inline
> On Mar 5, 2015, at 9:59 AM, Hannes Tschofenig <hannes.tschofe...@gmx.net> 
> wrote:
> 
> Hi all,
> 
> I refreshed the PoP key distribution document. No changes to the
> content of the document.
> 
> The document contains two questions, namely
> 
> QUESTION: A benefit of asymmetric cryptography is to allow clients to
>   request a PoP token for use with multiple resource servers.  The
>   downside of that approach is linkability since different resource
>   servers will be able to link individual requests to the same client.
>   (The same is true if the a single public key is linked with PoP
>   tokens used with different resource servers.)  Nevertheless, to
>   support the functionality the audience parameter could carry an array
>   of values.  Is this desirable?
> 
> 
> Hannes: My view is that we do not want to introduce likability into
> OAuth via the use of these keys. As such, different keys for different
> origins.
> 
> 
John:  Having an array increases complexity and decreases privacy by allowing 
RS to link.

Audiance should be a single value.  That requires separate keys for symmetric, 
or asymmetric keys provisioned by the AS.

For asymmetric keys provisioned by the client it would be up to the client to 
decide if using the same key for multiple RS makes sense.  

It might be that there is a single key provisioned by a MSM in the tpm that 
they want to use for all the connections as that is the most secure, and are 
not concerned with correlation as all the RS are internal to a single 
enterprise.



> QUESTION: Should we register the token_type and alg parameters for use
> with the dynamic client registration protocol?
> 
> Hannes: I believe we should register these two parameters into the
> dynamic client registration protocol since that allows us to configure
> the values for the client rather than exchanging them with every message.
> 
John:  Yes I had assumed that that was a no brainer.
The other question on registering is if we should allow the client to 
preregister a public key as well.
In some situations the client may want to always use the same key and making 
them push it each time is a waste of bandwidth.

John B.
> Feedback appreciated before the submission deadline.
> 
> Ciao
> Hannes
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to