I agree that TLS (which, in the IETF, sprobably a better three-letter word than SSL) is the simplest solution, and the one that is implementable.
Igor

Blaine Cook wrote:
OAuth WRAP is very similar to cookies as deployed by major vendors.

Google has just switched to HTTPS-by-default for all GMail
sessions[1], and my understanding (per [2]) is that access to
authenticated sessions (i.e., full GMail or Google Docs access versus
just displaying "[email protected]" on the page) is always negotiated with
a secure cookie. Thus, Google has made decisions internally to secure
the equivalent of both the Refresh and the Bearer token, short-lived
assurances aside.

We're also entering an age where we have enough computing power to
*factor* RSA-1024 in non-infinite-time; handheld devices that are
realistically expected to use these protocols have sufficient
computing power and battery life to encrypt HTTP requests and decrypt
the responses (my phone already does this for all Twitter and email
requests; yours probably does, too).

As such, I can't see how *not* requiring SSL for unsigned requests
could pass muster at an IETF security review.

[1] http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html
[2] 
http://googleonlinesecurity.blogspot.com/2009/06/https-security-for-web-applications.html

2010/1/14 John Kemp <[email protected]>:
On Jan 14, 2010, at 1:05 AM, Eran Hammer-Lahav wrote:

[...]
QUESTIONS: Are there any valid (such that will pass IETF security review
scrutiny) reasons for allowing unsigned requests to be sent in the clear
over an insecure channel? Are there use cases for this (regardless of their
security properties)?
I am still wavering on this.

I think that using a bearer token with short lifetime and one-time use 
semantics (for example) is probably sufficient security for many use-cases. And 
using TLS/SSL (or even just signing and verifying a signed request) in all 
cases may provide too much performance overhead for some of those cases.

In other words, I think that it's not only channel security we need to 
consider, but a combination of other measures that would, in some cases, 
obviate the need for TLS.

Regards,

- johnk

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to