Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Brian Eaton
On Tue, Mar 9, 2010 at 11:02 PM, Luke Shepard wrote: > I'd still like to see someone construct an example access token that is > longer than 255 characters that would be reasonably used. If there > are real, legitimate use cases that REQUIRE more than that many > characters, then let's hear them.

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Luke Shepard
I'd still like to see someone construct an example access token that is longer than 255 characters that would be reasonably used. If there are real, legitimate use cases that REQUIRE more than that many characters, then let's hear them. I don't think that appealing to "it might be useful" is a g

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread David Waite
On Mar 9, 2010, at 8:16 PM, David Recordon wrote: > The challenge is that client developers (who we really want to make > OAuth dead simple for) will be forced to use less optimal storage for > tokens (blobs versus shorter and indexable types such as varchars). > They also won't be able to build a

Re: [OAUTH-WG] [WRAP] Username and Password Profile

2010-03-09 Thread Brian Eaton
On Tue, Mar 9, 2010 at 12:02 PM, David Recordon wrote: > I'd rather support the client secret and document the hell out of the > security considerations for the profile. Thinking out loud... what if we called it the "server you trust to use username and password profile" instead of the client app

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Torsten Lodderstedt
Hi, Whoa- are we seriously saying we need more than 255 characters to encode a token? (By the way, that's 10^396 combinations, with letters and numbers.) yes. As I said, in our approach we put permissions and attributes into the tokens. Having short tokens makes the whole protocol much si

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Brian Eaton
On Tue, Mar 9, 2010 at 4:44 PM, David Recordon wrote: > I believe that Google wishes to encode information within access > tokens so that they can be verified in a stateless manner.  Brian, how > many characters do you need? I think it would be OK to make request tokens short. They are service-s

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Luke Shepard
Whoa- are we seriously saying we need more than 255 characters to encode a token? (By the way, that's 10^396 combinations, with letters and numbers.) Having short tokens makes the whole protocol much simpler, more approachable, easy to use for developers. I will push hard to keep them short and

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Torsten Lodderstedt
Hi David, I wouldn't restrict the length of a tokens to 255 characters, especially for access tokens. Our proprietary token service today uses a token type combination similar to OAUTH refresh and access tokens. Based on our experiences I would assume the following characteristics of a large

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Dick Hardt
On 2010-03-09, at 7:50 PM, David Recordon wrote: > On Tue, Mar 9, 2010 at 7:25 PM, Dick Hardt wrote: >> I understand the desire to set a max length that can easily fit into a DB. >> There are lots of other items I think the developer is storing that can be >> long as well, like URLs -- so I don'

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread David Recordon
On Tue, Mar 9, 2010 at 7:25 PM, Dick Hardt wrote: > I understand the desire to set a max length that can easily fit into a DB. > There are lots of other items I think the developer is storing that can be > long as well, like URLs -- so I don't see it as a huge issue. > I do see the need to make it

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Marius Scurtescu
On Tue, Mar 9, 2010 at 7:16 PM, David Recordon wrote: > The challenge is that client developers (who we really want to make > OAuth dead simple for) will be forced to use less optimal storage for > tokens (blobs versus shorter and indexable types such as varchars). > They also won't be able to bui

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Dick Hardt
I understand the desire to set a max length that can easily fit into a DB. There are lots of other items I think the developer is storing that can be long as well, like URLs -- so I don't see it as a huge issue. I do see the need to make it clear that it can be a few K or something like that so th

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread David Recordon
The challenge is that client developers (who we really want to make OAuth dead simple for) will be forced to use less optimal storage for tokens (blobs versus shorter and indexable types such as varchars). They also won't be able to build any assumptions around token length into their database desi

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Dick Hardt
On 2010-03-09, at 6:24 PM, Ethan Jewett wrote: > I think it would make sense to advise client library and application > programmers to provide for the possibility of and storage of large > tokens. We should probably reference examples of tokens seen in the > wild and mention the technical limitat

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Ethan Jewett
Agreed. I've heard tell of Yahoo access tokens with encoded information weighing in at up to 800 characters. I don't see anything necessarily wrong with this and I don't think there's much reason to limit it in the spec. It could incur a significant bandwidth cost, but since the provider is going t

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Dick Hardt
On 2010-03-09, at 4:23 PM, Marius Scurtescu wrote: > On Tue, Mar 9, 2010 at 3:50 PM, David Recordon wrote: >> Ideally we'd limit the length of access and refresh tokens as well as >> client keys and secrets to no more than 255 characters (a one byte >> varchar in MySQL). > >> Is this an issue

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread David Recordon
I believe that Google wishes to encode information within access tokens so that they can be verified in a stateless manner. Brian, how many characters do you need? On Tue, Mar 9, 2010 at 4:23 PM, Marius Scurtescu wrote: > On Tue, Mar 9, 2010 at 3:50 PM, David Recordon wrote: >> Ideally we'd li

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Marius Scurtescu
On Tue, Mar 9, 2010 at 3:50 PM, David Recordon wrote: > Ideally we'd limit the length of access and refresh tokens as well as > client keys and secrets to no more than 255 characters (a one byte > varchar in MySQL). Add verification codes to the list as well. > Is this an issue for anyone? Not

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Chuck Mortimore
No issue, and there is certainly precedent. SAML 2.0 specifies the following about persistent name identifiers, which would be similar is use and formfactor: Persistent name identifier values MUST NOT exceed a length of 256 characters -cmort On 3/9/10 3:50 PM, "David Recordon" wrote: Ideally

[OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread David Recordon
Ideally we'd limit the length of access and refresh tokens as well as client keys and secrets to no more than 255 characters (a one byte varchar in MySQL). Is this an issue for anyone? The OAuth 1.0 protocol specifically states: Clients should avoid making assumptions about the size of tokens and

Re: [OAUTH-WG] [WRAP] Username and Password Profile

2010-03-09 Thread Ethan Jewett
Sorry, I jumped the gun on my "related note". I don't think I really understood what was being discussed. So ... er ... ignore that suggestion please. Ethan On Tue, Mar 9, 2010 at 11:23 AM, Justin Smith wrote: > Part of the motivation behind that profile was to allow an autonomous client > (no

Re: [OAUTH-WG] Signatures, Why?

2010-03-09 Thread Igor Faynberg
Ah, now I think I figured it out: x/s means x operations per second. (Initially, I thought x was the time it took to perform an operation, and /s was some time measured in one or other fraction of a second.) Thanks! Igor P.S.:Just to state my preferences: I am actually very much for the publ

Re: [OAUTH-WG] Signatures, Why?

2010-03-09 Thread Torsten Lodderstedt
Hi Igor, I don't consider RSA a good option for signing requests from consumer to resources because of its performance characteristics. Symmetric algorithms like HMAC are by magnitudes faster. I did some benachmarking in a project in 2006. The measurements have been taken on a Windows PC (Inte

Re: [OAUTH-WG] [WRAP] Username and Password Profile

2010-03-09 Thread David Recordon
I'd rather support the client secret and document the hell out of the security considerations for the profile. On Tue, Mar 9, 2010 at 10:57 AM, Allen Tom wrote: > The problem with using a client secret for trusted devices is that these > secrets usually get extracted over time. For obvious reason

Re: [OAUTH-WG] [WRAP] Username and Password Profile

2010-03-09 Thread Brian Eaton
On Tue, Mar 9, 2010 at 9:46 AM, David Recordon wrote: > @Brain, I'm not focused on using this profile for DRM.  Rather for > trusted devices (ideally with TPM) which do not open web browsers > (such as the XBox). That sounds a lot like DRM + hardware support. And other folks on this thread have

Re: [OAUTH-WG] [WRAP] Username and Password Profile

2010-03-09 Thread Allen Tom
The problem with using a client secret for trusted devices is that these secrets usually get extracted over time. For obvious reasons, I'd rather not get into the details, but there are many examples of devices whose secrets are not secret. The motivation for deliberately excluding the client secr

Re: [OAUTH-WG] [WRAP] Username and Password Profile

2010-03-09 Thread Justin Smith
Yep - mistake on my part. I the discussion was around section 5.1 and 5.2 on OAuth WRAP v0.9.7.2. -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of David Recordon Sent: Tuesday, March 09, 2010 9:46 AM To: oauth-wrap...@googlegroups.com; oauth@ie

Re: [OAUTH-WG] [WRAP] Username and Password Profile

2010-03-09 Thread David Recordon
@Justin, there's a separate client key and secret profile for making requests not within the context of a given user. @Brain, I'm not focused on using this profile for DRM. Rather for trusted devices (ideally with TPM) which do not open web browsers (such as the XBox). --David On Tue, Mar 9, 20

Re: [OAUTH-WG] [WRAP] Username and Password Profile

2010-03-09 Thread Brian Eaton
On Mon, Mar 8, 2010 at 10:33 PM, David Recordon wrote: > Yes.  I was agreeing with your point and suggesting that the profile > have the client secret added to the request. :) Just so we're clear on use cases... is the primary use case here DRM, verifying software on client machines? Or do folk

Re: [OAUTH-WG] [WRAP] Username and Password Profile

2010-03-09 Thread Luke Shepard
Can you clarify what you mean by autonomous? Isn't the wrap_username an end user identity? Sent from my iPhone On Mar 9, 2010, at 8:25 AM, "Justin Smith" wrote: > Part of the motivation behind that profile was to allow an > autonomous client (no end-user identity passed to the AS) the >

Re: [OAUTH-WG] [WRAP] Username and Password Profile

2010-03-09 Thread Justin Smith
Part of the motivation behind that profile was to allow an autonomous client (no end-user identity passed to the AS) the ability to access a web service. In that case, I don't see what the client secret (along with the username and password) would be adding. Ethan - assuming the token is signed

Re: [OAUTH-WG] Signatures, Why?

2010-03-09 Thread Igor Faynberg
Torsten Lodderstedt wrote: ... I don't consider RSA a good option for signing requests from consumer to resources because of its performance characteristics. Symmetric algorithms like HMAC are by magnitudes faster. I did some benachmarking in a project in 2006. The measurements have been take

Re: [OAUTH-WG] Recent UMA work that may inform this group's deliberations

2010-03-09 Thread Dick Hardt
On 2010-03-09, at 7:05 AM, Eve Maler wrote: > > It's a good idea to give guidance on how the scope parameter should be used. > That way, it will help avoid "abuse" of the parameter for other purposes, and > clashes if different deployments are using it in different ways. (I suspect > that th

Re: [OAUTH-WG] Signatures, Why?

2010-03-09 Thread Torsten Lodderstedt
Hi Ethan, I'm glad I managed to prompt some discussion on the topic! Thank you very much for initiating this discussion! It will help to establish a common understanding of what is required/feasible for the upcoming standard. RSA vs. HMAC: I really have no idea. On the other hand, Google i

Re: [OAUTH-WG] Recent UMA work that may inform this group's deliberations

2010-03-09 Thread Eve Maler
Thanks for your further feedback. Just a couple of comments back (eliding other portions of the thread): On 8 Mar 2010, at 2:21 PM, Dick Hardt wrote: > On 2010-03-05, at 6:57 AM, Eve Maler wrote: 2c. Currently, WRAP doesn't say anything about how to fill the scope parameter valu

Re: [OAUTH-WG] [WRAP] Username and Password Profile

2010-03-09 Thread Jason Hullinger
Ah, gotcha, sorry for the misunderstanding. :) One thing I had thought of to mitigate the risk to the client, or at least allow the client the ability to see what data is going to be sent to the provider as "them" would be this: The user connects as 5.3 specifies, upon success the user is given a