+1

On Thu, Apr 7, 2016 at 12:25 PM, Mike Jones <michael.jo...@microsoft.com>
wrote:

> Yes - an intentionally conservative, implementation- and experience-driven
> path.
>
> Revising OAuth 2.0 is a *big deal*.  We shouldn't even be talking about it
> until we've completed steps 1-5 below - *including* the "iterate" step, as
> necessary.  If we get this wrong, we'll fragment OAuth, which is a terrible
> and irresponsible outcome we should consciously avoid at all costs.
>
> In particular, we should not recharter for an OAuth 2.1 until we already
> know what will be in it and know from deployment experience that it's the
> right stuff.
>
>                                 -- Mike
>
> -----Original Message-----
> From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net]
> Sent: Thursday, April 7, 2016 3:16 PM
> To: Mike Jones <michael.jo...@microsoft.com>
> Cc: Samuel Erdtman <sam...@erdtman.se>; Anthony Nadalin <
> tony...@microsoft.com>; oauth@ietf.org
> Subject: Re: [OAUTH-WG] OAuth 2.1
>
> Hi Mike,
>
> in my opinion, you described a possible path towards 2.1. Would you agree?
>
> best regards,
> Torsten.
>
> > Am 07.04.2016 um 13:38 schrieb Mike Jones <michael.jo...@microsoft.com>:
> >
> > I am strongly against creating a 2.1 spec until we have at least a year
> of deployment experience with the contents we're adding to 2.0, so as not
> to fragment the OAuth marketplace.
> >
> > I think we should:
> > 1.  Continue working on new security mitigations in new drafts (such
> > as mix-up-mitigation, etc.) that add features to use with 2.0 2.
> > Continue working on PoP specs (such as pop-key-distribution, etc.)
> > that add features to use with 2.0 3.  Continue working on other new
> > specs (such as discovery, resource-indicators, etc.) that add features
> > to use with 2.0 4.  Learn from deployment experience with all of them
> > 5.  Iterate if the deployment experience tells us that we need to
> >
> > Only after we believe we have all the features right and we know that
> they work together well should we consider creating a 2.1.  If we rush to a
> 2.1 and get it wrong, we'll lose developers' trust and we'll never get it
> back.
> >
> >                -- Mike
> >
> > -----Original Message-----
> > From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Samuel
> > Erdtman
> > Sent: Thursday, April 7, 2016 12:48 PM
> > To: Anthony Nadalin <tony...@microsoft.com>
> > Cc: oauth@ietf.org
> > Subject: Re: [OAUTH-WG] OAuth 2.1
> >
> > +1 on a 2.1 version
> >
> > -1 on defining scopes more precisely in 2.1
> >
> > Sent from my iPhone
> >
> >> On 7 apr. 2016, at 14:46, Anthony Nadalin <tony...@microsoft.com>
> wrote:
> >>
> >> I don't belive that scopes should be defined more precisely as this
> opaqueness was a design feature, I'm not seeing the reason why scopes need
> to be defined, as these are application specific.
> >>
> >> -----Original Message-----
> >> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Torsten
> >> Lodderstedt
> >> Sent: Thursday, April 7, 2016 5:32 AM
> >> To: George Fletcher <gffle...@aol.com>
> >> Cc: oauth@ietf.org
> >> Subject: Re: [OAUTH-WG] OAuth 2.1
> >>
> >> Hi all,
> >>
> >> as I already said in the meeting: I would very much prefer to have an
> extension/update of RFC 6819 covering all "new" threats, including:
> >> - mix up
> >> - code injection aka copy and paste
> >> - open redirector at AS and client
> >> - potential other threats in the context of "dynamic" OAuth
> >>
> >> I also assume mitigations for (at least some of) the threats need to go
> into an update of RFC 6749 as normative text. To give an example: if we
> agree on using the state parameter at the token endpoint to mitigate code
> injection, this MUST be part of the core spec (request description and
> security consoderations). Otherwise, noone will even  consider it.
> >>
> >> We should also use the opportunity to improve/enhance the text of the
> spec. In the course of the last years, we have learned a lot about
> ambiquities of the text and how different implementations utilize OAuth.
> >>
> >> I think time is right to define scopes more precisely. As the
> discussions in the last days proved again (at least for me), scope is not
> sufficiently defined to come up with interoperable implementations.
> Additionally, there seems to be a need to represent resource server
> locations (to not say identities :-)) in this context.
> >>
> >> To bundle all changes in a version 2.1 would also make communication
> into the market much easier.
> >>
> >> best regards,
> >> Torsten.
> >>
> >>> Am 06.04.2016 um 16:05 schrieb George Fletcher <gffle...@aol.com>:
> >>>
> >>> I'd definitely prefer a single solution document to many little ones
> that have to be combined to actually build a secure solution. It's already
> getting complex with the additional specs that have been added.
> >>>
> >>> Additionally, I'm not against working on OAuth 2.1.
> >>>
> >>> Thanks,
> >>> George
> >>>
> >>>> On 4/6/16 2:06 PM, Phil Hunt (IDM) wrote:
> >>>>
> >>>> Existing implementations are for the large part ok and do not need
> these mitigations.
> >>>>
> >>>> Only the new use cases we have been discussing (configure on the fly
> and multi-as, etc) really need mitigation.
> >>>>
> >>>> The updated by approach seems like a good way to address the new
> cases.
> >>>>
> >>>> Phil
> >>>>
> >>>>> On Apr 6, 2016, at 14:35, Hannes Tschofenig <
> hannes.tschofe...@gmx.net> wrote:
> >>>>>
> >>>>> Hi all,
> >>>>>
> >>>>> today we discussed the OAuth Authorization Server Mixup draft. We
> >>>>> were wondering what types of threats the document should find
> solutions for.
> >>>>>
> >>>>> We discussed various document handling approaches including
> >>>>> * OAuth Mix-Up and Cut-and-Paste attacks documented in separate
> >>>>> solution documents
> >>>>> * combined solution document covering the OAuth Mix-Up and the
> >>>>> Cut-and-Paste attacks.
> >>>>>
> >>>>> Barry pointed out that these documents could update the OAuth base
> >>>>> specification.
> >>>>>
> >>>>> As a more radical change it was also suggested to revise RFC 6749
> >>>>> "OAuth
> >>>>> 2.0 Authorization Framework" and RFC 6819 "OAuth 2.0 Threat Model
> >>>>> and Security Considerations".
> >>>>>
> >>>>> Opening up the OAuth base specification obviously raises various
> >>>>> other questions about cleaning up parts that go far beyond the AS
> >>>>> mix-up and the cut-and-paste attacks. Other specifications, such
> >>>>> as the Open Redirector, could be folded into such a new
> specification.
> >>>>>
> >>>>> Derek and I would appreciate your input on this topic before we
> >>>>> make a decision since it has significant impact on our work.
> >>>>>
> >>>>> Ciao
> >>>>> Hannes & Derek
> >>>>>
> >>>>>
> >>>>> _______________________________________________
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org
> >>>>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fw
> >>>>> w
> >>>>> w
> >>>>> .ietf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40mi
> >>>>> c
> >>>>> r
> >>>>> osoft.com%7cce8c942bed81437aca0408d35ee0be21%7c72f988bf86f141af91a
> >>>>> b
> >>>>> 2
> >>>>> d7cd011db47%7c1&sdata=BqcE9eDhm8pgdoitrPFufouxS6qYndnkLgLa5SPk2HI%
> >>>>> 3
> >>>>> d
> >>>> _______________________________________________
> >>>> OAuth mailing list
> >>>> OAuth@ietf.org
> >>>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww.
> >>>> ietf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40micr
> >>>> o
> >>>> s
> >>>> oft.com%7cce8c942bed81437aca0408d35ee0be21%7c72f988bf86f141af91ab2d
> >>>> 7 c
> >>>> d011db47%7c1&sdata=BqcE9eDhm8pgdoitrPFufouxS6qYndnkLgLa5SPk2HI%3d
> >>>
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww.
> >>> i
> >>> etf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40micros
> >>> o
> >>> f
> >>> t.com%7cce8c942bed81437aca0408d35ee0be21%7c72f988bf86f141af91ab2d7cd
> >>> 0
> >>> 1 1db47%7c1&sdata=BqcE9eDhm8pgdoitrPFufouxS6qYndnkLgLa5SPk2HI%3d
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww.
> >> i
> >> etf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40microso
> >> f
> >> t.com%7cce8c942bed81437aca0408d35ee0be21%7c72f988bf86f141af91ab2d7cd0
> >> 1 1db47%7c1&sdata=BqcE9eDhm8pgdoitrPFufouxS6qYndnkLgLa5SPk2HI%3d
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to