Re: [OAUTH-WG] AD review of Draft-ietf-dyn-reg

2015-02-18 Thread Kathleen Moriarty
On Wed, Feb 18, 2015 at 4:45 PM, Sam Hartman wrote: > > "Kathleen" == Kathleen Moriarty > writes: > > Kathleen> registry, but setting HTTP Basic as the default seems like > Kathleen> a really bad choice. HOBA is on it's way to becoming an > Kathleen> RFC from the HTTPAuth working

Re: [OAUTH-WG] AD review of Draft-ietf-dyn-reg

2015-02-18 Thread Sam Hartman
> "Kathleen" == Kathleen Moriarty writes: Kathleen> registry, but setting HTTP Basic as the default seems like Kathleen> a really bad choice. HOBA is on it's way to becoming an Kathleen> RFC from the HTTPAuth working group. HTTPAuth also has an Kathleen> updated version of Ba

Re: [OAUTH-WG] Shepherd Writeup for draft-ietf-oauth-spop-06.txt

2015-02-18 Thread John Bradley
It was Google that wanted S256 to be mandatory for the AS to support. That makes it easier for the client. S256 is relatively new so not being supported yet is not surprising. Sent from my iPhone > On Feb 18, 2015, at 12:15 PM, Torsten Lodderstedt > wrote: > > We don't plan to support s25

Re: [OAUTH-WG] Shepherd Writeup for draft-ietf-oauth-spop-06.txt

2015-02-18 Thread Torsten Lodderstedt
We don't plan to support s256 Basically, I don't see a need to. Plain already mitigates the threat, spop/tcse had been designed to mitigate - an app intercepting the code response of a public client. Am 18. Februar 2015 18:33:17 MEZ, schrieb Hannes Tschofenig : >Thanks Brian for pointing me t

Re: [OAUTH-WG] AD review of Draft-ietf-dyn-reg

2015-02-18 Thread Hannes Tschofenig
Hi Justin, Hi John, I believe that provisioning a client with a unique id (which is what a client id/client secret is) allows some form of linkability. While it may be possible to associate the client to a specific user I could very well imagine that the correlation between activities from a user

Re: [OAUTH-WG] AD review of Draft-ietf-dyn-reg

2015-02-18 Thread Hannes Tschofenig
Hi Justin, Hi John, I believe that provisioning a client with a unique id (which is what a client id/client secret is) allows some form of linkability. While it may be possible to associate the client to a specific user I could very well imagine that the correlation between activities from a user

Re: [OAUTH-WG] AD review of Draft-ietf-dyn-reg

2015-02-18 Thread Justin Richer
I’ll incorporate this feedback into another draft, to be posted by the end of the week. Thanks everyone! — Justin > On Feb 18, 2015, at 10:30 AM, Kathleen Moriarty > wrote: > > > > On Wed, Feb 18, 2015 at 10:07 AM, John Bradley > wrote: > snip >> On Feb 18, 2015,

Re: [OAUTH-WG] Shepherd Writeup for draft-ietf-oauth-spop-06.txt

2015-02-18 Thread Hannes Tschofenig
Thanks Brian for pointing me to Section 4.4.1 and to the MTI for "S256". While this is good from a security point of view I am wondering whether anyone is actually compliant to the specification. Neither PingIdentity nor DT implements the S256 transform, if I understood that correctly. Are you guys

Re: [OAUTH-WG] Shepherd Writeup for draft-ietf-oauth-spop-06.txt

2015-02-18 Thread Brian Campbell
There's a bit of MTI talk tucked into https://tools.ietf.org/html/draft-ietf-oauth-spop-10#section-4.4.1 that perhaps needs to be expanded and/or placed somewhere else. On Wed, Feb 18, 2015 at 8:33 AM, Hannes Tschofenig < hannes.tschofe...@gmx.net> wrote: > Thanks for the info, Torsten. > > Your

Re: [OAUTH-WG] draft-ietf-oauth-spop-10

2015-02-18 Thread Brian Campbell
On Wed, Feb 18, 2015 at 7:38 AM, John Bradley wrote: > > > I don’t remember precisely , but I may be the one responsible for the for > the 2^(-128) value for code. > > The archives have a more precise memory http://www.ietf.org/mail-archive/web/oauth/current/msg03844.html ;) _

Re: [OAUTH-WG] draft-ietf-oauth-spop-10

2015-02-18 Thread Bill Mills
I was OK with SHOULD because there's no firm measure of "enough entropy".   Whether it's SHOULD or MUST is moot without some way to quantify it. On Wednesday, February 18, 2015 1:27 AM, Nat Sakimura wrote: Hi Hannes, The reason I have put SHOULD there instead of MUST is that there

Re: [OAUTH-WG] Shepherd Writeup for draft-ietf-oauth-spop-06.txt

2015-02-18 Thread Hannes Tschofenig
Thanks for the info, Torsten. Your feedback raises an interesting question, namely what functionality the parties have to implement to claim conformance to the specification. Quickly scanning through the specification didn't tell me whether it is OK to just implement the plain mode or whether bot

Re: [OAUTH-WG] AD review of Draft-ietf-dyn-reg

2015-02-18 Thread Kathleen Moriarty
On Wed, Feb 18, 2015 at 10:07 AM, John Bradley wrote: > snip > > On Feb 18, 2015, at 6:46 AM, Kathleen Moriarty < > kathleen.moriarty.i...@gmail.com> wrote: > > > The client_id *could* be short lived, but they usually aren't. I don't >> see any particular logging or tracking concerns using a dyna

Re: [OAUTH-WG] AD review of Draft-ietf-dyn-reg

2015-02-18 Thread John Bradley
snip > On Feb 18, 2015, at 6:46 AM, Kathleen Moriarty > wrote: > > > The client_id *could* be short lived, but they usually aren't. I don't see > > any particular logging or tracking concerns using a dynamic OAuth client > > above using any other piece of software, ever. As such, I don't think

Re: [OAUTH-WG] AD review of Draft-ietf-dyn-reg

2015-02-18 Thread Kathleen Moriarty
Hi, On Mon, Feb 16, 2015 at 6:42 PM, Mike Jones wrote: > A few responses and comments are inline below... > > > From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Phil Hunt > > Sent: Thursday, February 12, 2015 11:47 AM > > To: Justin Richer > > Cc: oauth@ietf.org > > Subject: Re: [OAUTH-

Re: [OAUTH-WG] draft-ietf-oauth-spop-10

2015-02-18 Thread John Bradley
As I stated in my message. I think for plain having there be a MUST at 256 bits would be overkill. For plain given it is single use like the code is we should probably match it to the entropy required for code. In RFC 6749 we say The probability of an attacker guessing generated tokens (and

Re: [OAUTH-WG] draft-ietf-oauth-spop-10

2015-02-18 Thread Brian Campbell
I tend to agree with Torsten here - similar sentiments were (maybe not well) expressed a few weeks ago: http://www.ietf.org/mail-archive/web/oauth/current/msg14155.html On Wed, Feb 18, 2015 at 6:36 AM, wrote: > Hi Nat, > > as far as I understand, the length of at least 32 octets is justified

Re: [OAUTH-WG] AD review of Draft-ietf-dyn-reg

2015-02-18 Thread Kathleen Moriarty
Hi, On Tue, Feb 17, 2015 at 7:03 PM, Phil Hunt wrote: > I’m not sure if this is what Kathleen is after. I think part of the > background in the current spec is that we were trying to differentiate from > the large scale success stories OAuth has had in the past like Facebook and > Google. When

Re: [OAUTH-WG] draft-ietf-oauth-spop-10

2015-02-18 Thread torsten
Hi Nat, as far as I understand, the length of at least 32 octets is justified for S256 only. So limiting the MUST to S256 would be ok (from my perspective). I consider a general MUST (which also applies to plain) a to strong requirement. kind regards, Torsten. Am 18.02.2015 10:50, schrieb

Re: [OAUTH-WG] Shepherd Writeup for draft-ietf-oauth-spop-06.txt

2015-02-18 Thread torsten
Hi Hannes, our implementation supports the "plain" mode only. We just verified compliance of our implementation with the current spec. As the only deviation, we do not enforce the minimum length of 43 characters of the code verifier. kind regards, Torsten. Am 17.02.2015 17:48, schrieb Hanne

Re: [OAUTH-WG] draft-ietf-oauth-spop-10

2015-02-18 Thread Nat Sakimura
Is there anyone who has problems changing it to a MUST? On 2015年2月18日(水) at 18:48 Hannes Tschofenig wrote: > I think that the "controlled environment" is a risky idea. I believe we > should definitely go for a MUST. > > On 02/18/2015 10:26 AM, Nat Sakimura wrote: > > Hi Hannes, > > > > The reason

Re: [OAUTH-WG] draft-ietf-oauth-spop-10

2015-02-18 Thread Hannes Tschofenig
I think that the "controlled environment" is a risky idea. I believe we should definitely go for a MUST. On 02/18/2015 10:26 AM, Nat Sakimura wrote: > Hi Hannes, > > The reason I have put SHOULD there instead of MUST is > that there may be a valid reason not to in a controlled > environment, a

Re: [OAUTH-WG] draft-ietf-oauth-spop-10

2015-02-18 Thread Nat Sakimura
Hi Hannes, The reason I have put SHOULD there instead of MUST is that there may be a valid reason not to in a controlled environment, and it does not interfere the interoperability. The deployment may opt to use other control than entropy, and SHOULD allows it while MUST does not. Having sai

Re: [OAUTH-WG] draft-ietf-oauth-spop-10

2015-02-18 Thread Hannes Tschofenig
Hi John, I am fine with the plain vs. SHA256 concept and I understand the reasoning behind the two. Having the same for both types is also OK for me. My question about the 32 bytes entropy was based on curiosity. SHA256 is a function that takes an arbitrary length input and produces an output wit

Re: [OAUTH-WG] draft-ietf-oauth-spop-10

2015-02-18 Thread Hannes Tschofenig
Hi Nat, thanks for the quick response. I was hoping to see a statement like "The code verifier MUST have enough entropy to make it impractical to guess the value." in the text rather than the SHOULD. Given all the other statements in the draft I am not sure what the should actually means. Under w