[OAUTH-WG] security considerations early draft

2010-04-02 Thread Brian Eaton
http://trac.tools.ietf.org/wg/oauth/trac/attachment/wiki/SecurityConsiderations/ Cheers, Brian ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Device Flow - Session Fixation?

2010-04-02 Thread Brent Goldman
+1 to accepting only HTTP POST and preventing cross-site posting. On Apr 2, 2010, at 10:20 AM, Marius Scurtescu wrote: > On Fri, Apr 2, 2010 at 8:53 AM, Brian Eaton wrote: >> On Thu, Apr 1, 2010 at 9:18 PM, Allen Tom wrote: >>> The Auth server should also check for the presence of an HTTP Refer

Re: [OAUTH-WG] Device Flow - Session Fixation?

2010-04-02 Thread Brent Goldman
Even if the auth server is using redirects for user simplicity, it can still comply with the referer-checking requirement by having the simple URL (http://google.samsung.com) pass its referer as a GET param to the actual complex URL (https://www.google.com/accounts/OAuthAuthorize?client_id=12389

Re: [OAUTH-WG] Scope using Realm idea

2010-04-02 Thread Dick Hardt
There are times when a resource may have different scope for different kinds of access. realm != scope On 2010-04-02, at 2:45 PM, Igor Faynberg wrote: > > > I don't see any problem at all. > > Igor > > David Recordon wrote: >> Assuming that this is mean to replace the scope parameter? >> >>

Re: [OAUTH-WG] Scope using Realm idea

2010-04-02 Thread Igor Faynberg
I don't see any problem at all. Igor David Recordon wrote: Assuming that this is mean to replace the scope parameter? On Fri, Apr 2, 2010 at 9:18 AM, Eran Hammer-Lahav wrote: This is half baked but I wanted to get people's reaction: Clients tries accessing a resource with or without an

Re: [OAUTH-WG] Scope using Realm idea

2010-04-02 Thread David Recordon
Assuming that this is mean to replace the scope parameter? On Fri, Apr 2, 2010 at 9:18 AM, Eran Hammer-Lahav wrote: > This is half baked but I wanted to get people's reaction: > > Clients tries accessing a resource with or without an access token: > >  GET /resource/1 HTTP/1.1 >  Host: server.exa

Re: [OAUTH-WG] SAML Assertion Flow (was: Draft progress update)

2010-04-02 Thread Marius Scurtescu
On Fri, Apr 2, 2010 at 12:00 PM, Eran Hammer-Lahav wrote: > Because of how we send parameters. Most of the problems we had with > 1.0 involved encoding issues. We just need to find a good way of > explaining it. > > These are the characters allowed in Uris and form encoded bodies. Of course, but

Re: [OAUTH-WG] SAML Assertion Flow

2010-04-02 Thread Peter Saint-Andre
On 4/2/10 10:35 AM, Marius Scurtescu wrote: > On Thu, Apr 1, 2010 at 10:10 PM, Eran Hammer-Lahav > wrote: >> The current draft allows the following characters: >> >> value-char = ALPHA / DIGIT / "-" / "." / "_" / "~" / "%" >> >> Which means a utf-8 string will need to be encoded somehow. Shoul

Re: [OAUTH-WG] SAML Assertion Flow (was: Draft progress update)

2010-04-02 Thread Eran Hammer-Lahav
Because of how we send parameters. Most of the problems we had with 1.0 involved encoding issues. We just need to find a good way of explaining it. These are the characters allowed in Uris and form encoded bodies. EHL On Apr 2, 2010, at 12:35, "Marius Scurtescu" wrote: > On Thu, Apr 1, 2

Re: [OAUTH-WG] Draft progress update

2010-04-02 Thread Marius Scurtescu
Hi Eran, A few more comments: 1. Only one endpoint. While I think collapsing the access token and refresh token URLs into one URL was a good think, keeping the user authorization as a separate URL could be beneficial. I think there should be 2 endpoints defined: access token and user authorizatio

Re: [OAUTH-WG] Device Flow - Session Fixation?

2010-04-02 Thread Marius Scurtescu
On Fri, Apr 2, 2010 at 8:53 AM, Brian Eaton wrote: > On Thu, Apr 1, 2010 at 9:18 PM, Allen Tom wrote: >> The Auth server should also check for the presence of an HTTP Referrer. >> There should not be a referrer, since the user should not have clicked on >> anything to have landed on the screen >

Re: [OAUTH-WG] SAML Assertion Flow (was: Draft progress update)

2010-04-02 Thread Chuck Mortimore
Agreed on Base64, however the SAML already specifies this at it's encoding for web profiles, so we'll get the most reuse out of existing infrastructure by using it. I will work on an example - we should be able to make some sound decisions about how best to deal with it once we have somethin

Re: [OAUTH-WG] SAML Assertion Flow (was: Draft progress update)

2010-04-02 Thread Marius Scurtescu
On Thu, Apr 1, 2010 at 10:10 PM, Eran Hammer-Lahav wrote: > The current draft allows the following characters: > >   value-char  = ALPHA / DIGIT / "-" / "." / "_" / "~" / "%" > > Which means a utf-8 string will need to be encoded somehow. Should it be > percent-encoded? Something else? Why do we

Re: [OAUTH-WG] Scope using Realm idea

2010-04-02 Thread Paul C. Bryan
Presumably, the realm was used to discover the token issuance endpoints. Why wouldn't the discovered URL of the access token endpoint dictate realm, and why can't the realm then be implicit beyond discovery? -Original Message- From: Eran Hammer-Lahav To: OAuth WG Subject: [OAUTH-WG] Scop

[OAUTH-WG] Scope using Realm idea

2010-04-02 Thread Eran Hammer-Lahav
This is half baked but I wanted to get people's reaction: Clients tries accessing a resource with or without an access token: GET /resource/1 HTTP/1.1 Host: server.example.com The server replies with: HTTP/1.1 401 Unauthorized WWW-Authenticate: OAuth realm='example' Clients requests an

Re: [OAUTH-WG] SAML Assertion Flow (was: Draft progress update)

2010-04-02 Thread Eran Hammer-Lahav
The problem with base64 (even the uri safe flavor) is the paddind character (=) is not allowed without percent encoding. This gets messy without clear encoding process. The example below show that the profiles are likely to be much longer than the flow itself, raising my question of whether

Re: [OAUTH-WG] Device Flow - Session Fixation?

2010-04-02 Thread Brian Eaton
On Thu, Apr 1, 2010 at 9:18 PM, Allen Tom wrote: > The Auth server should also check for the presence of an HTTP Referrer. > There should not be a referrer, since the user should not have clicked on > anything to have landed on the screen I don't think this one is going to work in practice. Manu

Re: [OAUTH-WG] SAML Assertion Flow (was: Draft progress update)

2010-04-02 Thread Chuck Mortimore
Other profiles will be required. The only point is to give these profiling specs clear guidelines on how they should approach the problem. In any case, I get your point about what you want included in the core specification and why. I'll try and draft a proposal for the SAML format over the

Re: [OAUTH-WG] SAML Assertion Flow (was: Draft progress update)

2010-04-02 Thread Chuck Mortimore
Other profiles will be required. The only point is to give these profiling specs clear guidelines on how they should approach the problem. In any case, I get your point about what you want included in the core specification and why. I'll put forth a proposal for the SAML format. -cmort ___

Re: [OAUTH-WG] SAML Assertion Flow (was: Draft progress update)

2010-04-02 Thread Chuck Mortimore
The format would be specified by a profilie.For instance, a SAML profile might define: assertion_format=urn:oasis:names:tc:SAML:2.0:cm:bearer assertion={SAML 2 bearer assertion, optionally wrapped in a SAML response, Signature must cover the assertion and can be inherited from the Response

Re: [OAUTH-WG] SAML Assertion Flow (was: Draft progress update)

2010-04-02 Thread Chuck Mortimore
For SAML it should be Base64 encoded. -cmort From: oauth-boun...@ietf.org [oauth-boun...@ietf.org] On Behalf Of Eran Hammer-Lahav [e...@hueniverse.com] Sent: Thursday, April 01, 2010 10:10 PM To: Marius Scurtescu Cc: OAuth WG Subject: Re: [OAUTH-WG] SAML A

Re: [OAUTH-WG] Draft progress update

2010-04-02 Thread Torsten Lodderstedt
The OAuth implementation at Deutsche Telekom uses a non-standard parameter "serviceId" to identity the protected resource the client wants to access. The client passes such an id as parameter when requesting a token. The authorization server knows all services it issues tokens for. The service