Right, I read that as text for describing the examples and not for describing 
requirements.

The token itself doesn’t have to be signed at all.

 — Justin

> On Nov 25, 2015, at 1:05 PM, Phil Hunt <phil.h...@oracle.com> wrote:
> 
> Ok. Well this was requested by Kathleen because of this paragraph in Sec 6.…
> 
>    To simplify the subsequent description we assume in the PoP architecture
>    that the token itself is digitally signed by the authorization server
>    and therefore cannot be modified.
> 
> Please 
> Phil
> 
> @independentid
> www.independentid.com <http://www.independentid.com/>phil.h...@oracle.com 
> <mailto:phil.h...@oracle.com>
>> On Nov 25, 2015, at 9:33 AM, Justin Richer <jric...@mit.edu 
>> <mailto:jric...@mit.edu>> wrote:
>> 
>> The token doesn’t have to be signed and the client doesn’t have to verify 
>> the signature on the token. That’s not PoP. The request has to be signed in 
>> a way that includes the token. The token itself can still be opaque. The 
>> *key* material can’t be opaque to the client, but the *token* material still 
>> is.
>> 
>> I agree with Brian that this statement is misleading.
>> 
>> The examples use a signed token but that is absolutely not a requirement. 
>> Maybe the examples shouldn’t all use one style.
>> 
>> What’s most difficult about this particular spec is that it’s very 
>> hand-wavy, saying “this is kinda a thing that kinda works like this” without 
>> saying how to actually do it. I’m honestly not sure it’s worth publishing as 
>> an RFC in its own right but I’m not going to stand in its way.
>> 
>>  — Justin
>> 
>>> On Nov 25, 2015, at 12:14 PM, Brian Campbell <bcampb...@pingidentity.com 
>>> <mailto:bcampb...@pingidentity.com>> wrote:
>>> 
>>> Where does it say that? 
>>> 
>>> 
>>> 
>>> On Wed, Nov 25, 2015 at 8:44 AM, Phil Hunt <phil.h...@oracle.com 
>>> <mailto:phil.h...@oracle.com>> wrote:
>>> Except that later on we require the token be signed and the client verify 
>>> that signed token. IOW mutual pop. 
>>> 
>>> Phil
>>> 
>>> On Nov 25, 2015, at 07:30, Brian Campbell <bcampb...@pingidentity.com 
>>> <mailto:bcampb...@pingidentity.com>> wrote:
>>> 
>>>> Looking at the diff I noticed the following new text, which seems to 
>>>> conflate bearer/PoP and opaqueness to the client. A client demonstrating 
>>>> proof-of-possession of some key is orthogonal to the client being able to 
>>>> parse and understand the access token itself. 
>>>>  
>>>> "In contrast to bearer tokens [RFC6750] which call for tokens that are 
>>>> opaque to OAuth 2.0 clients, this specification defines the requirements 
>>>> for proof-of-possession ("PoP") tokens that may be parsed and verified by 
>>>> OAuth 2.0 clients and relying parties."
>>>> 
>>>> On Tue, Nov 24, 2015 at 1:07 PM, Phil Hunt <phil.h...@oracle.com 
>>>> <mailto:phil.h...@oracle.com>> wrote:
>>>> This draft addresses review comments from Kathleen and Erik raised since 
>>>> the last draft.
>>>> 
>>>> It may not include some of the discussion from yesterday/today.  I will 
>>>> add that as the group decides.
>>>> 
>>>> Cheers,
>>>> 
>>>> Phil
>>>> 
>>>> @independentid
>>>> www.independentid.com <http://www.independentid.com/>
>>>> phil.h...@oracle.com <mailto:phil.h...@oracle.com>
>>>> 
>>>> > On Nov 24, 2015, at 12:05 PM, internet-dra...@ietf.org 
>>>> > <mailto:internet-dra...@ietf.org> wrote:
>>>> >
>>>> >
>>>> > A New Internet-Draft is available from the on-line Internet-Drafts 
>>>> > directories.
>>>> > This draft is a work item of the Web Authorization Protocol Working 
>>>> > Group of the IETF.
>>>> >
>>>> >        Title           : OAuth 2.0 Proof-of-Possession (PoP) Security 
>>>> > Architecture
>>>> >        Authors         : Phil Hunt
>>>> >                          Justin Richer
>>>> >                          William Mills
>>>> >                          Prateek Mishra
>>>> >                          Hannes Tschofenig
>>>> >       Filename        : draft-ietf-oauth-pop-architecture-06.txt
>>>> >       Pages           : 23
>>>> >       Date            : 2015-11-24
>>>> >
>>>> > Abstract:
>>>> >   The OAuth 2.0 bearer token specification, as defined in RFC 6750,
>>>> >   allows any party in possession of a bearer token (a "bearer") to get
>>>> >   access to the associated resources (without demonstrating possession
>>>> >   of a cryptographic key).  To prevent misuse, bearer tokens must be
>>>> >   protected from disclosure in transit and at rest.
>>>> >
>>>> >   Some scenarios demand additional security protection whereby a client
>>>> >   needs to demonstrate possession of cryptographic keying material when
>>>> >   accessing a protected resource.  This document motivates the
>>>> >   development of the OAuth 2.0 proof-of-possession security mechanism.
>>>> >
>>>> >
>>>> > The IETF datatracker status page for this draft is:
>>>> > https://datatracker.ietf.org/doc/draft-ietf-oauth-pop-architecture/ 
>>>> > <https://datatracker.ietf.org/doc/draft-ietf-oauth-pop-architecture/>
>>>> >
>>>> > There's also a htmlized version available at:
>>>> > https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-06 
>>>> > <https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-06>
>>>> >
>>>> > A diff from the previous version is available at:
>>>> > https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-pop-architecture-06 
>>>> > <https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-pop-architecture-06>
>>>> >
>>>> >
>>>> > Please note that it may take a couple of minutes from the time of 
>>>> > submission
>>>> > until the htmlized version and diff are available at tools.ietf.org 
>>>> > <http://tools.ietf.org/>.
>>>> >
>>>> > Internet-Drafts are also available by anonymous FTP at:
>>>> > ftp://ftp.ietf.org/internet-drafts/ <ftp://ftp.ietf.org/internet-drafts/>
>>>> >
>>>> > _______________________________________________
>>>> > OAuth mailing list
>>>> > OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>> > https://www.ietf.org/mailman/listinfo/oauth 
>>>> > <https://www.ietf.org/mailman/listinfo/oauth>
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>> 
>>>> 
>>>> 
>>>> -- 
>>>>  <https://www.pingidentity.com/>                           
>>>> Brian Campbell
>>>> Distinguished Engineer
>>>> Ping Identity
>>>> @  bcampb...@pingidentity.com <mailto:bcampb...@pingidentity.com>
>>>>    +1 720.317.2061 <tel:%2B1%20720.317.2061>
>>>>    @pingidentity
>>>> Connect with us!
>>>>  <https://www.pingidentity.com/> <https://www.pingidentity.com/>
>>>>  <https://ping.force.com/Support/PingIdentityCommunityHome> 
>>>> <https://ping.force.com/Support/PingIdentityCommunityHome> 
>>>> <http://www.glassdoor.com/Overview/Working-at-Ping-Identity-EI_IE380907.11,24.htm>
>>>>   <https://twitter.com/pingidentity>  
>>>> <https://www.youtube.com/user/PingIdentityTV>  
>>>> <https://www.linkedin.com/company/21870>  
>>>> <https://www.facebook.com/pingidentitypage>  
>>>> <https://plus.google.com/u/0/114266977739397708540>  
>>>> <http://www.slideshare.net/PingIdentity>  <http://flip.it/vjBF7>  
>>>> <https://www.pingidentity.com/blogs/>
>>> 
>>> 
>>> -- 
>>>  <https://www.pingidentity.com/>                            
>>> Brian Campbell
>>> Distinguished Engineer
>>> Ping Identity
>>> @   bcampb...@pingidentity.com <mailto:bcampb...@pingidentity.com>
>>>     +1 720.317.2061
>>>     @pingidentity
>>> Connect with us!
>>>  <https://www.pingidentity.com/> <https://www.pingidentity.com/>
>>>  <https://ping.force.com/Support/PingIdentityCommunityHome> 
>>> <https://ping.force.com/Support/PingIdentityCommunityHome> 
>>> <http://www.glassdoor.com/Overview/Working-at-Ping-Identity-EI_IE380907.11,24.htm>
>>>   <https://twitter.com/pingidentity>  
>>> <https://www.youtube.com/user/PingIdentityTV>  
>>> <https://www.linkedin.com/company/21870>  
>>> <https://www.facebook.com/pingidentitypage>  
>>> <https://plus.google.com/u/0/114266977739397708540>  
>>> <http://www.slideshare.net/PingIdentity>  <http://flip.it/vjBF7>  
>>> <https://www.pingidentity.com/blogs/>_______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/oauth 
>>> <https://www.ietf.org/mailman/listinfo/oauth>
>> 
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to