[OAUTH-WG] Fwd: New Non-WG Mailing List: web-bot-auth

2025-03-17 Thread Mark Nottingham
ussion of use cases, requirements, and proposed solutions for > authenticating non-human users ("bots") to Web sites intended for humans > ("normal" Web sites). This is a follow-on from a side meeting at IETF 122. > > This list belongs to IETF area: WIT > > For additio

[OAUTH-WG] Re: [IANA #1372073] expert review for draft-ietf-oauth-resource-metadata (well-known-uris)

2024-08-14 Thread Mark Nottingham
Hi David, That looks fine to me. Cheers, > On 14 Aug 2024, at 7:14 AM, David Dong via RT > wrote: > > Dear Mark (cc: oauth WG), > > As the designated expert for the Well-Known URIs registry, can you review the > proposed registration in draft-ietf-oauth-resource-metad

Re: [OAUTH-WG] Httpdir telechat review of draft-ietf-oauth-step-up-authn-challenge-13

2023-04-05 Thread Mark Nottingham
___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

[OAUTH-WG] Httpdir telechat review of draft-ietf-oauth-step-up-authn-challenge-13

2023-04-04 Thread Mark Nottingham via Datatracker
Reviewer: Mark Nottingham Review result: Not Ready # HTTPDIR review of drat-ietf-oauth-step-up-authn-challenge-13 I am an assigned HTTP directorate reviewer for draft-ietf-masque-connect-ip. These comments were written primarily for the benefit of the ART Area Directors. Document editors and

Re: [OAUTH-WG] [IANA #1264432] expert review for draft-ietf-oauth-dpop (http-fields)

2023-03-08 Thread Mark Nottingham
I thought we already had; if not, approved. Cheers, > On 9 Mar 2023, at 12:32 pm, Mike Jones > wrote: > > Hi Mark, > We’ve published > https://www.ietf.org/archive/id/draft-ietf-oauth-dpop-14.html, which > incorporates the PR. Could you please approve IANA reg

Re: [OAUTH-WG] [IANA #1264432] expert review for draft-ietf-oauth-dpop (http-fields)

2023-03-07 Thread Mark Nottingham
Hi Mike, Thanks. I left a comment on the PR, suggesting two small tweaks. Cheers, > On 8 Mar 2023, at 2:33 pm, Mike Jones > wrote: > > Hi Mark, > > I've created the pull request > https://github.com/danielfett/draft-dpop/pull/180 to incorporate your > sugge

Re: [OAUTH-WG] [IANA #1264432] expert review for draft-ietf-oauth-dpop (http-fields)

2023-02-08 Thread Mark Nottingham
Feb 2023, at 6:12 am, David Dong via RT > wrote: > > Dear Mark / Roy, > > We see that this document has been updated; could you please let us know if > this is OK or if you have further comments? > > Thank you. > > https://datatracker.ietf.org/doc/draft-ietf-oau

Re: [OAUTH-WG] [IANA #1264432] expert review for draft-ietf-oauth-dpop (http-fields)

2023-01-22 Thread Mark Nottingham
Hi Brian, > On 21 Jan 2023, at 5:46 am, Brian Campbell > wrote: > > > Hi Mark, > > Thanks for the review and feedback. I am aware of HTTP Structured Fields and > certainly see value in it - even using it in some other work in which I'm > involved. However,

Re: [OAUTH-WG] [IANA #1264432] expert review for draft-ietf-oauth-dpop (http-fields)

2023-01-19 Thread Mark Nottingham
st be a letter. Is that always the case for a JWT? If not, two other options: - It could be conveyed as a String (surround with ") - The three components could be decomposed and each conveyed separately Cheers, -- Mark Nottingham https://www.mnot.net/

Re: [OAUTH-WG] [IANA #1264432] expert review for draft-ietf-oauth-dpop (http-fields)

2023-01-18 Thread Mark Nottingham
efining new HTTP fields. - The long line-wrapped example in Section 4.1 would benefit from RFC8792 encoding. In HTTP, a line-wrapped field like the one shown has whitespace inserted between each line, which is problematic here. Cheers, > On 19 Jan 2023, at 5:30 am, David Dong via RT

Re: [OAUTH-WG] .well-known/jwks.json and constrained-voucher and RFC7517

2022-07-12 Thread Mark Nottingham
Hi, Could you take me off the cc please? Thanks. Sent from my iPhone > On 13 Jul 2022, at 4:18 pm, Neil Madden wrote: > >  >> On 12 Jul 2022, at 20:26, Michael Richardson wrote: >> >>  >> EXEC-SUM: /.well-known/jwks.json seems in use, but not registered >> with IANA. I don't kno

[OAUTH-WG] Building Real Internet Platforms

2021-02-23 Thread Mark Nottingham
le to nobody. In neither case are > the people with power accountable to end users because they are not even > customers, they are the product. > > What I am interested in is the extent to which Internet technologies are > Technologies of Freedom. The question we need to ask ourselve

Re: [OAUTH-WG] Diversity and Inclusiveness in the IETF

2021-02-23 Thread Mark Nottingham
AB a few times, but we haven't made much progress. Cheers, -- Mark Nottingham https://www.mnot.net/ ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] security considerations for draft-ietf-oauth-mtls-12

2018-11-01 Thread John-Mark Gurney
LS 1.3. Also, >> > I'd note that we're well past WGCL for this document. But, with that said, >> > I suppose adding some privacy considerations text on the subject is >> > worthwhile. Would you propose some text for the WG to consider, John-Mark? >>

Re: [OAUTH-WG] security considerations for draft-ietf-oauth-mtls-12

2018-11-01 Thread John-Mark Gurney
1.2 > (and prior) and a noted difference of the new features in TLS 1.3. Also, I'd > note that we're well past WGCL for this document. But, with that said, I > suppose adding some privacy considerations text on the subject is worthwhile. > Would you propose some text

[OAUTH-WG] security considerations for draft-ietf-oauth-mtls-12

2018-10-31 Thread John-Mark Gurney
track users. I recently posted a blog entry about this: https://blog.funkthat.com/2018/10/tls-client-authentication-leaks-user.html Thanks. John-Mark Gurney ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Call for adoption of "JWT Response for OAuth Token Introspection"

2018-07-20 Thread Mark Dobrinic
I +1 this, but at the same time, I'm wondering what happened with the argument that this should be solved by Token Exchange instead of Introspect? Cheers! Mark On 20/07/18 17:39, Phil Hunt wrote: > +1 adoption > > I have always been concerned about clients doing introspection

Re: [OAUTH-WG] Token Introspection and JWTs

2018-02-28 Thread Mark Dobrinic
be as a property for dynamically registered clients?) but we haven't felt the urge to take that plunge just yet. If we are be missing out on some insights there, I'd love to hear more on that. And thanks for those compliments, I'll pass them on my colleague who wrote that! Cheers,

Re: [OAUTH-WG] Token Introspection and JWTs

2018-02-28 Thread Mark Dobrinic
Having the introspect endpoint support a response Content-Type of `application/jwt` is exactly what we're doing in Curity. We actually gave it a cool name in the process, a Phantom Token ;) Doing things this way has proven highly useful in usecases where customers have high throughput requirements

[OAUTH-WG] " Help" unsubscribe

2016-02-18 Thread mark
Please remove/unsubscribe this email address. Thanks Mark Warwick Rock Solid Imports 1700 Quincy Ave Suite #102 Naperville, IL 60540 630-532-2622 www.rocksolidimports.com - Original Message - Subject: OAuth Digest, Vol 88, Issue 81 From: oauth-requ...@ietf.org Date

[OAUTH-WG] client_id format: whitespaces allowed?

2015-10-13 Thread Mark Dobrinic
your insights, Mark ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Confirmation: Call for Adoption of "OAuth Token Introspection" as an OAuth Working Group Item

2014-07-29 Thread Mark Dobrinic
eturn a token's info. Cheers! Mark On 29/07/14 03:23, Justin Richer wrote: > I think this perspective has a lot to do with your idea of OAuth's > deployment model. You're right in that many people bundle the RS and the > AS very tightly, but that's not alway

Re: [OAUTH-WG] WGLC for draft-ietf-oauth-revocation-03

2012-12-30 Thread Mark Wubben
> > Thoughts? That works for my use case I think, assuming "authorization" doesn't specifically mean "access grant" but whatever the AS takes it to mean. -- Mark Wubben http://novemberborn.net http://twitter.com/novemberborn ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] WGLC for draft-ietf-oauth-revocation-03

2012-12-30 Thread Mark Wubben
to be revoked while device B keeps working. The user could also remove the app from device A and then re-install it, which leaves the old access grant intact and not revoked. That may be solved by tying authorizations to specific devices, which OAuth currently does not cover. I'm al

Re: [OAUTH-WG] WGLC for draft-ietf-oauth-revocation-03

2012-12-02 Thread Mark Wubben
last call for draft-ietf-oauth-revocation-03 on > "Token Revocation". The draft is available here: > http://tools.ietf.org/html/draft-ietf-oauth-revocation-03 > > Please send you comments to the OAuth mailing list by December 10, 2012. > > Thanks, > Hannes

Re: [OAUTH-WG] FYI - Text resolving DISCUSS issue about Bearer URI Query Parameter method

2012-05-23 Thread Mark Nottingham
ly ask the list. > > EH > > >> -Original Message- >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf >> Of Mike Jones >> Sent: Wednesday, May 23, 2012 11:49 PM >> To: Julian Reschke >> Cc: Mark Nottingham; oauth@ietf.org &g

Re: [OAUTH-WG] FYI - Text resolving DISCUSS issue about Bearer URI Query Parameter method

2012-05-23 Thread Mark Nottingham
s, Julian > > Hi, it would be awesome to see feedback on this (it has been mentioned during > IETF LC multiple times). > > > Best regards, Julian > ___ > OAuth mailing list > OAuth@ie

Re: [OAUTH-WG] Shepherd review of draft-ietf-oauth-v2-threatmodel

2012-04-25 Thread Mark Mcgloin
this email list If everyone could avoid replying to this thread, we can resolve our differences with the smaller mail group thanks Mark oauth-boun...@ietf.org wrote on 24/04/2012 19:05:55: > From: > > Eran Hammer > > To: > > Peter Saint-Andre > > Cc: > > "o

Re: [OAUTH-WG] Shepherd review of draft-ietf-oauth-v2-threatmodel

2012-04-24 Thread Mark Mcgloin
Michael Thomas wrote on 24/04/2012 14:24:47: > > Re: [OAUTH-WG] Shepherd review of draft-ietf-oauth-v2-threatmodel > > On 04/24/2012 01:17 AM, Mark Mcgloin wrote: > > Hi Thomas > > > > Your additional text is already covered in a countermeasure for section &g

Re: [OAUTH-WG] Shepherd review of draft-ietf-oauth-v2-threatmodel

2012-04-24 Thread Mark Mcgloin
Hi Thomas Your additional text is already covered in a countermeasure for section 4.1.4. In addition, section 4.1.4.4 states the assumption that the auth server can't protect against a user installing a malicious client Regards Mark oauth-boun...@ietf.org wrote on 23/04/2012 17:09:11: &

Re: [OAUTH-WG] [apps-discuss] Apps Area review of draft-ietf-oauth-v2-threatmodel-01

2012-02-22 Thread Mark Mcgloin
Hi Peter The core oauth spec states that TLS MUST be used wherever tokens or passwords are being transmitted, except for the redirection_url but it does recommend it use TLS in section 3.1.2.1 and explicitly states why. Regards Mark oauth-boun...@ietf.org wrote on 22/02/2012 01:34:08: > F

Re: [OAUTH-WG] Last Call: (The OAuth 2.0 Authorization Protocol: Bearer Tokens) to Proposed Standard

2012-01-24 Thread Mark Nottingham
> protected from disclosure in storage and in transport. > > > > > The file can be obtained via > http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-bearer/ > > IESG discussion can be tracked via > http://datatracker.ietf.org/doc/dra

Re: [OAUTH-WG] Phishing with Client Application Name Spoofing

2012-01-17 Thread Mark Mcgloin
lient application handles user authentication in an appropriate way Regards Mark André DeMarre wrote on 16/01/2012 23:20:02: > > To: > > Eran Hammer 16/01/2012 23:22 > > > Re: [OAUTH-WG] Phishing with Client Application Name Spoofing > > Eran, > > Yes; I

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-16 Thread Mark Mcgloin
those will be applicable to all developers Regards Mark William Mills wrote on 05/01/2012 16:29:02: > > Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011 > > There's going to be a whole class of apps tat will be in violation > of "Client applicati

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread Mark Mcgloin
Why do you think this William? Apple does it? Google android market had to pull 30 apps recently because they contained malware. There are automated tools that will do some sanity checks on apps and it is only advice, i.e. 'could' Mark > William Mills > > " o Clie

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-05 Thread Mark Mcgloin
that the client application handles user authentication in an appropriate way 3. Client developers should not write client applications that collect authentication information directly from users and should instead delegate this task to a trusted system component, e.g. the system-browser. Regards M

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-04 Thread Mark Mcgloin
Hi Michael I have asked you to clearly describe the threat, not the mitigation. It obviously was either not clear or convincing the first time and I am not going to start digging through emails when you clearly understand it. Regards Mark Michael Thomas wrote on 04/01/2012 20:05:21: > F

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2012-01-04 Thread Mark Mcgloin
Hi Michael Can you clearly word the threat for which this countermeasure (or lack of) applies thanks Mark Michael Thomas wrote on 03/01/2012 23:52:54: > From: > > Michael Thomas > > To: > > Phillip Hunt > > Cc: > > Mark Mcgloin/Ireland/IBM@IBMIE, Barry Le

Re: [OAUTH-WG] OK to post OAuth Bearer draft 15?

2011-12-24 Thread Mark Nottingham
Hi Mike, On 18/12/2011, at 8:00 PM, Mike Jones wrote: > Thanks for your comments, Mark. Here are my thoughts on the issues that you > see as being outstanding. I'd also welcome additional input from the working > group on these topics: > > ON THE URI QUERY PARAMETER M

Re: [OAUTH-WG] Phishing with Client Application Name Spoofing

2011-12-16 Thread Mark Mcgloin
lient Registration of phishing clients". It kind of reminds me of the issues android market place has seen recently with malware apps due to no vetting of those apps. It is touched upon in the oauth 2 rfc: http://tools.ietf.org/html/draft-ietf-oauth-v2-22#section-2 Regards Mark On 3 Nov 2011 17:09:

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2011-12-16 Thread Mark Mcgloin
changes. Clearly worded means concise, technically accurate and devoid of alarmist phrases and words used out of context, such as existential. Can I suggest you review with a colleague before posting here. Regards Mark oauth-boun...@ietf.org wrote on 15/12/2011 18:15:45: > From: > > Micha

Re: [OAUTH-WG] WGLC on draft-ietf-oauth-v2-threatmodel-01, ends 9 Dec 2011

2011-12-15 Thread Mark Mcgloin
Thanks Barry - I just responded to that thread. We will not be making any changes to the threat model based on that comment Regards Mark oauth-boun...@ietf.org wrote on 15/12/2011 14:30:02: > From: > > Barry Leiba > > To: > > oauth WG > > Date: > > 15/12/2011

Re: [OAUTH-WG] client embedded browsers (was: I-D Action: draft-ietf-oauth-v2-threatmodel-01.txt)

2011-12-15 Thread Mark Mcgloin
ed on that consensus, I would consider this issue closed and we will not be making any changes to the threat model Regards Mark McGloin On Wed, 26 Oct 2011 13:17:58 , "Michael Thomas" wrote: First, I think that this threat should be elevated to something more than a threat because it

Re: [OAUTH-WG] OK to post OAuth Bearer draft 15?

2011-12-14 Thread Mark Nottingham
, see some specifics below. Regards, On 15/12/2011, at 1:13 PM, Mike Jones wrote: > Mark, Stephen, Hannes, and Barry, > > Any objections to posting the updated Bearer draft incorporating the results > of the APPS Area review an

Re: [OAUTH-WG] [apps-discuss] HTTP MAC Authentication Scheme

2011-11-20 Thread Mark Nottingham
It sounds like it's specifying *almost* the same thing, but in a different way. Why is there friction? Is it fashion, NIH or something more substantial? Cheers, On 20/11/2011, at 4:08 AM, Eran Hammer-Lahav wrote: > > >> -Original Message----- >> From: Ma

Re: [OAUTH-WG] Proposed resolution for issue 26

2011-10-04 Thread Mark Lentczner
nable multiple different encodings, nor multiple encodings with a single header. Further, I wonder how widespread support for it is in various HTTP frameworks. - Mark ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Draft 16 Security Considerations additions

2011-07-06 Thread Mark Mcgloin
eorigin, which will block any framing or framing by sites with a different origin, respectively. For older browsers, javascript framebusting techniques can be used but may not be effective in all browsers. Regards Eran Hammer-Lahav wrote on 04/07/2011 20:02:02: > From: > > Eran Hamm

Re: [OAUTH-WG] Native Application Text

2011-07-01 Thread Mark Mcgloin
This assumes we support the authorization code grant type without client authentication. See http://www.ietf.org/mail-archive/web/oauth/current/msg06816.html and many other contributions on the same topic Regards Mark oauth-boun...@ietf.org wrote on 29/06/2011 02:15:10: > From: > >

Re: [OAUTH-WG] Draft 16 comment

2011-06-28 Thread Mark Mcgloin
#x27;s redirect-uri, would that suffice? Regards Mark oauth-boun...@ietf.org wrote on 23/05/2011 05:40:22: > From: > > Shane B Weeden > > To: > > oauth@ietf.org > > Date: > > 23/05/2011 06:26 > > Subject: > > [OAUTH-WG] Draft 16 comment > > S

Re: [OAUTH-WG] [apps-discuss] [http-state] HTTP MAC Authentication Scheme

2011-06-07 Thread Mark Nottingham
___ > apps-discuss mailing list > apps-disc...@ietf.org > https://www.ietf.org/mailman/listinfo/apps-discuss -- Mark Nottingham http://www.mnot.net/ ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] [apps-discuss] HTTP MAC Authentication Scheme

2011-06-02 Thread Mark Nottingham
On 03/06/2011, at 1:44 AM, Eran Hammer-Lahav wrote: > > >> -Original Message----- >> From: Mark Nottingham [mailto:m...@mnot.net] >> Sent: Wednesday, June 01, 2011 5:16 PM >> To: Eran Hammer-Lahav >> Cc: apps-disc...@ietf.org; Ben Adida; http-st...@i

Re: [OAUTH-WG] [apps-discuss] HTTP MAC Authentication Scheme

2011-06-01 Thread Mark Nottingham
am has put into limiting the use of sniffing. Cheers, -- Mark Nottingham http://www.mnot.net/ ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Draft 16 Security Considerations additions

2011-06-01 Thread Mark Mcgloin
whereby HTTP requests are transmitted from a user that the website trusts or has authenticated _(e.g., via HTTP redirects or HTML forms)_. CSRF attacks on OAuth approvals can allow an attacker to obtain authorization to OAuth Protected Resources without the consent of the User. Regards Mark

Re: [OAUTH-WG] Draft 16 Security Considerations additions

2011-06-01 Thread Mark Mcgloin
the client which MUST then validate the state parameter matches on the response. Regards Mark Torsten Lodderstedt wrote on 01/06/2011 09:11:31: > From: > > Torsten Lodderstedt > > To: > > Mark Mcgloin/Ireland/IBM@IBMIE > > Cc: > > oauth@ietf.org > > Date: &

Re: [OAUTH-WG] [apps-discuss] HTTP MAC Authentication Scheme

2011-05-31 Thread Mark Nottingham
y appreciated. > > EHL > ___ > apps-discuss mailing list > apps-disc...@ietf.org > https://www.ietf.org/mailman/listinfo/apps-discuss -- Mark Nottingham http://www.mnot.net/ ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

[OAUTH-WG] Draft 16 Security Considerations additions

2011-05-31 Thread Mark Mcgloin
amebusting techniques can be used but may not be effective in all browsers. Regards Mark ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Formal security protocol analysis of OAuth 2.0

2011-05-16 Thread Mark Mcgloin
Hi Igor, I will pass on your comments Regards Mark Igor Faynberg wrote on 16/05/2011 09:45:23: > Igor Faynberg > 16/05/2011 09:45 > > Please respond to > igor.faynb...@alcatel-lucent.com > > To > > Mark Mcgloin/Ireland/IBM@IBMIE > > cc > > fcore...

Re: [OAUTH-WG] Formal security protocol analysis of OAuth 2.0

2011-05-16 Thread Mark Mcgloin
Hi Igor, comments Inline below Igor Faynberg wrote on 16/05/2011 09:02:25: > Igor Faynberg > 16/05/2011 09:02 > > Please respond to > igor.faynb...@alcatel-lucent.com > > To > > Mark Mcgloin/Ireland/IBM@IBMIE > > cc > > oauth@ietf.org > > Subjec

Re: [OAUTH-WG] Formal security protocol analysis of OAuth 2.0

2011-05-14 Thread Mark Mcgloin
/papers/B0D33665257DD3A0852576410043BCDD/$File/rc24856.pdf Regards Mark Francisco Corella wrote on 13/05/2011 17:58:01: > Francisco Corella > 13/05/2011 17:58 > > Please respond to > fcore...@pomcor.com > > To > > oauth@ietf.org, Mark Mcgloin/Ireland/IBM@IBMI

[OAUTH-WG] Formal security protocol analysis of OAuth 2.0

2011-05-13 Thread Mark Mcgloin
Does anyone know of a formal security protocol analysis that has been carried out for OAuth 2.0? I could only find analysis done against 1.0a, like this one: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5762765 thanks Mark ___ O

Re: [OAUTH-WG] BCP for returning HTTP Authentication (2617) Error Status (questions from the OAuth WG)

2011-05-11 Thread Mark Nottingham
if it's part of a bigger spec, it's inseparable. > If you answered no to #1: > > 4. Should the Bearer draft retain the attribute and registry for its own > scheme-specific needs? Not sure how that's relevant here... Cheers, -- Mark Nottingham http://www.mnot.net/ ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Authorization code security issue (reframed)

2011-04-01 Thread Mark Mcgloin
h mandates the use of TLS. This won't break anyone using the current grant type = 'code' and providers can choose which to support. Mark oauth-boun...@ietf.org wrote on 01/04/2011 01:09:46: > Eran Hammer-Lahav > Sent by: oauth-boun...@ietf.org > > 01/04/2011 01:09 &g

Re: [OAUTH-WG] OAuth without HTTP redirects

2011-04-01 Thread Mark Mcgloin
Hi Marius, Can you provide very high level details on what that approach is? thanks Mark oauth-boun...@ietf.org wrote on 01/04/2011 02:34:56: > Marius Scurtescu > Sent by: oauth-boun...@ietf.org > > 01/04/2011 02:34 > > To > > Greg Brockman > > cc > &g

Re: [OAUTH-WG] Security Considerations Section Proposal

2011-03-31 Thread Mark Mcgloin
sent over TLS is still being debated wrt redirect_uri 2.12. Authenticity of endpoints I think I must be missing some subtleties of the statements in this section as I don't understand. Is it just stating that both must be capable of supporting TLS? Mark McGloin Torsten Lodderstedt wro

Re: [OAUTH-WG] Authors, Contributors, Acknowledgement

2011-03-28 Thread Mark Mcgloin
Eran, you are right about the plan. We have already had a couple of iterations of distilling the separate document down into a security considerations section for inclusion in the spec and will complete if based on feedback Torsten received this week at IETF-80. I am unable to attend Mark

Re: [OAUTH-WG] draft-ietf-oauth-v2-13 comments

2011-03-24 Thread Mark Kent
>> 3. I believe that section 5.2 is ambiguous as to the error code that should >> be >> returned from the token endpoint when the client credentials are valid, >> when the client is authorized to use the authorization code grant type in >> general, but when the authorization code supplied is not va

Re: [OAUTH-WG] IETF-80

2011-03-14 Thread Mark Mcgloin
ussed before that too thanks Mark McGloin oauth-boun...@ietf.org wrote on 11/03/2011 22:22:16: > Igor Faynberg > Sent by: oauth-boun...@ietf.org > > 11/03/2011 22:22 > > Please respond to > igor.faynb...@alcatel-lucent.com > > To > > Peter Saint-Andre > > cc

[OAUTH-WG] draft-ietf-oauth-v2-13 comments

2011-03-06 Thread Mark Kent
token formats are provided in companion specifications, I see no references for authorization codes. Any thoughts on this would be gratefully received. Mark. ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Draft -12 feedback deadline

2011-02-18 Thread Mark Mcgloin
s Of course, the refresh access token flow currently requires a secret so would need to be changed or alternative flow introduced. Will wait for details of how auth code flow can be used Mark e-mail: mark.mcgl...@ie.ibm.com oauth-boun...@ietf.org wrote on 16/02/2011 21:38:45: > Marius S

[OAUTH-WG] Stored association for Access Token Request

2011-02-04 Thread Mark Kent
appear to be referenced elsewhere in the document, and it¹s not clear to me what association is intended, or when it should be established. A cursory search of the archives of this list has not provided a conclusive explanation; my apologies if I¹ve missed something. Thanks, Mark

Re: [OAUTH-WG] draft-ietf-oauth-v2-bearer: token characters

2010-12-03 Thread Mark Lentczner
proposes a solution, and a corrected ABNF grammar. I can resend if people would like. - Mark Lentczner mz...@google.com ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Security Considerations Suggestion

2010-11-11 Thread Mark Mcgloin
gh as we just wanted to add something before China. Based on feedback from people like Richard Barnes and Anthony Nadalin, we intend to rework it but I just wanted to make sure I am not duplicating effort Regards Mark McGloin oauth-boun...@ietf.org wrote on 11/11/2010 11:18:52: > Hannes Ts

Re: [OAUTH-WG] [secdir] ** OAuth Tutorial & OAuth Security Session **

2010-11-09 Thread Mark Mcgloin
needs tidying but we wanted to push something in before the security meeting in China Regards Mark McGloin oauth-boun...@ietf.org wrote on 09/11/2010 08:53:40: > "Richard L. Barnes" > Sent by: oauth-boun...@ietf.org > > 09/11/2010 08:53 > > To > > tors

[OAUTH-WG] OAuth v2 Authorization Header Credentials

2010-10-27 Thread Mark Lentczner
.. oauth2-key = "oauth2_" oauth2-param oauth2-param = "access_token" future-key = token Lastly, if there was significant compatability issues with introducing a new prefix to key values in OAuth credentials, then "oauth_" could be used as the pre

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-09-29 Thread Mark Mcgloin
Eran Hammer-Lahav wrote on 29/09/2010 15:50:33: > > > > -1 to splitting acquiring and using a token. It may not confuse > people actively > > engaged in the WG but what about everyone else? > > We are already splitting it, by putting signatures elsewhere. Just > because you might think bearer to

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-09-29 Thread Mark Mcgloin
n? I don't have concrete examples to back this up but possibilities include: automatic granting of access token, refresh tokens, non-secure channels, ?? Regards Mark McGloin Dick Hardt wrote on 29/09/2010 01:08 > I am mildly concerned that breaking the spec into multiple parts makes it harder

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-27 Thread Mark Mcgloin
tions/OAuthWRAP2.0SecurityConsiderations.pdf Regards Mark McGloin Dick Hardt wrote on 27/09/2010 14:30 > wrt. another comment you had about security considerations, Brian Eaton did write up a bunch of security considerations for WRAP. ___ OAuth mailing list OAuth@ietf.o

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-25 Thread Mark Mcgloin
+1 to having it in the core spec. I don't see how an optional section in the spec will cause any confusion +1 to John's suggestion below of starting with the OAuth 1.0a signature mechanism. Why not put it in the spec and see what breaks or no longer holds true Mark McGloin John Pa

Re: [OAUTH-WG] Rechartering

2010-09-15 Thread Mark Mcgloin
Hi Torsten Yes, I can contribute. Will email you directly to follow up Regards Mark McGloin Torsten Lodderstedt 14/09/2010 17:01 I plan to work on that aspect. Do you (or someone else) want to contribute? regards, Torsten. Am 14.09.2010 um 17:18 schrieb Mark Mcgloin : > What ab

Re: [OAUTH-WG] Rechartering

2010-09-14 Thread Mark Mcgloin
What about Security Considerations. I know some individuals have worked on it in the past - does it need a WG to complete Mark McGloin Hannes Tschofenig Sent by: oauth-boun...@ietf.org 12/09/2010 00:59 Hi all, at the Washington Internet Identity Workshop we had the chance to chat about

Re: [OAUTH-WG] Returning HTTP 200 on Error for JSONP

2010-08-19 Thread Mark Nottingham
How fortuitous: http://blogs.msdn.com/b/ieinternals/archive/2010/08/19/http-error-pages-in-internet-explorer.aspx On 19/08/2010, at 8:47 AM, Mark Nottingham wrote: > See: > http://support.microsoft.com/kb/294807 > > > On 19/08/2010, at 1:55 AM, Brian Eaton wrote: >

Re: [OAUTH-WG] Returning HTTP 200 on Error for JSONP

2010-08-18 Thread Mark Nottingham
See: http://support.microsoft.com/kb/294807 On 19/08/2010, at 1:55 AM, Brian Eaton wrote: > On Tue, Aug 17, 2010 at 11:36 PM, Mark Nottingham wrote: >>> The other reason people get funny with these status codes has to do >>> with browser behavior. Sometimes browsers r

Re: [OAUTH-WG] Returning HTTP 200 on Error for JSONP

2010-08-17 Thread Mark Nottingham
that > says, more or less, "Whoa. That sucked." > ___ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth -- Mark Nottingham http://www.mnot.net/ ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Returning HTTP 200 on Error for JSONP

2010-08-17 Thread Mark Nottingham
ion about the current user." >>>>>> }. >>>>>> 400, >>>>>> 'Bad Request'); >>>>>> >>>>>> which you can grab with >>>>>> >>>>>> function jso

Re: [OAUTH-WG] assertion profile changes

2010-07-09 Thread Mark Mcgloin
ntent on using refresh tokens with assertions intend to link the two? Regards Mark McGloin On 08/07/2010 23:49 Brian Eaton wrote: Nice summary, thanks Brian! I think there is a third issue as well, i.e. what the use case for client_id actually is. I think Chuck's use case has client_

Re: [OAUTH-WG] proposal for factoring out request signing in OAuth 2

2010-06-01 Thread Mark Mcgloin
for altering the token response is a good suggestion Mark McGloin > On 31/05/2010 06:58 James Manger wrote >>... we're going to have to split out profiles to deal with the >> different key distribution challenges. >Instead of starting with profiles, I think a key to addr

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-10 Thread Mark Mcgloin
> 1. Server Response Format No Preference > 2. Client Authentication (in flows) > A. Client authenticates by sending its credentials using special parameters (current draft) > B. Client authenticated by using HTTP Basic (or other schemes supported by the server such as Digest) Pr

Re: [OAUTH-WG] Scope - Coming to a Consensus

2010-05-04 Thread Mark Mcgloin
+1 to option 3 I think the suggestion below from Torsten makes great sense, especially in relation to standardized apis such as mail Mark On 01 May 2010, at 13:36 PM, Eve Maier wrote: > Am 01.05.2010 03:07, schrieb Marius Scurtescu: >> On Fri, Apr 30, 2010 at 11:43 AM, Torsten Lo

Re: [OAUTH-WG] Issue: add refresh token as optional in all access token requests

2010-04-16 Thread Mark Mcgloin
+1 to this Mark McGloin >On 16/04/2010 17:08, Richard Barnes wrote: >Sure, this seems sensible, especially with the *optional* part. >On Apr 15, 2010, at 3:22 PM, David Recordon wrote: >> +1, remember discussing this a week or so ago on the list >> >>> On

Re: [OAUTH-WG] Issue: Scope parameter

2010-04-16 Thread Mark Mcgloin
client identifier but they only request contacts for some operation, and the user feels more secure. Is this the main reason for scope? James, how does your proposal work if the client needs access to more than one set of resources? Mark McGloin

Re: [OAUTH-WG] Combining the Native application and User-agent flows

2010-04-16 Thread Mark Mcgloin
n for combining Native app flow with UA flow as that seems a better solution Mark On 15/04/2010 18:15, Marius Scurtescu wrote: >> What is the benefit in combining Native flow and Device flow and then >> having to expend effort preventing any ingenious phishing attacks? >The main i

Re: [OAUTH-WG] Combining the Native application and User-agent flows

2010-04-15 Thread Mark Mcgloin
e device >code on the URL. The code can be very long and impossible to >brute-force. The session fixation/phishing attack still exists, but I >agree that could be addressed with good UI. What is the benefit in combining Native flow and Device flow and then having to expend effort preventi

Re: [OAUTH-WG] First draft of OAuth 2.0

2010-03-23 Thread Mark Mcgloin
-hardt-oauth-01. We have strong customer use-cases for an assertion based flow, specifically SAML bearer tokens, and I >believe Microsoft may have already shipped a minor variation on this ( wrap_SAML ) in Azure. Mark McGloin ___ OAuth mailing l

Re: [OAUTH-WG] WG Survey

2010-02-21 Thread Mark Mcgloin
think the protocol should include a signature-based authentication scheme? Yes. I think there will be some use cases or worries from over-cautious CIOs that it will neccessitate it. Mark McGloin ___ OAuth mailing list OAuth@ietf.org https://www.ietf.or