[OAUTH-WG] specification of authorization code properties

2010-09-29 Thread PRATEEK MISHRA
I read through v10 from the perspective of an implementor, and it seemed to me that properties of generated authorization code and its treatment by various entities need to be called out explicitly as a counter-measure against various simple attacks. I would also comment that the exchanges bet

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-09-29 Thread Luke Shepard
Okay, I'm fine with proceeding down this path. My takeaway is that I don't care really where signatures live, but we definitely need a threat analysis and security considerations document dealing with how and in what contexts to use bearer tokens. On Sep 28, 2010, at 10:08 AM, Eran Hammer-Lahav

[OAUTH-WG] Next steps (draft timeline)

2010-09-29 Thread Eran Hammer-Lahav
(This is a draft overview of our next steps. Clearly, this can change based on working group consensus.) Proposal discussion The working group is still discussing the compromise proposal for moving section 5 out of the specification. So far there is general support but some have raised concern

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-09-29 Thread Thomas Hardjono
+1 I think this is a reasonable & practical proposal. /thomas/ From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Eran Hammer-Lahav Sent: Tuesday, September 28, 2010 2:26 AM To: OAuth WG (oauth@ietf.org) Subject: [OAUTH-WG] Looking for a compromise on signatures and othe

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-09-29 Thread Eran Hammer-Lahav
Thanks Mark. > -Original Message- > From: Mark Mcgloin [mailto:mark.mcgl...@ie.ibm.com] > Sent: Wednesday, September 29, 2010 8:28 AM > I think acquiring and using a token can be considered core as you always > need both. I don't have valid security consideration linkage between > acquiri

Re: [OAUTH-WG] Comparing the JSON Token drafts

2010-09-29 Thread Anthony Nadalin
> So this one I do feel more strongly about: We should only include crypto > mechanisms that everybody MUST support. Otherwise, we'll have to invent some > sort of negotiation step in the protocol: "do you support alg XYZ? No I > don't, > please use ABC". Let's not do that. >As just one datapoi

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-09-29 Thread Mark Mcgloin
Eran Hammer-Lahav wrote on 29/09/2010 15:50:33: > > > > -1 to splitting acquiring and using a token. It may not confuse > people actively > > engaged in the WG but what about everyone else? > > We are already splitting it, by putting signatures elsewhere. Just > because you might think bearer to

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-09-29 Thread Anthony Nadalin
I agree bearer tokens are already in wide usage, I think it makes sense to have a default interoperable token type, much like a token format and signature. The security considerations section can point/cover any issues. I'm not seeing what the splitting of the document is achieving except side

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-09-29 Thread Eran Hammer-Lahav
> -Original Message- > From: Mark Mcgloin [mailto:mark.mcgl...@ie.ibm.com] > Sent: Wednesday, September 29, 2010 12:55 AM > I echo Dick's sentiment, mildly > > -1 to splitting acquiring and using a token. It may not confuse people > actively > engaged in the WG but what about everyone

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-09-29 Thread Mark Mcgloin
I echo Dick's sentiment, mildly -1 to splitting acquiring and using a token. It may not confuse people actively engaged in the WG but what about everyone else? Also, as Torsten and I look at security considerations, I wonder if there are some examples that link the threat model for acquiring a to