TLS doesn't define how servers obtain certificates. It just assumes they are 
installed.  The same thing is happening here.

I'm not sure why this is objectionable. It is simply a broader model of your 
proprietary (meaning specific) solution for BB+.

Phil

@independentid
www.independentid.com
phil.h...@oracle.com







On 2013-08-22, at 1:18 PM, Justin Richer <jric...@mitre.org> wrote:

> But it also assumes, in many cases, a pre-registration step. I think you 
> might be simplifying for the case of one piece of software with the same 
> parameters talking to the same server many times. In some sense, it doesn't 
> matter to a client developer whether they have to send their display name as 
> part of a JSON object or as part of a signed JWT (though the former's 
> simpler, the results are the same), they still have to send it to the server. 
> You kick the can down the road and set up something where there's a 
> pre-registration step where common elements of the client's registration are 
> fixed -- but then the server's going to have to be able to get those common 
> elements at registration time and (later) at authorization time. Unless 
> you're building inside of a single security domain, this becomes tricky, with 
> all kinds of trust and policy issues. But it's useful and it can be done -- 
> that's what we did with the "trusted registration" extension that BB+ uses, 
> with registries and discovery using the initial access token. The server 
> effectively parses the initial access token and looks up information about 
> the client at the registry. We also toyed with the idea of packing the 
> registration information into the token itself. Either way, the server has to 
> decide that it trusts whoever issued that token, and it has to be able to 
> verify the token's veracity. In BB+, we're using discovery to find the JWK 
> that was used to sign the token and (optionally) token introspection to 
> verify that the initial access token hasn't been decomissioned by the 
> registry server. In this case, it's the registry that holds the fixed 
> information about the client -- not the auth server -- and so the trust model 
> is different.
> 
> I think we're better off starting with the fully open case, where neither the 
> app nor the server really know anything about each other, and build from 
> there. We know that that's a case that people want to solve. Note that BB+ 
> builds directly on what's already there -- you don't have to burn down the 
> house in order to hang a painting. I think that there are so many 
> similarities between the two that the software statement work can do the 
> same. 
> 
> I'd also like to point out something about passing client information around: 
> in the "fully stateless assertion" world that's being proposed (where there 
> *is* no registration step), the client ends up passing its full registration 
> information (as a software statement) with *every* call to the authorization 
> endpoint. The fact that the registration is encoded in an assertion is 
> immaterial. Having the server be truly stateless dramatically increases the 
> amount of information sent over the wire at runtime -- that's a pretty 
> universal tradeoff, and that's not a cost that everyone wants to pay. 
> 
>  -- Justin
> 
> On 08/22/2013 03:57 PM, Phil Hunt wrote:
>> Agreed. 
>> 
>> The problem for dyn reg is most params are optional and passed at reg time. 
>> I think this also represents huge complexity to client app developers since 
>> each sp may be different. Move bulk of info to statement simplifies the 
>> registration and encourages uniformity. 
>> 
>> Phil
>> 
>> On 2013-08-22, at 12:53, Justin Richer <jric...@mitre.org> wrote:
>> 
>>> Phil, thanks for writing this down. I think that part of the confusion in 
>>> this conversation may come from the nature of items such as the client id, 
>>> client secret, and even the registration access token. In many instances, 
>>> these are simply random values that the server generates and stores for 
>>> later use. However, as you point out, OAuth doesn't state that that has to 
>>> be the case any more than it states that a server must store access tokens. 
>>> The important thing is that the auth server be able to recognize and verify 
>>> each of these values. As such, nothing is stopping the server from staying 
>>> stateless and sending signed values to the client for each or all of these 
>>> fields, much in same way that a server can issue signed access tokens that 
>>> carry all their rights and state within. As long as all of these values 
>>> remain opaque to the client, everything in OAuth still works. It also works 
>>> fine within the current DynReg framework, as John has just pointed out 
>>> under a separate thread.
>>> 
>>>  -- Justin
>>> 
>>> On 08/22/2013 03:22 PM, Phil Hunt wrote:
>>>> I have attached a PDF including some of my thoughts, concerns, and 
>>>> suggestions for the upcoming meeting.
>>>> 
>>>> Phil
>>>> 
>>>> @independentid
>>>> www.independentid.com
>>>> phil.h...@oracle.com
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> On 2013-08-22, at 4:06 AM, "Tschofenig, Hannes (NSN - FI/Espoo)" 
>>>> <hannes.tschofe...@nsn.com> wrote:
>>>> 
>>>> > I messed up the conference bridge time; here is the corrected version 
>>>> > but the details are actually the same. 
>>>> > 
>>>> > Meeting Number: 702 442 101 
>>>> > Meeting Password: oauth 
>>>> > 
>>>> > ------------------------------------------------------- 
>>>> > To join the online meeting 
>>>> > ------------------------------------------------------- 
>>>> > 1. Go to 
>>>> > https://nsn.webex.com/nsn/j.php?ED=268691357&UID=0&PW=NOTlkZjIwNTEy&RT=MiMyNQ%3D%3D
>>>> >  
>>>> > 2. Enter your name and email address. 
>>>> > 3. Enter the meeting password: oauth 
>>>> > 4. Click "Join Now". 
>>>> > 
>>>> > To view in other time zones or languages, please click the link: 
>>>> > https://nsn.webex.com/nsn/j.php?ED=268691357&UID=0&PW=NOTlkZjIwNTEy&ORT=MiMyNQ%3D%3D
>>>> >  
>>>> > 
>>>> > ------------------------------------------------------- 
>>>> > To join the Teleconference 
>>>> > ------------------------------------------------------- 
>>>> > Global dial-in numbers: http://www.nokiasiemensnetworks.com/nvc 
>>>> > Conference Code: 944 910 5485 
>>>> > 
>>>> > To update this meeting to your calendar program (for example Microsoft 
>>>> > Outlook), click this link: 
>>>> > https://nsn.webex.com/nsn/j.php?ED=268691357&UID=0&ICS=MRS3&LD=1&RD=2&ST=1&SHA2=KseMD/IKx0YGjSRaNyDJbqnmJ2i-xirziLGyc2bHNI8=&RT=MiMyNQ%3D%3D
>>>> > 
>>>> >> -----Original Message-----
>>>> >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
>>>> >> Of ext Tschofenig, Hannes (NSN - FI/Espoo)
>>>> >> Sent: Wednesday, August 21, 2013 6:35 PM
>>>> >> To: oauth mailing list
>>>> >> Subject: [OAUTH-WG] Dynamic Client Registration Conference Call: Thu 22
>>>> >> Aug, 2pm PDT: Conference Bridge Details
>>>> >> 
>>>> >> Here is the conference bridge and Webex information.
>>>> >> 
>>>> >> From an agenda point of view I guess we should start at a basic level,
>>>> >> namely with what we have already in the dynamic client registration
>>>> >> document (and folks may have actually missed it). There are two use
>>>> >> cases described in the WG document, namely
>>>> >> - Use Case #1: Open Registration (Appendix B.1)
>>>> >> - Use Case #2: Protected Registration (Appendix B.2)
>>>> >> 
>>>> >> Then, we could talk about some more sophisticated use cases where
>>>> >> information for protected registration is provided by a third party.
>>>> >> 
>>>> >> --------------------
>>>> >> 
>>>> >> Meeting Number: 702 442 101
>>>> >> Meeting Password: oauth
>>>> >> 
>>>> >> -------------------------------------------------------
>>>> >> To join the online meeting
>>>> >> -------------------------------------------------------
>>>> >> 1. Go to
>>>> >> https://nsn.webex.com/nsn/j.php?ED=268691357&UID=0&PW=NOTlkZjIwNTEy&RT=
>>>> >> MiMzMA%3D%3D
>>>> >> 2. Enter your name and email address.
>>>> >> 3. Enter the meeting password: oauth
>>>> >> 4. Click "Join Now".
>>>> >> 
>>>> >> To view in other time zones or languages, please click the link:
>>>> >> https://nsn.webex.com/nsn/j.php?ED=268691357&UID=0&PW=NOTlkZjIwNTEy&ORT
>>>> >> =MiMzMA%3D%3D
>>>> >> 
>>>> >> -------------------------------------------------------
>>>> >> To join the teleconference only
>>>> >> -------------------------------------------------------
>>>> >> Global Dial-In Numbers: http://www.nokiasiemensnetworks.com/nvc
>>>> >> Conference Code: 944 910 5485
>>>> >> _______________________________________________
>>>> >> OAuth mailing list
>>>> >> OAuth@ietf.org
>>>> >> https://www.ietf.org/mailman/listinfo/oauth
>>>> > _______________________________________________
>>>> > OAuth mailing list
>>>> > OAuth@ietf.org
>>>> > https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to