Re: [OAUTH-WG] Token refresh and The Two Generals

2012-11-27 Thread Brian Eaton
On Mon, Nov 26, 2012 at 7:22 PM, Shane B Weeden wrote: > My understanding is that it is considered a best practice to rollover a > refresh token on each use - that is when a refresh token is used, both a > new access token and a new refresh token are issued, and the old refresh > token is revoked

Re: [OAUTH-WG] Token refresh and The Two Generals

2012-11-26 Thread Brian Eaton
On Fri, Nov 23, 2012 at 4:43 AM, Bob Gregory wrote: > We've had OAuth2 running successfully for a while now, but we're finding > that mobile applications have frequent problems with the refresh flow where > a refresh request is made, but the network connection fails before the new > AT/RT pair is

Re: [OAUTH-WG] Refresh token security considerations

2011-07-12 Thread Brian Eaton
On Tue, Jul 12, 2011 at 8:29 AM, William J. Mills wrote: > Why would you re-issue a refresh token every usage?  What's the use case > where this makes sense? It's key rotation built into the protocol. Even if a refresh token is stolen, it's going to become useless to the attacker very quickly.

Re: [OAUTH-WG] Authorization code security considerations

2011-07-08 Thread Brian Eaton
On Fri, Jul 8, 2011 at 11:39 AM, Eran Hammer-Lahav wrote: > How exactly? They are not confidential by nature, being received via > redirection in the URI query. I know what this sentence is trying to > accomplish but not sure how to do that with normative language. SHOULD > doesn't really work

Re: [OAUTH-WG] security considerations - authorization tokens

2011-07-07 Thread Brian Eaton
On Thu, Jul 7, 2011 at 11:08 AM, Anthony Nadalin wrote: > I was responding to the structure question only. The token text is > questionable sine the tokens are opaque to the core, seems like the token > write-up better belongs in the threat model document. Developers of the > various token specs

Re: [OAUTH-WG] security considerations - authorization tokens

2011-07-07 Thread Brian Eaton
On Thu, Jul 7, 2011 at 10:49 AM, Anthony Nadalin wrote: > When we constructed the current structure in Prague we thought that > structure best fit the needs of a implementer, so my preference would be to > keep it as it is now but, Torsten / Mark / Phil also may have feedback. > Really? The curr

Re: [OAUTH-WG] Concerns about Implicit Grant flow

2011-07-06 Thread Brian Eaton
On Wed, Jul 6, 2011 at 1:31 PM, Justin Richer wrote: > You can still use the access code (web server) flow within a JavaScript > application, just without a reliable client secret. The point of the > "implicit" flow was to save a roundtrip to the server for light clients > with limited lifespans,

Re: [OAUTH-WG] Client authentication requirement

2011-06-16 Thread Brian Eaton
On Thu, Jun 16, 2011 at 2:14 PM, Igor Faynberg < igor.faynb...@alcatel-lucent.com> wrote: > ** > > > On 6/16/2011 4:51 PM, Brian Eaton wrote: > > On Thu, Jun 16, 2011 at 1:49 PM, Torsten Lodderstedt < > tors...@lodderstedt.net> wrote: > >> If those people

Re: [OAUTH-WG] Client authentication requirement

2011-06-16 Thread Brian Eaton
On Thu, Jun 16, 2011 at 1:49 PM, Torsten Lodderstedt < tors...@lodderstedt.net> wrote: > ** > If those people have reasonable means in place to protect secrets on > deployment channels and in the local installation - fine. I would be eager > to learn more about those means because I would be wille

Re: [OAUTH-WG] Client authentication requirement

2011-06-16 Thread Brian Eaton
On Thu, Jun 16, 2011 at 1:25 PM, Torsten Lodderstedt < tors...@lodderstedt.net> wrote: > ** > no I'm saying people will use real secrets and rely on them - just as with > OAuth 1.0 > =) People are going to ignore what the spec says on this. If you read through the mailing list threads on this t

Re: [OAUTH-WG] Client authentication requirement

2011-06-16 Thread Brian Eaton
On Thu, Jun 16, 2011 at 1:05 PM, Torsten Lodderstedt < tors...@lodderstedt.net> wrote: > ** > No, it's not simpler nor clearer. Such a client secret is useless, so the > security implications have to be explained anyway. > The issue really isn't the security implications being unclear; the issue

Re: [OAUTH-WG] Client authentication requirement

2011-06-16 Thread Brian Eaton
On Thu, Jun 16, 2011 at 12:56 PM, Torsten Lodderstedt < tors...@lodderstedt.net> wrote: > ** > Certainly not. Are we discussing to make client authentication required > just for syntactical purposes? > That is what I'd like to see. >From my perspective, no harm is done by making client authentic

Re: [OAUTH-WG] Client authentication requirement

2011-06-16 Thread Brian Eaton
On Thu, Jun 16, 2011 at 12:42 PM, Torsten Lodderstedt < tors...@lodderstedt.net> wrote: > -1 making client authentication required at the access token endpoint > > Client authentication is useful in some situations to raise the security > level. But requiring it will either keep out native apps or

Re: [OAUTH-WG] review of draft-ietf-oauth-v2-16

2011-06-16 Thread Brian Eaton
On Thu, Jun 16, 2011 at 10:51 AM, Eran Hammer-Lahav wrote: > This is nice on paper but doesn’t work. > I have to agree. It doesn't matter what the spec says on this point. No one is going to take advice from the spec about what the text on their approval page ought to say. _

Re: [OAUTH-WG] Redirection URI and Implicit grant

2011-06-16 Thread Brian Eaton
On Wed, Jun 15, 2011 at 12:37 PM, Eran Hammer-Lahav wrote: > 1. Why not require the registration of a redirection URI for implicit grant > requests, removing the redirect_uri parameter completely from the request > (the client can still use the state parameter)? > As others have stated, this is a

Re: [OAUTH-WG] Client authentication requirement

2011-06-16 Thread Brian Eaton
On Thu, Jun 16, 2011 at 8:48 AM, Thomas Hardjono wrote: > >>> Requiring client authentication doesn't defend against > >>> attacks directly; it makes recovery after a successful > >>> attack easier. > > I presume you mean direct attacks on the authorization server. > Also attacks on the clients.

Re: [OAUTH-WG] Client authentication requirement

2011-06-16 Thread Brian Eaton
On Wed, Jun 15, 2011 at 6:19 PM, Eran Hammer-Lahav wrote: > Your comment was that having client authentication makes it easier to > recovery from an attack. I don’t understand how the comments below about > changing client secrets every 30 days are relevant. Are you suggesting to > wait until the

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Brian Eaton
On Wed, Jun 15, 2011 at 6:02 PM, Eran Hammer-Lahav wrote: > How does it make recovery easier? Why is revoking refresh token any harder > than changing client secret? > Changing a client secret can be done without disrupting users. You can even schedule it, do it every 30 days as part of your gen

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Brian Eaton
On Wed, Jun 15, 2011 at 3:50 PM, Shane B Weeden wrote: > Brain - can you elaborate on that a little? Are you suggesting that clients > that can't keep secrets use a dummy (notasecret) pwd anyway to satisfy > "requiring client authentication"? > Or use random secrets. Whatever floats your boat a

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Brian Eaton
On Wed, Jun 15, 2011 at 5:27 PM, Eran Hammer-Lahav wrote: > So basically, it is authentication on top of bearer credentials to achieve > another level of security. Are we just assuming that stealing the refresh > token will be harder than stealing the client credentials? Seems a bit > optimistic.

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Brian Eaton
On Wed, Jun 15, 2011 at 5:21 PM, Eran Hammer-Lahav wrote: > > I suspect another choice of words would be useful there. Implicit grants > rely > > on the browser's authentication of the receiving web site. When https is > > used, that authentication is fairly strong. > > "authentication of the re

Re: [OAUTH-WG] Client authentication requirement

2011-06-15 Thread Brian Eaton
> We have one grant type without client authentication (implicit) I suspect another choice of words would be useful there. Implicit grants rely on the browser's authentication of the receiving web site. When https is used, that authentication is fairly strong. > I would like to go back to requi

Re: [OAUTH-WG] Refresh tokens

2011-06-15 Thread Brian Eaton
okens are credentials used to access protected > resources. Refresh > tokens are credentials used to obtain access tokens. > > -bill > > > -- > *From:* Brian Eaton > *To:* Eran Hammer-Lahav > *Cc:* OAuth WG > *Sent:* Wednesday, June 15, 201

Re: [OAUTH-WG] Refresh tokens

2011-06-15 Thread Brian Eaton
On Wed, Jun 15, 2011 at 10:30 AM, Eran Hammer-Lahav wrote: > I would like to add a quick discussion of access token and refresh token > recommended deployment setup, providing clear guidelines when a refresh > token SHOULD and SHOULD NOT be issued, and when issues, how it is difference > from the

Re: [OAUTH-WG] Client Credentials and Refresh Tokens

2011-06-03 Thread Brian Eaton
Agreed, it's nuts to return a refresh token for that flow. Eran, why is this still in the spec?  You agreed to remove it almost a year ago. It's come up multiple times since then. http://www.ietf.org/mail-archive/web/oauth/current/msg03651.html Cheers, Brian On Fri, Jun 3, 2011 at 9:45 AM, Mar

Re: [OAUTH-WG] review of draft-ietf-oauth-v2-16

2011-06-02 Thread Brian Eaton
On Thu, Jun 2, 2011 at 7:13 PM, Peter Saint-Andre wrote: > I'm not thinking about your use case, but things like enterprise > deployments in high-security environments where every person and every > software application has a certificate or is otherwise provisioned for > authentication with the au

Re: [OAUTH-WG] review of draft-ietf-oauth-v2-16

2011-06-02 Thread Brian Eaton
On Thu, Jun 2, 2011 at 5:08 PM, Peter Saint-Andre wrote: > I think the SHOULD we had originally is probably fine -- with the > understanding that "SHOULD" means "you really ought to do this unless > you have a good reason not to". I think one such really good reason > might be a authorization serv

Re: [OAUTH-WG] review of draft-ietf-oauth-v2-16

2011-06-02 Thread Brian Eaton
On Thu, Jun 2, 2011 at 3:01 PM, Peter Saint-Andre wrote: > I think I might have misunderstood that text -- I took it to be talking > about the client's authentication with the authorization server, not the > client's authentication with the resource server. No, you understand perfectly. We're t

Re: [OAUTH-WG] Text for Native Applications

2011-06-02 Thread Brian Eaton
On Thu, Jun 2, 2011 at 2:31 PM, William J. Mills wrote: > In practice there are an extremely small number of cases where this is > actually done right, and legions of cases where it's done wrong. Industry > just doesn't get this right often enough to rely on it. > Well, "rely" is a strong-term.

Re: [OAUTH-WG] Text for Native Applications

2011-06-02 Thread Brian Eaton
On Thu, Jun 2, 2011 at 12:17 PM, Thomas Hardjono wrote: > (a) Oauth2.0 today is designed for low-assurance environments. So I think > the WG is wasting a lot of time in trying to address whether the Client can > keep secrets. The WG should just assume that the problem of keeping secrets > is out

Re: [OAUTH-WG] review of draft-ietf-oauth-v2-16

2011-06-02 Thread Brian Eaton
On Thu, Jun 2, 2011 at 11:40 AM, Thomas Hardjono wrote: > Well, not to belabor this point :) but in Kerberos it is the proof of > possession of the client secret key which _is_ the authentication mechanism. > There is also PKINIT (RFC4556) which can be used to "pre-authenticate" the > user via D

Re: [OAUTH-WG] review of draft-ietf-oauth-v2-16

2011-06-01 Thread Brian Eaton
Hey Peter - I haven't read all of your comments yet, but I wanted to clarify one point about client impersonation and installed apps. The cuirrent text is unrealistic, but your request would push it the wrong way. CC'ing Torsten as well. - OLD: The authorization server SHO

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Wed, Jun 1, 2011 at 1:41 AM, Skylar Woodward wrote: > Verifyable and Forgeable were the best terms we've come up with so far in > attempt to put a label on "apps that can keep secrets" and "apps that can't > keep secrets," respectively. You might be on to something there. There are two ways

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Wed, Jun 1, 2011 at 9:11 AM, William J. Mills wrote: >> - native apps always use the authorization code grant > > I don't like this if it means I can't use passwrd grant for stuff like IMAP > clients. Sorry, didn't mean to suggest that password grants would go away. The business need is clear

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Wed, Jun 1, 2011 at 12:47 AM, Torsten Lodderstedt wrote: >> - ignore the problem and leave the spec vague and insecure. > > Could you please describe what you consider "insecure"? As an example, optional client authentication in the authorization code flow makes the web server flow much less s

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
fic secret which we can issue > through an admin controlled provisioning process.  In this case we can also > escalate capabilities as we’re reasonably sure we’re talking to an instance > of the client. > > For JS Apps we support the implicit grant with no refresh token > > -cm

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Wed, Jun 1, 2011 at 12:15 AM, Torsten Lodderstedt wrote: > I'm getting confused. This thread is about native apps. So why discuss > security considerations for web apps here? They overlap because they both use refresh tokens. =/ When people propose changes that impact refresh tokens, it impac

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Wed, Jun 1, 2011 at 12:08 AM, Chuck Mortimore wrote: > This is one reason we’ve favored implicit for native apps. OK, so are you using the implicit grant for both web apps and native apps...? I'm trying to figure out if you need two flows are three. - web server flow used with real secret

Re: [OAUTH-WG] Text for Native Applications

2011-06-01 Thread Brian Eaton
On Tue, May 31, 2011 at 11:47 PM, Kris Selden wrote: > If a provider chooses to do that though, in the attack you described, they > could still revoke the refresh token to stop the abuse when it is discovered, > and that is still easier in my opinion than rotating a client secret but yes, > all

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Brian Eaton
On Tue, May 31, 2011 at 11:41 PM, Chuck Mortimore wrote: > It’s not entirely necessary; I’m just having a tough time figuring out any > practical difference between the implicit grant flow, and the webserver flow > with no credentials.   In general I agree with your points, but I think we > have a

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Brian Eaton
On Tue, May 31, 2011 at 10:39 PM, Kris Selden wrote: > Why can't you just revoke the refresh token for a client when you change the > client secret? > > Is it not easier to revoke a token than it is to rotate the client secret > (which is usually configured or embedded in the client whereas the

Re: [OAUTH-WG] Text for Native Applications

2011-05-31 Thread Brian Eaton
On Tue, May 31, 2011 at 10:41 AM, Chuck Mortimore wrote: > Updated in language I just sent out – thanks. > > On that note, we currently return refresh_token using the implicit grant > type under certain controlled circumstances.   Facebook in turn uses the > implicit grant type, and simply issues

[OAUTH-WG] security considerations - authorization tokens

2011-05-22 Thread Brian Eaton
As I said in the other note, after reading through the security considerations section a couple of times, I think it could benefit from a different organization. Specifically - keep the introduction, it’s awesome. - write new sections for each of the following 1) Authorization Tokens 2) Web

[OAUTH-WG] draft 16 review notes

2011-05-22 Thread Brian Eaton
I just read over the whole of the draft for the first time in a while.  I looked it over mostly for a) places where spec and reality were going to have trouble intersecting    and b) places where security advice would be useful    and c) grammer and speling, because I notices things like that Mos

Re: [OAUTH-WG] requirement of redirect_uri in access token requests

2011-05-02 Thread Brian Eaton
On Mon, May 2, 2011 at 11:33 AM, Freeman, Tim wrote: > The issues around redirect_uri seem muddled to me. > Yeah. =/ It's unfortunate. I think the problem is that implementers disagree on what type of redirect uri validation to do, so the spec has papered over the inconsistencies with muddled

Re: [OAUTH-WG] OAuth 1.0 2-legged scenario

2011-05-02 Thread Brian Eaton
Hey Andrew - Two-legged OAuth is a very confusing term. I've tried to stop using it, because it means so many different things to different people. I'm not 100% sure what your use case is... The current OAuth2 draft handles traditional client-server authentication with the client credentials fl

Re: [OAUTH-WG] requirement of redirect_uri in access token requests

2011-04-30 Thread Brian Eaton
On Fri, Apr 29, 2011 at 11:21 AM, Doug Tangren wrote: > Is this required or not? In the example > http://tools.ietf.org/html/draft-ietf-oauth-v2-15#section-3.1 it's listed > in the example but not itemized as optional or required. It's not in the > example for refreshing tokens > http://tools.iet

Re: [OAUTH-WG] Authorization code security issue (reframed)

2011-04-04 Thread Brian Eaton
On Mon, Apr 4, 2011 at 1:06 PM, Phil Hunt wrote: > Very quickly here is the attack... > 1) Paul starts dance at good Client &  good AS, App requests authorization. > Note: outbound call is secure, but returned redirect is not. For the record, we haven't had particular problems with installed app

Re: [OAUTH-WG] Authorization code security issue (reframed)

2011-04-04 Thread Brian Eaton
On Mon, Apr 4, 2011 at 9:52 AM, Phil Hunt wrote: > As Prateek clarified in the previous message to Francisco, SAML also uses > SHOULD, but artifact security is achieved by an additional > counter-measure... > > The identity provider MUST ensure that only the service provider to whom > the messag

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-08 Thread Brian Eaton
OAuth Bearer Token draft >> >>So is a different namespace for each new mechanism right, or should a >>parameter be added to parallel the authorization scheme name?  Seems like >>it would be clean to define oauth_scheme and use the same value as >>defined for the auth

Re: [OAUTH-WG] Indicating origin of OAuth credentials to combat login CSRF

2011-02-25 Thread Brian Eaton
I don't think the advice from the OAuth 1.0a spec is wrong: http://oauth.net/core/1.0a/#anchor38 "Cross-Site Request Forgery (CSRF) is a web-based attack whereby HTTP requests are transmitted from a user that the website trusts or has authenticated. CSRF attacks on OAuth approvals can allow an at

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-02-25 Thread Brian Eaton
On Fri, Feb 25, 2011 at 3:03 PM, Eran Hammer-Lahav wrote: > ‘oauth_token’ is limited to bearer tokens only. It is not suitable for > anything else. Except that OAuth 1.0 already went out using oauth_token for signed requests. ___ OAuth mailing list OAut

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-02-25 Thread Brian Eaton
My two cents: We've already taken three user visible outages because the OAuth2 spec reused the "oauth_token" parameter in a way that was not compatible with the OAuth1 spec. Luckily they were all caught before they caused serious damage. Generic parameter names are not useful. They lead to con

Re: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-security-00

2011-02-21 Thread Brian Eaton
On Sun, Feb 20, 2011 at 3:47 PM, Eran Hammer-Lahav wrote: > How do you envision this being incorporated into v2? Just section 5 or the > entire document? > My two cents: rather than dedicating a single section of the core doc to security considerations, smaller sections should be added to individ

[OAUTH-WG] who is working on security considerations?

2011-02-07 Thread Brian Eaton
Has anyone stepped up to start writing security considerations yet? Now that the organization is back to tracking different use cases using different flows, I think it's feasible and would like to contribute. ___ OAuth mailing list OAuth@ietf.org https:/

Re: [OAUTH-WG] Bearer token type and scheme name (deadline: 2/10)

2011-02-03 Thread Brian Eaton
How do we reconcile "Bearer" with "Negotiate", "NTLM", "Basic", and "GoogleLogin"? All of those examples are widely deployed and use bearer tokens in Authorization headers. Should all of those switch to using the "Bearer" scheme as well? Tokens issued via OAuth will require specific validation l

Re: [OAUTH-WG] How to integrated DIGEST or SPNEGO with tokensendpoint?

2011-01-26 Thread Brian Eaton
On Wed, Jan 26, 2011 at 2:53 PM, Eran Hammer-Lahav wrote: > Can you share what the actual request looks on the wire? How are you passing > the Kerberos authentication in the request? What do you set the grant type to? Most of this pre-dates grant type and the OAuth2 brand. =) >From memory, the

Re: [OAUTH-WG] How to integrated DIGEST or SPNEGO with tokensendpoint?

2011-01-26 Thread Brian Eaton
On Wed, Jan 26, 2011 at 2:53 PM, Eran Hammer-Lahav wrote: > Can you share what the actual request looks on the wire? How are you passing > the Kerberos authentication in the request? What do you set the grant type to? Most of this pre-dates grant type and the OAuth2 brand. =) >From memory, the

Re: [OAUTH-WG] How to integrated DIGEST or SPNEGO with tokensendpoint?

2011-01-26 Thread Brian Eaton
On Wed, Jan 26, 2011 at 9:07 AM, Eran Hammer-Lahav wrote: > Can you share an actual example of how you are authenticating *both* the > resource owner and client in a single request? That's not a business requirement. So the desired flow goes like this: kerberos (or other magic sauce) authe

Re: [OAUTH-WG] How to integrated DIGEST or SPNEGO with tokensendpoint?

2011-01-26 Thread Brian Eaton
On Tue, Jan 25, 2011 at 10:58 PM, Eran Hammer-Lahav wrote: >> What's the difference from a conceptual point of view? In my opinion, the >> resource owners password is used for both, authenticating the resource >> owner and authorizing the token issuance. > > The resource owner is not present and t

Re: [OAUTH-WG] How to integrated DIGEST or SPNEGO with tokensendpoint?

2011-01-26 Thread Brian Eaton
27;t seemed like a high-value proposition. On Wed, Jan 26, 2011 at 12:45 AM, wrote: > Hi Brian, > > you identified the use cases correctly. No interactive user-consent would be > required. > > Regards, > Torsten. > Gesendet mit BlackBerry® Webmail von Telekom Deutschland &g

Re: [OAUTH-WG] How to integrated DIGEST or SPNEGO with tokensendpoint?

2011-01-25 Thread Brian Eaton
Hey Torsten - I'm trying to parse through these messages to figure out the flows you're interested in. I think you're aiming for rules like this one, right? kerberos authentication -> access token or digest authentication -> access token And furthermore your intended use cases are applica

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-20 Thread Brian Eaton
hat category. Even you are not going to use it. > > EHL > >> -Original Message- >> From: Brian Eaton [mailto:bea...@google.com] >> Sent: Wednesday, January 19, 2011 6:21 PM >> To: Eran Hammer-Lahav >> Cc: OAuth WG >> Subject: Re: [OAUTH-WG] Proposal

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-19 Thread Brian Eaton
On Wed, Jan 19, 2011 at 6:14 PM, Eran Hammer-Lahav wrote: > Since no one else (other than you) showed any interest in keeping this > section in for the past 9 days, I assume they don't care. I will remove this. This is an unfortunate assumption, and I think it could do serious damage to the spec

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-19 Thread Brian Eaton
On Wed, Jan 19, 2011 at 6:11 PM, Eran Hammer-Lahav wrote: > Will this HTML5 magic involve making a single authorization request > (redirection) or two? It's not magic, it's window.postMessage(). It's an authenticated low-latency channel between windows or iframes. There is more than one way to

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-19 Thread Brian Eaton
On Wed, Jan 19, 2011 at 6:05 PM, Eran Hammer-Lahav wrote: > Can I take this as an endorsement for dropping it? It feels very experimental > and should be easy to add as an extension. I defer to the several other people who were interested in this approach. From memory, that's Brian Ellin, Luke

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-19 Thread Brian Eaton
On Tue, Jan 11, 2011 at 4:40 PM, Brian Eaton wrote: > On Tue, Jan 11, 2011 at 1:21 PM, Eran Hammer-Lahav > wrote: >> But that's just an annoying implementation detail. > > Yes.  The user-agent flow is a set of annoying implementation details > that are very, very usef

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-11 Thread Brian Eaton
On Tue, Jan 11, 2011 at 2:44 PM, Torsten Lodderstedt wrote: > Do you see any need to restrict the power of this token or is it as powerful > as the tokens obtained using the code? I'm asking because this token is sent > out without authenticating the client whereas exchange of code to tokens can >

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-11 Thread Brian Eaton
On Tue, Jan 11, 2011 at 1:21 PM, Eran Hammer-Lahav wrote: > But that's just an annoying implementation detail. Yes. The user-agent flow is a set of annoying implementation details that are very, very useful if you want to make the protocol efficient. > If the only different now between the hybr

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-11 Thread Brian Eaton
On Tue, Jan 11, 2011 at 12:45 PM, Eran Hammer-Lahav wrote: > The exact same argument can be made that the hybrid flow meets all the use > cases of the web-server flow... which means we can keep the current single > flow specification as is... :-) > > What am I missing? (I'm asking). The hybrid

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-11 Thread Brian Eaton
On Mon, Jan 10, 2011 at 3:42 PM, Eran Hammer-Lahav wrote: > These are two very different client profiles. In one, the client is > completely authenticated, residing solely in the user-agent. The other is a > mix authenticated and unauthenticated, where parts of the client can keep a > secrets b

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-10 Thread Brian Eaton
On Mon, Jan 10, 2011 at 3:22 PM, Phil Hunt wrote: > What about the idea that the code is only used as a hand-off mechanism > between service components (e.g. authorization manager vs, resource access > manager).  In that case, the code would not be usable for anything except to > get an access

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-10 Thread Brian Eaton
On Mon, Jan 10, 2011 at 3:06 PM, Eran Hammer-Lahav wrote: > What about the difference between the two access tokens? The one issued > directly and the one via the code? Are those the same? Same scope? Same > duration? Same. > I think this needs to be presented as a separate profile from the us

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-10 Thread Brian Eaton
On Mon, Jan 10, 2011 at 2:39 PM, Eran Hammer-Lahav wrote: > This explains why you want the code returned in the fragment, but not why you > need both code and token in the same response, as well as any differences in > the token attributes, The token in the same response is a latency optimizati

Re: [OAUTH-WG] Proposal to drop/relocate response_type=code_and_token

2011-01-10 Thread Brian Eaton
On Mon, Jan 10, 2011 at 2:17 PM, Eran Hammer-Lahav wrote: > In -12, I am moving back to the -05 specification structure of profiles > (flows). Sweet! > This means this code_and_token hybrid needs to be explained beyond > just the definition of the extra parameter and response format. But I don’t

Re: [OAUTH-WG] Call for Consensus on Document Split

2010-10-20 Thread Brian Eaton
On Thu, Oct 14, 2010 at 12:06 AM, Mike Jones wrote: > I am willing to serve as editor for the bearer token specification and have my > management's approval to do so.  Furthermore, I believe that I am qualified, > having successfully served as an editor for several standards specifications, > incl

Re: [OAUTH-WG] Hashing passwords for "password" grant type

2010-09-10 Thread Brian Eaton
Hey Aaron - Here's some more research and recommendations for you: http://chargen.matasano.com/chargen/2007/9/7/enough-with-the-rainbow-tables-what-you-need-to-know-about-s.html. I agree with the other recommendations on this thread, probably not a good idea for you to invent a hashing scheme for

Re: [OAUTH-WG] Returning HTTP 200 on Error for JSONP

2010-08-18 Thread Brian Eaton
On Tue, Aug 17, 2010 at 11:36 PM, Mark Nottingham wrote: >> The other reason people get funny with these status codes has to do >> with browser behavior.  Sometimes browsers react in funny ways to >> funny HTTP status codes.  To be on the safe side, developers tend to >> return an HTTP 200 with wh

Re: [OAUTH-WG] Returning HTTP 200 on Error for JSONP

2010-08-17 Thread Brian Eaton
On Tue, Aug 17, 2010 at 7:33 PM, John Panzer wrote: > Is there any legit reason other than jsonp specifically? Protected resource authors are slack and are not going to read the spec. That might not be a great reason, but it's not a bad one either. The other reason people get funny with these s

Re: [OAUTH-WG] Returning HTTP 200 on Error for JSONP

2010-08-17 Thread Brian Eaton
On Tue, Aug 17, 2010 at 11:48 AM, David Recordon wrote: > Luke's point still holds true of the core spec needing to allow a 200 status > code on an error in this scenario. I'd also rather see this as part of the > core spec as it reduces the number of things that implementors will need to > read f

Re: [OAUTH-WG] more than one assertion?

2010-08-12 Thread Brian Eaton
On Thu, Aug 12, 2010 at 12:36 PM, David Recordon wrote: > I've only been half following the recent assertion threads for this > exact reason. I don't understand how these proposals are going to be > used and worry about any additional complexity added to the spec. Likewise. __

Re: [OAUTH-WG] Quick survey: fragment vs. query

2010-08-12 Thread Brian Eaton
of the flow is for third-party.com to access printing.com. That is what the user wants to have happen, and the service provider wants to allow it. Cheers, Brian On Thu, Aug 12, 2010 at 8:26 AM, Oleg Gryb wrote: > > > > > - Original Message > > From: Brian Eato

Re: [OAUTH-WG] Quick survey: fragment vs. query

2010-08-11 Thread Brian Eaton
On Tue, Aug 10, 2010 at 11:00 AM, Oleg Gryb wrote: > The thing is that each time when a web app with sensitive info can be run in > a frame, security people would advice to break that > frame-reads-other-frame-data logic, because it can lead to violation of same > origin policy. This is incorrect

Re: [OAUTH-WG] Extensibility: new endpoints

2010-08-04 Thread Brian Eaton
On Wed, Aug 4, 2010 at 10:04 AM, Torsten Lodderstedt wrote: >> So far no one has offered to work on the security consideration section >> (Brian's draft is too far from the format I need to incorporate). >> > > I could work on this topic, if Brian does not insist to do so. > @Brian: What do you th

Re: [OAUTH-WG] Is User Agent Profile Secure in OAuth 2.0?

2010-08-04 Thread Brian Eaton
On Wed, Aug 4, 2010 at 8:45 AM, Oleg Gryb wrote: > thirdparty.com never gets the access token in the scenario that Brian has > described, becuase fragment that was sent by a service provider in Location > header is not going to travel to the thirdparty.com server. This is not quite true. thirdpa

Re: [OAUTH-WG] Is User Agent Profile Secure in OAuth 2.0?

2010-08-03 Thread Brian Eaton
On Tue, Aug 3, 2010 at 12:44 PM, Yoav Nir wrote: > So if the browser works correctly (instead of what the python library does, > then thirdparty.com sees only "GET rpc_relay.html", while the javascript > also gets the "access_token=12345". In the average case, thirdparty.com doesn't even see GET

Re: [OAUTH-WG] Is User Agent Profile Secure in OAuth 2.0?

2010-08-03 Thread Brian Eaton
gt; >> On Aug 3, 2010, at 11:18 PM, Marius Scurtescu wrote: >> >>> On Tue, Aug 3, 2010 at 12:44 PM, Yoav Nir wrote: >>>> >>>> On Aug 3, 2010, at 8:32 PM, Brian Eaton wrote: >>>> >>>> Please provide an example of code that you wou

Re: [OAUTH-WG] Is User Agent Profile Secure in OAuth 2.0?

2010-08-03 Thread Brian Eaton
On Tue, Aug 3, 2010 at 9:59 AM, Oleg Gryb wrote: >> Question: why are you implementing the user-agent  flow? > > It's not helpful. Doesn't answer the qs. The reason I asked is because I suspect you are trying to use the user-agent flow in a way very different from other people. It's important to

Re: [OAUTH-WG] Is User Agent Profile Secure in OAuth 2.0?

2010-08-02 Thread Brian Eaton
On Mon, Aug 2, 2010 at 10:21 PM, Oleg Gryb wrote: > Returning to our discussion about necessity of passing access_token in URL's > fragment, I've read both your proposal for changing  v.9 and the current > v.10, but still don't understand why we need access_token in a fragment. Question: why are

Re: [OAUTH-WG] Is User Agent Profile Secure in OAuth 2.0?

2010-08-02 Thread Brian Eaton
On Mon, Aug 2, 2010 at 6:15 PM, David Stanek wrote: > I just verified that the Python urllib client does send the fragment to the > server. I've created a patch and will be created a bug on the Python > tracker. > Cool, but this doesn't seem relevant to the user-agent profile. Market penetratio

Re: [OAUTH-WG] Is User Agent Profile Secure in OAuth 2.0?

2010-08-02 Thread Brian Eaton
On Mon, Aug 2, 2010 at 9:23 AM, Oleg Gryb wrote: > > What about browsing history? I've just run the JSP below in Tomcat and found > out that Firefox remembers the redirect in the browsing history. It'll be a > problem in a shared desktop or Internet kiosk environment. I think the best practice

Re: [OAUTH-WG] SAML 2.0 Bearer Assertion Profile for OAuth 2.0 draft

2010-07-27 Thread Brian Eaton
On Tue, Jul 27, 2010 at 11:56 AM, Brian Campbell wrote: > There seem to be two potential arguments against it - the burden of > tracking the state and the potential that it's unnecessarily > restrictive.  I don't personally see either as being a major issue but > would like to hear from folks if t

Re: [OAUTH-WG] Proposed language for section 2.2 on Client Assertions

2010-07-26 Thread Brian Eaton
On Mon, Jul 26, 2010 at 4:11 PM, Eran Hammer-Lahav wrote: > How do you link the client_id using in the authorization endpoint with the > client assertion using in the token endpoint? In theory: "any document that defines how to use an assertion of a particular type with OAuth 2.0 MUST define ho

Re: [OAUTH-WG] Proposed language for section 2.2 on Client Assertions

2010-07-26 Thread Brian Eaton
On Mon, Jul 26, 2010 at 2:08 PM, Eran Hammer-Lahav wrote: > I understand that in many assertions, the client identifier is established > internally, but this approach will completely prevent using the assertion > client authentication method with other flows that involve getting a code. I'm prett

Re: [OAUTH-WG] Change grant_type="none" to something less confusing

2010-07-19 Thread Brian Eaton
with all the other grant types. > >  -- Justin > > On Sat, 2010-07-17 at 15:51 -0400, Eran Hammer-Lahav wrote: >> client_credentials worked fine before. I'll just replace none with that. No >> one had an issue with the name in -05. >> >> EHL >> >>

Re: [OAUTH-WG] Change grant_type="none" to something less confusing

2010-07-17 Thread Brian Eaton
On Sat, Jul 17, 2010 at 8:52 AM, Luke Shepard wrote: > As far as consistency, it is just a little weird to call it "client password" > in one > part of the spec, when it's defined as "client secret" elsewhere. Agreed, we could be more consistent. The value we're talking about is the same in all

Re: [OAUTH-WG] Change grant_type="none" to something less confusing

2010-07-17 Thread Brian Eaton
On Sat, Jul 17, 2010 at 11:50 AM, Eran Hammer-Lahav wrote: > The use case is pretty simple: the user uses the server and approves a third > party site access to their data directly (i.e. They are not sent to the > server from the client, but just use the server). The third part then uses > their c

Re: [OAUTH-WG] Change grant_type="none" to something less confusing

2010-07-16 Thread Brian Eaton
On Fri, Jul 16, 2010 at 3:27 PM, Eran Hammer-Lahav wrote: > The client authentication can be used to retrieve a grant previously arranged. Really? Who is going to implement that? I'm pretty sure that if the only inputs to the protocol are a client name and a client password, the output is going

Re: [OAUTH-WG] Change grant_type="none" to something less confusing

2010-07-16 Thread Brian Eaton
inted. =) (David, no offense, I'm just trying to stick by my guns on the whole "stop screwing up the spec by merging separate use cases into single flows" thing...) On Fri, Jul 16, 2010 at 2:23 PM, Eran Hammer-Lahav wrote: > And that matters how? > > EHL > > > > On Jul

Re: [OAUTH-WG] Change grant_type="none" to something less confusing

2010-07-16 Thread Brian Eaton
On Fri, Jul 16, 2010 at 2:25 PM, Eran Hammer-Lahav wrote: > External, out-of-band, implicit. > > It cannot be client because that is not always the case. Can you point to a use case where someone is going to use the client password flow to authenticate something besides a client? Because I'm pre

  1   2   3   >