Re: [OAUTH-WG] [Ace] Questions about OAuth and DTLS

2016-02-08 Thread Samuel Erdtman
Hi, I think it is a reasonable simplification to mandate that PoP key and (D)TLS Mode matches i.e. if the PoP keys is symmetric the (D)TLS mode would be PSK, if the PoP key is asymmetric (D)TLS mode would be Raw Public key. But I think there is some compelling properties of having a symmetric PoP

Re: [OAUTH-WG] [Ace] Questions about OAuth and DTLS

2016-02-08 Thread Michael Richardson
Ludwig Seitz wrote: > On 02/04/2016 03:31 PM, Michael Richardson wrote: >> >> Ludwig Seitz wrote: > Assuming we are using (D)TLS to >> secure the connection between C and RS, > assuming further that we are >> using proof-of-possession tokens [2], > i.e. tokens linked to a key

Re: [OAUTH-WG] [Ace] Questions about OAuth and DTLS

2016-02-08 Thread Phil Hunt (IDM)
There is a more general problem in PaaS deployment about how RA and AS infrastructure discover and coordinate with each other. For the most part this hasn't been necessary since usually the AS and RS are controlled by the same admins. But in PaaS/IaaS the requirements vary widely. How does an

Re: [OAUTH-WG] [Ace] Questions about OAuth and DTLS

2016-02-08 Thread John Bradley
The RS is going to have to advertise what presentment mechanisms it supports. We don’t have that yet. I suspect that it might be part of OAuth Discovery. Currently that mostly cover AS discovery, but for the RS I could see doing a head on the resource and getting back a link to a JSON documen

Re: [OAUTH-WG] [Ace] Questions about OAuth and DTLS

2016-02-08 Thread Ludwig Seitz
Michael, thank you for answering, this is getting very interesting. Comments inline. /Ludwig On 02/05/2016 04:26 PM, Michael Richardson wrote: First, let me say that I confused RS and RO/AS in my mind when reading before. Starting again, I think that any PSK for authentication between C<->R

Re: [OAUTH-WG] [Ace] Questions about OAuth and DTLS

2016-02-07 Thread Ludwig Seitz
On 02/07/2016 06:24 PM, Samuel Erdtman wrote: Hi, ~snip~ But I think there is some compelling properties of having a symmetric PoP key and a Raw Public Key (D)TLS. In this case the Public key of the RS can be distributed to the client in the client information (the attributes accompanying the

Re: [OAUTH-WG] [Ace] Questions about OAuth and DTLS

2016-02-05 Thread Ludwig Seitz
On 02/04/2016 05:14 PM, John Bradley wrote: In https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution The proof key is included in the access token or provided out of band. The proof mechanism to the RS is what would determine if the key type needs to match DTLS . If the proof is DT

Re: [OAUTH-WG] [Ace] Questions about OAuth and DTLS

2016-02-04 Thread John Bradley
In https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution The proof key is included in the access token or provided out of band. The proof mechanism to the RS is what would determine if the key type needs to match DTLS . If the proof is DTLS then they would need to match. POP wi

Re: [OAUTH-WG] [Ace] Questions about OAuth and DTLS

2016-02-04 Thread Ludwig Seitz
Thank you Michael! Comments inline. /Ludwig On 02/04/2016 03:31 PM, Michael Richardson wrote: Ludwig Seitz wrote: > Assuming we are using (D)TLS to secure the connection between C and RS, > assuming further that we are using proof-of-possession tokens [2], > i.e. tokens linked

Re: [OAUTH-WG] [Ace] Questions about OAuth and DTLS

2016-02-04 Thread Michael Richardson
Ludwig Seitz wrote: > Assuming we are using (D)TLS to secure the connection between C and RS, > assuming further that we are using proof-of-possession tokens [2], > i.e. tokens linked to a key, of which the client needs to prove possession in > order for the RS to accept the toke