Re: [OAUTH-WG] Change in editorship of OAuth Core Spec

2012-07-11 Thread Barry Leiba
> Eran Hammer has decided to step down as Editor of the OAuth Core > specification. I would like to personally thank Eran for all his years > of hard work and effort to the draft as well as to the working group at > large. As former chair, I want to add my thanks. Eran has done a *lot* of work o

Re: [OAUTH-WG] Holder-of-the-Key for OAuth

2012-07-11 Thread William Mills
Having re-read this I think I now understand how symmetric would work.  In the HOK model as I think of it we have 3 basic parts:  opaque token stuff, asserted client key, and server signature.  The asserted client key could be: -a public key -a certificate -an encrypted symmetric key -other? Fo

Re: [OAUTH-WG] Holder-of-the-Key for OAuth

2012-07-11 Thread prateek mishra
Hmmm, well actually, I am referencing something like the symmetric key generation (ephemeral) within TLS, I certainly dont view that as "crazy enterprise identity management" :-) If a client (with a public-private key pair) and resource have a multi-step interaction, and this is a common use-c

Re: [OAUTH-WG] Holder-of-the-Key for OAuth

2012-07-11 Thread John Bradley
On the specifics of OAuth bindings. We may profit by stepping back a bit and agreeing on what threats we are attempting to mitigate. One threat that is on a number of peoples minds is the complete failure of PKIX. Another is the simple fact that many clients don't validate server certificates a

Re: [OAUTH-WG] Holder-of-the-Key for OAuth

2012-07-11 Thread John Bradley
JWT is a OAuth WG item so we can do a proof semantic for that that works with the OAuth bindings but is not necessarily specific to OAuth. Connect and Browser ID may want to use it as well for JWT outside of OAuth. John B. On 2012-07-11, at 6:48 AM, Hannes Tschofenig wrote: > It is certainl

[OAUTH-WG] Fwd: draft-ietf-tls-oob-pubkey: The Open Issue

2012-07-11 Thread Hannes Tschofenig
It would be good to get your feedback here as well as this document relates to the the holder-of-the-key concept (with the exchange of the raw public key in TLS). Ciao Hannes Begin forwarded message: > From: Hannes Tschofenig > Date: July 11, 2012 1:56:40 PM GMT+03:00 > To: t...@ietf.org > C

Re: [OAUTH-WG] Holder-of-the-Key for OAuth

2012-07-11 Thread Hannes Tschofenig
It is certainly a plus that we can now make use of the JSON work. This will improve interoperability and avoid making implementation mistakes if developers use libraries (with the JOSE features). On Jul 11, 2012, at 1:37 PM, John Bradley wrote: > The POST of a signed blob would work with JOSE

Re: [OAUTH-WG] Holder-of-the-Key for OAuth

2012-07-11 Thread John Bradley
The POST of a signed blob would work with JOSE or CMS signing the blob. I suspect that would be more of a application level signing than OAuth though. Though worth talking about. I suspect a OAuth level signing might look a bit like HMAC. The access_token might be: 1 a JWT including a JWK struct

Re: [OAUTH-WG] Holder-of-the-Key for OAuth

2012-07-11 Thread Hannes Tschofenig
Hi Tony, On Jul 10, 2012, at 12:17 AM, Anthony Nadalin wrote: >> Regarding the symmetric keys: The asymmetric key can be re-used but with a >> symmetric key holder-of-the-key you would have to request a fresh one every >> time in order to accomplish comparable security benefits. > > We have u

Re: [OAUTH-WG] Holder-of-the-Key for OAuth

2012-07-11 Thread Manger, James H
>>John Bradley wrote: >>> I suspect that we will need two OAuth bindings. One for TLS and one for >>> signed message. >>  >>I agree. For instance, set “token_type”:”tls_client_cert” when the client has >>to use TLS; set “token_type”:”cms” when the client has to digitally sign >>messages using Cr