Re: [OAUTH-WG] Section 7.2

2012-06-14 Thread Eran Hammer
WFM. This will be the new text for 7.2 unless someone has any additional feedback or concerns. This closes my issue with the new error registry changes. EH From: Mike Jones [mailto:michael.jo...@microsoft.com] Sent: Thursday, June 14, 2012 6:15 PM To: Eran Hammer; oauth@ietf.org WG (oauth@ietf

Re: [OAUTH-WG] Section 7.2

2012-06-14 Thread Mike Jones
Thanks for writing the text below. It looks fine to me. About adding the other error parameters as suggestions, that seems like a reasonable thing to do. How about the text at the end below, which adds mentions of error_description and error_uri? 7.2. Error Response If a resource ac

Re: [OAUTH-WG] Section 7.2

2012-06-14 Thread Eran Hammer
Mike - if you want to add the other error parameters as suggestions, that would be fine by me. EH > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Eran Hammer > Sent: Thursday, June 14, 2012 3:23 PM > To: Mike Jones; oauth@ietf.org WG (oa

Re: [OAUTH-WG] Section 7.2

2012-06-14 Thread Eran Hammer
7.2. Error Response If a resource access request fails, the resource server SHOULD inform the client of the error. While the specifics of such error responses are beyond the scope of this specification, this documents establishes a common registry for error values to be shared among

Re: [OAUTH-WG] Error Registry: Conclusion

2012-06-14 Thread Eran Hammer
It seems to me that a single table is a better way to accomplish the goals set by the working group. The entire reason for adding the new location was based on the assumption that there will be overlap. EH From: Mike Jones [mailto:michael.jo...@microsoft.com] Sent: Thursday, June 14, 2012 3:0

Re: [OAUTH-WG] Section 7.2

2012-06-14 Thread Mike Jones
That sounds fine to me. If you want to take a stab at proposed text, have at it! -- Mike From: Eran Hammer Sent: 6/14/2012 2:59 PM To: oauth@ietf.org WG (oauth@ietf.org) Subject: [OAUTH-WG] Section 7.2 One simple solution is to define the new error location as

Re: [OAUTH-WG] Error Registry: Conclusion

2012-06-14 Thread Mike Jones
Yes, we already have multiple registries, but only one for errors. When an error code can be used in more than one usage location, having one will make the registrations simpler and it may be somewhat more apparent how the error code is used. The two structures are equivalent, but it seems to

[OAUTH-WG] Section 7.2

2012-06-14 Thread Eran Hammer
One simple solution is to define the new error location as an opt-in registry for oauth-centric token authentication methods. Instead of requiring new schemes to use it and deal with all the confusing qualifications, just narrowly define the new registry as a service for new token authentication

Re: [OAUTH-WG] Error Registry: Conclusion

2012-06-14 Thread Eran Hammer
We already have multiple registries. This one is about error codes only. I don't think the overlap is clear at this point between errors on the core endpoints vs error on the bearer and future auth schemes opting into this registry. So it is hard to tell which format would be better. The main qu

Re: [OAUTH-WG] Error Registry: Conclusion

2012-06-14 Thread William Mills
We might be able to combine these, but to me it really does make sense to have one registry for OAuth 2 core extensions to the frameowrk and one for the auth profiles.  The downside of this would be duplication between the two.  If we think there will be significant overlap then I think they sho

Re: [OAUTH-WG] On the OAuth Core Spec

2012-06-14 Thread Mike Jones
I'm thinking about what the appropriate updates to 7.2 are. Your question about "What if the parameter is named 'err' rather than 'error'?" is a fair one, for instance. I'll also target proposed updates to that for Monday. As to the question of one OAuth Errors registry versus four, as I suspe

Re: [OAUTH-WG] Error Registry: Conclusion

2012-06-14 Thread Mike Jones
Hi Hannes, You stated a preference for separate registries below, but that was a larger change to the OAuth Core spec than the current draft, which added a fourth error usage location "resource access error response" to the registry. To my knowledge, the consensus call didn't ask people to exp

Re: [OAUTH-WG] OAuth discovery registration... -01 draft posed

2012-06-14 Thread William Mills
Updated for examples, the editorial issues like replacing link header for lrdd where it appears, fixing authenticate->authorize. Thanks for the feedback so far. -bill -- A new version of I-D, draft-wmills-oauth-lrdd-01.txt has been successfully submitted by William Mills and

Re: [OAUTH-WG] On the OAuth Core Spec

2012-06-14 Thread Eran Hammer
Sounds good. Any progress on a revised 7.2? I'd like to get clarity on that so we can agree on new text and close the issue along with the ABNF. EH > -Original Message- > From: Mike Jones [mailto:michael.jo...@microsoft.com] > Sent: Thursday, June 14, 2012 2:18 PM > To: Eran Hammer > Cc

Re: [OAUTH-WG] On the OAuth Core Spec

2012-06-14 Thread Mike Jones
FYI, Eran, I'm going to hold off sending you proposed updated ABNF text for a few more days to let the discussions continue and consensus to build. I'm currently mentally targeting sending proposed draft updates Monday. Best wishes,

Re: [OAUTH-WG] Report an authentication issue

2012-06-14 Thread Nat Sakimura
This is a fairly well known (hopefully by now) issue. We, at the OpenID Foundation, call it "access_token phishing" attack these days. See: http://www.thread-safe.com/2012/01/problem-with-oauth-for-authentication.html Nov Matake has actually built the code on iPhone to verify the problem, and has

Re: [OAUTH-WG] [apps-discuss] OAuth discovery registration.

2012-06-14 Thread Eve Maler
FWIW, the reason we ultimately went with JSON was that it removed stumbling blocks around implementation and sheer spec volume. When we used straight XRD, we found that we had to put a full worked example in an appendix so it didn't impede the flow of the spec, and implementers reported to us th

[OAUTH-WG] Report an authentication issue

2012-06-14 Thread rui wang
Dear Facebook Security Team and OAuth Standard group, We are a research team in Microsoft Research. In January, 2011, we reported a vulnerability in Facebook Connect which allowed everyone to sign into Facebook-secured relying parties without password. It was promptly fixed after reporting. ( http

Re: [OAUTH-WG] Clarification in Section 2.0 of draft-ietf-oauth-revocation-00

2012-06-14 Thread doug foiles
That works for me Torsten, thanks. The “SHOULD”s make it interesting for the clients. It seems that the client developer will need to know how the individual AS’s are handling it. I pasted a couple of examples below where the terms “SHOULD” and “SHOULD NOT” are used. Both of these indicate to