Re: [OAUTH-WG] signatures, v2

2010-07-15 Thread Dick Hardt
On 2010-07-15, at 6:45 PM, Naitik Shah wrote: > On Thu, Jul 15, 2010 at 5:43 PM, Dirk Balfanz wrote: > > One question: What's the deal with having the signature go first? If you can > explain to me why that is a good idea, I'm happy to oblige. > > > When we were talking about base64url or no

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Manger, James H
>> What happens if a 1.0 client receives a WWW-Authenticate header >> from a 2.0 protected resource with the 'OAuth' mechanism specified? >> Might it then attempt OAuth 1 with a 2.0 token service (and thus >> just fail without being able to know what went wrong)? > There is no such thing. Since th

Re: [OAUTH-WG] proposal for signatures

2010-07-15 Thread Dick Hardt
On 2010-07-15, at 5:29 PM, Dirk Balfanz wrote: > Hi Dick, > > you're right - after actually reading the paper :-), I agree that if you have > both sender and receiver in your payload, the order (of encrypting and > signing) doesn't seem to matter. > > I'm still hesitant, though, to optimize

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Campbell
On Thu, Jul 15, 2010 at 5:36 PM, Brian Eaton wrote: > There are certain practical limits, but I think there is still blood > on the specification from the last time normative language was > discussed. That must have been been before my time - sorry for bringing it up again. We can put those skel

Re: [OAUTH-WG] signatures, v2

2010-07-15 Thread Naitik Shah
On Thu, Jul 15, 2010 at 5:43 PM, Dirk Balfanz wrote: > > One question: What's the deal with having the signature go first? If you > can explain to me why that is a good idea, I'm happy to oblige. > > When we were talking about base64url or not, putting the signature before the dot meant it was ok

[OAUTH-WG] signatures, v2

2010-07-15 Thread Dirk Balfanz
Hi guys, after reading through the feedback, we did a pass over the OAuth signature proposals. As a reminder, there are three documents: - a document (called "JSON Tokens") that just explains how to sign something and verify the signature: http://docs.google.com/document/pub?id=1kv6Oz_HRnWa0DaJx

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-15 Thread Evan Gilbert
On Thu, Jul 15, 2010 at 6:35 AM, Eran Hammer-Lahav wrote: > Access tokens should not be stored in plain text either since stealing > them is just like stealing a password. > Access tokens are designed to be stored in plain text in less secure environments - web browser cookie JAR, in RAM in inst

Re: [OAUTH-WG] proposal for signatures

2010-07-15 Thread Dirk Balfanz
Hi Dick, you're right - after actually reading the paper :-), I agree that if you have both sender and receiver in your payload, the order (of encrypting and signing) doesn't seem to matter. I'm still hesitant, though, to optimize for the encryption use case now (even though I do believe it will

Re: [OAUTH-WG] return to draft 6 spec org?

2010-07-15 Thread Nat
As I see, the current draft is half way towards the complete modularization. It has abstracted what parameters are needed for each end points from various flows but failed to stop there and included how they are to be passed as well. IMHO, how they are passed is the profile/binding issue and all

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread William Mills
Sure, but it's not easy to early branch, you have to actually parse the whole header. It's also fragile if extensions are not careful. From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Naitik Shah Sent: Thursday, July 15,

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Naitik Shah
The formats for 1.0 and 2.0 are sufficiently different that it is possible to unambiguously figure out what version is being used. -Naitik On Thu, Jul 15, 2010 at 3:56 PM, Torsten Lodderstedt < tors...@lodderstedt.net> wrote: > where is the relation between token version and HTTP authenticatio

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Eaton
On Thu, Jul 15, 2010 at 4:04 PM, Brian Campbell wrote: > I'm guessing you don't want any language restricting the length of the > code?  Though there is some practical limit due to the URL length in > the 302 (I think it has to be a redirect). There are certain practical limits, but I think there

Re: [OAUTH-WG] I-D: multiple access tokens

2010-07-15 Thread Torsten Lodderstedt
Am 15.07.2010 16:27, schrieb Christian Stübner: Torsten, I came across your I-D when looking for a way to distinguish between different protected resources. Just some remarks and questions: o In 3.1. I suppose your example request is missing the service_id, right? Yepp. o 3.4. Replace s

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Eran Hammer-Lahav
No normative language needed. Security consideration is the right approach. EHL On Jul 15, 2010, at 19:05, "Brian Campbell" wrote: > Okay, I'm with you. Some text guiding the more obvious (to me anyway) > usage might still be useful. Something like, > > "If Authorization Code value is a

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Campbell
Okay, I'm with you. Some text guiding the more obvious (to me anyway) usage might still be useful. Something like, "If Authorization Code value is a reference to state on the server, the value MUST/SHOULD be constructed from a cryptographically strong random or pseudo-random number sequence [RF

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Torsten Lodderstedt
where is the relation between token version and HTTP authentication scheme version? regards, Torsten. Am 15.07.2010 23:34, schrieb Naitik Shah: I though we'd come to a decision on the versioning too :) IMHO, it's better to push this burden of versioning into the token itself if necessary. I t

Re: [OAUTH-WG] resource server id needed?

2010-07-15 Thread Torsten Lodderstedt
Am 15.07.2010 20:14, schrieb Marius Scurtescu: On Thu, Jul 15, 2010 at 10:03 AM, Torsten Lodderstedt wrote: As I have written in my reply to Marius's posting. I'm fine with including server ids in scopes. But this requires a definition of the scope's syntax and semantics in the spec. Other

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread David Recordon
Even better, thanks! On Thu, Jul 15, 2010 at 2:31 PM, Michael D Adams wrote: > On Thu, Jul 15, 2010 at 2:11 PM, David Recordon > wrote: > > On Thu, Jul 15, 2010 at 1:36 PM, Zeltsan, Zachary (Zachary) > >> “The client makes the following request at an arbitrary but reasonable > >> interval which

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Naitik Shah
I though we'd come to a decision on the versioning too :) IMHO, it's better to push this burden of versioning into the token itself if necessary. I think it's better from a developers perspective to pass an oauth_token, because it's cleaner. Most deployments will already have versioned tokens to en

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread Michael D Adams
On Thu, Jul 15, 2010 at 2:11 PM, David Recordon wrote: > On Thu, Jul 15, 2010 at 1:36 PM, Zeltsan, Zachary (Zachary) >> “The client makes the following request at an arbitrary but reasonable >> interval which MUST NOT exceed the minimum interval rate provided by >>   the authorization server (if p

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Eaton
On Thu, Jul 15, 2010 at 2:16 PM, Brian Campbell wrote: > I must admit to never having considered the authz code as anything but > a random string as a reference that must be resolved.  Can you expand > on your thinking a bit, if only to enlighten me? > > Are you thinking of embedding what would be

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Campbell
As written it probably does preclude that but I'm sure we could massage it to be more flexible while still keeping the intent that the code isn't something that can be easily guessed or is likely to collide. I must admit to never having considered the authz code as anything but a random string as

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread David Recordon
On Thu, Jul 15, 2010 at 1:36 PM, Zeltsan, Zachary (Zachary) < zachary.zelt...@alcatel-lucent.com> wrote: > Section 1.5: > > “The client makes the following request at an arbitrary but reasonable > > interval which MUST NOT exceed the minimum interval rate provided by > > the authorization serve

[OAUTH-WG] SAML 2.0 Bearer Assertion Profile for OAuth 2.0 draft

2010-07-15 Thread Brian Campbell
I'm gong to join the growing list of people attaching a potential I-D to an email due to he cut off time for the I-D submissions. Attached is a draft that aims to tightly define the particular format of a SAML 2.0 bearer assertion in requesting an access token using the assertion grant_type. I'v

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread Zeltsan, Zachary (Zachary)
Section 1.5: "The client makes the following request at an arbitrary but reasonable interval which MUST NOT exceed the minimum interval rate provided by the authorization server (if present via the "interval" parameter)." My understanding is that the intervals between the client's subsequent r

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread David Recordon
On Thu, Jul 15, 2010 at 1:05 PM, George Fletcher wrote: > Looks good. > > Are there any restrictions on the device_code such that it has to be under > a certain size? Seems like it would be good to protect against random > polling attacks (I presume this is what the Google research refers to). I

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread George Fletcher
Looks good. Are there any restrictions on the device_code such that it has to be under a certain size? Seems like it would be good to protect against random polling attacks (I presume this is what the Google research refers to). If there are no size restrictions then the device_code could be

[OAUTH-WG] Device profile draft

2010-07-15 Thread David Recordon
I've broken the device profile out of draft 06 so that it now lives in a separate document as an extension and have updated it to fit into the draft 10 structure. It defines a new "device endpoint" for the initial setup request where the client gets the two codes and URL. It then uses the existing

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Justin Richer
> Framing the argument against "having a 2 in it" as bikeshedding is missing > the point. My reason against using OAuth2 is that is will undermine all the > work put in to build an extensible framework that can evolve without needing > a whole new version. By putting a version number, we make it

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Justin Richer
> > It was discussed before, but I don't remember there being any consensus > > in the group. What are the practical reasons for not using "oauth2" > > namespacing in the one place we still use namespacing? Most of what I've > > heard seems to sound like "I don't like it to have a 2 on it". > > I

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Marius Scurtescu
On Thu, Jul 15, 2010 at 11:36 AM, Eran Hammer-Lahav wrote: > Framing the argument against "having a 2 in it" as bikeshedding is missing > the point. My reason against using OAuth2 is that is will undermine all the > work put in to build an extensible framework that can evolve without needing >

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread William Mills
Lots of things can be done. Checking presence of oauth_signature_method implies that the format is the same in all cases including the auth header right? What you seem to be arguing for right now is parsing the entire line to decide which auth you do. I would *much* prefer a leading tag or schem

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Eran Hammer-Lahav
There is no such thing. Since there is no discovery for 1.0, all calls are hardcoded into the client today. There is no 'trying things out'. EHL On Jul 15, 2010, at 14:33, "John Kemp" wrote: > On Jul 15, 2010, at 9:07 AM, Eran Hammer-Lahav wrote: > >> I would like people to raise their han

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread John Kemp
On Jul 15, 2010, at 2:35 PM, David Recordon wrote: > Given that OAuth discovery hasn't been written yet, how would an OAuth 1.0 > client know about a 2.0 protected resource in the first place? It wouldn't know anything other than it got back a WWW-Authenticate header when accessing the resource

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Eran Hammer-Lahav
Framing the argument against "having a 2 in it" as bikeshedding is missing the point. My reason against using OAuth2 is that is will undermine all the work put in to build an extensible framework that can evolve without needing a whole new version. By putting a version number, we make it more at

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread David Recordon
Given that OAuth discovery hasn't been written yet, how would an OAuth 1.0 client know about a 2.0 protected resource in the first place? On Thu, Jul 15, 2010 at 11:33 AM, John Kemp wrote: > On Jul 15, 2010, at 9:07 AM, Eran Hammer-Lahav wrote: > > > I would like people to raise their hand and

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread John Kemp
On Jul 15, 2010, at 9:07 AM, Eran Hammer-Lahav wrote: > I would like people to raise their hand and explain how this will break > actual 1.0 deployments. What happens if a 1.0 client receives a WWW-Authenticate header from a 2.0 protected resource with the 'OAuth' mechanism specified? Might it

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Luke Shepard
On Jul 15, 2010, at 10:51 AM, Justin Richer wrote: > It was discussed before, but I don't remember there being any consensus > in the group. What are the practical reasons for not using "oauth2" > namespacing in the one place we still use namespacing? Most of what I've > heard seems to sound like

Re: [OAUTH-WG] resource server id needed?

2010-07-15 Thread Marius Scurtescu
On Thu, Jul 15, 2010 at 10:03 AM, Torsten Lodderstedt wrote: > As I have written in my reply to Marius's posting. I'm fine with including > server ids in scopes. But this requires a definition of the scope's syntax > and semantics in the spec. Otherwise, scope interpretation (and server > identifi

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Justin Richer
It was discussed before, but I don't remember there being any consensus in the group. What are the practical reasons for not using "oauth2" namespacing in the one place we still use namespacing? Most of what I've heard seems to sound like "I don't like it to have a 2 on it". I don't want to have

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread William Mills
No, the people who don't like the sharing of the namespace between the 2 still don't like it, and the people that can;t stand teh idea of using oauth2 for anything still won't move. From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Brian Eaton
On Thu, Jul 15, 2010 at 10:37 AM, David Recordon wrote: > I thought this topic had been beaten to death before. Can you give me a pointer to the earlier threads? ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Eaton
On Thu, Jul 15, 2010 at 7:22 AM, Brian Campbell wrote: >    The Authorization Code value MUST be constructed from >    a cryptographically strong random or pseudo-random number >    sequence [RFC1750] generated by the Authorization Server. >    The probability of any two Authorization Code values

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread David Recordon
I thought this topic had been beaten to death before. An OAuth 1.0 protected resource request includes a variety of oauth_ parameters whereas OAuth 2.0 just has oauth_token. --David On Thu, Jul 15, 2010 at 10:12 AM, Brian Eaton wrote: > On Thu, Jul 15, 2010 at 7:59 AM, Justin Richer wrote: >

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Lukas Rosenstock
+1 for both 2010/7/15 Justin Richer : > +1 on OAuth2 header, and I also want to see oauth2_token in URI and form > parameter methods. > > 1.0 clients will talk to systems that support both oauth2 and oauth1 > simultaneously. Most likely on the same PR endpoints as well. Since the > protocols are n

Re: [OAUTH-WG] resource server id needed?

2010-07-15 Thread Ivan Pulleyn
On Thu, Jul 15, 2010 at 10:03 AM, Torsten Lodderstedt < tors...@lodderstedt.net> wrote: > As I have written in my reply to Marius's posting. I'm fine with including > server ids in scopes. But this requires a definition of the scope's syntax > and semantics in the spec. Otherwise, scope interpret

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Brian Eaton
On Thu, Jul 15, 2010 at 7:59 AM, Justin Richer wrote: > +1 on OAuth2 header, and I also want to see oauth2_token in URI and form > parameter methods. Good point about the query parameter names needing to be unambiguous. ___ OAuth mailing list OAuth@ietf

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Torsten Lodderstedt
sounds really good. +1 for adding this to the authorization code's specification. Am 15.07.2010 16:22, schrieb Brian Campbell: I agree it's important but it belong in security considerations or perhaps somewhere in the definition of the Authorization Code itself? Either way here's some text th

Re: [OAUTH-WG] resource server id needed?

2010-07-15 Thread Torsten Lodderstedt
As I have written in my reply to Marius's posting. I'm fine with including server ids in scopes. But this requires a definition of the scope's syntax and semantics in the spec. Otherwise, scope interpretation (and server identification) will be deployment specific. In your example, ':' is used

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread William Mills
Well, no. We're rolling out new Oauth 1.0a stuf even now, because 2.0 isn't ready and Oauth 1.0a is better than many alternatives. > > OAuth is dead, long live OAuth. Right? I mean, you don't move > the White House to another address every time you get a new > president... > > b.

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Blaine Cook
On 15 July 2010 15:59, Justin Richer wrote: > +1 on OAuth2 header, and I also want to see oauth2_token in URI and form > parameter methods. > > 1.0 clients will talk to systems that support both oauth2 and oauth1 > simultaneously. Most likely on the same PR endpoints as well. Since the > protocols

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Justin Richer
+1 on OAuth2 header, and I also want to see oauth2_token in URI and form parameter methods. 1.0 clients will talk to systems that support both oauth2 and oauth1 simultaneously. Most likely on the same PR endpoints as well. Since the protocols are not backwards compatible, they should be able to co

Re: [OAUTH-WG] I-D: multiple access tokens

2010-07-15 Thread Christian Stübner
My post was a reply to http://www.ietf.org/mail-archive/web/oauth/current/msg03639.html. (Something obviously went wrong with the Thread Index.) Regards, Christian > Torsten, > > I came across your I-D when looking for a way to distinguish between > different protected resources. > > Just so

Re: [OAUTH-WG] I-D: multiple access tokens

2010-07-15 Thread Christian Stübner
Torsten, I came across your I-D when looking for a way to distinguish between different protected resources. Just some remarks and questions: o In 3.1. I suppose your example request is missing the service_id, right? o 3.4. Replace server_id by service_id and you comply with the rest of the docu

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Campbell
I agree it's important but it belong in security considerations or perhaps somewhere in the definition of the Authorization Code itself? Either way here's some text that could be used as a starting point. I borrowed heavily from concepts and language in SAML regarding artifacts and IDs which bear

[OAUTH-WG] OAuth2 Spec Feedback for v2-10

2010-07-15 Thread Christian Stübner
Hi @all! Here is my feedback to the current version (-10) of the draft. So far it looks really promising to me. Just a view thoughts/ideas/questions: 1.4: Is it necessary for an authorization server to support all client profiles in order to be standard complaint? 1.4.1. Wording: Profile "Web S

Re: [OAUTH-WG] Assertion profile + client_secret and client_id security

2010-07-15 Thread Eran Hammer-Lahav
You need to verify that when you use an authorization code, not when you use an assertion. EHL On 7/15/10 3:54 AM, "Elena Lozano" wrote: Hi everyone, As we adapt the RedIRIS PHP OAuth2 library[1] to the last version of the draft we have found some issues regarding the client secret and clie

Re: [OAUTH-WG] "shared symmetric secret"

2010-07-15 Thread Eran Hammer-Lahav
Access tokens should not be stored in plain text either since stealing them is just like stealing a password. As for cookies, client developers do very little to protect cookies today. While the theory might be similar, in practice, telling a client developer this is just like a cookies doesn't

Re: [OAUTH-WG] resource server id needed?

2010-07-15 Thread Eran Hammer-Lahav
No. It is. Let me ask you this: why can't you use 'photos:server1' and 'photos:server2' as scopes? EHL On 7/14/10 10:49 PM, "Torsten Lodderstedt" wrote: Did I get you right? Your answer is: Oauth is not suited for deployments with different resource servers which rely in a single authz serv

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Eran Hammer-Lahav
To elaborate a bit: Since there is no discovery in 1.0, the only place this can create a conflict is on the server side, when servers support both new and old schemes, and need to tell which version the client is using. This is the same issue as using the 'oauth_token' parameter in the query or

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Eran Hammer-Lahav
I would like people to raise their hand and explain how this will break actual 1.0 deployments. EHL On Jul 15, 2010, at 1:38, Brian Eaton wrote: > Draft 10 switched from "Token" scheme in the authorization header to > "OAuth". I'd rather we didn't reuse OAuth. 'OAuth2' would be great. > "

Re: [OAUTH-WG] Assertion profile + client_secret and client_id security

2010-07-15 Thread Torsten Lodderstedt
Why don't you use the client secret to authenticate the application? The spec allows you to use a BASIC authorization header for that purpose. Regards, Torsten. Am 15.07.2010 um 12:54 schrieb Elena Lozano : > Hi everyone, > > As we adapt the RedIRIS PHP OAuth2 library[1] to the last version o

[OAUTH-WG] Assertion profile + client_secret and client_id security

2010-07-15 Thread Elena Lozano
Hi everyone, As we adapt the RedIRIS PHP OAuth2 library[1] to the last version of the draft we have found some issues regarding the client secret and client id. The thing is that we don't understand the security given with the client_id and client_secret of the assertion profile. The last chan

Re: [OAUTH-WG] single use authorization codes

2010-07-15 Thread Igor Faynberg
An important point, which I think should be captured in the security consideration section. Igor Torsten Lodderstedt wrote: what about guessing/brute force attacks on the code? Supposed an authorization server issuing tokens for a client w/o secret. Then the number of attempts needed to obtai

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Manger, James H
> Draft 10 switched from "Token" scheme in the authorization header to > "OAuth". I'd rather we didn't reuse OAuth. I agree that "OAuth" is taken as a scheme name. I like "Bearer" for the Authorization header scheme holding an access token. We should use a different name for the WWW-Authenticati