> -----Original Message----- > From: Mark Mcgloin [mailto:[email protected]] > Sent: Wednesday, September 29, 2010 12:55 AM
> I echo Dick's sentiment, mildly > > -1 to splitting acquiring and using a token. It may not confuse people > actively > engaged in the WG but what about everyone else? We are already splitting it, by putting signatures elsewhere. Just because you might think bearer tokens are the 'obvious choice' and signatures are the 'optional more advance choice', you are still splitting the protocol over multiple parts. It is just that your preferred way of splitting it is optimized to what you care most about. I have made the same argument about the readability of the specification without signatures in core and was shut down because it will delay the work too much and other reasons. > Also, as Torsten and I look at security considerations, I wonder if there are > some examples that link the threat model for acquiring a token and using a > token. So: > > 1) Will the decisions a service provider make when granting a token depend > on, or affect, the use case for using that token? > 2) Will the use case, grant type or other flow parameters a client selects for > acquiring a token, depend on how they will use that token? > > I don't have concrete examples to back this up but possibilities include: > automatic granting of access token, refresh tokens, non-secure channels, ?? This is possible, but there is absolutely no benefit from the way the draft is structured today. If you strive to offer a complete and comprehensive solution and security review, you clearly have to include signatures in the same document. How would you discuss these examples and dependencies without the full picture? IOW, how is including bearer token but not other alternatives make answering these questions in the core specification any easier? Why is it any less useful to discuss these questions in each of the token authentication schemes? After all, it is the nature of the scheme that dictates everything else. This argument is valid but has nothing to do with moving section 5 out. This leaves readability as the only potential argument against splitting. Why not try it out? What's the worse that will happen? We have to put it back in and look for a different compromise? And last, if you are going to opposed this proposal, then the burden is on you to offer an alternative that is going to address the concerns and parameters presented in my original post. By definition, a compromise means you don't get everything you want, so what are you willing to give up to help resolve these otherwise blocking issues? I am not trying to tease anyone, but asking an sincere question. Every other proposal has been rejected with sufficient resistance to suggest it will not last through the multiple review stages. EHL _______________________________________________ OAuth mailing list [email protected] https://www.ietf.org/mailman/listinfo/oauth
