Phil, When you write that article, just let me know and I'll add a link to it from this one.
Thanks, -- Justin On Nov 2, 2014, at 6:52 PM, Phil Hunt <phil.h...@oracle.com> wrote: > John > > I am trying to establish how a client app org should assess an AS org and > their approach. > > Why is fb/connect or oidc, or other approaches good or bad? > > The client org has to do this. We shouldn't be in the business of assessing > goodness or compliance. > > Phil > >> On Nov 2, 2014, at 15:14, John Bradley <ve7...@ve7jtb.com> wrote: >> >> Many of the threats can only be mitigated by the AS/IDP . This document >> should cover that. >> >> I didn't say the IdP must use connect only that it needs to understand and >> mitigate the treats from the document, implementing Connect is one way to >> do it. >> >> Sorry I was trying to interpret "Sigh" >> >> John B. >> >> >> >>> On Nov 2, 2014, at 6:47 PM, Phil Hunt <phil.h...@oracle.com> wrote: >>> >>> That is not what I said. >>> >>> I said establish the criteria for mitigation of the threats. >>> >>> Phil >>> >>>> On Nov 2, 2014, at 12:53, John Bradley <ve7...@ve7jtb.com> wrote: >>>> >>>> Your proposal required changes and extensions to the AS. >>>> >>>> Without some cooperation from the AS /API provider, they shouldn't be >>>> using OAuth for identity. >>>> >>>> The client can't make it secure all on it's own. The API semantics might >>>> change, the client would largely be relying on luck. >>>> >>>> Sorry, >>>> >>>> What sort of advice are you looking for that the client can implement >>>> without the cooperation of the IdP around some of the security >>>> considerations. >>>> About the only thing would be to never use implicit. However that alone >>>> in my opinion is not sufficient for real security. >>>> >>>> John B. >>>> >>>> >>>> >>>> >>>>> On Nov 2, 2014, at 4:55 PM, Phil Hunt <phil.h...@oracle.com> wrote: >>>>> >>>>> Sigh. >>>>> >>>>> Phil >>>>> >>>>> @independentid >>>>> www.independentid.com >>>>> phil.h...@oracle.com >>>>> >>>>> >>>>> >>>>>> On Nov 2, 2014, at 10:33 AM, John Bradley <ve7...@ve7jtb.com> wrote: >>>>>> >>>>>> If a client developer doesn't have Connect available then they need to >>>>>> point the API developer at this doc, so that they do provide Connect or >>>>>> some other API that takes into account all of the security >>>>>> considerations. >>>>>> >>>>>> A client developer should never make up there own identity protocol out >>>>>> of someone else's API that is not designed for it. >>>>>> >>>>>> A vanilla OAuth API with no additional security considerations on the >>>>>> API developers part is pretty much guaranteed to go horribly wrong. >>>>>> >>>>>> John B. >>>>>> >>>>>>> On Nov 2, 2014, at 2:15 PM, Phil Hunt <phil.h...@oracle.com> wrote: >>>>>>> >>>>>>> We may have a problem with audience here. >>>>>>> >>>>>>> Justin mentioned he wrote it for service providers but the threats are >>>>>>> against the client that wants to authenticate users. >>>>>>> >>>>>>> Would be better to have recommendations for each group. >>>>>>> >>>>>>> Since oidc is the only recommendation, what does a client implementer >>>>>>> do when openid connect is not available? Suggest we give a list of >>>>>>> qualities developers should look for (eg is fb connect good)? >>>>>>> >>>>>>> Phil >>>>>>> >>>>>>>> On Nov 2, 2014, at 09:04, Torsten Lodderstedt >>>>>>>> <tors...@lodderstedt.net> wrote: >>>>>>>> >>>>>>>> Hi all, >>>>>>>> >>>>>>>> I just read the document. It explains the situation, >>>>>>>> challenges/threats, and options very clear and readable. >>>>>>>> >>>>>>>> So +1 for publishing it soon. >>>>>>>> >>>>>>>> kind regards, >>>>>>>> Torsten. >>>>>>>> >>>>>>>> Am 28.10.2014 00:21, schrieb Richer, Justin P.: >>>>>>>>> I've been incorporating peoples' feedback into the proposed oauth.net >>>>>>>>> page, and the current state is here: >>>>>>>>> >>>>>>>>> https://github.com/jricher/oauth.net/blob/authentication/articles/authentication.php >>>>>>>>> >>>>>>>>> Commentary has slowed down and I think the document's in reasonable. >>>>>>>>> I would like to publish this as a draft version on oauth.net in the >>>>>>>>> very near future (like, this week), so get comments and feedback to >>>>>>>>> me on this soon. I'm going to be at IIW all week if anyone wants to >>>>>>>>> back me into a corner and talk about this. >>>>>>>>> >>>>>>>>> -- Justin >>>>>>>>> >>>>>>>>>> On Oct 16, 2014, at 12:54 PM, Hannes Tschofenig >>>>>>>>>> <hannes.tschofe...@gmx.net> wrote: >>>>>>>>>> >>>>>>>>>> Participants: >>>>>>>>>> >>>>>>>>>> * Brian Campbell >>>>>>>>>> * John Bradley >>>>>>>>>> * Derek Atkins >>>>>>>>>> * Phil Hunt >>>>>>>>>> * William Kim >>>>>>>>>> * Josh Mandel >>>>>>>>>> * Hannes Tschofenig >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Notes: >>>>>>>>>> >>>>>>>>>> Justin distributed a draft writeup and explained the reasoning behind >>>>>>>>>> it. The intended purpose is to put the write-up (after enough >>>>>>>>>> review) on >>>>>>>>>> oauth.net. See attachments. Justin solicited feedback from the >>>>>>>>>> conference call participants and from the working group. >>>>>>>>>> >>>>>>>>>> One discussion item was specifically related to the concept of >>>>>>>>>> audience >>>>>>>>>> restrictions, which comes in two flavours: (a) restriction of the >>>>>>>>>> access >>>>>>>>>> token regarding the resource server and (b) restriction of the id >>>>>>>>>> token >>>>>>>>>> regarding the client. Obviously, it is necessary to have both of >>>>>>>>>> these >>>>>>>>>> audience restrictions in place and to actually check them. >>>>>>>>>> >>>>>>>>>> The group then went into a discussion about the use of pseudonyms in >>>>>>>>>> authentication and the problems deployments ran into when they used >>>>>>>>>> pseudonyms together with a wide range of attributes that identified >>>>>>>>>> users nevertheless. Phil suggested to produce a write-up about this >>>>>>>>>> topic. >>>>>>>>>> >>>>>>>>>> Finally, the group started a discussion about potential actions for >>>>>>>>>> the >>>>>>>>>> OAuth working groups. Two activities were mentioned, namely to >>>>>>>>>> produce >>>>>>>>>> an IETF draft of the write-up Justin has prepared as a "formal" >>>>>>>>>> response >>>>>>>>>> to the problems with authentication using OAuth and, as a second >>>>>>>>>> topic, >>>>>>>>>> potential re-chartering of the OAuth working group to work on some >>>>>>>>>> solutions in this area. Hannes suggested to postpone these >>>>>>>>>> discussions >>>>>>>>>> and to first finish the write-up Justin had distributed. >>>>>>>>>> >>>>>>>>>> Ciao >>>>>>>>>> Hannes & Derek >>>>>>>>>> <Authentication with OAuth 2.doc><Authentication with OAuth >>>>>>>>>> 2.html><Authentication with OAuth >>>>>>>>>> 2.pdf>_______________________________________________ >>>>>>>>>> OAuth mailing list >>>>>>>>>> OAuth@ietf.org >>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>> _______________________________________________ >>>>>>>>> OAuth mailing list >>>>>>>>> OAuth@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>> >>>>>>>> _______________________________________________ >>>>>>>> OAuth mailing list >>>>>>>> OAuth@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>> >>>>>>> _______________________________________________ >>>>>>> OAuth mailing list >>>>>>> OAuth@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/oauth >> > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth