Re: [OAUTH-WG] Issue 15, new client registration

2011-07-25 Thread Eran Hammer-Lahav
Thanks for the feedback. > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Torsten Lodderstedt > Sent: Wednesday, July 20, 2011 1:59 PM > 2.1 Client types > > I'm struggeling with the new terminology of "private" and "public" > clients. In

Re: [OAUTH-WG] Issue 16, revised Redirection URI section (3.1.2)

2011-07-25 Thread Eran Hammer-Lahav
> -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Torsten Lodderstedt > Sent: Wednesday, July 20, 2011 2:15 PM > "The authorization server redirects the user-agent to the > client's redirection URI previously established with the >

Re: [OAUTH-WG] Issue 17, new token endpoint Client Authentication section (3.2.1)

2011-07-25 Thread Eran Hammer-Lahav
True. > -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Torsten Lodderstedt > Sent: Wednesday, July 20, 2011 2:19 PM > To: OAuth WG > Subject: [OAUTH-WG] Issue 17, new token endpoint Client Authentication > section (3.2.1) > > just a minor

Re: [OAUTH-WG] Comments on -18

2011-07-25 Thread Eran Hammer-Lahav
> -Original Message- > From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf > Of Torsten Lodderstedt > Sent: Wednesday, July 20, 2011 2:49 PM > To: OAuth WG > Subject: [OAUTH-WG] Comments on -18 > > section 1.5 > > "(A) The client requests an access token by authentic

[OAUTH-WG] I-D Action: draft-ietf-oauth-v2-19.txt

2011-07-25 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Web Authorization Protocol Working Group of the IETF. Title : The OAuth 2.0 Authorization Protocol Author(s) : Eran Hammer-Lahav

[OAUTH-WG] Draft -19

2011-07-25 Thread Eran Hammer-Lahav
Draft 19 includes all the feedback received for -18: * Closes issues 15-19 * Moved client profiles to section 2.1 from 10 * New text for 'Code Injection and Input Validation' * A few minor editorial clarifications There are two open issues (20, 21) which are minor editorial requests, and the req

Re: [OAUTH-WG] OAuth v2-18 comment on "state" parameter

2011-07-25 Thread Aiden Bell
Sounds good Eran On 25 July 2011 07:37, Eran Hammer-Lahav wrote: > This seems too verbose, considering how fundamental input validation is in > general. > > ** ** > > I added the following to a new section: > > ** ** > > A code injection attack occurs when an input or otherwise

Re: [OAUTH-WG] Draft -19

2011-07-25 Thread Peter Saint-Andre
On 7/25/11 4:06 AM, Eran Hammer-Lahav wrote: > Draft 19 includes all the feedback received for -18: BTW, the diff is here: http://tools.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-19.txt /psa ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mai

Re: [OAUTH-WG] Draft -19

2011-07-25 Thread Lucy Lynch
On Mon, 25 Jul 2011, Peter Saint-Andre wrote: On 7/25/11 4:06 AM, Eran Hammer-Lahav wrote: Draft 19 includes all the feedback received for -18: BTW, the diff is here: http://tools.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-19.txt clarifying question on section 10.1 - I'm reading this as s

Re: [OAUTH-WG] OAuth 2.0 Bearer Token Specification draft -06

2011-07-25 Thread Mike Jones
You're correct about the missing comma. I'll plan on updating the draft this week. To your second question, the definition of quoted-string does allow for unquoted whitespace within the quoted string. -- Mike -Original Message- From: Ian McKellar [mailt

[OAUTH-WG] treatment of client_id for authentication and identification

2011-07-25 Thread Brian Campbell
I need to revisit a question that came up about two months ago. I thought I had a clear understanding of when client_id was and wasn't included in access token requests but drafts 18/19 seemed to have changed things (or my understanding of 16 was wrong). The question is, when is client_id a requi

[OAUTH-WG] pdf format documents are half cooked

2011-07-25 Thread Dhiva
can some one verify and publish pdf format documents again? All empty pages, starting from 6 or 7 page. all the active documets. Thanks dhiva ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] Issue 15, new client registration

2011-07-25 Thread Justin Richer
I would avoid using the term "open" here as it has other deep-seated meanings in the software world, particularly with regard to Open Source and Open Standard stuff. FWIW, I think "confidential/public" or "private/public" are serviceable. -- Justin On Mon, 2011-07-25 at 02:45 -0400, Eran Hammer-

Re: [OAUTH-WG] Comments on -18

2011-07-25 Thread Torsten Lodderstedt
Hi Eran, section 5.2 "The authorization server MAY return an HTTP 401 (Unauthorized) status code to indicate which HTTP authentication schemes are supported." Given the usage of HTTP authentication schemes is the way to authenticated client recommended by the s

Re: [OAUTH-WG] Draft -19

2011-07-25 Thread Mike Jones
A few editorial points about references: - the draft is referencing an old draft of the bearer token spec (-04), rather than the current version (-06), - the draft is referencing an old draft of the SAML bearer spec (-03), rather than the current version (-04), - the draft is not referenci

Re: [OAUTH-WG] Issue 16, revised Redirection URI section (3.1.2)

2011-07-25 Thread Torsten Lodderstedt
Hi Eran, Am 25.07.2011 03:28, schrieb Eran Hammer-Lahav: -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Torsten Lodderstedt Sent: Wednesday, July 20, 2011 2:15 PM "The authorization server redirects the user-agent to the client's redir

Re: [OAUTH-WG] Section 10.1 (Client authentication)

2011-07-25 Thread Torsten Lodderstedt
+1 Am 25.07.2011 02:16, schrieb Eran Hammer-Lahav: How about, add this to 10.1: When client authentication is not possible, the authorization server SHOULD employ other means to validate the client's identity. For example, by requiring the registration of th

Re: [OAUTH-WG] Comments on -18

2011-07-25 Thread Eran Hammer-Lahav
> -Original Message- > From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] > Sent: Monday, July 25, 2011 7:24 AM > To: Eran Hammer-Lahav > Cc: OAuth WG > Subject: Re: [OAUTH-WG] Comments on -18 > > Hi Eran, > >> section 5.2 > >> > >> "The authorization server MAY return an HTTP 40

Re: [OAUTH-WG] Draft -19

2011-07-25 Thread Eran Hammer-Lahav
BTW, I'm planning on following -19 with -20 later today with text closing all the remaining issues. EHL From: Eran Hammer-Lahav Sent: Monday, July 25, 2011 1:07 AM To: OAuth WG Subject: Draft -19 Draft 19 includes all the feedback received for -18: * Closes issues 15-19 * Moved client profiles

Re: [OAUTH-WG] Draft -19

2011-07-25 Thread Eran Hammer-Lahav
Yeah, I'm not going to waste time trying to keep these in sync for now. This will all be done once before IETF LC and then with the RFC editor. EHL From: Mike Jones [mailto:michael.jo...@microsoft.com] Sent: Monday, July 25, 2011 7:24 AM To: Eran Hammer-Lahav; OAuth WG Subject: RE: Draft -19 A

Re: [OAUTH-WG] Draft -19

2011-07-25 Thread Eran Hammer-Lahav
The term Redirection URI describes the URI provided by the client throughout the document. The additional parameters added later by the authorization server are part of the redirection request but not the URI provided by the client. EHL > -Original Message- > From: Lucy Lynch [mailto:ll

Re: [OAUTH-WG] Issue 16, revised Redirection URI section (3.1.2)

2011-07-25 Thread Eran Hammer-Lahav
> -Original Message- > From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] > Sent: Monday, July 25, 2011 7:19 AM > To: Eran Hammer-Lahav > Cc: OAuth WG > Subject: Re: [OAUTH-WG] Issue 16, revised Redirection URI section (3.1.2) > > Hi Eran, > > Am 25.07.2011 03:28, schrieb Eran H

Re: [OAUTH-WG] Issue 15, new client registration

2011-07-25 Thread Eran Hammer-Lahav
I'll switch to confidential/public. EHL > -Original Message- > From: Justin Richer [mailto:jric...@mitre.org] > Sent: Monday, July 25, 2011 7:41 AM > To: Eran Hammer-Lahav > Cc: e...@sled.com; Torsten Lodderstedt; OAuth WG > Subject: Re: [OAUTH-WG] Issue 15, new client registration > > I

Re: [OAUTH-WG] treatment of client_id for authentication and identification

2011-07-25 Thread Eran Hammer-Lahav
client_id is only required on the authorization endpoint, not the token endpoint. -18 cleaned up how the document talked about client authentication in general. So you should remove client_id from your draft and instead mention client authentication (if appropriate). EHL > -Original Messag

Re: [OAUTH-WG] treatment of client_id for authentication and identification

2011-07-25 Thread Brian Campbell
How should HTTP Basic be used for a client not in possession of a client secret? On Mon, Jul 25, 2011 at 10:25 AM, Eran Hammer-Lahav wrote: > client_id is only required on the authorization endpoint, not the token > endpoint. -18 cleaned up how the document talked about client authentication

Re: [OAUTH-WG] treatment of client_id for authentication and identification

2011-07-25 Thread Eran Hammer-Lahav
It shouldn't. You are still allowed to reuse client_id outside the specific password credentials use case. Just make sure the way the parameter is defined in v2 is consistent. EHL > -Original Message- > From: Brian Campbell [mailto:bcampb...@pingidentity.com] > Sent: Monday, July 25, 20

[OAUTH-WG] I-D Action: draft-ietf-oauth-v2-20.txt

2011-07-25 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Web Authorization Protocol Working Group of the IETF. Title : The OAuth 2.0 Authorization Protocol Author(s) : Eran Hammer-Lahav

[OAUTH-WG] Draft -20

2011-07-25 Thread Eran Hammer-Lahav
Draft -20 closes all open issues. Any additional feedback will be part of the WGLC process. Thanks, EHL From: Eran Hammer-Lahav Sent: Monday, July 25, 2011 9:10 AM To: 'OAuth WG' Subject: RE: Draft -19 BTW, I'm planning on following -19 with -20 later today with text closing all the remaining

Re: [OAUTH-WG] Draft -19

2011-07-25 Thread Lucy Lynch
On Mon, 25 Jul 2011, Eran Hammer-Lahav wrote: The term Redirection URI describes the URI provided by the client throughout the document. The additional parameters added later by the authorization server are part of the redirection request but not the URI provided by the client. Thanks - EH

Re: [OAUTH-WG] Comments on -18

2011-07-25 Thread Torsten Lodderstedt
ok Am 25.07.2011 11:53, schrieb Eran Hammer-Lahav: -Original Message- From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] Sent: Monday, July 25, 2011 7:24 AM To: Eran Hammer-Lahav Cc: OAuth WG Subject: Re: [OAUTH-WG] Comments on -18 Hi Eran, section 5.2 "The authorization ser

Re: [OAUTH-WG] Issue 16, revised Redirection URI section (3.1.2)

2011-07-25 Thread Torsten Lodderstedt
Hi Eran, Regarding this particular section: I think the two different issues (transport security and endpoint authenticity) should be presented separately. Which section? 3.1.2.1. regards, Torsten. EHL ___ OAuth mailing list OAuth@ietf.org https

Re: [OAUTH-WG] treatment of client_id for authentication and identification

2011-07-25 Thread Brian Campbell
I'm asking from both an implementation perspective as well as the spec perspective. On the spec side, draft-ietf-oauth-assertions will deal with client_id and while it's currently required I'd guess it will become optional or even forbidden. On the implementation side, let me make sure I understa

Re: [OAUTH-WG] redirect uri validation

2011-07-25 Thread Torsten Lodderstedt
Hi Eran, OAuth 1.0 was highly criticized for failing to address client identity in public clients. I believe OAuth 2.0 offers a much better story, within the boundaries>of what’s possible today. Agreed. I think we must honestly discuss the value of client authentication/identification itself. I

Re: [OAUTH-WG] Call For Agenda Items for IETF#81

2011-07-25 Thread Barry Leiba
People attending in person should be aware that the room we have is not large. It claims to hold 60, which I think is a generous estimate. I advise folks to be prompt, so as to get a seat. If we get a good turnout, we may overflow the room. Barry ___

Re: [OAUTH-WG] treatment of client_id for authentication and identification

2011-07-25 Thread Eran Hammer-Lahav
> -Original Message- > From: Brian Campbell [mailto:bcampb...@pingidentity.com] > Sent: Monday, July 25, 2011 10:39 AM > To: Eran Hammer-Lahav > Cc: oauth > Subject: Re: [OAUTH-WG] treatment of client_id for authentication and > identification > > I'm asking from both an implementation p

Re: [OAUTH-WG] Issue 16, revised Redirection URI section (3.1.2)

2011-07-25 Thread Eran Hammer-Lahav
Since these issues are covered in the security section, I think it is enough to simply stress the importance of using TLS for the redirection endpoint and leave the more detailed analysis for later in the document. But if you want to propose new text, I'm open to it. EHL > -Original Messag

[OAUTH-WG] Fwd: Several typos in -20 and a possible security consideration

2011-07-25 Thread Niv Steingarten
Forwarded as per Eran's request. A couple of corrections to my original email: 1. By AJAX, I mean, AJAX like techniques (if the user agent does not enforce same origin policy). 2. When saying POST to '/authorize_callback' -- it may well be GET, if the authorization server mishandles the request.

Re: [OAUTH-WG] Fwd: Several typos in -20 and a possible security consideration

2011-07-25 Thread Torsten Lodderstedt
Hi Niv, thank you for posting this to the list. I think you are right with your threat description. One question: shouldn't the browser already prevent the request to the authorization endpoint because of the same origin policy (or CORS restrictions)? Apart from that, a similar attack can be

Re: [OAUTH-WG] Fwd: Several typos in -20 and a possible security consideration

2011-07-25 Thread Niv Steingarten
Yes, I believe the vast majority of user-agents would block this kind of request if it originated from a JavaScript XMLHttpRequest or such. However, there are still scenarios in which a user-agent based client could manipulate this vulnerability. For example, the client could launch the GET reques

[OAUTH-WG] Extra "Authorization: Basic" lines in examples

2011-07-25 Thread Mike Jones
In sections 4.1.3, 4.3.2, 4.4.2, and 6 of draft -20, the examples contain both the line "Authorization: Basic czZCaGRSa3F0MzpnWDFmQmF0M2JW" and credentials in the post body. For instance, the example from 4.3.2 is: POST /token HTTP/1.1 Host: server.example.com Authorization: Basi

Re: [OAUTH-WG] Extra "Authorization: Basic" lines in examples

2011-07-25 Thread Shane B Weeden
Mike - I don't think that's true for the resource owner password credentials flow that you showed below. The Authorization header is authenticating the client, the username/password POST body params represent the resource owner. From: Mike Jones To: "oauth@ietf.org" Date: 26-07-11 02

Re: [OAUTH-WG] Extra "Authorization: Basic" lines in examples

2011-07-25 Thread Bob Van Zant
The Authorization header in those examples is authorizing the client. In 4.1.3 the /token URI requires HTTP basic authorization to access. Section 2.4 talks about this more. -Bob On Mon, Jul 25, 2011 at 9:27 PM, Mike Jones wrote: > In sections 4.1.3, 4.3.2, 4.4.2, and 6 of draft -20, the examp

Re: [OAUTH-WG] Extra "Authorization: Basic" lines in examples

2011-07-25 Thread Brian Campbell
I believe those examples are okay. The content in the post body is the grant while the HTTP Basic Authorization header is the client authentication. They are two different things. On Mon, Jul 25, 2011 at 10:27 PM, Mike Jones wrote: > In sections 4.1.3, 4.3.2, 4.4.2, and 6 of draft -20, the examp

Re: [OAUTH-WG] Extra "Authorization: Basic" lines in examples

2011-07-25 Thread Eran Hammer-Lahav
There is nothing wrong with the examples. From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Mike Jones Sent: Monday, July 25, 2011 9:28 PM To: oauth@ietf.org Subject: [OAUTH-WG] Extra "Authorization: Basic" lines in examples In sections 4.1.3, 4.3.2, 4.4.2, and 6 of draft