Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Naitik Shah
Thanks! That sounds great. On Tue, Jul 13, 2010 at 3:00 PM, Eran Hammer-Lahav wrote: > This is clearly a third flow - hybrid (of user-agent and web-server) - and > not just a variant of the user-agent flow. It should be presented with its > own flow diagram and description. I also think the user-

Re: [OAUTH-WG] issuing new refresh tokens

2010-07-13 Thread Torsten Lodderstedt
We plan to issue new refresh tokens for certain clients only (mobile, desktop), it's part of the client-related policy. So the behavior for a particular client is predictable. Regards, Torsten. Am 14.07.2010 um 03:07 schrieb Brian Eaton : > Kris - > > Thanks for pointing back to where this

Re: [OAUTH-WG] single use authorization codes

2010-07-13 Thread William Mills
That's even worse I think, it's a harder problem. Why do we want to revoke previously issued tokens here? It closes one door but opens a DOS attack. From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Eran Hammer-Lahav Sent

Re: [OAUTH-WG] single use authorization codes

2010-07-13 Thread Brian Eaton
I'd suggest "authorization server MAY revoke all tokens". Revoking an access token that was just issued is surprisingly tricky. Fast to verify, easy to revoke, scalable: pick two. On Tue, Jul 13, 2010 at 9:26 PM, Eran Hammer-Lahav wrote: > How about: > > Authorization codes SHOULD expire shortly

Re: [OAUTH-WG] single use authorization codes

2010-07-13 Thread Eran Hammer-Lahav
How about: Authorization codes SHOULD expire shortly after they are issued to minimize the risk of leaks. Clients MUST NOT reuse authorization codes. If an authorization code is used more than once, the authorization server SHOULD revoke all tokens previously issued based on that authorization c

[OAUTH-WG] single use authorization codes

2010-07-13 Thread Brian Eaton
Draft 10 currently requires that the authorization code issued for the web-app profile is a single use token. That won't scale well. This got added in draft 4, I'm not sure why. Anybody know...? Here's the relevant section: http://tools.ietf.org/html/draft-ietf-oauth-v2-10#section-3 "The autho

Re: [OAUTH-WG] issuing new refresh tokens

2010-07-13 Thread Brian Eaton
Kris - Thanks for pointing back to where this started! I more or less agree with what Allen said in response to Torsten's proposal: http://www.ietf.org/mail-archive/web/oauth/current/msg02295.html. The devil is in the details. I'd be interested in tackling client secret rotation at the same tim

Re: [OAUTH-WG] issuing new refresh tokens

2010-07-13 Thread Kris Selden
Torsten Lodderstedt [OAUTH-WG] Refresh tokens security enhancement http://www.ietf.org/mail-archive/web/oauth/current/msg02292.html Eran Hammer-Lahav Re: [OAUTH-WG] Refresh tokens security enhancement http://www.ietf.org/mail-archive/web/oauth/current/msg02390.html On Jul 13, 2010, at 7:04 AM, Er

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread William Mills
I agree with the below. To be clear, the case where we had a problem with this is a 3 legged flow, where we as the 3rd party direct a user through an auth flow to be redir3ected back to us. In this case it's nto the browser specifying, it's the partner/integrator with a service. _

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Eran Hammer-Lahav
I'm only using 2828 definition of capability, not password. EHL On 7/13/10 3:20 PM, "Zachary Zeltsan" wrote: According to the RFC 2828 an access token is rather a capability than a password. The passwords are usually associated with the matching identifiers, but an access token of OAuth 2.0

Re: [OAUTH-WG] What to do about 'realm'

2010-07-13 Thread Robert Sayre
On Tue, Jul 13, 2010 at 9:46 AM, Yaron Goland wrote: > As defined in section 4.2 of RFC 2616 the only characters legally allowed in > a HTTP header are a fairly small subset of ASCII. I don't think that is correct. The definition of the TEXT rule in section 2.2 allows most octets. It also refere

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Zeltsan, Zachary (Zachary)
According to the RFC 2828 an access token is rather a capability than a password. The passwords are usually associated with the matching identifiers, but an access token of OAuth 2.0 is used as a single credential that allows access to a protected resource. >From RFC 2828: $ password

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Brian Eaton
On Tue, Jul 13, 2010 at 3:00 PM, Eran Hammer-Lahav wrote: > In an attempt to accommodate Brian's request for more concentrated flow > descriptions, I am working on coming up with come middle ground between -05 > and -10. Thank you! ___ OAuth mailing lis

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Eran Hammer-Lahav
This is clearly a third flow - hybrid (of user-agent and web-server) - and not just a variant of the user-agent flow. It should be presented with its own flow diagram and description. I also think the user-agent and web-server flow names are misleading. They need to be replaced with more descriptiv

Re: [OAUTH-WG] issuing new refresh tokens

2010-07-13 Thread Brian Eaton
On Tue, Jul 13, 2010 at 2:05 PM, Andrew Arnott wrote: > I'm not storing tokens at all.  And a compromise of the database wouldn't > expose any tokens or their hashes.  I'm only storing that > user/client/scope/issued_date tuple -- not the token itself. And a signing key. So the question is what

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Eran Hammer-Lahav
This is how OAuth works: The client wants to access a protected resource. The resource requires authentication (that's the definition of protected). The client presents the access token to authenticate (using an HTTP authentication header). The access token has all the security characteristics o

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Naitik Shah
On Tue, Jul 13, 2010 at 2:06 PM, Eran Hammer-Lahav wrote: > This looks reasonable, however, I am no longer see the value in the > hybrid mode of token and code. If the code is passed in the fragment, the > client has to pass it to the server. If that is the case, why can’t the > server reply back

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Eran Hammer-Lahav
This looks reasonable, however, I am no longer see the value in the hybrid mode of token and code. If the code is passed in the fragment, the client has to pass it to the server. If that is the case, why can't the server reply back with the access token? Is the entire purpose just a performance

Re: [OAUTH-WG] issuing new refresh tokens

2010-07-13 Thread Andrew Arnott
On Tue, Jul 13, 2010 at 1:56 PM, Brian Eaton wrote: > On Tue, Jul 13, 2010 at 1:46 PM, Andrew Arnott > wrote: > > Ah, got it. Yes, we're on the same page. > > I happen to store the authorization tuple (mentioned in another thread) > > rather than the refresh token itself. That way I can issue

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Igor Faynberg
YES!!! Brian, could you please add this? Igor Brian Eaton wrote: On Tue, Jul 13, 2010 at 1:40 PM, Igor Faynberg wrote: In this case, the term "capability" MUST be defined up front. The word "capability" seems to carry a much broader meaning than password... It has a standard defini

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread John Kemp
On Jul 13, 2010, at 4:06 PM, Blaine Cook wrote: > On 13 July 2010 20:31, John Kemp wrote: >> Where is that specified? Is that required for all implementations? > > It's not specified - I was referring to your earlier comments: > >> In the "bearer token" case (and even over SSL unless client ce

Re: [OAUTH-WG] issuing new refresh tokens

2010-07-13 Thread Brian Eaton
On Tue, Jul 13, 2010 at 1:46 PM, Andrew Arnott wrote: > Ah, got it.  Yes, we're on the same page. > I happen to store the authorization tuple (mentioned in another thread) > rather than the refresh token itself.  That way I can issue an arbitrary > number of refresh tokens for the same client/user

Re: [OAUTH-WG] issuing new refresh tokens

2010-07-13 Thread Andrew Arnott
On Tue, Jul 13, 2010 at 1:37 PM, Brian Eaton wrote: > On Tue, Jul 13, 2010 at 1:10 PM, Andrew Arnott > wrote: > >> I'm pretty sure anyone issuing cryptographic refresh tokens is crazy, > >> these pretty much have to be backed by server-side state or there is > >> no way to run your system. > > >

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Eran Hammer-Lahav
I'll work with this text. EHL On 7/13/10 1:35 PM, "Brian Eaton" wrote: On Tue, Jul 13, 2010 at 1:06 PM, Blaine Cook wrote: > Don't leak it, and treat it as though it were a > password", then we avoid having to explain (embarrassingly) that the > "capability" actually meant something like "pas

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Brian Eaton
On Tue, Jul 13, 2010 at 1:40 PM, Igor Faynberg wrote: > In this case, the term "capability" MUST be defined up front. The word > "capability" seems to carry a much broader meaning than password... It has a standard definition we can reference. From http://www.ietf.org/rfc/rfc2828.txt $ capab

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Igor Faynberg
In this case, the term "capability" MUST be defined up front. The word "capability" seems to carry a much broader meaning than password... Igor Brian Eaton wrote: On Tue, Jul 13, 2010 at 1:06 PM, Blaine Cook wrote: Don't leak it, and treat it as though it were a password", then we avoid h

Re: [OAUTH-WG] issuing new refresh tokens

2010-07-13 Thread Brian Eaton
On Tue, Jul 13, 2010 at 1:10 PM, Andrew Arnott wrote: >> I'm pretty sure anyone issuing cryptographic refresh tokens is crazy, >> these pretty much have to be backed by server-side state or there is >> no way to run your system. > > Brian, can you tell me what you mean by cryptographically impleme

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Brian Eaton
On Tue, Jul 13, 2010 at 1:06 PM, Blaine Cook wrote: > Don't leak it, and treat it as though it were a > password", then we avoid having to explain (embarrassingly) that the > "capability" actually meant something like "password". For the initiated, that's what "capability" means. How about this

Re: [OAUTH-WG] issuing new refresh tokens

2010-07-13 Thread Andrew Arnott
On Mon, Jul 12, 2010 at 10:36 PM, Brian Eaton wrote: > Draft 10 has the following sentence in section 4.1.4: > http://tools.ietf.org/html/draft-ietf-oauth-v2-10#section-4.1.4 > > "The authorization server MAY issue a new refresh token." > > That carries a surprising amount of baggage. I suggest

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Blaine Cook
On 13 July 2010 20:31, John Kemp wrote: > Where is that specified? Is that required for all implementations? It's not specified - I was referring to your earlier comments: > In the "bearer token" case (and even over SSL unless client certs are used), > the > token clearly SHOULD NOT be used as

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Naitik Shah
On Tue, Jul 13, 2010 at 11:17 AM, Brian Eaton wrote: > On Tue, Jul 13, 2010 at 9:42 AM, David Recordon > wrote: > >> That strikes me as very odd - returning some params in the query, and > >> others in the fragment is just weird. > > > > I actually think that you want this – albiet odd – combina

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread John Kemp
On Jul 13, 2010, at 3:03 PM, Blaine Cook wrote: > +1 on "like a password", or something similar-and-meaningful because > that's exactly how it's being used here. Pre-shared key, shared > secret, etc, would be fine. Keep in mind that authentication *will be > done* using the bearer token, and the b

Re: [OAUTH-WG] Proposal: Develop Implementor's Guides for Major Use Cases

2010-07-13 Thread Eran Hammer-Lahav
I think the spec should address this. I don't think it needs to go back to -06 format. There is a middle ground. Also, keep in mind that the current format is much easier for those implementing multiple flows or servers. The important part is to make the spec instructive, not to optimize line

[OAUTH-WG] Proposal: Develop Implementor's Guides for Major Use Cases

2010-07-13 Thread Richer, Justin P.
Brian's brought up the point that the new organization would cause an implementor to have to jump all around the spec to find all the parts needed. I propose that the working group work on a set of "implementor guides" that detail exactly what parts one needs to deal with all of the major use ca

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Blaine Cook
+1 on "like a password", or something similar-and-meaningful because that's exactly how it's being used here. Pre-shared key, shared secret, etc, would be fine. Keep in mind that authentication *will be done* using the bearer token, and the bearer token alone. An OAuth token is unlike capabilities

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Brian Eaton
On Tue, Jul 13, 2010 at 11:53 AM, Blaine Cook wrote: > I don't claim to fully grok what the current state of the various > proposals are regarding the user agent flow, but fundamentally, > shouldn't we be aiming to replicate what Twitter and Facebook are > already doing? Yes. They are passing al

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread John Kemp
On Jul 13, 2010, at 2:46 PM, Richer, Justin P. wrote: >>> I would be very unhappy if we equated access tokens with passwords. >>> >>> I agree with Dirk that "capability" is a more expressive phrase than either >>> "shared secret" or "password". > >> Expressive to you and people well-versed in se

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Blaine Cook
I don't claim to fully grok what the current state of the various proposals are regarding the user agent flow, but fundamentally, shouldn't we be aiming to replicate what Twitter and Facebook are already doing? We've already moved towards JSON as a standard format, why not go all the way and manda

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Richer, Justin P.
>> I would be very unhappy if we equated access tokens with passwords. >> >> I agree with Dirk that "capability" is a more expressive phrase than either >> "shared secret" or "password". > Expressive to you and people well-versed in security theory. It means > nothing to a casual reader. The token

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread John Kemp
Hi Eran, On Jul 13, 2010, at 1:40 PM, Eran Hammer-Lahav wrote: > > On 7/13/10 10:25 AM, "John Kemp" wrote: > >> On Jul 13, 2010, at 12:02 PM, Eran Hammer-Lahav wrote: >> >>> I am ok replacing it with Oacts as a password¹. >> >> An access token is something used by the server to decide whethe

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Eran Hammer-Lahav
Isn't that better overall than requiring the browser to make another HTTP request to pass the code over? EHL On 7/13/10 11:17 AM, "Brian Eaton" wrote: On Tue, Jul 13, 2010 at 9:42 AM, David Recordon wrote: >> That strikes me as very odd - returning some params in the query, and >> others in

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread Colin Snover
The only other thing I could think of to suggest would be to change the spec to state that an authorization server MUST NOT rely on Cookie or Authorization headers from the user-agent during the end-user redirect phase as being safe for use in authentication. To me, at least, it seems obvious

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Brian Eaton
On Tue, Jul 13, 2010 at 9:42 AM, David Recordon wrote: >> That strikes me as very odd - returning some params in the query, and >> others in the fragment is just weird. > > I actually think that you want this – albiet odd – combination when > requesting both a code and token. The code and state pa

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Eran Hammer-Lahav
On 7/13/10 10:25 AM, "John Kemp" wrote: > On Jul 13, 2010, at 12:02 PM, Eran Hammer-Lahav wrote: > >> I am ok replacing it with Oacts as a password¹. > > An access token is something used by the server to decide whether a request is > authorized. Although it may also be used for authenticating

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread William Mills
I can live with SHOULD. > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] > On Behalf Of Eran Hammer-Lahav > Sent: Tuesday, July 13, 2010 10:30 AM > To: Colin Snover; David Recordon > Cc: OAuth WG > Subject: Re: [OAUTH-WG] ' force_auth' request parameter

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread Eran Hammer-Lahav
On 7/13/10 10:24 AM, "Colin Snover" wrote: > The problem I see with pushing this up into an identity layer is that > providers that choose to implement their own identity layer (or no identity > layer) may still end up doing this implicit authorization thing. We¹re neither > providing a sp

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread Eran Hammer-Lahav
User authentication and approval interaction has always been the sole domain of the authorization server. This proposal shifts the decision towards the client. It is unclear to me why is the client better suited to make this decision? In the context of identity, if a client relies on the server

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread John Kemp
On Jul 13, 2010, at 12:02 PM, Eran Hammer-Lahav wrote: > I am ok replacing it with ‘acts as a password’. An access token is something used by the server to decide whether a request is authorized. Although it may also be used for authenticating the request(er), it's purpose is to authorize the r

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread Colin Snover
The problem I see with pushing this up into an identity layer is that providers that choose to implement their own identity layer (or no identity layer) may still end up doing this implicit authorization thing. We’re neither providing a specific identity to connect nor are we requesting ident

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread William Mills
I agree it changes the boundaries. I think this one needs moving. As I said we hit a significant problem with this, which we solved by virtue of the fact that the target we were working with has an un-crumbed logout, so we could XSRF the logout. It's something people get wrong and we should

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread Eran Hammer-Lahav
The question is if we have consensus to force providers to support it. It seems to overstep the boundaries we set over the years and it makes assumptions about how services authenticate users and obtain approvals. EHL On Jul 13, 2010, at 13:05, William Mills mailto:wmi...@yahoo-inc.com>> wrot

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread William Mills
I think it's a mistake not to have force_auth in the core. From: David Recordon [mailto:record...@gmail.com] Sent: Tuesday, July 13, 2010 9:58 AM To: William Mills Cc: Colin Snover; Eran Hammer-Lahav; OAuth WG Subject: Re:

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread Justin Hart
+1, though I would like to see it to be a little more specific. Essentially there are four states. 'accept' (allow all cookies and consent as present in browser - for example how Facebook currently works), 'consent' (accept login, but still prompt for the allow/deny consent - for example, how

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread David Recordon
I support immediate and a form of forced auth (ala OpenID's PAPE) but not in the core spec. They both should be part of an identity extension. On Tue, Jul 13, 2010 at 9:51 AM, William Mills wrote: > I agree with Colin that some form of force_auth is needed. I haven't > read enough on the "imm

Re: [OAUTH-WG] expired_token error code

2010-07-13 Thread William Mills
+1 From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Eran Hammer-Lahav Sent: Tuesday, July 13, 2010 7:21 AM To: Brian Eaton; OAuth WG; b...@google.com Subject: Re: [OAUTH-WG] expired_token error code

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread William Mills
I agree with Colin that some form of force_auth is needed. I haven't read enough on the "immediate" proposal, but I know that we have run into the problem of trusting currently set cookies in the browser (even when we're actually sending a username/password and really do want to have an authen

Re: [OAUTH-WG] What to do about 'realm'

2010-07-13 Thread Yaron Goland
As defined in section 4.2 of RFC 2616 the only characters legally allowed in a HTTP header are a fairly small subset of ASCII. So if we want to shove in Unicode characters they will have to be encoded in a form that only uses characters that are legal in the subset of ASCII supported by HTTP. >

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread David Recordon
On Tue, Jul 13, 2010 at 1:06 AM, Luke Shepard wrote: > I just read this bit: > >If the response type is "code_and_token", the authorization server >adds the "code" and "state" parameters to the redirection URI query >component and the "access_token", "scope", and "expires_in" to the >

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread Eran Hammer-Lahav
Building consensus around new ideas is tough. The only advice I can give you is to identify the people most likely to support this idea and ping them off-list to try and get their support. I don't think it belongs in core because core currently represents pretty solid consensus on the feature se

Re: [OAUTH-WG] ' force_auth' request parameter

2010-07-13 Thread Colin Snover
On 22/07/28164 13:59, Eran Hammer-Lahav wrote: The following was submitted via the shared-copy page but does not belong with editorial feedback. This needs to be discussed and supported on the list before added the specification. I think it belongs where 'immediate' is specified. EHL --

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Eran Hammer-Lahav
New text: Clients access protected resources by presenting an access token to the resource server. Access tokens are bearer tokens, where the token string acts as a password. This requires treating the access token with the same care as other passwords. Access tokens SHO

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Eran Hammer-Lahav
I am ok replacing it with 'acts as a password'. EHL On 7/13/10 8:55 AM, "Dirk Balfanz" wrote: On Tue, Jul 13, 2010 at 7:18 AM, Eran Hammer-Lahav wrote: >From the client's perspective, they are 'shared symmetric secrets' because the client has to store them as-is and present them as-is. The

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Dirk Balfanz
On Tue, Jul 13, 2010 at 7:18 AM, Eran Hammer-Lahav wrote: > From the client's perspective, they are 'shared symmetric secrets' because > the client has to store them as-is and present them as-is. The act exactly > like passwords. I added that text to make that stand out. > > When using passwords,

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Igor Faynberg
I tend to agree with Eran, although it should be qualified that a token is BASED on a shared secret, rather than is a shared secret itself. (By the way, I think the word "symmetric" is redundant here.). I also think that the text in the Security Considerations must contain the last paragraph o

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Eran Hammer-Lahav
On 7/13/10 1:06 AM, "Luke Shepard" wrote: > > On Jul 11, 2010, at 6:37 AM, Eran Hammer-Lahav wrote: > >> The server can¹t trust what the client is asking unless the client is >> authenticated *and* the server can trust that authentication (i.e. Client >> secret not used in a user-agent). For

Re: [OAUTH-WG] return to draft 6 spec org?

2010-07-13 Thread Darren Bounds
+1 On Sun, Jul 11, 2010 at 12:15 AM, Brian Eaton wrote: > I think it would be a good idea to return to the draft 6 organization. > > Draft 6: normative language for each flow was called out separately, > and was described from start to finish, in chronological order, with > no interruption. Eac

Re: [OAUTH-WG] Instead of desktop apps, refer to mobile apps

2010-07-13 Thread Eran Hammer-Lahav
I think the profiles section is mostly useless in helping developers pick the right profile unless they are clearly a JS browser client or a client running on a well-protected web server. We have blurred the lines so much in when each profile should/could be used, that a new reader will be lost.

Re: [OAUTH-WG] return to draft 6 spec org?

2010-07-13 Thread Eran Hammer-Lahav
On 7/12/10 11:22 PM, "Brian Eaton" wrote: > On Sun, Jul 11, 2010 at 7:37 AM, Eran Hammer-Lahav > wrote: >> I think the way to solve it is to make them more detailed and normative. >> This will retain the general framework as current specified, but will >> provide a reference-able description

Re: [OAUTH-WG] expired_token error code

2010-07-13 Thread Eran Hammer-Lahav
I'm fine with this. Any objections? EHL On 7/12/10 11:01 PM, "Brian Eaton" wrote: http://tools.ietf.org/html/draft-ietf-oauth-v2-10#section-5.2.1 The "expired_token" error code doesn't scale well and won't be implemented reliably. It should be merged with "invalid_token". Suggested language

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-13 Thread Eran Hammer-Lahav
>From the client's perspective, they are 'shared symmetric secrets' because the client has to store them as-is and present them as-is. The act exactly like passwords. I added that text to make that stand out. When using passwords, the server doesn't need to store them in plain-text either (e.g. us

Re: [OAUTH-WG] issuing new refresh tokens

2010-07-13 Thread Eran Hammer-Lahav
On 7/12/10 10:36 PM, "Brian Eaton" wrote: > Draft 10 has the following sentence in section 4.1.4: > http://tools.ietf.org/html/draft-ietf-oauth-v2-10#section-4.1.4 > > "The authorization server MAY issue a new refresh token." The capability was there since -02. -04 added the following text

Re: [OAUTH-WG] Moving the User Experience Extension draft forward

2010-07-13 Thread Richer, Justin P.
I'd like to propose the addition of two more optional parameters to this extension: instance_name Short, human-readable name that the server SHOULD display to the end-user along with the client name. This name is designed to reflect a per-instance identifier for cases where a single us

Re: [OAUTH-WG] user-agent flow needs a rewrite

2010-07-13 Thread Luke Shepard
On Jul 11, 2010, at 6:37 AM, Eran Hammer-Lahav wrote: The server can’t trust what the client is asking unless the client is authenticated *and* the server can trust that authentication (i.e. Client secret not used in a user-agent). For that, you need to establish some form of trust with the cl

[OAUTH-WG] Instead of desktop apps, refer to mobile apps

2010-07-13 Thread Luke Shepard
Minor language change request. We have seen much more demand for use of the user-agent flow in mobile apps than in desktop apps in the past month. I think that the spec should address that. Instead of this: 1.4.3. Native Application Native application are clients running as native code o