Barry,

I’ve uploaded a new draft that should address your comments below:

Draft: https://tools.ietf.org/html/draft-ietf-oauth-introspection-10 
<https://tools.ietf.org/html/draft-ietf-oauth-introspection-10>

Diff: https://tools.ietf.org/rfcdiff?url2=draft-ietf-oauth-introspection-10.txt 
<https://tools.ietf.org/rfcdiff?url2=draft-ietf-oauth-introspection-10.txt>

Hopefully this will be sufficient to clear the DISCUSS.

Please let me know if you have any further questions,
 — Justin

> On Jun 11, 2015, at 5:32 PM, Barry Leiba <barryle...@computer.org> wrote:
> 
>>> 1. Why is GET an optimization?  It has privacy disadvantages, and I
>>> don't see any advantages.
>>> 
>>> 2. This "tight coupling" thing is something that I think weakens the
>>> interoperability of the OAuth protocol in general, and I've never
>>> liked it.  In this case, in particular, I don't see any advantage to
>>> it, and I don't understand why it's useful to have an option that only
>>> works if you have inside knowledge, for no benefit.
>>> 
>>> Why is it ever good to have clients that only work with certain
>>> servers, when it's just as easy to make sure that all clients work
>>> with all servers?
>> 
>> I can see your point here, and others have raised it as well. Part of
>> the reason the GET option is there is that most (if not all) of the
>> existing implementations of this protocol enable it anyway. Having
>> thought about this a bit, I would be fine with simply saying that POST
>> is required and remaining silent on other methods in the main section.
>> We can keep the warnings against also allowing GET in the security
>> considerations. Will that work?
> 
> That will be of great excellence all 'round.  Thanks!
> 
> Barry

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to