Can you live with the current language or do you still want to see it change?

EHL

From: [email protected] [mailto:[email protected]] On Behalf Of Dirk 
Balfanz
Sent: Tuesday, May 05, 2009 11:48 PM
To: [email protected]
Subject: [oauth] Re: OAuth Core 1.0 Rev A, Draft 2

I agree it's not a huge deal, and people will probably realize that they don't 
have to store the verification code, but just to engage in some late-hour 
nit-picking: You don't have to calculate the verification code (i.e. signature) 
from the request token in order to verify it. Not all signature verification 
schemes take the signed message, calculate the legitimate signature, and then 
compare that to the supplied signature [1]. Generally, a signature verification 
scheme simply assumes that you input the signed message and the signature, and 
get Yes or No as the output.

Dirk.

[1] For example, if you used DSA as the signature scheme, every time you run 
it, you get a different signature on the same message - so that 
calculate-signature-then-test-for-equality-with-supplied-signature method 
wouldn't work there.
On Tue, May 5, 2009 at 11:37 PM, Eran Hammer-Lahav 
<[email protected]<mailto:[email protected]>> wrote:

Which my language implies. The server has to retrieve the verification code to 
compare it. It can do that from a database or by calculating it. I think you 
are reading too much into this. The draft does not prevent this kind of 
implementation. My first draft used something like 'the server must verify that 
the verification code is valid' but I think the current language is easier for 
developers to understand, and doesn't prevent more sophisticated 
implementations.



EHL



From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]<mailto:[email protected]>] On Behalf Of 
Dirk Balfanz
Sent: Tuesday, May 05, 2009 11:33 PM
To: [email protected]<mailto:[email protected]>
Subject: [oauth] Re: OAuth Core 1.0 Rev A, Draft 2





On Tue, May 5, 2009 at 2:27 PM, Eran Hammer-Lahav 
<[email protected]<mailto:[email protected]>> wrote:

I'm not following. The server shows the user a string which the client has to 
provide back to the server. The string the server gives the user must be the 
same as the string the client gives back to the server.



This assumes that the server remembers the string it gave to the user, so it 
can compare that one to the string it's receiving in Step 6.3.2. I think an 
easier implementation would be if the verification code was a signature on the 
request token (then the server doesn't have to remember the verification code). 
In that case, the server doesn't have two strings to compare for equality in 
Step 6.3.2. Instead, the SP would simply check that the verification code is a 
valid signature on the request token.



Dirk.



What other flow do you have in mind?

EHL



On 5/5/09 2:04 PM, "Dirk Balfanz" 
<[email protected]<http://[email protected]>> wrote:


On Tue, May 5, 2009 at 1:20 PM, Eran Hammer-Lahav 
<[email protected]<http://[email protected]>> wrote:

Please review:

http://oauth.googlecode.com/svn/spec/core/1.0a/drafts/2/oauth-core-1_0a.html

Change log:

http://code.google.com/p/oauth/source/diff?spec=svn993&old=992&r=993&format=unidiff&path=%2Fspec%2Fcore%2F1.0a%2Foauth-core-1_0a.xml

The changes are minimal:

1. Define 'oob' as out-of-band
2. Clarify that 'oob' is for any out-of-band configuration, not delivery of 
verification code
3. Minor language tweak
4. Correct reference to first step
5. Clarify that verification code should be displayed when no callback is 
configured, not just via the oauth_callback parameter

Deadline for feedback is still May 8th. If you provided feedback to draft 1 
which was not incorporated and still believe it should, please let me know.

In Section 6.3.2, there is still language that assumes that the SP has two 
verification codes at that point:

 *   The verification code received from the Consumer is identical to the 
verification code provided to the User via the redirection or manually.

I believe that presupposes/dictates a particular implementation, which is not 
what we should be doing in the spec.

Proposed change: "The verification code matches the Request Token".

Dirk.

If no changes are needed by Friday, I will promote this to an implementer draft 
at which point developers will be encouraged to change their code. If no 
changes are identified by developers, we will declare this draft final 5/25.

EHL













--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"OAuth" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [email protected]
For more options, visit this group at http://groups.google.com/group/oauth?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to