Re: [OAUTH-WG] Public client cloning

2019-09-10 Thread Marius Scurtescu
If the phone is compromised, original app replaced by malicious app, then RFC8252 will not help. The assumption is that the phone is not compromised. On Tue, Sep 10, 2019 at 9:58 AM Masakazu OHTSUKA wrote: > Hi, > > I've read rfc8252 and have questions about native apps, that I couldn't > find a

Re: [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit

2018-12-03 Thread Marius Scurtescu
+1 for the proposed change Providing context around the change and to clarify that this is not a reaction to some emergency would be useful IMO. On Mon, Dec 3, 2018 at 1:50 PM Dick Hardt wrote: > I disagree. > > Existing deployments that have not mitigated against the concerns with > implicit s

Re: [OAUTH-WG] Fw: Breaking change in OAuth 2.0 rev. 23

2012-03-14 Thread Marius Scurtescu
h complex clients. I think this is another point missed in > your reading of the text. > > Hope this clarifies it. > > EH > >> -Original Message- >> From: Breno de Medeiros [mailto:br...@google.com] >> Sent: Wednesday, March 14, 2012 10:16 AM >>

[OAUTH-WG] Fw: Breaking change in OAuth 2.0 rev. 23

2012-03-14 Thread Marius Scurtescu
Hi, Nat Sakimura started a thread on the OpenID Connect list about a breaking change introduced by rev 2.3 The paragraph in question is in section 2.1: "A client application consisting of multiple components, each with its own client type (e.g. a distributed client with both a confidential serve

Re: [OAUTH-WG] Ignoring unrecognized request parameters

2012-02-16 Thread Marius Scurtescu
+1 Yes, forward compatibility and extensions will be broken if unrecognized params are not allowed. Marius On Thu, Feb 16, 2012 at 10:32 AM, William Mills wrote: > No, this is required for forward compatibility.  Implementations that send > extended parameters like capability advertisements (

Re: [OAUTH-WG] Mandatory-to-implement token type

2011-12-05 Thread Marius Scurtescu
+1, what John said. Marius On Sat, Dec 3, 2011 at 9:39 PM, John Bradley wrote: > I remain unconvinced that at this point MTI is going to be useful. > > I appreciate that some people want MAC, I could not support it being MTI. > > The below text with Bearer as MTI the only would be acceptable,

Re: [OAUTH-WG] draft-ietf-oauth-v2-bearer-09: Open Issues & Proposed Resolutions

2011-10-19 Thread Marius Scurtescu
the form scheme://host/path or > some such. Which is not necessarily a bad thing. It allows systems to scale and interoperate. > It's an opportunity to bloat scopes far out of proportion to > what is actually needed. > > ____ > From: Marius S

Re: [OAUTH-WG] draft-ietf-oauth-v2-bearer-09: Open Issues & Proposed Resolutions

2011-10-19 Thread Marius Scurtescu
profile", and > "openid". All those simple words are URIs. They are relative URIs (just the path), but URIs nonetheless. Marius > >                                -- Mike > > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On

Re: [OAUTH-WG] draft-ietf-oauth-v2-bearer-09: Open Issues & Proposed Resolutions

2011-10-19 Thread Marius Scurtescu
Marius On Tue, Oct 18, 2011 at 9:39 AM, Julian Reschke wrote: > On 2011-10-18 17:38, Eran Hammer-Lahav wrote: >> >> Space is allowed inside a quoted string and is already not allowed inside >> each scope string. >> >> EHL >> ... > > a) yes. > > b) well: > >   The value of the scope parameter is

Re: [OAUTH-WG] draft-ietf-oauth-v2-bearer-08.txt WGLC comments

2011-10-12 Thread Marius Scurtescu
On Wed, Oct 12, 2011 at 5:38 PM, Manger, James H wrote: >> One possible syntax is: >> >> Bearer access_token=xyz_-123,more_info=pdq >> >> Ultimately though, the format of the bearer token is outside of the scope of >> the spec, and up to the participants to determine, including whether to use >>

Re: [OAUTH-WG] Possible alternative resolution to issue 26

2011-10-04 Thread Marius Scurtescu
On Tue, Oct 4, 2011 at 12:18 PM, Julian Reschke wrote: > On 2011-10-04 20:38, Marius Scurtescu wrote: >> >> On Tue, Oct 4, 2011 at 11:07 AM, Mike Jones > <mailto:michael.jo...@microsoft.com>> wrote: >> >>    Existing practice is that simple ASCII string

Re: [OAUTH-WG] Possible alternative resolution to issue 26

2011-10-04 Thread Marius Scurtescu
k they are parsed as a URI with no scheme and authority only a path. Marius > > > ** ** > > -- Mike > > ** ** > > *From:* oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] *On Behalf > Of *Mariu

Re: [OAUTH-WG] Possible alternative resolution to issue 26

2011-10-04 Thread Marius Scurtescu
I just realized that scopes are defined as a space separated list of strings, for some reason I though they are a list of URIs. Mark Lentczner just clarified for me that URIs are supposed to be ASCII only. IRIs can have non-ASCII characters and can be canonically converted to URIs using percent en

Re: [OAUTH-WG] Proposed resolution for issue 26

2011-09-28 Thread Marius Scurtescu
On Wed, Sep 28, 2011 at 6:40 AM, Barry Leiba wrote: > I'd like to see more participation in this thread, besides just from > Mike and James. What do others think? > I think James made it pretty clear that we have a problem and that we have to solve it. One solution would be for the core spec to

Re: [OAUTH-WG] Bearer token credentials syntax

2011-09-23 Thread Marius Scurtescu
On Fri, Sep 23, 2011 at 7:00 AM, Mike Jones wrote: > James Manger and others pointed out that the current credentials syntax does > not comply with RFC 2617, nor does it match the updated credentials syntax > contained in HTTPbis, part 7: Authentication.  The current syntax in the > bearer token d

Re: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-revocation-03.txt

2011-09-19 Thread Marius Scurtescu
+1 On Fri, Sep 16, 2011 at 1:06 PM, Chuck Mortimore wrote: > If it's not already implicit by our implementation, I'm voicing our support > for this becoming a working group item. > > - cmort > > On Sep 16, 2011, at 12:31 PM, "Torsten Lodderstedt" < > tors...@lodderstedt.net> wrote: > > Hi all, >

Re: [OAUTH-WG] Device Profile

2011-08-02 Thread Marius Scurtescu
On Tue, Aug 2, 2011 at 3:19 PM, Aiden Bell wrote: > Hi, > > I am currently implementing the device profile described at > http://tools.ietf.org/html/draft-recordon-oauth-v2-device-00 > > Wanted to check this hadn't been superseded by any other document or > protocol > though I did notice the Googl

Re: [OAUTH-WG] OAuth2 and clients without browsers

2011-07-26 Thread Marius Scurtescu
I think you are describing the device profile: http://tools.ietf.org/html/draft-recordon-oauth-v2-device-00 Is that correct? Marius On Tue, Jul 26, 2011 at 12:18 PM, Andrew Arnott wrote: > Trying a different DL... > -- > Andrew Arnott > "I [may] not agree with what you have to say, but I'll de

Re: [OAUTH-WG] defining new response types

2011-07-12 Thread Marius Scurtescu
On Tue, Jul 12, 2011 at 1:35 PM, Eran Hammer-Lahav wrote: > I will withdraw my objections to the change (parsing the response_type > string) if enough support is present. If you care about it, please speak out > now. The complexity of composite response types is affecting mostly authorization s

[OAUTH-WG] defining new response types

2011-07-11 Thread Marius Scurtescu
If I read section 8.4 correctly it seems that new response types can be defined but composite values must be registered explicitly. I don't think this approach scales too well. OpenID Connect for example is adding a new response type: id_token. id_token can be combined with either code or token a

Re: [OAUTH-WG] best practices for storing access token for implicit clients

2011-07-11 Thread Marius Scurtescu
On Thu, Jun 30, 2011 at 12:45 PM, Doug Tangren wrote: > What is the current recommended practice of storing an implicit client's > access_tokens? LocalStorage, im mem and re-request auth on every browser > refresh? Both sound reasonable. I think most important is how NOT to store it, in a cookie.

Re: [OAUTH-WG] state parameter and XSRF detection

2011-06-27 Thread Marius Scurtescu
On Mon, Jun 27, 2011 at 2:22 PM, Torsten Lodderstedt wrote: > Hi all, > > while working on a new revision of the OAuth security document, a question > arose I would like to clarify on the list. > > The "state" parameter is supposed to be used to link a certain authorization > request and response.

Re: [OAUTH-WG] Fwd: [oauth] Good list of OAuth open source?

2011-06-24 Thread Marius Scurtescu
On Fri, Jun 24, 2011 at 11:11 AM, Justin Richer wrote: > To Eran: I really don't get your comment. Libraries are a very Good > Thing and their use and development should be greatly encouraged by the > OAuth community. The less that I have to write the Same Code As Last > Time the better. +1 If y

Re: [OAUTH-WG] Redirection URI and Implicit grant

2011-06-17 Thread Marius Scurtescu
On Wed, Jun 15, 2011 at 7:36 PM, Manger, James H wrote: > It seems like an authorization server receiving a request with an > unregistered redirect_uri of https://example.org/ can tell the user: > > > >   “Permission will be passed to your browser then onto *example.org*” > > > > An authorization

Re: [OAUTH-WG] Redirection URI and Implicit grant

2011-06-17 Thread Marius Scurtescu
On Wed, Jun 15, 2011 at 6:09 PM, Eran Hammer-Lahav wrote: > >> -Original Message- >> From: Shane B Weeden [mailto:swee...@au1.ibm.com] >> Sent: Wednesday, June 15, 2011 3:19 PM >> To: Eran Hammer-Lahav >> Cc: OAuth WG >> Subject: Re: [OAUTH-WG] Redirection URI and Implicit grant >> >> > Fr

Re: [OAUTH-WG] issuing multiple tokens

2011-06-17 Thread Marius Scurtescu
On Fri, Jun 17, 2011 at 12:13 PM, David Recordon wrote: > +1 Eran > > On Fri, Jun 17, 2011 at 12:46 AM, Eran Hammer-Lahav > wrote: >> OAuth has been successful because of its simple architecture and because it >> is based on actual deployment experience. Offering multi-token responses >> would

Re: [OAUTH-WG] consistency of token param name in bearer token type

2011-06-10 Thread Marius Scurtescu
On Fri, Jun 10, 2011 at 9:34 AM, John Kemp wrote: > George, > > On Jun 10, 2011, at 4:11 PM, George Fletcher wrote: > >> I definitely don't want to change the Authorization header naming scheme. I >> believe it should stay 'Bearer' because that's what the token is. We could >> make it... >> >> A

Re: [OAUTH-WG] consistency of token param name in bearer token type

2011-06-08 Thread Marius Scurtescu
On Wed, Jun 1, 2011 at 1:14 PM, Mike Jones wrote: > If you can drive a consensus decision for the name "access_token", I'd be > glad to change the name in the spec.  I agree that the current names are > confusing for developers. At Google we are getting the same feedback, that it is confusing f

Re: [OAUTH-WG] Client Credentials and Refresh Tokens

2011-06-03 Thread Marius Scurtescu
On Thu, Jun 2, 2011 at 11:05 PM, Shane B Weeden wrote: > Would anyone care to explain what the value of a refresh token is for peer > to peer applications utilizing the client_credentials grant type,  or > validate if my explanation is the intended use case? Are you asking why would an authorizat

Re: [OAUTH-WG] Getting the authorization code - Native Applications

2011-06-02 Thread Marius Scurtescu
On Wed, Jun 1, 2011 at 7:54 PM, Matias Woloski wrote: > I've read the latest spec and some of the discussions around the user-agent > flow and native apps. I've read about the different options to get the authz > code (copy-paste, polling the title of the window, custom scheme, etc). > I might be

Re: [OAUTH-WG] bearer token authorization header

2011-05-26 Thread Marius Scurtescu
25/11 1:15 PM, Mike Jones wrote: > > What you quoted below was the acceptable syntax. The Authorization Server > and the Resource Server still need to agree upon the semantics of the bearer > token exchanged. > > -- Mike > > -Original Message- > From:

Re: [OAUTH-WG] bearer token authorization header

2011-05-24 Thread Marius Scurtescu
de ones like the ones you are asking for, such as: > >    param="value" > > > >     -- Mike > > > > -Original Message- > From: Marius Scurtescu [mailto:mscurte...@google.com]

Re: [OAUTH-WG] Native Client Extension

2011-05-23 Thread Marius Scurtescu
On Mon, May 23, 2011 at 1:44 PM, Skylar Woodward wrote: > Just for the record, I spoke with Marius just now and they'll be using Eran's > suggested URN for this (as well as 'oob' as a non-complient alias): > >        urn:ietf:wg:oauth:2.0:oob > > Still remains to be codified in some way as an off

Re: [OAUTH-WG] See everyone in the morning

2011-05-23 Thread Marius Scurtescu
On Mon, May 23, 2011 at 10:49 AM, Doug Tangren wrote: > Thanks It would be nice to have > in http://tools.ietf.org/html/draft-ietf-oauth-v2-16#section-6 Section 6 is about using a refresh token to get a new access token. Expired access tokens don't make sense in this case. Using access tokens to

Re: [OAUTH-WG] See everyone in the morning

2011-05-23 Thread Marius Scurtescu
On Mon, May 23, 2011 at 10:29 AM, Doug Tangren wrote: > Im on skype, and the audio is kind of choppy. with regard to the status > codes as error values, which is the proper error code to use when an access > token expires. Can someone bring that question up? The error code would be "invalid_token

Re: [OAUTH-WG] oauth2 implicit flow user experience

2011-05-11 Thread Marius Scurtescu
On Wed, May 11, 2011 at 11:44 AM, Lodderstedt, Torsten wrote: > How shall the authorization server ensure that the calling client is a > user-agent based app (i.e. a native app could impersonate an user-agent based > app)? Through registration and redirect URI validation. A native app does not

Re: [OAUTH-WG] oauth2 implicit flow user experience

2011-05-11 Thread Marius Scurtescu
On Tue, May 10, 2011 at 4:43 PM, Lodderstedt, Torsten wrote: > Hi Marius, > > wrt "auto-approval": how is the authorization server supposed to validated > the client's identity in a reliable way? Otherwise another application (using > the id of the legitimate client) could abuse the authorizatio

Re: [OAUTH-WG] oauth2 implicit flow user experience

2011-05-10 Thread Marius Scurtescu
On Tue, May 10, 2011 at 6:25 AM, Doug Tangren wrote: > Hi, > > I'm implementing an authorization and resource server at worked based on the > oauth2 draft 15. A question arose about the user experience of users of an > implicit client flow.  I've set a one hour expiry on access tokens but now > th

[OAUTH-WG] bearer token authorization header

2011-05-09 Thread Marius Scurtescu
I am working through version 04 of the Bearer Token draft: http://tools.ietf.org/html/draft-ietf-oauth-v2-bearer-04 Not sure how to interpret the authorization header grammar described in section 2.1. The intent seems to be for something like: Bearer dfgh76dfghdfg After the scheme name, "Bearer",

Re: [OAUTH-WG] implicit clients and refresh tokens

2011-04-29 Thread Marius Scurtescu
On Thu, Apr 21, 2011 at 9:26 AM, Doug Tangren wrote: > According to http://tools.ietf.org/html/draft-ietf-oauth-v2-15#section-4.2.2 > it doesn't look like clients of the implicit oauth2 flow should receive a > refreshing token although it looks like the access token can optionally have > an expire

Re: [OAUTH-WG] client authentication for implicit grant type

2011-04-29 Thread Marius Scurtescu
On Tue, Apr 12, 2011 at 7:27 AM, Andrew Arnott wrote: > I brought this concern up about a year ago.  Now reviewing the latest > drafts, I still have a concern with it.  It is regarding the use of > client_id without a password.  I agree with section 3, as included below: > Section 3. Client Authen

Re: [OAUTH-WG] Error registry proposal (round 3)

2011-04-05 Thread Marius Scurtescu
On Tue, Apr 5, 2011 at 3:51 PM, Eran Hammer-Lahav wrote: > The following is my new proposal, based on Mike Jones’ and my earlier > proposals. It is basically a combination of the two. Looks good. > This proposal does not allow defining new error codes unless another > extension is involved (new

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-04 Thread Marius Scurtescu
On Mon, Apr 4, 2011 at 4:14 PM, Skylar Woodward wrote: > In our implementation (not yet public) we accept the empty string ("") as the > value for clients not issued secrets. While this was done to simplify the > interface and implementation, it would make it compliant in my view.  In this > ca

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-04 Thread Marius Scurtescu
On Mon, Apr 4, 2011 at 12:38 PM, Zeltsan, Zachary (Zachary) wrote: > According to section "6 Refreshing an Access Token" (-13.txt), client when > making a request for exchanging a refresh token for an access token has to > include its authentication credentials, and the "authorization server MUS

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-04 Thread Marius Scurtescu
On Mon, Apr 4, 2011 at 12:09 PM, Kris Selden wrote: > I completely agree with you regarding not being able to authenticate a native > client. > > The problem with web flow is the user experience is bad for a native app.   > Why does this matter?  Because of competition – if competitors use a user

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-04-04 Thread Marius Scurtescu
On Mon, Apr 4, 2011 at 10:47 AM, Kris Selden wrote: > A typical iPhone app cannot be shipped with a client secret and rightly or > wrongly users expect to only have to enter their credentials once. > > What is the best profile to use for an app that can't have a client secret > and needs a refre

Re: [OAUTH-WG] Reques to drop section 3

2011-04-01 Thread Marius Scurtescu
What Mike said. Definitely keep section 3 and I would really like to see the client assertion section restored. Glad to hear there is some progress on that front. Marius On Fri, Apr 1, 2011 at 6:19 AM, Mike Jones wrote: > Also -1 on dropping section 3.  Rather, we need to restore the client

Re: [OAUTH-WG] Error extensibility proposal

2011-03-31 Thread Marius Scurtescu
gt; -Original Message- >> From: Marius Scurtescu [mailto:mscurte...@google.com] >> Sent: Thursday, March 31, 2011 6:07 PM > >> Many error codes (if not most) are not parameter specific. > > Like what? After a long debate, not a single use case was presented for a new

Re: [OAUTH-WG] OAuth without HTTP redirects

2011-03-31 Thread Marius Scurtescu
Hi Greg, Google is working on a pure JavaScript flow which does not involve redirects. Marius On Thu, Mar 17, 2011 at 12:20 PM, Greg Brockman wrote: > Hi, > > I notice that the current OAuth2 draft seems to have browser redirects > baked in rather deeply.  Are there any plans to add support f

Re: [OAUTH-WG] Error extensibility proposal

2011-03-31 Thread Marius Scurtescu
On Tue, Mar 29, 2011 at 4:01 PM, Eran Hammer-Lahav wrote: > *** Requirements > > The following proposal is based on two requirements: > > 1. Provide a way to return an OAuth error response for error situations other > then 400 and 401. For example, if the server is temporarily unavailable, it >

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-03-31 Thread Marius Scurtescu
On Thu, Mar 31, 2011 at 4:56 PM, Phil Hunt wrote: > Done. > > It isn't quite what the flow shows in the earlier diagram. I was originally > avoiding client type and trying to focus on section 4 options. > > But this should be a better diagram. > > http://independentidentity.blogspot.com/2011/03/o

Re: [OAUTH-WG] Flowchart for legs of OAuth

2011-03-31 Thread Marius Scurtescu
On Wed, Mar 23, 2011 at 12:56 PM, Torsten Lodderstedt wrote: > Hi Phil, > > looks even better now :-) > > As already pointed out > (http://www.ietf.org/mail-archive/web/oauth/current/msg05599.html), "Have > client credentials? No" does not automatically imply usage of implicit > grant. The client

Re: [OAUTH-WG] Google launched OAuth 2 v10 support

2011-03-31 Thread Marius Scurtescu
On Tue, Mar 15, 2011 at 12:43 PM, Torsten Lodderstedt wrote: > Congratulation! > > I've got some questions: > - do you support the token_type parameter for the revocation endpoint? No, we don't. At this point I think our implementations is compliant with your latest draft, I will double check tha

[OAUTH-WG] Google launched OAuth 2 v10 support

2011-03-14 Thread Marius Scurtescu
The announcement: http://googlecode.blogspot.com/2011/03/making-auth-easier-oauth-20-for-google.html The documentation page: http://code.google.com/apis/accounts/docs/OAuth2.html Other than the core spec it implements: - revocation endpoint - native app support using oob and localhost (I still ha

Re: [OAUTH-WG] Draft -12 feedback deadline

2011-02-28 Thread Marius Scurtescu
On Mon, Feb 28, 2011 at 12:16 PM, Igor Faynberg wrote: > +1 > > Igor > > Torsten Lodderstedt wrote: >> >> ... >> >> I'm in favour to add the refresh token parameter to the implicit grant >> flow as it would make it more useable for native apps. I think it is much safer to go with refresh tokens o

Re: [OAUTH-WG] Token Revocation (was: Re-Chartering: What Items to work on?)

2011-02-28 Thread Marius Scurtescu
On Sat, Feb 26, 2011 at 5:16 AM, Torsten Lodderstedt wrote: > thank you for your feedback. > > Am 03.02.2011 02:01, schrieb Marius Scurtescu: >> >> Following up on the Token Revocation extension proposed at: >> http://datatracker.ietf.org/doc/draft-lodderstedt-o

Re: [OAUTH-WG] Draft -12 feedback deadline

2011-02-18 Thread Marius Scurtescu
On Fri, Feb 18, 2011 at 3:49 AM, Mark Mcgloin wrote: > Marius > > Isn't the risk of the refresh token leaking the same as the risk of the > access token leaking, i.e. why not provide both? Sure, but refresh tokens never die. > IMO, the refresh token > just provides a server side mechanism for r

Re: [OAUTH-WG] Draft -12 feedback deadline

2011-02-16 Thread Marius Scurtescu
On Wed, Feb 16, 2011 at 12:28 PM, Eran Hammer-Lahav wrote: > The reason why we don't return a refresh token in the implicit grant is > exactly because there is no client authentication... Not sure that's the main reason. AFAIK it is because the response is sent through the user-agent and it coul

Re: [OAUTH-WG] Draft -12 feedback deadline

2011-02-16 Thread Marius Scurtescu
On Wed, Feb 16, 2011 at 11:06 AM, William Mills wrote: > Token endpoint with username/password credential doesn't solve this?  Depends > on the auth scheme of course, but Bearer should provide a solution? Not at all, in most case native apps must use the browser based 3-legged dance. Marius ___

Re: [OAUTH-WG] Draft -12 feedback deadline

2011-02-16 Thread Marius Scurtescu
On Wed, Feb 16, 2011 at 10:43 AM, Eran Hammer-Lahav wrote: > > >> -Original Message----- >> From: Marius Scurtescu [mailto:mscurte...@google.com] >> Sent: Wednesday, February 16, 2011 9:05 AM > >> Yes, I understand. But Native Apps have no appropriate flow n

Re: [OAUTH-WG] Draft -12 feedback deadline

2011-02-16 Thread Marius Scurtescu
On Wed, Feb 16, 2011 at 9:00 AM, Eran Hammer-Lahav wrote: > > >> -Original Message----- >> From: Marius Scurtescu [mailto:mscurte...@google.com] >> Sent: Wednesday, January 26, 2011 12:09 PM >> To: Eran Hammer-Lahav >> Cc: OAuth WG >> Subject:

Re: [OAUTH-WG] Hum about 'Removal: Client Assertion Credentials'

2011-02-10 Thread Marius Scurtescu
On Thu, Feb 3, 2011 at 12:14 AM, Hannes Tschofenig wrote: > Hi all, > > Eran suggested to remove the Client Assertion functionality from the > draft-ietf-oauth-v2 specification in his mail from last month: > http://www.ietf.org/mail-archive/web/oauth/current/msg05027.html > > This lead to a heated

Re: [OAUTH-WG] Bearer token type and scheme name (deadline: 2/10)

2011-02-08 Thread Marius Scurtescu
On Mon, Feb 7, 2011 at 9:59 PM, Eran Hammer-Lahav wrote: > Mike, Brian, Dirk, and Marius – can you live with #1? Works for me. Marius ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Bearer token type and scheme name (deadline: 2/10)

2011-02-04 Thread Marius Scurtescu
On Thu, Feb 3, 2011 at 11:39 AM, Eran Hammer-Lahav wrote: > Hey Marius, > >> -Original Message----- >> From: Marius Scurtescu [mailto:mscurte...@google.com] >> Sent: Thursday, February 03, 2011 10:36 AM >> To: Eran Hammer-Lahav >> Cc: OAuth WG >> Sub

Re: [OAUTH-WG] Bearer token type and scheme name (deadline: 2/10)

2011-02-03 Thread Marius Scurtescu
On Thu, Feb 3, 2011 at 12:34 AM, Eran Hammer-Lahav wrote: > 2. Single OAuth2 scheme with sub-schemes > > Define a single authentication scheme for all token types with some > attribute used to detect which scheme is actually being used. > > Benefits: > > - single scheme, reuse of the 1.0 pattern.

[OAUTH-WG] Token Revocation (was: Re-Chartering: What Items to work on?)

2011-02-02 Thread Marius Scurtescu
In case of success, why is the server supposed to return 204 instead of 200? Just worried that this will confuse clients. Thanks, Marius On Thu, Jan 13, 2011 at 8:39 AM, Marius Scurtescu wrote: > On Wed, Jan 12, 2011 at 4:31 PM, Torsten Lodderstedt > wrote: >> Am 12.01.2011

Re: [OAUTH-WG] Update required for bearer token spec

2011-01-30 Thread Marius Scurtescu
On Thu, Jan 27, 2011 at 6:23 PM, Eran Hammer-Lahav wrote: > As for the open issues: the bearer token scheme name - if it wasn’t clear, I > plan to use every mean available to me to block the bearer token draft from > using the ‘OAuth2’ scheme name, and will raise this issue in the WGLC, Area > Dir

[OAUTH-WG] assertion, client_assertion_type and client_assertion

2011-01-30 Thread Marius Scurtescu
I would like to bring up one more argument to keep the assertion, client_assertion_type and client_assertion parameters in core. If I understood correctly, the main argument to remove them from core was that they are underspecified and extensions are needed anyhow before they are useful. First of

Re: [OAUTH-WG] Native Client Extension

2011-01-28 Thread Marius Scurtescu
On Fri, Jan 28, 2011 at 10:25 AM, Eran Hammer-Lahav wrote: > -12 3.1.1: > >   The redirection URI MUST be an absolute URI and MAY include a query >   component, which MUST be retained by the authorization server when >   adding additional query parameters. > > 'oob' is not an absolute URI. Good p

Re: [OAUTH-WG] Native Client Extension

2011-01-28 Thread Marius Scurtescu
On Fri, Jan 28, 2011 at 8:21 AM, Eran Hammer-Lahav wrote: > Why not: > > urn:ietf:wg:oauth:2.0:oob > > Can you can add more flavors for different ways of floating the token/code up > to the application. This requires no changes at all to -12 to allow this > special case. Using the simpler "oob"

Re: [OAUTH-WG] Native Client Extension

2011-01-27 Thread Marius Scurtescu
On Thu, Jan 27, 2011 at 3:00 AM, Skylar Woodward wrote: > Marius, > > I support the extension (as per my previous letter, as I missed this thread > over the holidays) and Kiva is/was planning to support this as well.  Given > the unpredictable technology environments of many of our customers, th

Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt

2011-01-26 Thread Marius Scurtescu
On Wed, Jan 26, 2011 at 2:29 PM, Eran Hammer-Lahav wrote: > How about turn the MUST to a SHOULD for using the x_ prefix? OK, let's go with that. Thanks, Marius ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt

2011-01-26 Thread Marius Scurtescu
On Tue, Jan 25, 2011 at 11:08 PM, Eran Hammer-Lahav wrote: > Thanks Marius. > >> -Original Message----- >> From: Marius Scurtescu [mailto:mscurte...@google.com] >> Sent: Tuesday, January 25, 2011 5:02 PM >> To: Eran Hammer-Lahav >> Cc: oauth@iet

Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt

2011-01-26 Thread Marius Scurtescu
On Wed, Jan 26, 2011 at 9:48 AM, Eran Hammer-Lahav wrote: > This is not aimed at anyone in particular. > > Replying +1 is not justification for a major breaking change. This was raised > in the past and consensus was that this is not a major concern. Over the past > 10 months not a single actual

Re: [OAUTH-WG] Bear token scheme name

2011-01-26 Thread Marius Scurtescu
On Tue, Jan 25, 2011 at 9:59 PM, Eran Hammer-Lahav wrote: > Simply because authentication is not what OAuth is about. > > OAuth is an authorization protocol for issuing access tokens. Access tokens > can have different properties and therefore need different schemes. I was the > first to suggest

Re: [OAUTH-WG] Bear token scheme name

2011-01-26 Thread Marius Scurtescu
On Tue, Jan 25, 2011 at 6:34 PM, William Mills wrote: > As I remember there was serious objection by a few to putting versioning in > the scheme name.  OAuth, OAuth2, and soon we're on OAuthN+1 seemed to be the > objection.  Some are passionate about it and no one was sufficiently > passionate

Re: [OAUTH-WG] Draft -12 feedback deadline

2011-01-26 Thread Marius Scurtescu
- 4.1. Authorization Code. It is stated that authorization code is suitable for clients that can hold a secret. Not necessarily true, it is the best flow for native apps, for example. - 4.1.2 Authorization Response. Minor typo in last sentence on page 16: "size of any value is issues" => "size of

Re: [OAUTH-WG] Bear token scheme name

2011-01-25 Thread Marius Scurtescu
On Wed, Jan 19, 2011 at 10:10 AM, Mike Jones wrote: > I’d like a sense from the working group whether others want this change, and > if so, what the name should be changed to. Probably this was debated, but I will ask again. Why can't we use "OAuth2" as the scheme in all cases and require a toke

Re: [OAUTH-WG] I-D Action:draft-ietf-oauth-v2-12.txt

2011-01-25 Thread Marius Scurtescu
On Thu, Jan 20, 2011 at 9:41 PM, Eran Hammer-Lahav wrote: > Forgot to mention that I don't have any outstanding comments in my queue so > if your feedback was not incorporated into -12, and you feel strongly about > it, bring it up again. >From an older email, adapted to v12: 1. The token_typ

Re: [OAUTH-WG] Reasons not to remove Client Assertion Credentials and OAuth2 HTTP Authentication Scheme

2011-01-20 Thread Marius Scurtescu
On Thu, Jan 20, 2011 at 2:25 PM, Brian Campbell wrote: > Okay, sorry, I see the distinction you were making.  The client could > potentially be told the client_assertion_type and given the assertion > (assuming it's properly encoded for all the hops) by some IdP/STS and make > use of the use of th

Re: [OAUTH-WG] Reasons not to remove Client Assertion Credentials and OAuth2 HTTP Authentication Scheme

2011-01-20 Thread Marius Scurtescu
On Thu, Jan 20, 2011 at 2:14 PM, Phillip Hunt wrote: > The client does need to know how to authenticate. But given that it already > has to know a lot about the service, you would think acceptable > authentication types are well known to the client. Yes, true. > What is the problem with the c

Re: [OAUTH-WG] Reasons not to remove Client Assertion Credentials and OAuth2 HTTP Authentication Scheme

2011-01-20 Thread Marius Scurtescu
On Thu, Jan 20, 2011 at 1:25 PM, Brian Campbell wrote: > I'd argue that, for reliable interoperability, both of those cases would > require an extension or at least some level of agreement about the format > and validation rules of the assertion. I do agree that an extension would be useful for t

Re: [OAUTH-WG] Reasons not to remove Client Assertion Credentials and OAuth2 HTTP Authentication Scheme

2011-01-20 Thread Marius Scurtescu
On Tue, Jan 18, 2011 at 10:12 AM, Eran Hammer-Lahav wrote: > Client assertion credentials: > > The mechanism is under specified, especially in its handling of the > client_id identifier (when used to obtain end-user authorization). > It does not contain any implementation details to accomplish any

Re: [OAUTH-WG] Removal: 'OAuth2' HTTP Authentication Scheme

2011-01-19 Thread Marius Scurtescu
On Wed, Jan 19, 2011 at 9:50 AM, William Mills wrote: > Yes it’s old, 1 week form expiring too.  The specs seem to be stabilizing > now so it’s worth updating.   Has there been any other discovery proposal > yet? Nothing concrete AFAIK, but for SASL we also discussed using host-meta style discove

Re: [OAUTH-WG] Removal: HTTP Basic Authentication for Client Credentials

2011-01-18 Thread Marius Scurtescu
+1 I think basic auth for client credentials belongs to an extension, that simplifies the core spec. Is there a good reason to keep an optional feature in core? Marius On Tue, Jan 18, 2011 at 3:21 PM, Igor Faynberg wrote: > +1 > > Igor > > Anthony Nadalin wrote: >> >> If it is left as optiona

Re: [OAUTH-WG] Removal: credential body parameters

2011-01-18 Thread Marius Scurtescu
On Mon, Jan 17, 2011 at 7:55 AM, Richer, Justin P. wrote: > I absolutely don't want to drop credentials being passed as parameters. I > think that's more widely deployed than using the BASIC style auth as well. +1 I think it is way too late for drastic changes like this. As shown by existing im

Re: [OAUTH-WG] Format of user-agent response parameters

2011-01-18 Thread Marius Scurtescu
On Sat, Jan 15, 2011 at 11:41 PM, Eran Hammer-Lahav wrote: > Why is the token returned in the fragment using form-encoding? This makes no > sense. It should be a JSON string for the following reasons: > > > > 1.   All token responses should be the same, which will enable returning > structured

Re: [OAUTH-WG] OAuth 2.0 Token Upgrade Extension

2011-01-13 Thread Marius Scurtescu
tokens are mentioned here, and I think both refresh and access tokens should be mentioned. Second, it is the refresh token that should have same expiration as the OAuth 1 token, and not the access token. Marius On Wed, Dec 29, 2010 at 5:40 PM, Marius Scurtescu wrote: > Hi David, > >

Re: [OAUTH-WG] Re-Chartering: What Items to work on?

2011-01-13 Thread Marius Scurtescu
On Wed, Jan 12, 2011 at 4:31 PM, Torsten Lodderstedt wrote: > Am 12.01.2011 22:19, schrieb Richer, Justin P.: >> >> Yes, let the server do the work. In practice, it's going to be looking up >> the token based on the token value anyway (for bearer tokens, at least). All >> the client really cares a

Re: [OAUTH-WG] Specification organization (Endpoints vs. Flows) - Vote by 1/17

2011-01-12 Thread Marius Scurtescu
+1 for option 2 as well Not convinced that naming the main flows Authenticated and Unauthenticated makes sense, I think it will only increase confusion. For example, native apps are not authenticated and they would be using the "Authenticated" flow. I think we should stick with something along the

Re: [OAUTH-WG] unregistered applications

2011-01-05 Thread Marius Scurtescu
On Wed, Jan 5, 2011 at 2:55 PM, Francisco Corella wrote: > > > Native application clients can be implemented in different > > ways based on their requirements and desired end-user > > experience.  Native application clients can: > > > > o Utilize the end-user authorization endpoint as described in

Re: [OAUTH-WG] Native Client Extension

2011-01-04 Thread Marius Scurtescu
On Tue, Jan 4, 2011 at 2:23 PM, Torsten Lodderstedt wrote: > +1 > > I have asked myself all the time why "oob" disappeared in OAuth 2.0? Does > Google use this feature? Yes, we are planning to support this, exactly as described in the extension. Marius ___

Re: [OAUTH-WG] TLS is needed for redirecting back to the client

2011-01-04 Thread Marius Scurtescu
On Tue, Jan 4, 2011 at 1:27 PM, Francisco Corella wrote: > > We need a protocol that does both authentication and > authorization.  We can take OAuth and adapt it for > authentication, or take OpenID and adapt it for > authorization, or combine OpenID and OAuth (great solution > for people who lov

[OAUTH-WG] Native Client Extension

2010-12-29 Thread Marius Scurtescu
I would like to propose an OAuth 2 extension that helps native clients close the loop after the approval page. The extension defines a special value for the redirect URI for the case when the client does not have such a URI and it also defines that the authorization server should provide a default

Re: [OAUTH-WG] OAuth 2.0 Token Upgrade Extension

2010-12-29 Thread Marius Scurtescu
Hi David, A few suggestions for this extension. I am assuming that you will update it soon to conform to draft 11 of the core protocol. 1. Instead of passing an assertion why not treat it as another grant type and pass all parameters as POST parameters. For example: POST /token HTTP/1.1 Host: s

Re: [OAUTH-WG] unregistered applications

2010-12-29 Thread Marius Scurtescu
On Thu, Dec 23, 2010 at 9:38 PM, Francisco Corella wrote: > Thank you very much for your detailed reading of the paper > and your very useful comments.  I've revised the paper based > on your comments and put a new version online, with an > acknowledgment of your contribution. I'm glad you found

Re: [OAUTH-WG] unregistered applications

2010-12-23 Thread Marius Scurtescu
Hi Francisco, PKAuth seems similar to OAuth 2, I think it would help if you used the same terminology: - application => client - social site => authorization server - client => end user - reference code => authorization code The paper claims that users do not know how to interpret domain names, w

Re: [OAUTH-WG] expires_at vs expires_in

2010-12-23 Thread Marius Scurtescu
This expiration time is just a hint, client code should work perfectly fine without it, or with a wrong one. Trying to understand the use case here: JavaScript code receives an access token and the associated expires_in. It passes the access token to backend code, and this backend code is properly

Re: [OAUTH-WG] expires_at vs expires_in

2010-12-14 Thread Marius Scurtescu
On Tue, Dec 14, 2010 at 2:54 PM, Paul Walker wrote: > It seems to me that expires_in suffers from the same machine time > synchronization issue and additionally throws in an indeterminable time > amount, while expires_at would only suffer from the former. I don't see how expires_in suffers from

Re: [OAUTH-WG] OAuth 2.0 does not require parameter name oauth_token= while passing in authorization header

2010-12-14 Thread Marius Scurtescu
rrent/msg04673.html > > -Original Message- > From: Marius Scurtescu [mailto:mscurte...@google.com] > Sent: Tuesday, December 14, 2010 4:55 PM > To: Jitesh Bhate > Cc: OAuth@ietf.org > Subject: Re: [OAUTH-WG] OAuth 2.0 does not require parameter name > oauth_token= while passing

  1   2   3   4   >