Re: [OAUTH-WG] issuing multiple tokens

2011-06-15 Thread Phil Hunt
Eran, Agree, having an array all the time would be a pain. Still, I maintain a +1 to explore this a wee bit further much as I hate to do so at this late stage. Phil @independentid www.independentid.com phil.h...@oracle.com On 2011-06-15, at 10:46 PM, Eran Hammer-Lahav wrote: > It is not a

Re: [OAUTH-WG] issuing multiple tokens

2011-06-15 Thread Eran Hammer-Lahav
It is not an important enough feature. Parsing an array response when 99.99% will be a single object array is annoying. Also, what would you return in case of error? A single object? What is the client supposed to do if it gets an empty array? Array with more than one token? *This* would be the

Re: [OAUTH-WG] issuing multiple tokens

2011-06-15 Thread Phil Hunt
+1 Phil @independentid www.independentid.com phil.h...@oracle.com On 2011-06-15, at 10:01 PM, Manger, James H wrote: > Torsten Lodderstedt needs to issue multiple tokens; Igor Faynberg said +1 to > that; John Bradley identified that OpenID Connect needs to request multiple > tokens; Eran

Re: [OAUTH-WG] issuing multiple tokens

2011-06-15 Thread Eran Hammer-Lahav
My comment was not about not issuing an access token, but about the need for a refresh token *and* client authentication. EHL > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Manger, James H > Sent: Wednesday, June 15, 2011 10:02 PM > To:

[OAUTH-WG] issuing multiple tokens

2011-06-15 Thread Manger, James H
Torsten Lodderstedt needs to issue multiple tokens; Igor Faynberg said +1 to that; John Bradley identified that OpenID Connect needs to request multiple tokens; Eran Hammer-Lahav even mentioned a no-token flow as something that could make sense; ... Issuing 0, 1 or more tokens looks like an imp

Re: [OAUTH-WG] Redirection URI and Implicit grant

2011-06-15 Thread Eran Hammer-Lahav
I would be interested in working out a solution where client identifier is just the redirection URI registered (or not), which would completely decouple client authentication from the rest of the flow. But that's a much bigger change. EHL From: Manger, James H [mailto:james.h.man...@team.telstr

Re: [OAUTH-WG] Redirection URI and Implicit grant

2011-06-15 Thread Manger, James H
It seems like an authorization server receiving a request with an unregistered redirect_uri of https://example.org/ can tell the user: "Permission will be passed to your browser then onto *example.org*" An authorization server receiving a request with a registered redirect_uri of https://

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Shane B Weeden
Brian Eaton wrote on 16-06-2011 10:36:18 AM: > From: Brian Eaton > To: Shane B Weeden/Australia/IBM@IBMAU > Cc: OAuth WG > Date: 16-06-11 10:49 AM > Subject: Re: [OAUTH-WG] Client authentication requirement > > On Wed, Jun 15, 2011 at 3:50 PM, Shane B Weeden wrote: > Brain - can you elaborat

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Eran Hammer-Lahav
Your comment was that having client authentication makes it easier to recovery from an attack. I don't understand how the comments below about changing client secrets every 30 days are relevant. Are you suggesting to wait until the next routine secret cycle to revoke compromised credentials? Or

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Brian Eaton
On Wed, Jun 15, 2011 at 6:02 PM, Eran Hammer-Lahav wrote: > How does it make recovery easier? Why is revoking refresh token any harder > than changing client secret? > Changing a client secret can be done without disrupting users. You can even schedule it, do it every 30 days as part of your gen

Re: [OAUTH-WG] Redirection URI and Implicit grant

2011-06-15 Thread Eran Hammer-Lahav
> -Original Message- > From: Shane B Weeden [mailto:swee...@au1.ibm.com] > Sent: Wednesday, June 15, 2011 3:19 PM > To: Eran Hammer-Lahav > Cc: OAuth WG > Subject: Re: [OAUTH-WG] Redirection URI and Implicit grant > > > From: Eran Hammer-Lahav > > To: OAuth WG > > Date: 16-06-11 05:43 A

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Eran Hammer-Lahav
How does it make recovery easier? Why is revoking refresh token any harder than changing client secret? As for the assertion grant type, where is the specified that the refresh token is bound to the private keys used to produce the assertion used to obtain the refresh token in the first place?

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Brian Eaton
On Wed, Jun 15, 2011 at 3:50 PM, Shane B Weeden wrote: > Brain - can you elaborate on that a little? Are you suggesting that clients > that can't keep secrets use a dummy (notasecret) pwd anyway to satisfy > "requiring client authentication"? > Or use random secrets. Whatever floats your boat a

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Brian Eaton
On Wed, Jun 15, 2011 at 5:27 PM, Eran Hammer-Lahav wrote: > So basically, it is authentication on top of bearer credentials to achieve > another level of security. Are we just assuming that stealing the refresh > token will be harder than stealing the client credentials? Seems a bit > optimistic.

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Eran Hammer-Lahav
Ok. That makes sense and in line with my other thread about implicit grant and registration. So if a callback is not registered, we are basically at the mercy of the user not being an idiot. Seems like a good reason to require redirection URI registration for implicit grant clients. EHL From

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Brian Eaton
On Wed, Jun 15, 2011 at 5:21 PM, Eran Hammer-Lahav wrote: > > I suspect another choice of words would be useful there. Implicit grants > rely > > on the browser's authentication of the receiving web site. When https is > > used, that authentication is fairly strong. > > "authentication of the re

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Eran Hammer-Lahav
> -Original Message- > From: Brian Eaton [mailto:bea...@google.com] > Sent: Wednesday, June 15, 2011 1:53 PM > > But I have no idea why we need client authentication for using a refresh > token? > > This is covered here: http://www.ietf.org/mail- > archive/web/oauth/current/msg06362.htm

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Eran Hammer-Lahav
> -Original Message- > From: Brian Eaton [mailto:bea...@google.com] > Sent: Wednesday, June 15, 2011 1:53 PM > To: Eran Hammer-Lahav > Cc: Brian Campbell; OAuth WG > Subject: Re: [OAUTH-WG] Client authentication requirement > > > We have one grant type without client authentication (impl

Re: [OAUTH-WG] What constitutes "Payload Body" in MAC spec

2011-06-15 Thread Eran Hammer-Lahav
'Payload body' as defined by http://tools.ietf.org/html/draft-ietf-httpbis-p1-messaging-14#section-3.3 Message body is the wire bits which may include a range of content encoding, compression, fragmentation, etc. The point is that the client can't really know what the message body is going to l

Re: [OAUTH-WG] Redirection URI and Implicit grant

2011-06-15 Thread Shane B Weeden
> From: Eran Hammer-Lahav > To: OAuth WG > Date: 16-06-11 05:43 AM > Subject: [OAUTH-WG] Redirection URI and Implicit grant > Sent by: oauth-boun...@ietf.org > > This is coming from recent experience building a full web service > and multiple clients using OAuth 2.0. I am going to make these > ch

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Shane B Weeden
Eran: > > I would like to go back to requiring client authentication for the access token endpoint Brian: > Sure.  Why not? > > 1) It makes the spec simpler. > 2) It has no impact on the security of clients that can't keep secrets. > 3) It has no impact on the security of clients that can keep sec

[OAUTH-WG] What constitutes "Payload Body" in MAC spec

2011-06-15 Thread Phil Hunt
We had a discussion today about the MAC token spec. There was confusion was to whether payload body included the headers or just the HTTP request message body. I think the confusion comes about because of subtle term differences in other RFCs, see the message from Ron below... From Ron: > I to

Re: [OAUTH-WG] Refresh tokens

2011-06-15 Thread Phil Hunt
+ 1 Phil @independentid www.independentid.com phil.h...@oracle.com On 2011-06-15, at 1:39 PM, Brian Eaton wrote: > Yeah, I agree with that change. > > On Wed, Jun 15, 2011 at 1:24 PM, William J. Mills > wrote: > I like your draft in general, but > > 10.1.3. Access Tokens > >

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Brian Eaton
> We have one grant type without client authentication (implicit) I suspect another choice of words would be useful there. Implicit grants rely on the browser's authentication of the receiving web site. When https is used, that authentication is fairly strong. > I would like to go back to requi

Re: [OAUTH-WG] Refresh tokens

2011-06-15 Thread Brian Eaton
Yeah, I agree with that change. On Wed, Jun 15, 2011 at 1:24 PM, William J. Mills wrote: > I like your draft in general, but > > > 10.1.3. Access Tokens > > Access tokens are shorter-lived versions of refresh tokens. > > Doesn't work for me. Access tokens are credentials used to access

Re: [OAUTH-WG] consistency of token param name in bearer token type

2011-06-15 Thread William J. Mills
Makes sense to me. From: John Bradley To: Eran Hammer-Lahav Cc: paul Tarjan ; "oauth@ietf.org" Sent: Wednesday, June 15, 2011 11:04 AM Subject: Re: [OAUTH-WG] consistency of token param name in bearer token type I agree access_token is better. John B. On 201

Re: [OAUTH-WG] Refresh tokens

2011-06-15 Thread William J. Mills
I like your draft in general, but 10.1.3. Access Tokens Access tokens are shorter-lived versions of refresh tokens. Doesn't work for me. Access tokens are credentials used to access protected resources. Refresh tokens are credentials used to obtain access tokens. -bill __

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Eran Hammer-Lahav
Well, that's where this is coming from... Client registration needs to be defined, and it should be specific about the requirements for clients capable of authentication vs. not, as well as the redirection URI registration requirements for using the implicit grant type (see other message). We

Re: [OAUTH-WG] Refresh tokens

2011-06-15 Thread Eran Hammer-Lahav
And we need to say that explicitly. Even if we allow servers to use the two tokens differently, we should clearly state their design considerations and apply any needed restrictions to make that clear. We are leaving way too much to the whims of the individual developer. Are the access tokens

[OAUTH-WG] Redirection URI and Implicit grant

2011-06-15 Thread Eran Hammer-Lahav
This is coming from recent experience building a full web service and multiple clients using OAuth 2.0. I am going to make these changes to my own implementation and would like to raise the questions here and discuss possible changes. A few questions: 1. Why not require the registration of a r

Re: [OAUTH-WG] review of draft-ietf-oauth-v2-16

2011-06-15 Thread Eran Hammer-Lahav
I agree to the extent that the user can be trusted to know how they got to the authorization endpoint. If the client cannot be authenticated, the authorization server is limited in the information it can offer the user to make the decision. It is extremely hard to come up with language that wil

Re: [OAUTH-WG] Refresh tokens

2011-06-15 Thread Kris Selden
There is a scalability reason, in that the access_token could be verifiable on the resource server without DB lookup or a call out to a central server, then the refresh token serves as the means for revoking in the "an access token good for an hour, with a refresh token good for a year or good-t

Re: [OAUTH-WG] Refresh tokens

2011-06-15 Thread Eran Hammer-Lahav
Yes, this is useful and on my list of changes to apply. But I would like to start with a more basic, normative definition of what a refresh token is for. Right now, we have a very vague definition for it, and it is not clear how developers should use it alongside access tokens. EHL From: Brian

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Brian Campbell
Also seems this is related to the topic of native/mobile clients. As I understand it, native apps using the authorization code grant/flow have been the primary motivator for keeping client authentication optional. Anonymous client have come up too. On Wed, Jun 15, 2011 at 11:26 AM, Eran Hammer

Re: [OAUTH-WG] Refresh tokens

2011-06-15 Thread Brian Eaton
On Wed, Jun 15, 2011 at 10:30 AM, Eran Hammer-Lahav wrote: > I would like to add a quick discussion of access token and refresh token > recommended deployment setup, providing clear guidelines when a refresh > token SHOULD and SHOULD NOT be issued, and when issues, how it is difference > from the

Re: [OAUTH-WG] consistency of token param name in bearer token type

2011-06-15 Thread John Bradley
I agree access_token is better. John B. On 2011-06-15, at 1:38 PM, Eran Hammer-Lahav wrote: > It should be pretty easy :-) > > Anyone objects to changing the parameter name from 'bearer_token' to > 'access_token'? Let Mike know by 6/20 or he will make the change. > > EHL > > >> -Original

Re: [OAUTH-WG] consistency of token param name in bearer token type

2011-06-15 Thread Eran Hammer-Lahav
It should be pretty easy :-) Anyone objects to changing the parameter name from 'bearer_token' to 'access_token'? Let Mike know by 6/20 or he will make the change. EHL > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Mike Jones > Sent:

Re: [OAUTH-WG] Updated text for Native Apps

2011-06-15 Thread Eran Hammer-Lahav
That's an odd way of looking at it. I'm looking at over 30 responses to the text with clear disagreement on how native applications should be deployed using different grant types. To say that there is consensus to the text, but not to the other comments objecting to it is ignoring the lack of co

[OAUTH-WG] Refresh tokens

2011-06-15 Thread Eran Hammer-Lahav
The main source of confusion about refresh token is caused by the protocol lack of clear definition of access token lifetime, even in relative terms, and the objectives of refresh tokens. For example, the authorization server can issue: - an access token good for an hour, with a refresh token go

[OAUTH-WG] Client authentication requirement

2011-06-15 Thread Eran Hammer-Lahav
Client authentication has been one of the main problem areas in OAuth 1.0 and 2.0 does nothing to resolve it (arguably, it makes it more confusing). Because of the desire to allow any client type in any deployment environment, we ended up with a barely defined client authentication model. We off

Re: [OAUTH-WG] Updated text for Native Apps

2011-06-15 Thread Anthony Nadalin
Not seeing what you write about below, I think that the basic text that was discussed at the F2F has consensus around the guidance (with some changes that were discussed and Chuck provided), I think that some of the other thoughts people have thrown out don't. I disagree with dropping the text a

Re: [OAUTH-WG] Updated text for Native Apps

2011-06-15 Thread Eran Hammer-Lahav
This working group has failed, for well over a year, to reach any sort of consensus regarding which grant types are suitable for a given client type. There was no draft between 00 and 16 in which we had agreement on the definition of client types, or the exclusivity of any flow to any given type

Re: [OAUTH-WG] Updated text for Native Apps

2011-06-15 Thread Anthony Nadalin
Since Torsten and I had the action item to propose text we will update the text based upon the list and give you back an update From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Eran Hammer-Lahav Sent: Wednesday, June 15, 2011 9:33 AM To: Chuck Mortimore; oauth@ietf.org S

Re: [OAUTH-WG] Updated text for Native Apps

2011-06-15 Thread Eran Hammer-Lahav
Is there an updated text based on the long thread? EHL From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Chuck Mortimore Sent: Tuesday, May 31, 2011 10:37 AM To: oauth@ietf.org Subject: [OAUTH-WG] Updated text for Native Apps Minor updates for section 9 based upon feedba

Re: [OAUTH-WG] HTTP/1.0 and JSON

2011-06-15 Thread Justin Richer
> > I couldn't find a conclusion to the May 2010 discussions about using x-www- > > form-urlencoded vs. json nor a rationale in the spec for using JSON. Why do > > I > > need to add a JSON lexer/parser to my library just to get key-value pairs > > that > > can be represented by form-urlencoded?

Re: [OAUTH-WG] HTTP/1.0 and JSON

2011-06-15 Thread Eran Hammer-Lahav
> -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Tim Brody > Sent: Wednesday, June 15, 2011 5:42 AM > To: oauth@ietf.org > Subject: [OAUTH-WG] HTTP/1.0 and JSON > > Hi All, > > I'm the author of this Perl library for signing OAuth 1.0 re

[OAUTH-WG] HTTP/1.0 and JSON

2011-06-15 Thread Tim Brody
Hi All, I'm the author of this Perl library for signing OAuth 1.0 requests: http://search.cpan.org/~timbrody/LWP-Authen-OAuth-1.01/ I've been asked about OAuth 2.0 so have scanned through the spec and joined this list :-) The MAC-signing draft section 1.2 refers to "Host:" but I have an HTTP li

Re: [OAUTH-WG] consistency of token param name in bearer token type

2011-06-15 Thread Bill
On 15/06/11 02:30, David Recordon wrote: Bearer token doesn't exist within the core spec around getting an access token. The term that is used is "access token". Right, I get that Bearer is defined in another draft document (which the core spec references and probably should not btw, that's

Re: [OAUTH-WG] MAC: creation-time when a cookie is renewed

2011-06-15 Thread Adam Barth
These problems all seem sovled with the new definition of age to not be necessarily related to time. Adam On Wed, Jun 15, 2011 at 12:07 AM, Manger, James H wrote: > The MAC scheme’s cookie mode [draft-ietf-oauth-v2-http-mac-00, section 6] > says the cookie’s creation-time is used to determine t

[OAUTH-WG] MAC: creation-time when a cookie is renewed

2011-06-15 Thread Manger, James H
The MAC scheme's cookie mode [draft-ietf-oauth-v2-http-mac-00, section 6] says the cookie's creation-time is used to determine the age that goes in the nonce in a request. The creation-time is the time the client receives the Set-Cookie response - unless the client already has a cookie with the