Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Lukas Rosenstock
JSON-P (callback) works with

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Richer, Justin P.
Yes, there are many development setups where all you can reasonably access is the URL to get. It's also much simpler to make use of the well-supported syntax helpers for query parameters instead of relying on new, custom formatting for newly-defined headers. The bearer token makes this simple by

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread William J. Mills
Yeah, but there are serious security problems with credentials in the URL, is it really worth it in light of those problems? From: "Richer, Justin P." To: Lukas Rosenstock ; William J. Mills Cc: Brian Eaton ; OAuth WG Sent: Thursday, March 10, 2011 9:49 AM S

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Richer, Justin P.
Ah, here we run into the classic argument of usability vs. security, in which usability will win every single time in practice. If we don't define at least a reasonable way to do this within the scope of OAuth, that's not going to stop people from doing it. It's just going to make people do it i

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Phil Hunt
-1. It is a BAD security practice to pass credentials in URLs. Avoid it. Phil phil.h...@oracle.com On 2011-03-10, at 10:07 AM, Richer, Justin P. wrote: > Ah, here we run into the classic argument of usability vs. security, in which > usability will win every single time in practice. If we d

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Eran Hammer-Lahav
There are a few issues to consider. 1. Should the spec support sending bearer token in a query parameter? - The argument that there are many use cases for this is unproven. JSON-P is one valid example (though JSON-P usage is in decline with new methods for cross-domain calls), but so far the on

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Richer, Justin P.
What about temporary credentials across a local link between controlled systems? My point is just that there are cases where the usual leakage culprits (browsers, proxies, caches, logs) don't apply. It's also a bad idea to not use two-way TLS, and it's arguably a bad idea to look at anything o

[OAUTH-WG] Implicit Grant Client Authentication

2011-03-10 Thread Craig Heath
I'm sure this has been gone over before, so apologies for that, but I haven't found a clear answer (is there a better way than just Google to search the mailing list archive, by the way?) I've been puzzling over this text in 4.2: "... the authentication of the client is based on the user-agent'

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Richer, Justin P.
1) Yes. And don't discount ease-of-use for developers. If I'm already sending my parameters over the query, this becomes another parameter and is really easy to manage. 2) Yes, for parallelism to #1, when using a POST. 3) The idea of a parameter registry for this part is absurd, and the parameter

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Phil Hunt
Well, for one if you promote this, it becomes general technique. Now you have uid/passwords in browser history etc potentially accessible to javascript and could be leaked/hacked in any number of ways. Also, I would say that credentials are a higher risk item then say a specific API call. Why?

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Igor Faynberg
I agree with Phil here. Actually, I hoped that OAuth won't pass credentials in any case and by any means--including encryption, period, but I had lost this argument long ago. Igor Phil Hunt wrote: Well, for one if you promote this, it becomes general technique. Now you have uid/passwords

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Richer, Justin P.
Nobody said UID and password -- we're talking about tokens here. The cost of a leaked temporary token (even a straight bearer token) is much, much lower. -- Justin From: Phil Hunt [phil.h...@oracle.com] Sent: Thursday, March 10, 2011 2:01 PM To: Richer, J

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Phil Hunt
I think I was confused because of the use of the term "credential" rather than token. If you are calling the token service end-point then it is a big issue. E.g. exposing a refresh token would be as bad as a uid/pwd since it is long-lived. For a resource server, I agree, the risk is lower. Phi

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread William J. Mills
If people are doign a one-poff internal solution they can do whatever they want, that doesn't mean it shoudl be part of a security related standard. From: "Richer, Justin P." To: Phil Hunt Cc: William J. Mills ; Lukas Rosenstock ; OAuth WG Sent: Thursday, Ma

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Richer, Justin P.
The entire purpose of a standard is to codify the one-off solutions out there into best practices in different contexts. -- Justin From: William J. Mills [wmi...@yahoo-inc.com] Sent: Thursday, March 10, 2011 2:37 PM To: Richer, Justin P.; Phil Hunt Cc: Lu

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread William J. Mills
Yes, a token is a less priveledged thing that uid/password.  Some of the big problems are browser cache (being able to get back to a signed in state after a sign out), server side logging of credentials because they log the URL, and proxies caching credentials in URLs.  POST variables are signif

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread William J. Mills
We disagree on whether bearer credentials carried in GET parameters can be considered a best practice. From: "Richer, Justin P." To: William J. Mills ; Phil Hunt Cc: Lukas Rosenstock ; OAuth WG Sent: Thursday, March 10, 2011 11:41 AM Subject: RE: [OAUTH-WG] O

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Torsten Lodderstedt
I would assume refresh token exposure to be less dangerous than the leakage of uid/password since a refresh tokens is restricted to a scope. regards, Torsten. Am 10.03.2011 20:22, schrieb Phil Hunt: I think I was confused because of the use of the term "credential" rather than token. If you

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Phil Hunt
In theory yes, sometimes a token has limited scope. But since a token will often have unlimited scope, it carries the same potential for risk. I would say one-time use tokens (e.g. grant codes) are really the only things that should be passed by URL. Note that if the client was able to obtain a

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread George Fletcher
I'm not crazy about the compromise either, but it's not possible for a site using JSONP and it's cross-domain tricks to set the Authorization header out of the browser or POST the data out of the browser in a cross-domain way (due to the same origin browser policy). Quoting Eran from a previou

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Mike Jones
Several people have asked for this parameter name to be changed to oauth2_token. If a change is made, it would seem to me that that would be the logical name to use. Is anyone strongly opposed to making this change? -- Mike From: oau

Re: [OAUTH-WG] OAuth Bearer Token draft

2011-03-10 Thread Manger, James H
Justin Richer said: "Since all formats are optional,..." No they aren't. draft-ietf-oauth-v2-bearer-03 says "Resource servers MUST accept [the Authorization header], and MAY support [body & query parameters]" -- James Manger ___ OAuth mailing list OAu