Hi, Hannes,
 
> The Client and the Resource Server need to obtain this session key 
somehow. 
> Only two mechanisms exist: 
> 
> a) Key Transport 
> b) Key Agreement 
> 
> Here a key transport based mechanism is used and that's not uncommon. 
I have no doubt about that.
My concern is may be there are some better ways to do proof-of-posession, 
or proof-of-knowledge of keys. 
For example, as I wrote in  the review of 
draft-tschofenig-oauth-security-00:
client send H(R) in token request to AS, AS includes the H(R) in the 
token, and client sends (token,R) to RS,
RS can verify the access capablity by recalculating H(R) and checking 
access toekn, 
by feature of hash, RS can trust R provider,this method does not use 
pre-shared key between AS  and RS.


> 
> > Since distributing shared keys between AS and RS is already a 
> cubersome work, 
> > sending key to client implies the key is only one time thing, that
> will further increase the complexity. 
> > 
> An authentication and key exchange protocols is a complex thing. 
> No doubt about that. 

But Oauth is aimed at simple solutiion and better user experience. 
An AKE and be complex, but some AKE can be simpler than others, depending 
on requirements.

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to