I agree with the goal of standardizing on identifying software instances, but I think it's out of scope to do so inside of dynamic registration when most dynamic registration use cases don't need it and won't use it. I think that you've got to define discovery, assertion contents, and a few other things in order to make it work and interoperable across different services. Do we really want to define assertion formats and server/client discovery and processing rules inside of dynamic registration? I really don't think that's beneficial, either to dynamic registration itself or to the problem that the software instance tracking is trying to solve.

If this gets proposed as a separate document, I will support it and I will help work on it. Heck, I'll even help edit the thing (or things) if people want. But I strongly believe that it's a separate concern from dynamic client registration, and I think it needs to have its own proper discussion apart from that.

 -- Justin

On 06/04/2013 02:28 AM, Phil Hunt wrote:
Yes. However the contents and format are out of scope.

Phil

On 2013-06-03, at 22:32, Torsten Lodderstedt <tors...@lodderstedt.net <mailto:tors...@lodderstedt.net>> wrote:

Hi Phil,

isn't the initial registration token such a credential, which allows to co-relate different instances of the same software?

regards,
Torsten.



Phil Hunt <phil.h...@oracle.com <mailto:phil.h...@oracle.com>> schrieb:

    Finally i believe the bb+ doesn't have the issue because they are solving 
with an initial authn credential that contains the same info.

    My feeling is that this functionality needs to be standardized one way or 
another.

    Phil

    On 2013-06-03, at 19:16, Derek Atkins <de...@ihtfp.com  
<mailto:de...@ihtfp.com>> wrote:

        Phil, Phil Hunt <phil.h...@oracle.com
        <mailto:phil.h...@oracle.com>> writes:

            Not quite. I will call you. I am saying we are
            transitioning from the old public client model. The new
            model proposes quasi-confidential characteristics but in
            some respects is missing key information from the public
            m! odel. Namely that a group of clients are related and
            there have common behaviour and security characteristics.
            We need to add to the self-asserted model an assertion
            equiv to the old common client_id. That is all. I am NOT
            looking for a proof of application identity here. That is
            too far. But certainly what we define here can open that
            door. Phil

        I think I understand what you're saying here. In the "old
        way", a public client had a constant client_id amongst all
        instances of that public client, whereas in the "new way", a
        public client will have different client_ids amongst all
        instances of that client. You feel this is a loss, whereas it
        seems most people seem to feel this change is okay. Since you
        are effectively the lone dissenter on this one topic, let me
        ask you a question: What is a technical reason that you need
        to have a constant, assertion that would bind to! gether (in
        a non-authenticated way) multiple instances of a client? I
        believe that Justin has provides some attacks against this;
        so I'm trying to understand, (with my chair hat on), why you
        need this functionality? With my security-mafia hat on, I
        feel like the old way was bad, and I much prefer the newer
        way where each instance of a client gets its own ID and a
        locally-stored secret. -derek -- Derek Atkins 617-623-3745
        de...@ihtfp.com <mailto:de...@ihtfp.com> www.ihtfp.com
<http://www.ihtfp.com> Computer and Internet Security Consultant
    ------------------------------------------------------------------------

    OAuth mailing list
    OAuth@ietf.org  <mailto:OAuth@ietf.org>
    https://www.ietf.org/mailman/listinfo/oauth



_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to