Hiya,
Sorry - I should have posted the announce here too. Not doing so was just an oversight. Discussion of overlaps between the newly proposed and existing work is a fine topic for the new list I'd say. But better there than here. Cheers, S On 6 December 2014 11:42:57 GMT+00:00, Hannes Tschofenig <hannes.tschofe...@gmx.net> wrote: >I think it should be the responsibility of document authors to read the >the state of the art to avoid re-inventing the wheel (particularly >since >their co-workers have been heavily involved in the work). > >It is not true that we have been waiting for 4 years for this now since >they have changed their solution approach many times and the use of the >raw public key in combination with the PoP solution would have given a >complete solution. > >Ciao >Hannes > > >On 12/06/2014 11:09 AM, John Bradley wrote: >> They have examples of how it could be used in OAuth and Connect. >They didn't look at what we were doing with PoP so the examples don't >line up. >> >> That is why it is important to keep on top of this so that it is the >OAuth WG that is defining how this binding mechanism is used in OAuth >and JWT. >> >> The specs themselves are, or should be independent of token type. >> >> We have been waiting for TLS to produce this for around 4 years now. > It is not really new work, mostly a change of venue to make progress. >> >> All of this was discussed at the last IETF meeting. I thought a >significant number of people from the OAuth WG were in the room. >> >> John B. >>> On Dec 6, 2014, at 6:28 AM, Hannes Tschofenig ><hannes.tschofe...@gmx.net> wrote: >>> >>> I agree with Phil. As currently described it replicates a lot of the >>> work we have done in PoP. >>> >>> Ciao >>> Hannes >>> >>> On 12/06/2014 09:52 AM, John Bradley wrote: >>>> No, this is the the work formerly known as origin bound >certificates & Channel ID. We need this to bind id_tokens and or >access tokens to TLS sessions. >>>> >>>> So it is an alternative TLS binding mechanism. We still need to >describe how to use it with OAuth and JWT. >>>> >>>> It is a building block we can use for PoP. >>>> >>>> John B. >>>>> On Dec 5, 2014, at 10:48 PM, Phil Hunt <phil.h...@oracle.com> >wrote: >>>>> >>>>> Doesn't that duplicate our current work? >>>>> >>>>> Phil >>>>> >>>>>> On Dec 5, 2014, at 11:17, Hannes Tschofenig ><hannes.tschofe...@gmx.net> wrote: >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> -------- Forwarded Message -------- >>>>>> Subject: [websec] unbearable - new mailing list to discuss better >than >>>>>> bearer tokens... >>>>>> Date: Fri, 05 Dec 2014 16:43:19 +0000 >>>>>> From: Stephen Farrell <stephen.farr...@cs.tcd.ie> >>>>>> Reply-To: Stephen Farrell <stephen.farr...@cs.tcd.ie> >>>>>> To: s...@ietf.org <s...@ietf.org>, websec <web...@ietf.org>, >>>>>> u...@ietf.org <u...@ietf.org>, ietf-http...@w3.org Group >>>>>> <ietf-http...@w3.org>, http-a...@ietf.org <http-a...@ietf.org> >>>>>> >>>>>> >>>>>> Hiya, >>>>>> >>>>>> Following up on the presentation at IETF-91 on this topic, [1] >>>>>> we've created a new list [2] for moving that along. The list >>>>>> description is: >>>>>> >>>>>> "This list is for discussion of proposals for doing better than >bearer >>>>>> tokens (e.g. HTTP cookies, OAuth tokens etc.) for web >applications. >>>>>> The specific goal is chartering a WG focused on preventing >security >>>>>> token export and replay attacks." >>>>>> >>>>>> If you're interested please join in. >>>>>> >>>>>> Thanks to Vinod and Andrei for agreeing to admin the list. >>>>>> >>>>>> We'll kick off discussion in a few days when folks have had >>>>>> a chance to subscribe. >>>>>> >>>>>> Cheers, >>>>>> S. >>>>>> >>>>>> PS: Please don't reply-all to this, join the new list, wait >>>>>> a few days and then say what you need to say:-) >>>>>> >>>>>> [1] https://tools.ietf.org/agenda/91/slides/slides-91-uta-2.pdf >>>>>> [2] https://www.ietf.org/mailman/listinfo/unbearable >>>>>> >>>>>> _______________________________________________ >>>>>> websec mailing list >>>>>> web...@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/websec >>>>>> >>>>>> >>>>>> >>>>>> _______________________________________________ >>>>>> OAuth mailing list >>>>>> OAuth@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>> >>>>> _______________________________________________ >>>>> OAuth mailing list >>>>> OAuth@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>> >> > > > >------------------------------------------------------------------------ > >_______________________________________________ >OAuth mailing list >OAuth@ietf.org >https://www.ietf.org/mailman/listinfo/oauth _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth