[OAUTH-WG] Richard Barnes' Discuss on draft-ietf-oauth-jwt-bearer-10: (with DISCUSS and COMMENT)

2014-10-15 Thread Richard Barnes
Richard Barnes has entered the following ballot position for draft-ietf-oauth-jwt-bearer-10: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to htt

[OAUTH-WG] Richard Barnes' Discuss on draft-ietf-oauth-saml2-bearer-21: (with DISCUSS)

2014-10-15 Thread Richard Barnes
Richard Barnes has entered the following ballot position for draft-ietf-oauth-saml2-bearer-21: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to h

[OAUTH-WG] Richard Barnes' Discuss on draft-ietf-oauth-assertions-17: (with DISCUSS and COMMENT)

2014-10-15 Thread Richard Barnes
Richard Barnes has entered the following ballot position for draft-ietf-oauth-assertions-17: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to htt

Re: [OAUTH-WG] Pete Resnick's No Objection on draft-ietf-oauth-assertions-17: (with COMMENT)

2014-10-15 Thread Pete Resnick
On 10/15/14 6:06 PM, Brian Campbell wrote: Thanks for your review and feedback, Pete. Replies are inline below... Thanks for addressing the comments, including Barry's followup. Just on the questions: On Tue, Oct 14, 2014 at 2:42 PM, Pete Resnick mailto:presn...@qti.qualcomm.com>> wrote:

Re: [OAUTH-WG] Pete Resnick's No Objection on draft-ietf-oauth-assertions-17: (with COMMENT)

2014-10-15 Thread Brian Campbell
Fair point. I'll add some text saying that in the next revision. On Wed, Oct 15, 2014 at 5:18 PM, Barry Leiba wrote: > >>>Assertions used in the protocol exchanges defined by this >>>specification MUST always be protected against tampering using a >>>digital signature or a keyed mess

Re: [OAUTH-WG] Pete Resnick's No Objection on draft-ietf-oauth-assertions-17: (with COMMENT)

2014-10-15 Thread Barry Leiba
> > >>Assertions used in the protocol exchanges defined by this >>specification MUST always be protected against tampering using a >>digital signature or a keyed message digest applied by the issuer. >> >> Why is that? Aren't you using assertions over a protected channel (as >> required

Re: [OAUTH-WG] Pete Resnick's No Objection on draft-ietf-oauth-assertions-17: (with COMMENT)

2014-10-15 Thread Brian Campbell
Thanks for your review and feedback, Pete. Replies are inline below... On Tue, Oct 14, 2014 at 2:42 PM, Pete Resnick wrote: > Pete Resnick has entered the following ballot position for > draft-ietf-oauth-assertions-17: No Objection > > When responding, please keep the subject line intact and rep

Re: [OAUTH-WG] SPOP - code verifier requirements

2014-10-15 Thread Sergey Beryozkin
Hi, in our project we ship a transformer implementation that assumes that a code verifier represents a base64url encoded SHA-256 hash of the code challenge Cheers, Sergey On 15/10/14 19:48, Chuck Mortimore wrote: We're actually debating it internally. It seems easiest to just encode the bina

Re: [OAUTH-WG] SPOP - code verifier requirements

2014-10-15 Thread Chuck Mortimore
We're actually debating it internally. It seems easiest to just encode the binary code up front. Any issue with that? - cmort On Oct 15, 2014, at 8:32 AM, Nat Sakimura wrote: Thanks. So, to be clear, are you base64url encoding when sending it over the wire or is your code verifier is creat

Re: [OAUTH-WG] SPOP - code verifier requirements

2014-10-15 Thread Nat Sakimura
Thanks. So, to be clear, are you base64url encoding when sending it over the wire or is your code verifier is created by base64url encoding the binary value so that you do not need to encode it when sending it over? =nat via iPhone Oct 16, 2014 00:27、Chuck Mortimore のメッセージ: > We went with

Re: [OAUTH-WG] SPOP - code verifier requirements

2014-10-15 Thread Chuck Mortimore
We went with base64url in our implementation On Tue, Oct 14, 2014 at 2:26 AM, Nat Sakimura wrote: > In his mail, Mike asked whether code verifier is > a value that is sendable without trnasformation > as a http parameter value, or if it needs to be > % encoded when it is being sent. > > We have

Re: [OAUTH-WG] Secdir review of draft-ietf-oauth-saml2-bearer-21

2014-10-15 Thread Brian Campbell
Thanks for your review and feedback, Vincent. I'm adding the working group to the thread so they’re aware of the comments. Replies are inline below... From: Vincent Roca > Date: Tue, Oct 14, 2014 at 9:10 AM > Subject: Secdir review of draft-ietf-oauth-saml2-bearer-21 > To: IESG , sec...@ietf.or