MAC adds security if the initial secret exchange is secure, and it provides a 
definition for signing payload as part of the request.



________________________________
From: Nico Williams <[email protected]>
To: Paul E. Jones <[email protected]>
Cc: [email protected]; Ben Adida <[email protected]>; Adam Barth 
<[email protected]>; [email protected]; HTTP Working Group 
<[email protected]>; OAuth WG <[email protected]>
Sent: Tuesday, June 7, 2011 3:35 PM
Subject: Re: [OAUTH-WG] [http-state] [apps-discuss] HTTP MAC Authentication 
Scheme

On Tue, Jun 7, 2011 at 4:59 PM, Paul E. Jones <[email protected]> wrote:
> I fully agree with you that using TLS is usually preferred.  That said, we 
> encounter situations where there were a large number of client/server 
> interactions and the data conveyed is not confidential information in any 
> way.  Using TLS can significantly decreases server performance, particularly 
> when there are a number of separate connections that are established and 
> broken.
>
> So, we were trying to find a non-TLS solution that still provides a way to 
> ensure the server can identify the user and that both can verify that data 
> has not been tampered in flight.  (It would still be preferred to establish 
> security relations with TLS, though we were open to other solutions.)

I don't see the point of having a MAC instead of a cookie for HTTP
requests sent without TLS, not unless you cover enough of the request
(and response).  Of course, you'll want two different cookies -- one
for HTTP and one for HTTPS.

I think you've just convinced me that this MAC adds no value whatsoever.

Nico
--
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to