Re: [OAUTH-WG] Shepherd review of draft-ietf-oauth-v2-threatmodel

2012-04-25 Thread Mark Mcgloin
This topic should not have been raised again with this mailing list as we did reach a consensus before. What happened was that Barry sent a targeted email to some people, including Michael Thomas, regarding some additional wording as part of his shepard review. Michael inadvertently replied to thi

Re: [OAUTH-WG] Shepherd review of draft-ietf-oauth-v2-threatmodel

2012-04-24 Thread Mark Mcgloin
Michael Thomas wrote on 24/04/2012 14:24:47: > > Re: [OAUTH-WG] Shepherd review of draft-ietf-oauth-v2-threatmodel > > On 04/24/2012 01:17 AM, Mark Mcgloin wrote: > > Hi Thomas > > > > Your additional text is already covered in a countermeasure for section &g

Re: [OAUTH-WG] Shepherd review of draft-ietf-oauth-v2-threatmodel

2012-04-24 Thread Mark Mcgloin
Hi Thomas Your additional text is already covered in a countermeasure for section 4.1.4. In addition, section 4.1.4.4 states the assumption that the auth server can't protect against a user installing a malicious client Regards Mark oauth-boun...@ietf.org wrote on 23/04/2012 17:09:11: > From:

Re: [OAUTH-WG] [apps-discuss] Apps Area review of draft-ietf-oauth-v2-threatmodel-01

2012-02-22 Thread Mark Mcgloin
Hi Peter The core oauth spec states that TLS MUST be used wherever tokens or passwords are being transmitted, except for the redirection_url but it does recommend it use TLS in section 3.1.2.1 and explicitly states why. Regards Mark oauth-boun...@ietf.org wrote on 22/02/2012 01:34:08: > From: >

Re: [OAUTH-WG] Phishing with Client Application Name Spoofing

2012-01-17 Thread Mark Mcgloin
think a section should be added to the security model doc. > > On 2011-12-16 Mark Mcgloin agreed and suggested we call it "Client > Registration of phishing clients": > http://www.ietf.org/mail-archive/web/oauth/current/msg08061.html > > I'm happy to propose the text;

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-16 Thread Mark Mcgloin
or the user >across applications. The user is then always presenting their > credential to a >known and trusted web page. Collection and use of primary > authentication from >the user by client applications is NOT RECOMMENDED. > I don't agree that your wording clar

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread Mark Mcgloin
Why do you think this William? Apple does it? Google android market had to pull 30 apps recently because they contained malware. There are automated tools that will do some sanity checks on apps and it is only advice, i.e. 'could' Mark > William Mills > > " o Client applications could be val

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread Mark Mcgloin
Having read the suggested wording from Eran, William and Michael, I think Eran's description is the most succinct and relevant: "OAuth does not provide any protection against malicious applications and that the end user is solely responsible for the trustworthiness of any native application install

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-04 Thread Mark Mcgloin
rom: > > Michael Thomas > > To: > > Peter Saint-Andre > > Cc: > > Mark Mcgloin/Ireland/IBM@IBMIE, Barry Leiba > , oauth WG , "oauth- > boun...@ietf.org" > > Date: > > 04/01/2012 20:07 > > Subject: > > Re: [OAUTH-WG] WGLC on dr

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-04 Thread Mark Mcgloin
Hi Michael Can you clearly word the threat for which this countermeasure (or lack of) applies thanks Mark Michael Thomas wrote on 03/01/2012 23:52:54: > From: > > Michael Thomas > > To: > > Phillip Hunt > > Cc: > > Mark Mcgloin/Ireland/IBM@IBMIE, Barry Le

Re: [OAUTH-WG] Phishing with Client Application Name Spoofing

2011-12-16 Thread Mark Mcgloin
Andre You are right that the threat model does not cover this kind of issue related to client registration. Client registration is considered to be out of scope in the oauth spec but it is worth drawing developers attention to this. I can add a threat entitled something like "Client Registration

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2011-12-16 Thread Mark Mcgloin
Michael, I will review the comments from Phil where he suggests some changes in section 4.1.4 of the threat model I am unclear exactly what you are proposing. If you want to propose a clearly worded revamp of that section in the next couple of days, I am willing to review and accept legitimate ch

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2011-12-15 Thread Mark Mcgloin
Thanks Barry - I just responded to that thread. We will not be making any changes to the threat model based on that comment Regards Mark oauth-boun...@ietf.org wrote on 15/12/2011 14:30:02: > From: > > Barry Leiba > > To: > > oauth WG > > Date: > > 15/12/2011 14:30 > > Subject: > > Re: [OAUTH-

Re: [OAUTH-WG] client embedded browsers (was: I-D Action: draft-ietf-oauth-v2-threatmodel-01.txt)

2011-12-15 Thread Mark Mcgloin
ed on that consensus, I would consider this issue closed and we will not be making any changes to the threat model Regards Mark McGloin On Wed, 26 Oct 2011 13:17:58 , "Michael Thomas" wrote: First, I think that this threat should be elevated to something more than a threat because it

Re: [OAUTH-WG] Draft 16 Security Considerations additions

2011-07-06 Thread Mark Mcgloin
eorigin, which will block any framing or framing by sites with a different origin, respectively. For older browsers, javascript framebusting techniques can be used but may not be effective in all browsers. Regards Eran Hammer-Lahav wrote on 04/07/2011 20:02:02: > From: > > Eran Hamm

Re: [OAUTH-WG] Native Application Text

2011-07-01 Thread Mark Mcgloin
This assumes we support the authorization code grant type without client authentication. See http://www.ietf.org/mail-archive/web/oauth/current/msg06816.html and many other contributions on the same topic Regards Mark oauth-boun...@ietf.org wrote on 29/06/2011 02:15:10: > From: > > Anthony Nada

Re: [OAUTH-WG] Draft 16 comment

2011-06-28 Thread Mark Mcgloin
The question below remains unanswered in relation to native apps being able to use grant type auth code to utilize refresh tokens. Which of these is the best option 1) Change oauth spec so client credentials are optional when requesting access token for grant type 'authorization_code' and for refr

Re: [OAUTH-WG] Draft 16 Security Considerations additions

2011-06-01 Thread Mark Mcgloin
"William J. Mills" wrote on 01/06/2011 00:17:44: > From: > > "William J. Mills" > > To: > > Mark Mcgloin/Ireland/IBM@IBMIE, "oauth@ietf.org" > > Date: > > 01/06/2011 00:17 > > Subject: > > Re: [OAUTH-WG] Draft 16 Security Cons

Re: [OAUTH-WG] Draft 16 Security Considerations additions

2011-06-01 Thread Mark Mcgloin
the client which MUST then validate the state parameter matches on the response. Regards Mark Torsten Lodderstedt wrote on 01/06/2011 09:11:31: > From: > > Torsten Lodderstedt > > To: > > Mark Mcgloin/Ireland/IBM@IBMIE > > Cc: > > oauth@ietf.org > > Date: &

[OAUTH-WG] Draft 16 Security Considerations additions

2011-05-31 Thread Mark Mcgloin
Eran Here are some additional sections to add to the next draft under security considerations CSRF Cross-Site Request Forgery (CSRF) is a web-based attack whereby HTTP requests are transmitted from a user that the website trusts or has authenticated. CSRF attacks on OAuth approvals can allow an a

Re: [OAUTH-WG] Formal security protocol analysis of OAuth 2.0

2011-05-16 Thread Mark Mcgloin
Hi Igor, I will pass on your comments Regards Mark Igor Faynberg wrote on 16/05/2011 09:45:23: > Igor Faynberg > 16/05/2011 09:45 > > Please respond to > igor.faynb...@alcatel-lucent.com > > To > > Mark Mcgloin/Ireland/IBM@IBMIE > > cc > > fcore...

Re: [OAUTH-WG] Formal security protocol analysis of OAuth 2.0

2011-05-16 Thread Mark Mcgloin
Hi Igor, comments Inline below Igor Faynberg wrote on 16/05/2011 09:02:25: > Igor Faynberg > 16/05/2011 09:02 > > Please respond to > igor.faynb...@alcatel-lucent.com > > To > > Mark Mcgloin/Ireland/IBM@IBMIE > > cc > > oauth@ietf.org > > Subjec

Re: [OAUTH-WG] Formal security protocol analysis of OAuth 2.0

2011-05-14 Thread Mark Mcgloin
/papers/B0D33665257DD3A0852576410043BCDD/$File/rc24856.pdf Regards Mark Francisco Corella wrote on 13/05/2011 17:58:01: > Francisco Corella > 13/05/2011 17:58 > > Please respond to > fcore...@pomcor.com > > To > > oauth@ietf.org, Mark Mcgloin/Ireland/IBM@IBMI

[OAUTH-WG] Formal security protocol analysis of OAuth 2.0

2011-05-13 Thread Mark Mcgloin
Does anyone know of a formal security protocol analysis that has been carried out for OAuth 2.0? I could only find analysis done against 1.0a, like this one: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5762765 thanks Mark ___ OAuth maili

Re: [OAUTH-WG] Authorization code security issue (reframed)

2011-04-01 Thread Mark Mcgloin
So we have 2 different communities of Oauth developers that will never agree. SHOULD: Typically the social networking sites that need to cater for tail end developers by not enforcing TLS on redirect_uri. It is a risk to think that using strong language in the spec will help them appreciate the is

Re: [OAUTH-WG] OAuth without HTTP redirects

2011-04-01 Thread Mark Mcgloin
Hi Marius, Can you provide very high level details on what that approach is? thanks Mark oauth-boun...@ietf.org wrote on 01/04/2011 02:34:56: > Marius Scurtescu > Sent by: oauth-boun...@ietf.org > > 01/04/2011 02:34 > > To > > Greg Brockman > > cc > > oauth@ietf.org > > Subject > > Re: [OAUT

Re: [OAUTH-WG] Security Considerations Section Proposal

2011-03-31 Thread Mark Mcgloin
sent over TLS is still being debated wrt redirect_uri 2.12. Authenticity of endpoints I think I must be missing some subtleties of the statements in this section as I don't understand. Is it just stating that both must be capable of supporting TLS? Mark McGloin Torsten Lodderstedt wro

Re: [OAUTH-WG] Authors, Contributors, Acknowledgement

2011-03-28 Thread Mark Mcgloin
Eran, you are right about the plan. We have already had a couple of iterations of distilling the separate document down into a security considerations section for inclusion in the spec and will complete if based on feedback Torsten received this week at IETF-80. I am unable to attend Mark oauth

Re: [OAUTH-WG] IETF-80

2011-03-14 Thread Mark Mcgloin
ussed before that too thanks Mark McGloin oauth-boun...@ietf.org wrote on 11/03/2011 22:22:16: > Igor Faynberg > Sent by: oauth-boun...@ietf.org > > 11/03/2011 22:22 > > Please respond to > igor.faynb...@alcatel-lucent.com > > To > > Peter Saint-Andre > > cc

Re: [OAUTH-WG] Draft -12 feedback deadline

2011-02-18 Thread Mark Mcgloin
Marius Isn't the risk of the refresh token leaking the same as the risk of the access token leaking, i.e. why not provide both? IMO, the refresh token just provides a server side mechanism for revoking access, where resource servers are distributed, through having short lived access tokens Of cou

Re: [OAUTH-WG] Security Considerations Suggestion

2010-11-11 Thread Mark Mcgloin
gh as we just wanted to add something before China. Based on feedback from people like Richard Barnes and Anthony Nadalin, we intend to rework it but I just wanted to make sure I am not duplicating effort Regards Mark McGloin oauth-boun...@ietf.org wrote on 11/11/2010 11:18:52: > Hannes Ts

Re: [OAUTH-WG] [secdir] ** OAuth Tutorial & OAuth Security Session **

2010-11-09 Thread Mark Mcgloin
needs tidying but we wanted to push something in before the security meeting in China Regards Mark McGloin oauth-boun...@ietf.org wrote on 09/11/2010 08:53:40: > "Richard L. Barnes" > Sent by: oauth-boun...@ietf.org > > 09/11/2010 08:53 > > To > > tors

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-09-29 Thread Mark Mcgloin
Eran Hammer-Lahav wrote on 29/09/2010 15:50:33: > > > > -1 to splitting acquiring and using a token. It may not confuse > people actively > > engaged in the WG but what about everyone else? > > We are already splitting it, by putting signatures elsewhere. Just > because you might think bearer to

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-09-29 Thread Mark Mcgloin
n? I don't have concrete examples to back this up but possibilities include: automatic granting of access token, refresh tokens, non-secure channels, ?? Regards Mark McGloin Dick Hardt wrote on 29/09/2010 01:08 > I am mildly concerned that breaking the spec into multiple parts makes it harder

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-27 Thread Mark Mcgloin
tions/OAuthWRAP2.0SecurityConsiderations.pdf Regards Mark McGloin Dick Hardt wrote on 27/09/2010 14:30 > wrt. another comment you had about security considerations, Brian Eaton did write up a bunch of security considerations for WRAP. ___ OAuth mailing list OAuth@ietf.o

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-25 Thread Mark Mcgloin
+1 to having it in the core spec. I don't see how an optional section in the spec will cause any confusion +1 to John's suggestion below of starting with the OAuth 1.0a signature mechanism. Why not put it in the spec and see what breaks or no longer holds true Mark McGloin John Pa

Re: [OAUTH-WG] Rechartering

2010-09-15 Thread Mark Mcgloin
Hi Torsten Yes, I can contribute. Will email you directly to follow up Regards Mark McGloin Torsten Lodderstedt 14/09/2010 17:01 I plan to work on that aspect. Do you (or someone else) want to contribute? regards, Torsten. Am 14.09.2010 um 17:18 schrieb Mark Mcgloin : > What ab

Re: [OAUTH-WG] Rechartering

2010-09-14 Thread Mark Mcgloin
What about Security Considerations. I know some individuals have worked on it in the past - does it need a WG to complete Mark McGloin Hannes Tschofenig Sent by: oauth-boun...@ietf.org 12/09/2010 00:59 Hi all, at the Washington Internet Identity Workshop we had the chance to chat about

Re: [OAUTH-WG] assertion profile changes

2010-07-09 Thread Mark Mcgloin
ntent on using refresh tokens with assertions intend to link the two? Regards Mark McGloin On 08/07/2010 23:49 Brian Eaton wrote: Nice summary, thanks Brian! I think there is a third issue as well, i.e. what the use case for client_id actually is. I think Chuck's use case has client_

Re: [OAUTH-WG] proposal for factoring out request signing in OAuth 2

2010-06-01 Thread Mark Mcgloin
for altering the token response is a good suggestion Mark McGloin > On 31/05/2010 06:58 James Manger wrote >>... we're going to have to split out profiles to deal with the >> different key distribution challenges. >Instead of starting with profiles, I think a key to addr

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-10 Thread Mark Mcgloin
> 1. Server Response Format No Preference > 2. Client Authentication (in flows) > A. Client authenticates by sending its credentials using special parameters (current draft) > B. Client authenticated by using HTTP Basic (or other schemes supported by the server such as Digest) Prefer B Mark

Re: [OAUTH-WG] Scope - Coming to a Consensus

2010-05-04 Thread Mark Mcgloin
+1 to option 3 I think the suggestion below from Torsten makes great sense, especially in relation to standardized apis such as mail Mark On 01 May 2010, at 13:36 PM, Eve Maier wrote: > Am 01.05.2010 03:07, schrieb Marius Scurtescu: >> On Fri, Apr 30, 2010 at 11:43 AM, Torsten Lodderstedt >

Re: [OAUTH-WG] Issue: add refresh token as optional in all access token requests

2010-04-16 Thread Mark Mcgloin
+1 to this Mark McGloin >On 16/04/2010 17:08, Richard Barnes wrote: >Sure, this seems sensible, especially with the *optional* part. >On Apr 15, 2010, at 3:22 PM, David Recordon wrote: >> +1, remember discussing this a week or so ago on the list >> >>> On

Re: [OAUTH-WG] Issue: Scope parameter

2010-04-16 Thread Mark Mcgloin
client identifier but they only request contacts for some operation, and the user feels more secure. Is this the main reason for scope? James, how does your proposal work if the client needs access to more than one set of resources? Mark McGloin

Re: [OAUTH-WG] Combining the Native application and User-agent flows

2010-04-16 Thread Mark Mcgloin
My point though is why remove the Native app flow and then replace it with something that relies on having to warn the user about possible phishing attacks in your UI, like FlickR does. I would find it difficult to get that approved here in IBM I must look again at Luke Sheppard's suggestion for c

Re: [OAUTH-WG] Combining the Native application and User-agent flows

2010-04-15 Thread Mark Mcgloin
e device >code on the URL. The code can be very long and impossible to >brute-force. The session fixation/phishing attack still exists, but I >agree that could be addressed with good UI. What is the benefit in combining Native flow and Device flow and then having to expend effort preventi

Re: [OAUTH-WG] First draft of OAuth 2.0

2010-03-23 Thread Mark Mcgloin
-hardt-oauth-01. We have strong customer use-cases for an assertion based flow, specifically SAML bearer tokens, and I >believe Microsoft may have already shipped a minor variation on this ( wrap_SAML ) in Azure. Mark McGloin ___ OAuth mailing l

Re: [OAUTH-WG] WG Survey

2010-02-21 Thread Mark Mcgloin
think the protocol should include a signature-based authentication scheme? Yes. I think there will be some use cases or worries from over-cautious CIOs that it will neccessitate it. Mark McGloin ___ OAuth mailing list OAuth@ietf.org https://www.ietf.or