Re: [OAUTH-WG] Security of user agent clients (WAS: End user auth response code-and-token's scope parameter)

2010-07-03 Thread Torsten Lodderstedt
Is something as the user agent flow used in the wild today? What security means are used their? I wonder why we do not drop the user agent flow from the spec because of security reasons. From my point of view, the web flow could be used to achieve a similar behavior except the JavaScript

Re: [OAUTH-WG] Versioning

2010-07-03 Thread Rob Richards
Eran Hammer-Lahav wrote: Hi Rob, I agree with you that a migration spec is important - please write one. Like I didn't see that coming :) As for every provider returning the same error code, I don't think that this will always be the case as some providers will return invalid-request on

Re: [OAUTH-WG] Security of user agent clients (WAS: End user auth response code-and-token's scope parameter)

2010-07-03 Thread Ian McKellar
The user agent flow is really useful if you just require user interaction to issue new access tokens. There are big benefits (including security benefits[*]) to not involving the server. Ian [*] the security benefit being that I never have had to authorize your server to do action on my behalf,

Re: [OAUTH-WG] Security of user agent clients (WAS: End user auth response code-and-token's scope parameter)

2010-07-03 Thread Luke Shepard
On Jul 3, 2010, at 3:19 AM, Torsten Lodderstedt wrote: Is something as the user agent flow used in the wild today? What security means are used their? Yes. Facebook has shipped it: http://developers.facebook.com/docs/authentication/desktop We require either pre-registration of the callback

Re: [OAUTH-WG] Understanding the reasoning for Base64

2010-07-03 Thread Dick Hardt
On 2010-07-02, at 5:04 PM, Paul Tarjan wrote: We don't think base64url will work, because the most common error we'll see is that developers forget the url part and just do plain base64, and that's not sufficient because the stock set includes +. I think forgetting to url-decode is more

Re: [OAUTH-WG] Understanding the reasoning for Base64

2010-07-03 Thread Naitik Shah
On Sat, Jul 3, 2010 at 9:02 AM, Dick Hardt dick.ha...@gmail.com wrote: On 2010-07-02, at 5:04 PM, Paul Tarjan wrote: We don't think base64url will work, because the most common error we'll see is that developers forget the url part and just do plain base64, and that's not sufficient

Re: [OAUTH-WG] Understanding the reasoning for Base64

2010-07-03 Thread Ben Laurie
Let's not lose sight of the underlying reason to choose base64: avoiding the issue of canonicalisation. If you use an encoding that various software layers can choose to decode and operate on, then you open the canonicalisation can of worms. The point of using base64 is so the blob you hand around

Re: [OAUTH-WG] Understanding the reasoning for Base64

2010-07-03 Thread Dick Hardt
On 2010-07-03, at 9:13 AM, Naitik Shah wrote: I think Naitik is saying that accidentally doing base64 and not base64url will send some '+'s along. if there are '+'s in the token, then it is easy for someone helping to spot the problem. also easy for servers to send back an error message

Re: [OAUTH-WG] Understanding the reasoning for Base64

2010-07-03 Thread Dick Hardt
On 2010-07-03, at 11:28 AM, Luke Shepard wrote: * We'd like the signature first (so you can left split instead of right split) What are the advantages of left split vs right split? Built in split function with a limit is more common, which makes the left split easier. Size

Re: [OAUTH-WG] Security of user agent clients (WAS: End user auth response code-and-token's scope parameter)

2010-07-03 Thread Andrew Arnott
On Fri, Jul 2, 2010 at 9:12 PM, Eran Hammer-Lahav e...@hueniverse.comwrote: You are putting too much weight on the value of redirection URI registration. Since the same problem exists between the user-agent script and the server-side component used in the user-agent profile, anyone can

Re: [OAUTH-WG] Security of user agent clients (WAS: End user auth response code-and-token's scope parameter)

2010-07-03 Thread Andrew Arnott
(this sounds sarcastic, but I'm no being sarcastic... it's a serious question/challenge)... Why not just remove the client_id parameter from the user-agent flow? It's absolutely meaningless to security. It's only perceivable benefit is that the auth server can possible display to the user the

Re: [OAUTH-WG] Understanding the reasoning for Base64

2010-07-03 Thread Dick Hardt
On 2010-07-03, at 12:14 PM, Naitik Shah wrote: On Sat, Jul 3, 2010 at 9:42 AM, Dick Hardt dick.ha...@gmail.com wrote: On 2010-07-03, at 9:13 AM, Naitik Shah wrote: I think Naitik is saying that accidentally doing base64 and not base64url will send some '+'s along. if there are '+'s

[OAUTH-WG] Draft 9, Section 4.1.1 missing several parameters

2010-07-03 Thread Andrew Arnott
Section 4.1.1, which deals with requesting an access token using an authorization code, doesn't list the client_id and client_secret parameters at all, yet mentions verifying them in paragraph form, and they are included in the example. -- Andrew Arnott I [may] not agree with what you have to

[OAUTH-WG] Possible typos in -09, section 2.1 examples

2010-07-03 Thread Diogo Almeida
Hello, Both examples in section 2.1 mention a type parameter, which, if I'm interpreting the changes correctly, has been removed in -07. Assuming it's indeed a typo. Where it reads: For example (line breaks are for display purposes only): POST /token HTTP/1.1 Host:

[OAUTH-WG] draft 9, section 4.3.1 missing error code for invalid user credentials

2010-07-03 Thread Andrew Arnott
I see an invalid-client-credentials error code, but for the basic-credentials grant type, it seems there should be a specific error code to indicate the resource owner's basic creds are invalid, as opposed to the client's credentials being invalid. -- Andrew Arnott I [may] not agree with what you

Re: [OAUTH-WG] Possible typos in -09, section 2.1 examples

2010-07-03 Thread Eran Hammer-Lahav
Thanks. This was previously reported and already fixed for -10. Should include the grant_type parameter. EHL On 7/3/10 3:57 PM, Diogo Almeida diogo.borges.alme...@gmail.com wrote: Hello, Both examples in section 2.1 mention a type parameter, which, if I'm interpreting the changes correctly,

Re: [OAUTH-WG] Draft 9, Section 2 vs. Section 4.1

2010-07-03 Thread Eran Hammer-Lahav
Section 2 talked about how the client authenticates itself. This is used in the token endpoint but can be used elsewhere (i.e. A device profile). EHL On 7/3/10 5:42 PM, Andrew Arnott andrewarn...@gmail.com wrote: It may be my misreading the spec, or making assumptions based on my cluttered

Re: [OAUTH-WG] draft 9, section 4.3.1 missing error code for invalid user credentials

2010-07-03 Thread Eran Hammer-Lahav
There is no difference. The client credentials are either valid or not. EHL On 7/3/10 5:28 PM, Andrew Arnott andrewarn...@gmail.com wrote: I see an invalid-client-credentials error code, but for the basic-credentials grant type, it seems there should be a specific error code to indicate the