Re: [OAUTH-WG] Token refresh and The Two Generals

2012-11-26 Thread Shane B Weeden
My understanding is that it is considered a best practice to rollover a refresh token on each use - that is when a refresh token is used, both a new access token and a new refresh token are issued, and the old refresh token is revoked. The primary reason I have seen cited for this is it would allo

Re: [OAUTH-WG] Token refresh and The Two Generals

2012-11-26 Thread Tim Bray
As I read back through this one I’m not getting why you need a new refresh token. What am I missing? -T On Mon, Nov 26, 2012 at 6:27 PM, Brian Eaton wrote: > On Fri, Nov 23, 2012 at 4:43 AM, Bob Gregory wrote: > >> We've had OAuth2 running successfully for a while now, but we're finding >> th

Re: [OAUTH-WG] Token refresh and The Two Generals

2012-11-26 Thread Brian Eaton
On Fri, Nov 23, 2012 at 4:43 AM, Bob Gregory wrote: > We've had OAuth2 running successfully for a while now, but we're finding > that mobile applications have frequent problems with the refresh flow where > a refresh request is made, but the network connection fails before the new > AT/RT pair is

[OAUTH-WG] Reminder: Security Requirements / Security Use Cases - Conference Call Poll

2012-11-26 Thread Hannes Tschofenig
--- As Justin pointed out please indicate your availability for the conference calls. -- • From: Hannes Tschofenig • To: "oauth at ietf.org WG" • Date: Wed, 21 Nov 2012 23:05:21 +0200 Hi all, Based on the discussions at the OAuth WG meeting at IETF#85 we are tryi

Re: [OAUTH-WG] What needs to be done to complete MAC

2012-11-26 Thread Hannes Tschofenig
Hi Sergey, as Phil said it would be helpful for us to receive reviews of this document: http://tools.ietf.org/html/draft-tschofenig-oauth-security-00 The document lists requirements and threats. Ciao Hannes On Nov 26, 2012, at 8:28 PM, Phil Hunt wrote: > If we want to get this done we have t

Re: [OAUTH-WG] Comments on draft-ietf-oauth-dyn-reg-01

2012-11-26 Thread John Bradley
The idea is that registration is how you get/set the credential to use at the other endpoints. Bootstrapping and updating that with a bearer token is not unreasonable. The larger problem is that the password credential at the token endpoint is a bit of an anachronism. In my opinion we should be

Re: [OAUTH-WG] Comments on draft-ietf-oauth-json-web-token-05

2012-11-26 Thread John Bradley
I don't know that we need user_id in the JWT spec it may be enough to have it as a OIDC extension if it is not globally useful. I agree that the definition of prn should be more specific. On 2012-11-26, at 3:56 PM, Torsten Lodderstedt wrote: > Hi John, > > does it make sense to change the spec

Re: [OAUTH-WG] Comments on draft-ietf-oauth-dyn-reg-01

2012-11-26 Thread Torsten Lodderstedt
Hi Justin, Am 26.11.2012 15:51, schrieb Justin Richer: Hi Torsten, thanks for the comments. Whats the advantage of having two secrets for the same client_id, namely request_access_token and client_secret? Why not always issuing a secret and use it for authentication on this endpoint (in the s

Re: [OAUTH-WG] Comments on draft-ietf-oauth-json-web-token-05

2012-11-26 Thread Torsten Lodderstedt
Hi John, does it make sense to change the spec as follows: - specify the prn claim as being globally unqiue - add user_id as scoped by iss claim What do you think? regards, Torsten. Am 26.11.2012 19:51, schrieb John Bradley: A user_id is scoped to a iss. There is some notion that a prn is g

Re: [OAUTH-WG] Comments on draft-ietf-oauth-json-web-token-05

2012-11-26 Thread John Bradley
A user_id is scoped to a iss. There is some notion that a prn is globally unique, though the JWT spec is not clear on that. I think people are thinking of it like a UPN in LDAP/AD. John B. On 2012-11-26, at 3:46 PM, Torsten Lodderstedt wrote: > Hi John > > thanks for the explanatian. Just t

Re: [OAUTH-WG] What needs to be done to complete MAC

2012-11-26 Thread Justin Richer
I agree with Bill's statement and have stated so on several occasions. I think it's clear that we've got several use cases that are interested in different things, and I think that there's very little chance that we're going to have one super amazing specification that can cover all of them. I

Re: [OAUTH-WG] Comments on draft-ietf-oauth-json-web-token-05

2012-11-26 Thread Torsten Lodderstedt
Hi John thanks for the explanatian. Just to make sure I got you right. A prn can be a user_id. A prn is bound to the scope of an iss. Regards, Torsten. John Bradley schrieb: >JWT is more generic than OIDC. > >prn and user_id as used by OIDC are similar. user_id is already in >wide use wit

Re: [OAUTH-WG] What needs to be done to complete MAC

2012-11-26 Thread Anthony Nadalin
I agree that HOK may be independent of MAC and should be a separate issue, as MAC does not solve my proof of possession for a HOK solution From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of William Mills Sent: Monday, November 26, 2012 10:42 AM To: Phil Hunt; Sergey Beryoz

Re: [OAUTH-WG] What needs to be done to complete MAC

2012-11-26 Thread William Mills
I object to tying MAC to HOK, I see them as independent and I frankly don't understand why folks insist that MAC can not proceed without a broader HOK spec.   -bill From: Phil Hunt To: Sergey Beryozkin Cc: "" Sent: Monday, November 26, 2012 10:28 AM Subje

Re: [OAUTH-WG] What needs to be done to complete MAC

2012-11-26 Thread Phil Hunt
If we want to get this done we have to get agreements on the requirements for HOK. Several meetings ago (quebec) the group indicated that mac wasn't appropriate to anyone's needs. Some would argue that OAuth1 users arguably have less security than the simpler bearer token /tls model in OAuth2.

[OAUTH-WG] What needs to be done to complete MAC

2012-11-26 Thread Sergey Beryozkin
Hi What needs to be done to complete the MAC token spec ? Without having it signed off it will be difficult to get people working with OAuth 1.0 convinced to move to 2.0. I'm seeing another user request for getting OAuth 1.0 support extended further because the user expects it is more secure,

Re: [OAUTH-WG] WGLC for draft-ietf-oauth-revocation-03

2012-11-26 Thread Justin Richer
I have reviewed the document, and it looks ready to go. -- Justin On 11/24/2012 01:13 PM, Hannes Tschofenig wrote: Hi all, this is a working group last call for draft-ietf-oauth-revocation-03 on "Token Revocation". The draft is available here: http://tools.ietf.org/html/draft-ietf-oauth-rev

Re: [OAUTH-WG] Comments on draft-ietf-oauth-dyn-reg-01

2012-11-26 Thread Justin Richer
Hi Torsten, thanks for the comments. Whats the advantage of having two secrets for the same client_id, namely request_access_token and client_secret? Why not always issuing a secret and use it for authentication on this endpoint (in the same way as at the token endpoint)? Two things are at pla

Re: [OAUTH-WG] Comments on draft-ietf-oauth-json-web-token-05

2012-11-26 Thread John Bradley
JWT is more generic than OIDC. prn and user_id as used by OIDC are similar. user_id is already in wide use with Facebook's signed request. We were hoping that Facebook would be more likely to migrate from signed request to JWT if the parameter names stayed the same for developers. In the ge

Re: [OAUTH-WG] Comments on draft-ietf-oauth-dyn-reg-01

2012-11-26 Thread John Bradley
Torsten, Originally in OIC we defined using the client secret to access the registration endpoint. We received a lot of feedback that having it bearer protected for the first access and password protected for subsequent access was confusing. There are also the cases where there is no need for

[OAUTH-WG] Fwd: I-D Action: draft-ietf-oauth-assertions-08.txt

2012-11-26 Thread Brian Campbell
Draft -08 of the Assertion Framework for OAuth 2.0 has been published with only minor changes to clean up the IANA Considerations section and to update references from draft-ietf-oauth-urn-sub-ns to RFC 6755. -- Forwarded message -- From: Date: Mon, Nov 26, 2012 at 7:01 AM Subject

[OAUTH-WG] I-D Action: draft-ietf-oauth-assertions-08.txt

2012-11-26 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Web Authorization Protocol Working Group of the IETF. Title : Assertion Framework for OAuth 2.0 Author(s) : Brian Campbell C

Re: [OAUTH-WG] Token refresh and The Two Generals

2012-11-26 Thread Sergey Beryozkin
Hi Bob, On 26/11/12 10:47, Bob Gregory wrote: Hi Sergey, We are less concerned about failure during the initial authorization, since an end-user might reasonably expect to be asked to sign in again if a failure occurs. Indeed What's awkward here is that the user has been successfully using t

Re: [OAUTH-WG] Token refresh and The Two Generals

2012-11-26 Thread Sergey Beryozkin
On 23/11/12 12:43, Bob Gregory wrote: We've had OAuth2 running successfully for a while now, but we're finding that mobile applications have frequent problems with the refresh flow where a refresh request is made, but the network connection fails before the new AT/RT pair is received, leading to

[OAUTH-WG] draft-ietf-oauth-revocation-03

2012-11-26 Thread Hannes Tschofenig
Hi Torsten, thanks for the draft update. It looks good to me. I only have a minor wording suggestion for Section 3. Instead of " Depending on the authorization server's token design, revocation of access tokens might be a costly process. For example, revocation of self-contained acc