On Aug 10, 2012, at 3:00 AM, Hannes Tschofenig wrote:

> Justin wrote: 
> "
> I believe that there's value in per-message signing completely apart from the 
> channel level encryption. 
> "
> 
> May well be. But we have to figure out what exactly the reasons are why there 
> is value. 

Yes, there is value in this, and that's why we're collecting a handful of use 
cases to support this. Otherwise, people wouldn't keep reinventing this. See 
SAML and OpenID Connect's signed request object for other examples.

> 
> Bill wrote:
> "
> I find the idea of starting from scratch frustrating. MAC solves a set of 
> specific problems and has a well defined use case.
> "
> 
> This would be a very quick process if we had ever done our home work 
> properly. 

It's not done, but it's not empty. Why throw it out? Whether or not we continue 
the draft itself or import its best ideas into a new draft is beside the point.

> 
> So, what are the problems it tries to solve? Yesterday I found an old 
> presentation about MAC and the basic argument was that it has better 
> performance than TLS. While that's true it is not a good argument per se. 
> However, performance is not the only factor to look at and the negative 
> performance impact caused by TLS is overrated.  

This is a red herring, as pointed out by other use cases.

> 
> Here is the slide set I am talking about: 
> http://www.tschofenig.priv.at/Why_are_we_Signing.pdf
> 
> In many cases I had noticed that more time was spent with the pictures (in 
> slides and blog post) than with the content. That's not good IMHO. 
> 
> Bill, we can hardly call a specification "complete" if many of us don't know 
> what problem it solves. John phrases it nicely as "Part of the problem with 
> MAC has been that people could never agree on what it was protecting 
> against." I am also interested in hearing about deployment constraints that 
> people have. Blaine always said that many developers cannot get TLS to work. 
> I am sure that's true but OAuth 2.0 requires TLS to be used anyway to secure 
> the interaction with the authorization server. 

It solves this problem: How can I use the framework of OAuth to get a temporary 
signing key that I can use to protect HTTP messages with signing (without 
stuffing my parameters into a structured document like a SAML or JWT 
assertion)? There are many justifications for that problem and use cases that 
expand on this, but that's the core thing that the MAC does.

> 
> Note: I am not saying that we are not going to standardize something like the 
> MAC token (maybe with different details) but let us spend a little bit of 
> time to figure out what threats we want to deal with. 

It's not just about threats, it's about capabilities and features. 

 -- Justin

> 
> _______________________________________________
> OAuth mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to