What was wrong with HOK?

Aside: Why was “the” so important in HOTK?

Phil

@independentid
www.independentid.com
phil.h...@oracle.com

On Apr 3, 2014, at 9:37 AM, Anil Saldhana <anil.saldh...@redhat.com> wrote:

> Prateek,
>   why not just use "proof"? 
> 
> draft-hunt-oauth-proof-architecture-00.txt
> 
> Is that allowed by IETF?
> 
> 
> Regards,
> Anil
> 
> On 04/03/2014 11:30 AM, Prateek Mishra wrote:
>> "key confirmed" or "key confirmation" is another term that is widely used 
>> for these use-cases
>>> I really *like* the name "proof of possession", but I think the acronym PoP 
>>> is going to be confused with POP.  HOTK has the advantage of not being a 
>>> homonym for aything else.  What about "Possession Proof"?
>>>  
>>> -bill
>>> 
>>> 
>>> --------------------------------
>>> William J. Mills
>>> "Paranoid" MUX Yahoo!
>>> 
>>> On Thursday, April 3, 2014 1:38 AM, "internet-dra...@ietf.org" 
>>> <internet-dra...@ietf.org> wrote:
>>> 
>>> A new version of I-D, draft-hunt-oauth-pop-architecture-00.txt
>>> has been successfully submitted by Hannes Tschofenig and posted to the
>>> IETF repository.
>>> 
>>> Name:        draft-hunt-oauth-pop-architecture
>>> Revision:    00
>>> Title:        OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
>>> Document date:    2014-04-03
>>> Group:        Individual Submission
>>> Pages:        21
>>> URL:            
>>> http://www.ietf.org/internet-drafts/draft-hunt-oauth-pop-architecture-00.txt
>>> Status:        
>>> https://datatracker.ietf.org/doc/draft-hunt-oauth-pop-architecture/
>>> Htmlized:      
>>> http://tools.ietf.org/html/draft-hunt-oauth-pop-architecture-00
>>> 
>>> 
>>> Abstract:
>>>   The OAuth 2.0 bearer token specification, as defined in RFC 6750,
>>>   allows any party in possession of a bearer token (a "bearer") to get
>>>   access to the associated resources (without demonstrating possession
>>>   of a cryptographic key).  To prevent misuse, bearer tokens must to be
>>>   protected from disclosure in transit and at rest.
>>> 
>>>   Some scenarios demand additional security protection whereby a client
>>>   needs to demonstrate possession of cryptographic keying material when
>>>   accessing a protected resource.  This document motivates the
>>>   development of the OAuth 2.0 proof-of-possession security mechanism.
>>> 
>>>                                                                             
>>>       
>>> 
>>> 
>>> Please note that it may take a couple of minutes from the time of submission
>>> until the htmlized version and diff are available at tools.ietf.org.
>>> 
>>> The IETF Secretariat
>>> 
>>> 
>  
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to