Fair point. I'll add some text saying that in the next revision.

On Wed, Oct 15, 2014 at 5:18 PM, Barry Leiba <barryle...@computer.org>
wrote:

>
>>>    Assertions used in the protocol exchanges defined by this
>>>    specification MUST always be protected against tampering using a
>>>    digital signature or a keyed message digest applied by the issuer.
>>>
>>> Why is that? Aren't you using assertions over a protected channel (as
>>> required by the spec) and therefore not need to sign the assertions?
>>> Indeed, why would a self-issued Bearer Assertion need to be signed at
>>> all? Does that even make sense?
>>>
>>>
>> Yes, assertions are sent over a protected channel, which does provide
>> integrity protection for the transport form client to AS and also gives
>> server authentication. But it doesn't provide client authentication, which
>> is kind of the point of the Client Authentication part of this draft. And
>> for authorization the signing or MACing is what authenticates the issuer of
>> the assertion - sometimes the issuer is the client but often the issuer
>> will be a 3rd party system.
>>
>> I do agree with you in one specific case that, if the client is trusted
>> to be the assertion issuer and the client is properly authenticated, then
>> an unsigned assertion could be reasonably used as an authorization grant.
>> But it's a fairly rare and very specific case. And one that can be
>> accommodated in other ways. So it's not worth introducing the complexity
>> and potential security problems that having the signature be option would
>> bring.
>>
>
> In other words, the assertion must be protected against tampering *by the
> party that presents the assertion*.  That is a significant point, and you
> should say it.
>
> Barry
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to