing the JWT work that this WG is also doing. :-)
>>>> 
>>>> I'm pretty skeptical of us inventing another custom scheme for signing 
>>>> HTTP headers.  That was the impediment to OAuth 1.0 adoption that OAuth 
>>>> 2.0 solved in the first place.
>>>> 
>>>>                 -- Mike
>>>> 
>>>> -----Original Message-----
>>>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of 
>>>> Justin Richer
>>>> Sent: Tuesday, February 12, 2013 9:35 AM
>>>> To: Phil Hunt
>>>> Cc: IETF oauth WG
>>>> Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call 
>>>> - 11th February 2013
>>>> 
>>>> That's my reading of it as well, Phil, thanks for providing the 
>>>> clarification. One motivator behind using a JSON-based token is to be able 
>>>> to re-use some of the                                               great 
>>>> work that the JOSE group is doing but apply it to an HTTP payload.
>>>> 
>>>> What neither of us want is a token type that requires stuffing all query, 
>>>> header, and other parameters *into* the JSON object itself, which would be 
>>>> a more SOAPy approach.
>>>> 
>>>>   -- Justin
>>>> 
>>>> On 02/12/2013 12:30 PM, Phil Hunt wrote:
>>>> > Clarification.  I think Justin and I were in agreement that we don't 
>>>> > want to see a format that requires JSON payloads.                        
>>>> >                         We are both interested in a JSON token used in 
>>>> > the authorization header that could be based on a computed signature of 
>>>> > some combination of http headers and body if possible.
>>>> >
>>>> > Phil
>>>> >
>>>> > @independentid
>>>> > www.independentid.com
>>>> > phil.h...@oracle.com
>>>> >
>>>> >
>>>> >
>>>> >
>>>> >
>>>> > On 2013-02-12, at 1:10 AM, Hannes Tschofenig wrote:
>>>> >
>>>> >> Here are my notes.
>>>> >>
>>>> >> Participants:
>>>> >>
>>>> >> * John Bradley
>>>> >> * Derek Atkins
>>>> >> * Phil Hunt
>>>> >> * Prateek Mishra
>>>> >> * Hannes Tschofenig
>>>> >> * Mike Jones
>>>> >> * Antonio Sanso
>>>> >> * Justin Richer
>>>> >>
>>>> >> Notes:
>>>> >>
>>>> >> My slides are available here: 
>>>> >> http://www.tschofenig.priv.at/OAuth2-Security-11Feb2013.ppt
>>>> >>
>>>> >> Slide #2 summarizes earlier discussions during the conference calls.
>>>> >>
>>>> >> -- HTTP vs. JSON
>>>> >>
>>>> >> Phil noted that he does not like to use                                 
>>>> >>               the MAC Token draft as a starting point because it does 
>>>> >> not re-use any of the work done in the JOSE working group and in 
>>>> >> particular all the libraries that are available today. He mentioned 
>>>> >> that earlier                                               attempts to 
>>>> >> write the MAC Token code lead to problems for implementers.
>>>> >>
>>>> >> Justin responded that he does not agree                                 
>>>> >>               with using JSON as a transport mechanism since this would 
>>>> >> replicate a SOAP style.
>>>> >>
>>>> >> Phil noted that he wants to send JSON but the signature shall be 
>>>> >> computed over the HTTP header field.
>>>> >>
>>>> >> -- Flexibility for the keyed message digest computation
>>>> >>
>>>> >>  From earlier discussion it was clear that the conference call 
>>>> >> participants wanted more flexibility regarding the keyed message digest 
>>>> >> computation. For this                                               
>>>> >> purpose Hannes presented the DKIM based approach, which allows 
>>>> >> selective header fields to be included in the digest. This is shown in 
>>>> >> slide #4.
>>>> >>
>>>> >> After some discussion the conference call participants thought that 
>>>> >> this would meet their needs. Further investigations would still be 
>>>> >> useful to determine the degree of failed HMAC calculations due to HTTP 
>>>> >> proxies modifying the content.
>>>> >>
>>>> >> -- Key Distribution
>>>> >>
>>>> >> Hannes presented the open issue regarding the choice of key 
>>>> >> distribution. Slides #6-#8 present three techniques and Hannes asked 
>>>> >> for feedback regarding the preferred style. Justin and others didn't 
>>>> >> see the need to decide on one mechanism - they wanted to keep the 
>>>> >> choice open. Derek indicated that this                                  
>>>> >>              will not be an acceptable 
>>>> >> approach. Since the resource server and                                 
>>>> >>               the authorization server may, 
>>>> >> in the OAuth 2.0 framework, be entities                                 
>>>> >>               produced by different vendors 
>>>> >> there is an interoperability need. Justin responded that he disagrees 
>>>> >> and that the resource server needs to understand the access token and 
>>>> >> referred to the recent draft submission                                 
>>>> >>               for the token introspection 
>>>> >> endpoint. Derek indicated that the resource server has to understand 
>>>> >> the content of the access token and the                                 
>>>> >>               token introspection endpoint 
>>>> >> just pushes the problem around: the resource server has to send the 
>>>> >> access token to the authorization server and then the resource server 
>>>> >> gets the result back (which he the
>>>> n
>>>> >    a
>>>> >> gain needs to understand) in order to make a meaningful authorization 
>>>> >> decision.
>>>> >>
>>>> >> Everyone agreed that the client must receive the session key from the 
>>>> >> authorization server and that this approach has to be standardized. It 
>>>> >> was also agreed that this is a common approach among all three key 
>>>> >> distribution mechanisms.
>>>> >>
>>>> >> Hannes asked the participants to think                                  
>>>> >>              about their preference.
>>>> >>
>>>> >> The questions regarding key naming and                                  
>>>> >>              the indication for the intended resource server the client 
>>>> >> wants to talk to have been postponed.
>>>> >>
>>>> >> Ciao
>>>> >> Hannes
>>>> >>
>>>> >>
>>>> >> _______________________________________________
>>>> >> OAuth mailing list
>>>> >> OAuth@ietf.org
>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>> > _______________________________________________
>>>> > OAuth mailing list
>>>> > OAuth@ietf.org
>>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> 
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to