Re: [OAUTH-WG] What's the use case for signing OAuth 2.0 requests?

2010-10-01 Thread Yaron Goland
/hmac'd with the proof-of-possession key where the audience is the application endpoint and the original access token is included as a claim. Yaron From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] Sent: Friday, September 24, 2010 7:44 PM To: Yaron Goland; O

Re: [OAUTH-WG] What's the use case for signing OAuth 2.0 requests?

2010-10-01 Thread Yaron Goland
licit mechanism. Yaron From: PRATEEK MISHRA [mailto:prateek.mis...@oracle.com] Sent: Friday, September 24, 2010 3:19 PM To: Yaron Goland Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] What's the use case for signing OAuth 2.0 requests? Yaron, You have referenced the SAML

Re: [OAUTH-WG] Comparing the JSON Token drafts

2010-10-01 Thread Yaron Goland
No matter what algorithm or key size we pick the choice will prove unsupportable for any number of implementers due to everything from security issues (no matter what key size we pick, someone will have a real need for something larger) to legal issues (various countries have their own opinions

Re: [OAUTH-WG] OAuth Signature Draft Pre 00

2010-09-27 Thread Yaron Goland
The goal is to have a single unified draft. From: David Recordon [mailto:record...@gmail.com] Sent: Monday, September 27, 2010 7:00 AM To: Nat Sakimura; Yaron Goland Cc: oauth Subject: Re: [OAUTH-WG] OAuth Signature Draft Pre 00 I'm a bit confused between the relationship of Nat's I

[OAUTH-WG] What's the use case for signing OAuth 2.0 requests?

2010-09-24 Thread Yaron Goland
My understanding of Eran's article (http://hueniverse.com/2010/09/oauth-2-0-without-signatures-is-bad-for-the-web/) is that Eran believes that bearer tokens are not good enough as a security mechanism because they allow for replay attacks in discovery style scenarios. He then, if I understood t

Re: [OAUTH-WG] Proposed language for section 2.2 on Client Assertions

2010-08-09 Thread Yaron Goland
So how do we resolve if the language goes into the spec? Thanks, Yaron > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Eran Hammer-Lahav > Sent: Tuesday, July 27, 2010 8:36 AM > To: Brian Campbell; oauth > Subject:

[OAUTH-WG] Proposed language for section 2.2 on Client Assertions

2010-07-26 Thread Yaron Goland
The following is proposed language for inclusion in the spec as section 2.2. I would like to thank Brian Campbell, Brain Eaton, Chuck Mortimore, Dirk Balfanz, Eric Sachs, Justin Smith and Marius Scurtescu for taking the time to review and improve this proposal. Please note that the named folks c

Re: [OAUTH-WG] What to do about 'realm'

2010-07-16 Thread Yaron Goland
ntent in a HTTP header is to use some form of ASCII encoding. So, for example, we couldn't use UTF-16 because it produces characters that aren't safe in ASCII. > -Original Message- > From: Robert Sayre [mailto:say...@gmail.com] > Sent: Tuesday, July 13, 2010 4:01 PM > To:

Re: [OAUTH-WG] What to do about 'realm'

2010-07-13 Thread Yaron Goland
As defined in section 4.2 of RFC 2616 the only characters legally allowed in a HTTP header are a fairly small subset of ASCII. So if we want to shove in Unicode characters they will have to be encoded in a form that only uses characters that are legal in the subset of ASCII supported by HTTP. >

[OAUTH-WG] Versioning and namespaces

2010-07-08 Thread Yaron Goland
In regards to the discussion of versioning and namespaces I would suggest we follow RFC 3864. If someone wants to add an extension to OAuth then they can either write an RFC or they can use the lightweight review mechanism similar to the one RFC 3864 introduced. Just a thought,

Re: [OAUTH-WG] POLL: Are you going to Maastricht?

2010-07-08 Thread Yaron Goland
D From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of David Recordon Sent: Thursday, July 08, 2010 9:29 AM To: OAuth WG Subject: [OAUTH-WG] POLL: Are you going to Maastricht? I'm honestly trying to decide myself and a few other people are in similar situations. Thus a poll

Re: [OAUTH-WG] assertion profile changes

2010-07-08 Thread Yaron Goland
Here is what I think happened. In OAuth WRAP section 5.2.3 the wrap_assertion and wrap_assertion_format arguments were used to allow clients to authenticate themselves to token endpoints in two legged OAuth scenarios. In OAuth 2.0 two legged OAuth as a separate definition was removed and instea

[OAUTH-WG] The meaning of scope

2010-07-08 Thread Yaron Goland
Today the definition of scope is vague. But I have seen mails on this list (such as Lukas Rosenstock's post http://www.ietf.org/mail-archive/web/oauth/current/msg03560.html which is just one example) that assert that scope represents the permissions that a client is requesting. When we use sco

Re: [OAUTH-WG] Proposal for text for section 2

2010-07-06 Thread Yaron Goland
Message- > From: Manger, James H [mailto:james.h.man...@team.telstra.com] > Sent: Wednesday, June 30, 2010 9:18 PM > To: Yaron Goland; oauth@ietf.org > Subject: RE: Proposal for text for section 2 > > Yaron, > > > how can you ding client assertions credentials fo

Re: [OAUTH-WG] Proposal for text for section 2

2010-06-30 Thread Yaron Goland
oving this kind of stuff in the request body. What do you think? Yaron > -Original Message- > From: Manger, James H [mailto:james.h.man...@team.telstra.com] > Sent: Tuesday, June 29, 2010 7:30 PM > To: Yaron Goland; oauth@ietf.org > Subject: RE: P

Re: [OAUTH-WG] Client credentials type

2010-06-30 Thread Yaron Goland
Oh and don't forget fun things like including the full cert chain which after encoding also bloats to amazing heights. > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Yaron Goland > Sent: Wednesday, June 30, 2010 5:39

Re: [OAUTH-WG] Client credentials type

2010-06-30 Thread Yaron Goland
Or just a bit of XML signatures and encryption. The byte bloat is astounding. Yaron > -Original Message- > From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] > Sent: Tuesday, June 29, 2010 11:49 PM > To: Yaron Goland > Cc: Marius Scurtescu;

Re: [OAUTH-WG] How do we deal with unrecognized elements in requests and responses?

2010-06-29 Thread Yaron Goland
be missing). EHL From: David Recordon [mailto:record...@gmail.com] Sent: Monday, June 28, 2010 6:11 PM To: Eran Hammer-Lahav Cc: Yaron Goland; OAuth WG (oauth@ietf.org) Subject: Re: [OAUTH-WG] How do we deal with unrecognized elements in requests and responses? For #2, if an extension defines r

Re: [OAUTH-WG] OAuth discovery draft?

2010-06-29 Thread Yaron Goland
This then goes back to one of my original posts which is - Is www-authenticate legal on a non-401 response? I honestly don't know. From: William Mills [mailto:wmi...@yahoo-inc.com] Sent: Monday, June 28, 2010 3:30 PM To: Yaron Goland; Torsten Lodderstedt Cc: OAuth WG Subject: RE: [OAU

Re: [OAUTH-WG] Proposal for text for section 2

2010-06-29 Thread Yaron Goland
assertions. We are thus, as a practical matter, forced into using the request body. From: Manger, James H [mailto:james.h.man...@team.telstra.com] Sent: Monday, June 28, 2010 9:38 PM To: Yaron Goland; oauth@ietf.org Subject: RE: Proposal for text for section 2 Yaron, "Assertion Client Credentials&qu

Re: [OAUTH-WG] Client credentials type

2010-06-28 Thread Yaron Goland
l of the API. Moreover, authorization headers very well work > >> together with status code 401 and WWW-Authenticate headers. Using > >> WWW-Authenticate headers, an authz server can easily signal what > >> mechanisms (multiple WWW-Authenticate headers are allowed in a single &g

Re: [OAUTH-WG] What to do about 'realm'

2010-06-28 Thread Yaron Goland
+1 (for #3->#4) From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Torsten Lodderstedt Sent: Monday, June 28, 2010 11:08 AM To: Dick Hardt Cc: OAuth WG (oauth@ietf.org) Subject: Re: [OAUTH-WG] What to do about 'realm' +1 Am 28.06.2010 07:37, schrieb Dick Hardt: I vote for

Re: [OAUTH-WG] OAuth discovery draft?

2010-06-28 Thread Yaron Goland
OPTIONS. Thoughts? Yaron From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] Sent: Friday, June 25, 2010 11:09 PM To: Yaron Goland Cc: Eran Hammer-Lahav; James Manger; OAuth WG Subject: Re: [OAUTH-WG] OAuth discovery draft? I think it should

[OAUTH-WG] How do we deal with unrecognized elements in requests and responses?

2010-06-28 Thread Yaron Goland
In a private thread with Eran an issue came up regarding how to handle unrecognized arguments in OAuth requests and responses. For example, if a token endpoint receives an access token request that contains both a client_id and a client_foo_bar argument, what should it do? Should it reject the

Re: [OAUTH-WG] Proposal for text for section 2

2010-06-28 Thread Yaron Goland
ardless whether the credentials are identical or valid, the server MUST reply with an HTTP 400 status code (Bad Request) and include the "multiple_credentials" error code. From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] Sent: Friday, June 25, 2010 11:31 AM To: Yaron Goland; oau

[OAUTH-WG] Proposal for text for section 2

2010-06-25 Thread Yaron Goland
rror code. From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] Sent: Friday, June 25, 2010 11:31 AM To: Yaron Goland; oauth@ietf.org Subject: RE: Clients authenticating with assertions We never had support for two assertions in one request. The client authenticates itself and can include an

Re: [OAUTH-WG] How do autonomous clients asks for access tokens?

2010-06-25 Thread Yaron Goland
Sorry. I screwed up. I somehow missed "none" as an option. From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] Sent: Friday, June 25, 2010 11:20 AM To: Yaron Goland Cc: OAuth WG (oauth@ietf.org) Subject: RE: How do autonomous clients asks for access tokens? The access grants do not co

Re: [OAUTH-WG] OAuth discovery draft?

2010-06-25 Thread Yaron Goland
ardjono [mailto:hardj...@mit.edu] > Sent: Wednesday, June 23, 2010 11:40 AM > To: Yaron Goland; OAuth WG (oauth@ietf.org) > Subject: RE: OAuth discovery draft? > > > Hi Yaron, > > I think delegation is a great idea/feature that should be added or OAuth (as I > sugge

[OAUTH-WG] Clients authenticating with assertions

2010-06-25 Thread Yaron Goland
If a client wants to authenticate itself to a token endpoint to get an access token using an assertion how should it do it? Grant_Type = assertion doesn't seem right because that assertion should be from the resource owner who delegated the permission, not from the client, right? In other words

[OAUTH-WG] How do autonomous clients asks for access tokens?

2010-06-25 Thread Yaron Goland
Section 1.4.4 says that autonomous clients can get access tokens. But how? What grant_type should they use? Thanks, Yaron P.S. I looked for a grant_type of autonomous but I didn't see it in -08. Sorry if I missed it.

Re: [OAUTH-WG] OAuth discovery draft?

2010-06-23 Thread Yaron Goland
Thanks, Yaron From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] Sent: Wednesday, June 23, 2010 11:04 AM To: Yaron Goland; James Manger; OAuth WG Subject: Re: OAuth discovery draft? I think the core work is pretty stable now, unlike the discovery bits which (while simpl

Re: [OAUTH-WG] OAuth discovery draft?

2010-06-23 Thread Yaron Goland
I've been noodling [1] a lot about full delegation in OAuth [2] and one of the issues that came out of that was the need for discovering both the location and realm of an endpoint's token server. But at least for my use cases (which consist of walking up to a service and making an options reques

Re: [OAUTH-WG] Questions about sections 3.2/3.3

2010-06-10 Thread Yaron Goland
ginal Message- > From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] > Sent: Tuesday, June 08, 2010 3:11 PM > To: Yaron Goland; oauth@ietf.org > Subject: RE: Questions about sections 3.2/3.3 > > > > > -Original Message- > > From: oauth-boun...@ietf.org [m

Re: [OAUTH-WG] Questions about sections 3.2/3.3

2010-05-26 Thread Yaron Goland
Since there was no response to this mail may I assume it went to /dev/null? From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Yaron Goland Sent: Thursday, May 20, 2010 12:20 PM To: oauth@ietf.org Subject: [OAUTH-WG] Questions about sections 3.2/3.3 I was reading through

[OAUTH-WG] Questions about sections 3.2/3.3

2010-05-20 Thread Yaron Goland
I was reading through the spec and had some questions about 3.2 and 3.3 that I list below. Thanks, Yaron Section 3.2/3.3 - Handling requests without supported transport layer security Although optional in section 3.2 and mandatory in section 3.3 bot

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-17 Thread Yaron Goland
; Or I guess you can make it so OAuth is only for JSON APIs because JSON is the > future. Though I seem to remember that being said about XML not long ago. > Maybe I'm getting old. I guess I shouldn't use RSS and Atom feeds because > they are so last year. > > I'm for option C

Re: [OAUTH-WG] in-app logout?

2010-05-17 Thread Yaron Goland
Note that in some very popular browsers and some proxies the maximum safe URL size is more like 2k. > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Dick Hardt > Sent: Sunday, May 16, 2010 5:27 PM > To: Manger, James H > Cc: OAuth WG (oaut

Re: [OAUTH-WG] sites with wildcard

2010-05-13 Thread Yaron Goland
't require discovery, user interaction or a change to the existing protocol. Yaron > -Original Message- > From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] > Sent: Tuesday, May 11, 2010 4:36 PM > To: Yaron Goland; Manger, James H; OAuth WG (oauth@ietf.org

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Yaron Goland
iginal Message- > From: Eran Hammer-Lahav [mailto:e...@hueniverse.com] > Sent: Tuesday, May 11, 2010 4:37 PM > To: Yaron Goland; Torsten Lodderstedt > Cc: OAuth WG (oauth@ietf.org) > Subject: RE: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13) > > No one

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-13 Thread Yaron Goland
(weak or otherwise) exists for C. Could you please explain your reasoning? Thanks, Yaron Vivek Khurana - A or B but not C Yaron Goland - A then B but not C David Waite - A or B but doesn't like C Mike Moore - A (but not C) Dick Hardt - B James H Manger - B Torsten

Re: [OAUTH-WG] sites with wildcard

2010-05-11 Thread Yaron Goland
, Yaron From: Manger, James H [mailto:james.h.man...@team.telstra.com] Sent: Monday, May 10, 2010 5:31 PM To: Yaron Goland; OAuth WG (oauth@ietf.org) Subject: RE: sites with wildcard Yaron, > I don’t understand the scenario that requires this feature. When d

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-11 Thread Yaron Goland
submitted. Yaron > -Original Message- > From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] > Sent: Monday, May 10, 2010 10:47 PM > To: Yaron Goland > Cc: Eran Hammer-Lahav; OAuth WG (oauth@ietf.org) > Subject: Re: [OAUTH-WG] Open Issues: Group Surv

Re: [OAUTH-WG] sites with wildcard

2010-05-11 Thread Yaron Goland
Limited views on what a protocol is far tend to produce protocols that are actually interoperable. We should strive to do as little as possible in the standard and make sure we do a great job leaving the door open to later extensions. > -Original Message- > From: oauth-boun...@ietf.org

Re: [OAUTH-WG] sites with wildcard

2010-05-10 Thread Yaron Goland
+1 > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Brian Eaton > Sent: Monday, May 10, 2010 4:11 PM > To: Manger, James H > Cc: OAuth WG (oauth@ietf.org) > Subject: Re: [OAUTH-WG] sites with wildcard > > On Mon, May 10, 2010 at 7:32 AM, M

Re: [OAUTH-WG] sites with wildcard

2010-05-10 Thread Yaron Goland
I don’t understand the scenario that requires this feature. When does someone ask for a token without knowing where it is going? From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Manger, James H Sent: Monday, May 10, 2010 7:33 AM To: OAuth WG (oauth@ietf.org) Subject: [OA

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-10 Thread Yaron Goland
ller group but with > stronger feelings on the subject that JSON adds complexity with no obvious > value. > > A. Form-encoded only (original draft) > B. JSON only (current draft) > C. JSON as default with form-encoded and XML available with an optional > request parameter > [Yaron G

Re: [OAUTH-WG] application/x-www-form-urlencoded Counterproposal

2010-05-07 Thread Yaron Goland
+1 From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Mike Moore Sent: Friday, May 07, 2010 8:06 AM To: OAuth WG Subject: [OAUTH-WG] application/x-www-form-urlencoded Counterproposal I propose alter the spec so that the token responses are encoded with application/x-www-f

Re: [OAUTH-WG] application/x-www-form-urlencoded vs JSON (Proposal)

2010-05-07 Thread Yaron Goland
Every format we add increases the probability of failing to interoperate. I believe as a working group we need to specify exactly one format and only one format. That doesn't preclude later extensions that support more formats but if our goal is interoperability then the fewer options the more

Re: [OAUTH-WG] application/x-www-form-urlencoded vs JSON (Proposal)

2010-04-30 Thread Yaron Goland
AUTH-WG] application/x-www-form-urlencoded vs JSON > (Proposal) > > > Zitat von Brian Eaton : > > > On Thu, Apr 29, 2010 at 2:40 PM, Mike Moore > wrote: > >> On Thu, Apr 29, 2010 at 2:49 PM, Yaron Goland > wrote: > >>> > >>> Can we p

Re: [OAUTH-WG] application/x-www-form-urlencoded vs JSON (Proposal)

2010-04-29 Thread Yaron Goland
Can we please just have one format, not 3? The more choices we give the more interoperability suffers. > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Torsten Lodderstedt > Sent: Thursday, April 29, 2010 12:46 PM > To: Robert Sayre > Cc: