Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Richard L. Barnes
Then there's the question of checking to see if the data in the envelope is consistent with data outside the envelope. A good way to do this is to ignore the data outside the envelope and only use the verified, enveloped data. This is precisely the problem. But think about what "only usin

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread John Panzer
Ah ok, I misread your field names as field values :). Of course recipients can always choose to ignore the result of verifying signatures (or not verify them at all) no matter what scheme you use. Note that Magic Signatures is unabashedly an envelope, and well written libraries make it hard to sh

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread John Panzer
On Fri, Sep 24, 2010 at 9:06 AM, Eran Hammer-Lahav wrote: > Validating the signed data delivered with the request is as much magic as > the current 1.0 approach. Go write the validation rules and see. > Done that (for the specific case of Salmon). The only trick is to write the code so that if t

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Richard L. Barnes
Maybe I've misunderstood the Magic Signatures proposal. I thought that the MagicSig blob actually contained the data that was signed, so that step (3) below would be unnecessary. (Note that the object in Step 2 has only field *names*, not *values*.) Including the data is the part of that

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread John Panzer
Richard, I'm a bit confused because the made-up example you give below is, essentially, what Magic Signatures does. The algorithm you present is basically the correct one IMHO. Are you assuming that the recipient is _also_ using the HTTP-level method and URL path for some important security dec

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Eran Hammer-Lahav
Validating the signed data delivered with the request is as much magic as the current 1.0 approach. Go write the validation rules and see. I'm getting really tired of this argument because it is not grounded in reality. Any attempt to compare the HTTP request to what was signed, whether it is s

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Richard L. Barnes
Yes, there is certainly a risk if someone just checks the signature and does not verify the content of the message. This is a bad implementation of an authorization system, to be sure, and it's an issue that people need to be aware of. But simply signing metadata doesn't completely solve the p

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Justin Richer
> > I think that any signature method that we end up using needs to rely > > less on magic and anecdote and more on explicit declaration. > > This is certainly correct ... > > > > I think > > that Brian Eaton's approach of sending the bare string that was > > signed, > > which was also a JSON

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Richard L. Barnes
I think that any signature method that we end up using needs to rely less on magic and anecdote and more on explicit declaration. This is certainly correct ... I think that Brian Eaton's approach of sending the bare string that was signed, which was also a JSON element that could be parsed

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Justin Richer
> If it wasn’t clear, the reason why I am back at fighting for this > after taking a break for a few months, is based on the recent positive > experience from the Twitter migration. To me, it completely voids the > arguments that normalization on the client side is too hard. I wholeheartedly disag

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-23 Thread Eran Hammer-Lahav
Thanks Richard. FWIW, RFC 5849 was stuck in IESG discuss until I the language regarding the use of HTTPS with plaintext secrets was changed from SHOULD to MUST. Before the change, the security consideration section clearly highlighted the danger in not using HTTPS. OAuth 2.0 adds support for sh

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-23 Thread Richard L. Barnes
I also agree with the observation about consensus being based on individual voices. I don't think it's accurate to say that signatures are a generic security mechanism. As I would think we learned from OAuth 1.0[a], it can actually be pretty subtle to define how signatures are used in a

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-23 Thread Dick Hardt
I agree with your point that consensus is based on individual voices. I agree with Eric's points that signatures are a generic security mechanism and that signatures should be in a separate spec. -- Dick On 2010-09-23, at 6:11 PM, Eran Hammer-Lahav wrote: > It is pretty clear from the recent

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-23 Thread Eric Sachs
>> I believe that an OAuth 1.0a style signature How about we start with exactly an OAuth 1.0a style signature? It may be tricky, but there are still client libraries and some web-services that handle them. Like Tony, I also have not heard requests for a new signature approach, but one of the reas

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-23 Thread Anthony Nadalin
that it will proceed as a separate item. From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Eran Hammer-Lahav Sent: Thursday, September 23, 2010 6:12 PM To: Eric Sachs; OAuth WG Subject: Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec It is pretty

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-23 Thread Eran Hammer-Lahav
It is pretty clear from the recent public response that a core specification without signatures is going to be viewed as weak and insecure. This has been my position for over a year, and if it wasn't clear, I am going to continue expressing it. We have enough interest to get a basic signature s

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-23 Thread Anthony Nadalin
-boun...@ietf.org] On Behalf Of Eric Sachs Sent: Thursday, September 23, 2010 5:30 PM To: OAuth WG Subject: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec Google wanted to re-state our long standing opinions on HTTP signature mechanisms in the OAuth2 spec. The short version is

[OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-23 Thread Eric Sachs
Google wanted to re-state our long standing opinions on HTTP signature mechanisms in the OAuth2 spec. The short version is that standards for signing parts of an HTTP request have value in use-cases other than OAuth2, and thus they should be defined outside the spec, and just referenced from the s