Re: [OAUTH-WG] proposed agenda for second interim meeting

2010-02-03 Thread Dick Hardt
On 2010-02-03, at 11:21 AM, Eran Hammer-Lahav wrote: -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Eran Hammer-Lahav Sent: Wednesday, February 03, 2010 11:19 AM To: Dick Hardt Cc: OAuth WG Subject: Re: [OAUTH-WG] proposed agenda

Re: [OAUTH-WG] proposed agenda for second interim meeting

2010-02-03 Thread Dick Hardt
On 2010-02-03, at 12:01 PM, Peter Saint-Andre wrote: hat type='chair'/ On 2/3/10 12:46 PM, Dick Hardt wrote: Wanting to discuss technical details when there does not seem to be consensus on the problem we are solving was my Titanic reference. Remember, these interim meetings

Re: [OAUTH-WG] Signatures, Why?

2010-03-04 Thread Dick Hardt
On 2010-03-04, at 12:27 PM, Igor Faynberg wrote: Blaine Cook wrote: - Why are signatures needed? 1) For authentication 2) For ensuring integrity 3) For non-repudiation Those are the general capabilities of signatures. Why does the Client need to sign the request / token? is the

Re: [OAUTH-WG] Recent UMA work that may inform this group's deliberations

2010-03-04 Thread Dick Hardt
Hi Eve Looking at the WRAP oriented comments in the spec, here are some comments / questions: Note WRAP doesn't seem to say HTTPS is required for the user authorization URL; is this a bug in the WRAP spec? If not, is it a good idea for us to profile it in this way? Finally, is this the right

Re: [OAUTH-WG] Recent UMA work that may inform this group's deliberations

2010-03-04 Thread Dick Hardt
Thanks Eve, comments inserted ... On 2010-03-04, at 12:51 PM, Eve Maler wrote: As requested on today's call, here's a description of the places where UMA seems to need more than what the WRAP paradigm offers (both profiling and extending), based on the proposal at:

Re: [OAUTH-WG] Signatures, Why?

2010-03-08 Thread Dick Hardt
On 2010-03-08, at 1:09 PM, John Kemp wrote: On Mar 8, 2010, at 3:35 PM, Dick Hardt wrote: 2) Client signed tokens are no more secure in MITM attacks than bearer tokens for on-the-fly attacks. If the attacker can disrupt the channel, the attacker can take the signed token and use

Re: [OAUTH-WG] Recent UMA work that may inform this group's deliberations

2010-03-08 Thread Dick Hardt
On 2010-03-05, at 6:57 AM, Eve Maler wrote: More below... On 4 Mar 2010, at 5:43 PM, Dick Hardt wrote: Thanks Eve, comments inserted ... On 2010-03-04, at 12:51 PM, Eve Maler wrote: As requested on today's call, here's a description of the places where UMA seems to need more than

Re: [OAUTH-WG] Recent UMA work that may inform this group's deliberations

2010-03-09 Thread Dick Hardt
On 2010-03-09, at 7:05 AM, Eve Maler wrote: It's a good idea to give guidance on how the scope parameter should be used. That way, it will help avoid abuse of the parameter for other purposes, and clashes if different deployments are using it in different ways. (I suspect that the

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Dick Hardt
On 2010-03-09, at 4:23 PM, Marius Scurtescu wrote: On Tue, Mar 9, 2010 at 3:50 PM, David Recordon record...@gmail.com wrote: Ideally we'd limit the length of access and refresh tokens as well as client keys and secrets to no more than 255 characters (a one byte varchar in MySQL). Is this

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Dick Hardt
On 2010-03-09, at 6:24 PM, Ethan Jewett wrote: I think it would make sense to advise client library and application programmers to provide for the possibility of and storage of large tokens. We should probably reference examples of tokens seen in the wild and mention the technical

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Dick Hardt
a good thing to include. Ethan On Tue, Mar 9, 2010 at 8:14 PM, Dick Hardt dick.ha...@gmail.com wrote: On 2010-03-09, at 4:23 PM, Marius Scurtescu wrote: On Tue, Mar 9, 2010 at 3:50 PM, David Recordon record...@gmail.com wrote: Ideally we'd limit the length of access and refresh

Re: [OAUTH-WG] Defining a maximum token length?

2010-03-09 Thread Dick Hardt
On 2010-03-09, at 7:50 PM, David Recordon wrote: On Tue, Mar 9, 2010 at 7:25 PM, Dick Hardt dick.ha...@gmail.com wrote: I understand the desire to set a max length that can easily fit into a DB. There are lots of other items I think the developer is storing that can be long as well, like

Re: [OAUTH-WG] First draft of OAuth 2.0

2010-03-23 Thread Dick Hardt
On 2010-03-23, at 12:05 PM, Chuck Mortimore wrote: No worries – I figured it would be easier to push for it’s inclusion if the work were minimal. We will definitely need to implement this style of profile, as will many others, so it’s essential it ends in some spec. Personally I’d

Re: [OAUTH-WG] new sponsorship, time available for WG

2010-03-24 Thread Dick Hardt
into the spec as soon as possible. I have the next 4 weeks set aside for making significant progress on this document. EHL -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Brian Eaton Sent: Wednesday, March 24, 2010 10:25 AM To: Dick Hardt Cc

Re: [OAUTH-WG] Scope using Realm idea

2010-04-06 Thread Dick Hardt
On 2010-04-06, at 12:16 AM, Eran Hammer-Lahav wrote: On 4/2/10 3:27 PM, Dick Hardt dick.ha...@gmail.com wrote: There are times when a resource may have different scope for different kinds of access. realm != scope No. Realm is a subset. It is what people define as the protected

Re: [OAUTH-WG] Issue: Scope parameter

2010-04-18 Thread Dick Hardt
The scope parameter was included in WRAP at the request of library and AS implementors to standardize a commonly included parameters. The client_id parameter seems similar to the scope parameter. The meaning of client_id is not defined in the spec and is AS specific. A client_id that a developer

Re: [OAUTH-WG] Issue: Scope parameter

2010-04-18 Thread Dick Hardt
think we need to add a bit more definition to the scope parameter. Maybe as simple as a comma-separated list of strings. On Sun, Apr 18, 2010 at 6:12 PM, Dick Hardt dick.ha...@gmail.com wrote: The scope parameter was included in WRAP at the request of library and AS implementors to standardize

Re: [OAUTH-WG] Issue: prefixing parameters with oauth_

2010-04-18 Thread Dick Hardt
dubios of no oauth_ prefix after hacking on a draft implementation their opinion has changed. They're now really enjoying shorter and cleaner paramater names and found them to be easier to document and no more difficult to implement. On Sun, Apr 18, 2010 at 5:46 PM, Dick Hardt dick.ha

[OAUTH-WG] 4/17 draft feedback: token != identifier

2010-04-18 Thread Dick Hardt
The spec describes the access token as an identifier. One of the key capabilities of WRAP was that the token could be self contained. The PR could make an access control decision by examining the access token and not calling the AS. The token is referred to as an identifier in the Abstract,

[OAUTH-WG] Editorial feedback on 4/17 draft

2010-04-18 Thread Dick Hardt
General comments: Putting the flow description, diagram and steps in the section with the spec work well. Use of server term. In numerous places, the term server is used instead of authorization server or resource server (maybe even web server). To avoid ambiguity, I would suggest the term

Re: [OAUTH-WG] Issue: prefixing parameters with oauth_

2010-04-18 Thread Dick Hardt
On 2010-04-18, at 9:04 PM, Marius Scurtescu wrote: On Sun, Apr 18, 2010 at 5:46 PM, Dick Hardt dick.ha...@gmail.com wrote: Since calls to the token endpoint use POST, there can not be any confusion between the parameters in the body of the message and URI query parameters Unfortunately

[OAUTH-WG] Clarification: authorization server matching of redirect URI

2010-04-18 Thread Dick Hardt
Some AS will match part of the URI to what was registered, some require everything up to the start of a query. The spec needs to clarify how much of the URI needs to be matched, or state it is AS specified. -- Dick ___ OAuth mailing list

[OAUTH-WG] Clarification: Authorization scheme :: Token vs OAuth

2010-04-18 Thread Dick Hardt
I recall some earlier discussion on calling the scheme Token vs OAuth and see that it is now Token per the example: Authorization: Token token=vF9dft4qmT Would explain or point out the logic of using Token rather than OAuth? A related question: is the scheme case

Re: [OAUTH-WG] Issue: Scope parameter

2010-04-18 Thread Dick Hardt
+1 to #1 On 2010-04-18, at 9:35 PM, Luke Shepard wrote: 1/ We leave the scope parameter as an Auth Server-specific, opaque parameter. 2/ We all agree on a format and spec for the scope parameter. 3/ We drop the scope parameter and make each server define their own, non-standard scope param.

Re: [OAUTH-WG] Clarification: authorization server matching of redirect URI

2010-04-18 Thread Dick Hardt
. On the other hand, limiting the sub-domain can make scalability harder. Care to propose text? EHL -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Dick Hardt Sent: Sunday, April 18, 2010 9:22 PM To: OAuth WG Subject: [OAUTH-WG] Clarification

Re: [OAUTH-WG] Issue: state in web server flow

2010-04-18 Thread Dick Hardt
On 2010-04-18, at 10:28 PM, Eran Hammer-Lahav wrote: -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Dick Hardt Sent: Sunday, April 18, 2010 9:20 PM To: OAuth WG Subject: [OAUTH-WG] Issue: state in web server flow Why

Re: [OAUTH-WG] Issue: prefixing parameters with oauth_

2010-04-19 Thread Dick Hardt
On 2010-04-19, at 9:46 PM, Peter Saint-Andre wrote: On 4/18/10 6:46 PM, Dick Hardt wrote: Given the practice that the authorization endpoint and the redirect_uri can contain URI query parameters, then differentiating between application specific query parameters and OAuth protocol

Re: [OAUTH-WG] Call for Consensus (Deadline: April 22)

2010-04-27 Thread Dick Hardt
+1 as starting point. :) On Tue, Apr 27, 2010 at 11:55 AM, Peter Saint-Andre stpe...@stpeter.imwrote: On 4/26/10 3:14 PM, Marius Scurtescu wrote: +1 I am assuming this means that the current draft will become the initial check point, version 00. Is that correct? Correct. /psa

Re: [OAUTH-WG] application/x-www-form-urlencoded vs JSON (Proposal)

2010-04-30 Thread Dick Hardt
On 2010-04-30, at 9:02 AM, Yaron Goland wrote: I actually have a preference for application/x-www-form-urlencoded but it's not overwhelming, the key thing I believe we need to do is have exactly one request/response format. In other words, I don't believe we should use one format for

Re: [OAUTH-WG] application/x-www-form-urlencoded vs JSON

2010-04-30 Thread Dick Hardt
the request parameter and schema of the various reply formats. EHL -Original Message- From: Torsten Lodderstedt [mailto:tors...@lodderstedt.net] Sent: Monday, April 19, 2010 4:48 AM To: Eran Hammer-Lahav Cc: Dick Hardt; OAuth WG Subject: Re: [OAUTH-WG] application/x-www-form

Re: [OAUTH-WG] Scope - Coming to a Consensus

2010-05-01 Thread Dick Hardt
On 2010-05-01, at 3:48 PM, Luke Shepard wrote: I agree with approach #3. As for the delimiter, I'm fine if the spec wants to do space-delimited. Just FYI Facebook will also continue to support and document commas in addition to whatever the spec says, because spaces are typically

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-09 Thread Dick Hardt
On 2010-05-09, at 2:06 PM, Eran Hammer-Lahav wrote: DEADLINE: 5/13 I would like to publish one more draft before our interim meeting in two weeks (5/20). Below are two open issues we have on the list. Please reply with your preference (or additional solutions) to each item. Issues with

Re: [OAUTH-WG] Comments on draft-ietf-oauth-v2-03.txt

2010-05-09 Thread Dick Hardt
On 2010-05-09, at 3:25 PM, Eran Hammer-Lahav wrote: 3.2.1.1. Access Token Response expires_in OPTIONAL. The duration in seconds of the access token lifetime. refresh_token OPTIONAL. The refresh token used to obtain new access tokens using

[OAUTH-WG] modifying the scope of an access token

2010-05-09 Thread Dick Hardt
There has been some discussion about modifying the scope of the access token during a refresh. Perhaps we can add another method to what the AS MAY support that allows modifying the scope of an access token. Type of request is modify and the scope parameter is required to indicate the new scope

[OAUTH-WG] delegating access to another client

2010-05-09 Thread Dick Hardt
Twitter has an interesting use case that may become common: one client needs to delegate access to another client. Similar to the 'modify' method where the scope of the access token can be modified, the 'delegate' method allows a client to request delegation to another client (the delegate).

Re: [OAUTH-WG] Comments on draft-ietf-oauth-v2-03.txt

2010-05-09 Thread Dick Hardt
Right now it depends on the server. The spec should clarify that. Suggested wording: If the client has previously registered a redirection URI with the authorization server, the authorization server MUST verify that the redirection URI received matches the registered URI associated

Re: [OAUTH-WG] Open Issues: Group Survey (respond by 5/13)

2010-05-10 Thread Dick Hardt
On 2010-05-10, at 1:11 AM, Pid wrote: On 10/05/2010 07:57, Joseph Smarr wrote: 1. Server Response Format I vote for B, though I could live with C. (A would make me sad though) We've had a healthy and reasonable debate about the trade-offs here, but I think the main counterargument for

Re: [OAUTH-WG] modifying the scope of an access token

2010-05-16 Thread Dick Hardt
...@google.com] Sent: Monday, May 10, 2010 12:49 PM To: Eran Hammer-Lahav Cc: Dick Hardt; OAuth WG (oauth@ietf.org) Subject: Re: [OAUTH-WG] modifying the scope of an access token On Sun, May 9, 2010 at 10:17 PM, Eran Hammer-Lahav e...@hueniverse.com wrote: This would only work for the client

Re: [OAUTH-WG] modifying the scope of an access token

2010-05-16 Thread Dick Hardt
, May 10, 2010 12:49 PM To: Eran Hammer-Lahav Cc: Dick Hardt; OAuth WG (oauth@ietf.org) Subject: Re: [OAUTH-WG] modifying the scope of an access token On Sun, May 9, 2010 at 10:17 PM, Eran Hammer-Lahav e...@hueniverse.com wrote: This would only work for the client credentials flow

Re: [OAUTH-WG] Strict equality matching of redirect_uri

2010-05-16 Thread Dick Hardt
On Tue, May 11, 2010 at 11:31 PM, Luke Shepard lshep...@facebook.comwrote: FWIW, Facebook does not do strict equality matching on redirect_uri. We accept any redirect_uri that has either: - its prefix is the registered url - or it is a special facebook.com/xd_proxy.php url, with an origin

Re: [OAUTH-WG] in-app logout?

2010-05-16 Thread Dick Hardt
James: An important capability of the refresh token is that it *can* be a self contained token in that is not an id, but a signed token that can be examined and acted upon on presentation. Torsten: enabling a client to revoke a refresh token looks like a useful mechanism. I anticipate it will be

Re: [OAUTH-WG] Indicating sites where a token is valid

2010-05-16 Thread Dick Hardt
Not sure if you intended this, but you are mixing user present and user not present access control. I do NOT think we want OAuth protected images to be the same as Basic auth protected images. I do think OpenID protected images and Basic auth are similar. With OAuth today, the user has granted

Re: [OAUTH-WG] Separate HTTP and HTTPS tokens

2010-05-16 Thread Dick Hardt
Note that you could accomplish this functionality with the 'modify' proposal I posted where an access token with a different scope could be requested could be used to acquire a second token that has less privileges and would be appropriate over HTTP. To recap, 'modify' is like 'refresh' except

Re: [OAUTH-WG] Spec text for sites field

2010-05-16 Thread Dick Hardt
Looking over the previous threads, I don't think an important capability was pointed out that we want to preserve: The AS may NOT need or want to know where an access token is used. In other words, the access token could be viewed as a claim that can presented to an arbitrary resource to gain

[OAUTH-WG] proposed text to remove identifier from token definitions

2010-05-16 Thread Dick Hardt
Below is proposed text where a token is referred to as an identifier. Here is the definition of identifier from RFC 4949: $ identifier (I) A data object -- often, a printable, non-blank character string -- that definitively represents a specific identity of a system entity,

Re: [OAUTH-WG] [oauth] #6: Make automated self-registration of unique clients possible

2010-05-16 Thread Dick Hardt
On 2010-05-16, at 3:46 PM, oauth issue tracker wrote: #6: Make automated self-registration of unique clients possible -+-- Reporter: e...@…| Owner: Type: enhancement | Status: new

Re: [OAUTH-WG] in-app logout?

2010-05-16 Thread Dick Hardt
On 2010-05-16, at 5:20 PM, Manger, James H wrote: Dick, James: An important capability of the refresh token is that it *can* be a self contained token in that is not an id, but a signed token that can be examined and acted upon on presentation. Defining refresh_token as a URI does not

Re: [OAUTH-WG] Indicating sites where a token is valid

2010-05-20 Thread Dick Hardt
The image can be protected by both. Do you expect OAuth to be used with user present in the browser? On 2010-05-17, at 11:20 PM, Eran Hammer-Lahav wrote: Why can’t an image be protected with both Basic and OAuth? In this case the browser is the OAuth client. EHL From: Dick Hardt

[OAUTH-WG] Why JSON (Was: [oauth] Re: [twitter-dev] Hard lesson learned)

2010-05-24 Thread Dick Hardt
Frustration devs have with URL encoding. This is the core motivation to using JSON as the AS response format. -- Dick Begin forwarded message: From: Andrew Badera and...@badera.us Date: May 23, 2010 2:57:44 PM PDT To: twitter-development-t...@googlegroups.com Cc: oa...@googlegroups.com

Re: [OAUTH-WG] 'immediate' without identity

2010-05-24 Thread Dick Hardt
On 2010-05-23, at 8:40 AM, Eran Hammer-Lahav wrote: But back to my original email, what are the use cases for 'immediate' without identity? The client may not have any indication of which user it is, but want to check if it is a user they already know. They can do a check immediate, get the

Re: [OAUTH-WG] 'immediate' without identity

2010-05-24 Thread Dick Hardt
: Dick Hardt [mailto:dick.ha...@gmail.com] Sent: Sunday, May 23, 2010 8:01 PM To: Eran Hammer-Lahav Cc: Torsten Lodderstedt; OAuth WG (oauth@ietf.org) Subject: Re: [OAUTH-WG] 'immediate' without identity On 2010-05-23, at 8:40 AM, Eran Hammer-Lahav wrote: But back to my original email, what

Re: [OAUTH-WG] 'immediate' without identity

2010-05-24 Thread Dick Hardt
On 2010-05-24, at 8:55 AM, Eran Hammer-Lahav wrote: -Original Message- From: Dick Hardt [mailto:dick.ha...@gmail.com] Sent: Monday, May 24, 2010 7:35 AM To: Eran Hammer-Lahav Cc: OAuth WG (oauth@ietf.org) Subject: Re: [OAUTH-WG] 'immediate' without identity You were looking

Re: [OAUTH-WG] Access token opaqueness question

2010-05-24 Thread Dick Hardt
Not sure why you want to pull the OAuth token parameters from the Kerberos token. Are you envisioning the Protected Resource is a Kerberos Client? On Mon, May 24, 2010 at 9:31 AM, Thomas Hardjono hardj...@mit.edu wrote: I'm still a newbie to the OAuth and WRAP discussions, so please bear

Re: [OAUTH-WG] multiple access tokens from a single authorization flow?

2010-05-26 Thread Dick Hardt
Are you referring to my OpenID v.Next NewSocialService scenario? What issues do you see doing this in v.Next rather than OAuth? Using OpenID allows the client/RP to only discover the user's OP, which knows where the user's calendar / address book is. Having the OP as an intermediary allows it

Re: [OAUTH-WG] Should replay of access token request be allowed?

2010-05-30 Thread Dick Hardt
I think so. In WRAP the verification code was RECOMMENDED one time use. On 2010-05-30, at 9:38 AM, Andrew Arnott wrote: I was reviewing 3.6.2. Client Requests Access Token and it occurred to me that there's no requirement in the spec (that I can find) that a given callback URI and

Re: [OAUTH-WG] Questions about scopes (section 6.1)

2010-06-01 Thread Dick Hardt
I don't recall any discussion at the level of detail that Torsten is asking about. My inclination would be the Client would include the what was returned in WWW-Authenticate in the access request call. On Tue, Jun 1, 2010 at 11:47 AM, Peter Saint-Andre stpe...@stpeter.imwrote: We discussed

Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-02 Thread Dick Hardt
The Assertion Flow is for the AS to act as an STS where one token is exchanged for another. This allows the PR to not have to worry about different kinds of tokens and to only deal with tokens issued by an AS. Lisa: a real world example of your use case would make it easier for how you got to the

Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-03 Thread Dick Hardt
On 2010-06-03, at 7:54 AM, Thomas Hardjono wrote: Dick, Brian, Thanks for the clarification. - Is the Assertion Flow designed only for the STS, or can it be used with other identity providers (non-WSS). It can be used with any tokens. I use the STS term to clarify the design pattern.

Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-03 Thread Dick Hardt
On 2010-06-03, at 8:20 AM, Peter Saint-Andre wrote: On 6/3/10 8:54 AM, Thomas Hardjono wrote: PS. Compared to the details of RFC4120 and even to the old ISAKMP in the IETF, the current OAuth2.0 draft-05 spec appear to be a high-level framework that needs to be instantiated/profiled. At

Re: [OAUTH-WG] Partially standardized format for access tokens?

2010-06-04 Thread Dick Hardt
On Fri, Jun 4, 2010 at 8:00 AM, Luke Shepard lshep...@facebook.com wrote: On Jun 4, 2010, at 7:19 AM, George Fletcher wrote: On 6/4/10 9:53 AM, Luke Shepard wrote: Having a single resource server that works with multiple independent auth servers is not in scope for OAuth. That said,

Re: [OAUTH-WG] Partially standardized format for access tokens?

2010-06-04 Thread Dick Hardt
format Thanks, George On 6/4/10 12:45 PM, Luke Shepard wrote: On Jun 4, 2010, at 8:41 AM, Dick Hardt wrote: There is more to the web than the social web Luke, and supporting multiple AS has been a design goal of WRAP and OAuth 2.0 and is being implemented. Whoa, I didn't say

Re: [OAUTH-WG] Partially standardized format for access tokens?

2010-06-04 Thread Dick Hardt
: On Jun 4, 2010, at 8:41 AM, Dick Hardt wrote: There is more to the web than the social web Luke, and supporting multiple AS has been a design goal of WRAP and OAuth 2.0 and is being implemented. Whoa, I didn't say there wasn't. I agree that supporting multiple authorization servers

Re: [OAUTH-WG] 3.4. Client Credentials text change proposal

2010-06-04 Thread Dick Hardt
+1 On Fri, Jun 4, 2010 at 12:36 AM, axel.nenn...@telekom.de wrote: +1 -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Nat Sakimura Sent: Saturday, May 08, 2010 6:45 AM To: oauth Subject: [OAUTH-WG] 3.4. Client Credentials text change

Re: [OAUTH-WG] Partially standardized format for access tokens?

2010-06-04 Thread Dick Hardt
On 2010-06-04, at 6:39 PM, Luke Shepard wrote: I don't see how the extra parameter is required to support multiple auth servers for a resource. it is needed if there are multiple token types Responses to Dick and Torsten: On Jun 4, 2010, at 11:33 AM, Dick Hardt wrote: if we have

Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-04 Thread Dick Hardt
because we use it On 2010-06-04, at 6:40 PM, Luke Shepard wrote: Why? On Jun 4, 2010, at 4:41 PM, Patrick Harding wrote: +1 Sent from my iPhone On Jun 4, 2010, at 5:38 PM, Brian Campbell bcampb...@pingidentity.com wrote: On Thu, Jun 3, 2010 at 9:20 AM, Peter Saint-Andre

Re: [OAUTH-WG] Assertion flow and token bootstrapping

2010-06-07 Thread Dick Hardt
/ __ -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Dick Hardt Sent: Friday, June 04, 2010 9:59 PM To: Luke Shepard Cc: oauth@ietf.org Subject: Re: [OAUTH-WG] Assertion flow and token bootstrapping because we use it On 2010-06-04, at 6

Re: [OAUTH-WG] Username and Password flow: no captcha?

2010-06-07 Thread Dick Hardt
Background: The username / password flow can be used to brute force attack a system to find valid credentials. A captcha is presented to slow the attack down -- similar to what happens when you log in with an invalid password on a webpage. The captcha would be displayed by the app for the user

Re: [OAUTH-WG] User-agent flow and pre-registered redirect_uri

2010-06-07 Thread Dick Hardt
You are pointing out Marius point -- he wants to require registration. If the redirect_uri is not registered, the only party that can detect that it is the right URI is the user. The AS can only show the user the redirect_uri passed over. -- Dick On 2010-06-07, at 5:31 PM, Chuck Mortimore

Re: [OAUTH-WG] Username and Password flow: no captcha?

2010-06-07 Thread Dick Hardt
On 2010-06-07, at 1:24 PM, Thomas Hardjono wrote: What if the username/password (or PIN) was used to release a secret (located in an OTP dongle) or to exercise a secret key (symmetric or asymmetric) located in a smartcard or TPM chip? Reading Section 3.8, it seems it covers these cases

Re: [OAUTH-WG] Proposal for single JSON response format

2010-06-10 Thread Dick Hardt
+1 On 2010-06-10, at 1:29 PM, Eran Hammer-Lahav wrote: After taking a break from our previous debate(s) on the issue of which response format to support, I would like to suggest the following: - Support a single response format (including in the user-agent fragment) using JSON. My

Re: [OAUTH-WG] Assertion flow: please add optional refresh_token in response

2010-06-15 Thread Dick Hardt
+1 On 2010-06-14, at 9:02 PM, Brian Eaton wrote: On Mon, Jun 14, 2010 at 8:31 PM, Andrew Arnott andrewarn...@gmail.com wrote: For an application I'm building, the installed client app will have intermittent windows of time where it can obtain a (non-OAuth) assertion for user identity.

Re: [OAUTH-WG] Assertion flow: please add optional refresh_token in response

2010-06-15 Thread Dick Hardt
right to say it. - S. G. Tallentyre On Mon, Jun 14, 2010 at 11:00 PM, Dick Hardt dick.ha...@gmail.com wrote: +1 On 2010-06-14, at 9:02 PM, Brian Eaton wrote: On Mon, Jun 14, 2010 at 8:31 PM, Andrew Arnott andrewarn...@gmail.com wrote: For an application I'm building, the installed

Re: [OAUTH-WG] Assertion flow: please add optional refresh_token in response

2010-06-15 Thread Dick Hardt
Are you envisioning the client makes a call to AD to get an assertion where the call is automagically authenticated as the user by NTLM? What do you envision being the relationship between the AS and AD? What authority does the AS have? How long is the refresh token valid for? I think you

Re: [OAUTH-WG] proposal for signatures

2010-06-21 Thread Dick Hardt
Thanks for writing this up Dirk. I would suggest that the token be: payload . envelope . signature This enables the payload to be encrypted and independent from the envelope. Token signing, verification, encryption and decryption code can then be generic and not understand the

Re: [OAUTH-WG] proposal for signatures

2010-06-21 Thread Dick Hardt
-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Brian Eaton Sent: Monday, June 21, 2010 9:49 AM To: Dick Hardt Cc: OAuth WG Subject: Re: [OAUTH-WG] proposal for signatures On Mon, Jun 21, 2010 at 7:43 AM, Dick Hardt dick.ha...@gmail.com wrote: Thanks for writing this up Dirk

Re: [OAUTH-WG] proposal for signatures

2010-06-22 Thread Dick Hardt
On 2010-06-21, at 11:03 PM, David Recordon wrote: Thanks for writing this. A few questions... Do we need both `issuer` and `key_id`? Shouldn't we use `client_id` instead at least for OAuth? it is the ID of the key, not the client -- used to rollover keys Does websafe-base64-encoded mean

Re: [OAUTH-WG] Draft -07 (major rewrite)

2010-06-22 Thread Dick Hardt
One of the modifications I concluded to do to WRAP was to add in the type parameter. I was happy to see if in David's draft. Even though redundant in some ways, it make it very clear to both the client and server what is intended. +1 for putting it back in. On Mon, Jun 14, 2010 at 11:23 AM,

Re: [OAUTH-WG] Draft -07 (major rewrite)

2010-06-22 Thread Dick Hardt
Per an earlier comment, type might not be the best name for the parameter. Perhaps method might work and adds a clear extension point for other types of calls? On Tue, Jun 22, 2010 at 1:22 PM, Dick Hardt dick.ha...@gmail.com wrote: One of the modifications I concluded to do to WRAP was to add

[OAUTH-WG] Scope :: Was: Extensibility for OAuth?

2010-06-23 Thread Dick Hardt
On 2010-06-22, at 11:07 PM, Tschofenig, Hannes (NSN - FI/Espoo) wrote: scope OPTIONAL. The scope of the access request expressed as a list of space-delimited strings. The value of the scope parameter is defined by the authorization server. If the value contains

Re: [OAUTH-WG] Scope :: Was: Extensibility for OAuth?

2010-06-24 Thread Dick Hardt
10:49 AM To: Dick Hardt Cc: Tschofenig, Hannes (NSN - FI/Espoo); OAuth WG Subject: Re: [OAUTH-WG] Scope :: Was: Extensibility for OAuth? Wasn't there some concensus that URIs would be good for scope? They have in-built namespacing ... Lukas 2010/6/23 Dick Hardt dick.ha...@gmail.com

Re: [OAUTH-WG] Scope :: Was: Extensibility for OAuth?

2010-06-25 Thread Dick Hardt
, June 24, 2010 8:15 PM To: Tschofenig, Hannes (NSN - FI/Espoo); ext Lukas Rosenstock; Dick Hardt Cc: OAuth WG Subject: RE: [OAUTH-WG] Scope :: Was: Extensibility for OAuth? I'm in favor of having a spaces separated list of tokens. The only case I can think of where the client needs

Re: [OAUTH-WG] Scope :: Was: Extensibility for OAuth?

2010-06-25 Thread Dick Hardt
To: Tschofenig, Hannes (NSN - FI/Espoo); ext Lukas Rosenstock; Dick Hardt Cc: OAuth WG Subject: RE: [OAUTH-WG] Scope :: Was: Extensibility for OAuth? I'm in favor of having a spaces separated list of tokens. The only case I can think of where the client needs to handle the scope as anything other than

Re: [OAUTH-WG] Extensibility for OAuth?

2010-06-25 Thread Dick Hardt
Would you elaborate on your reasons here? Do you think we have enumerated all the possibilities? On 2010-06-25, at 10:59 AM, Eran Hammer-Lahav wrote: I would rather limit the ability to extend the two endpoints beyond their current architecture, and instead, allow others to specify new

Re: [OAUTH-WG] Scope :: Was: Extensibility for OAuth?

2010-06-25 Thread Dick Hardt
and would like to keep the process as light as possible (i.e. no registration at all). EHL -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Dick Hardt Sent: Friday, June 25, 2010 8:50 AM To: Tschofenig, Hannes (NSN - FI/Espoo) Cc: OAuth WG

Re: [OAUTH-WG] Extensibility for OAuth?

2010-06-25 Thread Dick Hardt
parameter (such as language) is a good thing to support, and by requiring review, only parameters that don't change the overall design will be approved. EHL -Original Message- From: Dick Hardt [mailto:dick.ha...@gmail.com] Sent: Friday, June 25, 2010 11:13 AM To: Eran Hammer

Re: [OAUTH-WG] Understanding the reasoning for Base64

2010-06-25 Thread Dick Hardt
The RFC term is base64url which turns up much better results when searching. URL safe base64 is also a good search term. Note that the token may also be included in the HTTP header. base64url encoding works well for HTTP headers. Note that the token is opaque to the client, so being plain text

Re: [OAUTH-WG] What to do about 'realm'

2010-06-27 Thread Dick Hardt
I vote for (3) unless a good (4) is suggested. On 2010-06-27, at 6:51 PM, Eran Hammer-Lahav wrote: Over the past year many people expressed concerns about the use of the ‘realm’ WWW-Authenticate header parameter. The parameter is defined in RFC 2617 as required, and is allowed to have

[OAUTH-WG] semantics of scope parameter

2010-06-27 Thread Dick Hardt
The current spec defines scope (when the scope variable is introduced) as: scope OPTIONAL. The scope of the access request expressed as a list of space-delimited strings. The value of the scope parameter is defined by the authorization server. If the value

Re: [OAUTH-WG] Client credentials type

2010-06-28 Thread Dick Hardt
While the AS implementor can infer the request by the parameters, I prefer the programmer explicitly state what she is doing. Thinking of it as a method parameter rather than a type parameter makes more sense to me. Similiarly, HTTP has GET, POST, PUT etc. even though you could differentiate

Re: [OAUTH-WG] Client credentials type

2010-06-28 Thread Dick Hardt
(type vs method). Are there any objection to defining a parameter for the client authentication method? Any views about using this parameter with an HTTP authorization header? EHL From: Dick Hardt [mailto:dick.ha...@gmail.com] Sent: Monday, June 28, 2010 12:25 PM To: Eran Hammer-Lahav

Re: [OAUTH-WG] Understanding the reasoning for Base64

2010-07-03 Thread Dick Hardt
On 2010-07-02, at 5:04 PM, Paul Tarjan wrote: We don't think base64url will work, because the most common error we'll see is that developers forget the url part and just do plain base64, and that's not sufficient because the stock set includes +. I think forgetting to url-decode is more

Re: [OAUTH-WG] Understanding the reasoning for Base64

2010-07-03 Thread Dick Hardt
On 2010-07-03, at 9:13 AM, Naitik Shah wrote: I think Naitik is saying that accidentally doing base64 and not base64url will send some '+'s along. if there are '+'s in the token, then it is easy for someone helping to spot the problem. also easy for servers to send back an error message

Re: [OAUTH-WG] Understanding the reasoning for Base64

2010-07-03 Thread Dick Hardt
On 2010-07-03, at 11:28 AM, Luke Shepard wrote: * We'd like the signature first (so you can left split instead of right split) What are the advantages of left split vs right split? Built in split function with a limit is more common, which makes the left split easier. Size

Re: [OAUTH-WG] Understanding the reasoning for Base64

2010-07-03 Thread Dick Hardt
On 2010-07-03, at 12:14 PM, Naitik Shah wrote: On Sat, Jul 3, 2010 at 9:42 AM, Dick Hardt dick.ha...@gmail.com wrote: On 2010-07-03, at 9:13 AM, Naitik Shah wrote: I think Naitik is saying that accidentally doing base64 and not base64url will send some '+'s along. if there are '+'s

Re: [OAUTH-WG] proposal for signatures

2010-07-10 Thread Dick Hardt
I agree we don't want to end up like other protocols that were too generic. :) The use case I am arguing for is sending encrypted tokens. Higher levels of assurance require this and various people brought this up as a requirement when WRAP was presented at IIW 09B. -- Dick On 2010-07-10, at

Re: [OAUTH-WG] proposal for signatures

2010-07-10 Thread Dick Hardt
On 2010-07-10, at 1:42 PM, David Recordon wrote: On Sat, Jul 10, 2010 at 1:29 PM, Dick Hardt dick.ha...@gmail.com wrote: On 2010-07-10, at 1:21 PM, David Recordon wrote: On Sat, Jul 10, 2010 at 11:00 AM, Dick Hardt dick.ha...@gmail.com wrote: * the signature comes before the payload * we

Re: [OAUTH-WG] proposal for signatures

2010-07-15 Thread Dick Hardt
useful in many other architectures and protocols. -- Dick Dirk. On Fri, Jul 9, 2010 at 4:45 PM, Dick Hardt dick.ha...@gmail.com wrote: Hi Dirk Responding to this now that you are back. From: http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html (which

Re: [OAUTH-WG] signatures, v2

2010-07-15 Thread Dick Hardt
On 2010-07-15, at 6:45 PM, Naitik Shah wrote: On Thu, Jul 15, 2010 at 5:43 PM, Dirk Balfanz balf...@google.com wrote: One question: What's the deal with having the signature go first? If you can explain to me why that is a good idea, I'm happy to oblige. When we were talking about

Re: [OAUTH-WG] Change grant_type=none to something less confusing

2010-07-17 Thread Dick Hardt
On 2010-07-17, at 12:51 PM, Eran Hammer-Lahav wrote: client_credentials worked fine before. I'll just replace none with that. No one had an issue with the name in -05. +1 ___ OAuth mailing list OAuth@ietf.org

Re: [OAUTH-WG] Facebook's experience with OAuth2.0 signatures

2010-07-26 Thread Dick Hardt
Thanks for sharing Paul! On 2010-07-26, at 3:18 PM, Paul Tarjan wrote: Facebook released an early version of the proposed signature method, with the aim of getting real-life implementation experience. We are not currently using this for protected resource requests, but rather more like if

  1   2   3   4   5   >