Re: Oauth blog post
Hector Santos <hsantos@isdg.net> Fri, 03 August 2012 04:07 UTC
Return-Path: <hsantos@isdg.net>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 876FC11E809B for <ietf@ietfa.amsl.com>; Thu, 2 Aug 2012 21:07:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.586
X-Spam-Level:
X-Spam-Status: No, score=-102.586 tagged_above=-999 required=5 tests=[AWL=0.013, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CugoJUVO0djx for <ietf@ietfa.amsl.com>; Thu, 2 Aug 2012 21:07:21 -0700 (PDT)
Received: from pop3.winserver.com (news.winserver.com [208.247.131.9]) by ietfa.amsl.com (Postfix) with ESMTP id 50FFD11E80AE for <ietf@ietf.org>; Thu, 2 Aug 2012 21:07:20 -0700 (PDT)
DKIM-Signature: v=1; d=isdg.net; s=tms1; a=rsa-sha1; c=simple/relaxed; l=5870; t=1343966838; h=Received:Received: Received:Received:Message-ID:Date:From:Organization:To:Subject: List-ID; bh=nHgxf2mN8tLLJU2P/JXReTNM+V8=; b=pd2z/5+E4ykTzukHohT9 OAEsX9iE6wQvSWWLvzHhyAumQEcEdKUfxJe4o16iiWFiDfWYJRGeSGFjtL5r9CdY f7XjwcLccy89HkWavynPffFh49AyKiby9eQNuguNNX3XIMd+4E3p3yH0mrkxAxho ASnFzo7hCk2tHm21wNu5Ff0=
Received: by winserver.com (Wildcat! SMTP Router v7.0.454.4) for ietf@ietf.org; Fri, 03 Aug 2012 00:07:18 -0400
Authentication-Results: dkim.winserver.com; dkim=pass header.d=beta.winserver.com header.s=tms1 header.i=beta.winserver.com; adsp=pass policy=all author.d=isdg.net asl.d=beta.winserver.com;
Received: from hector.wildcatblog.com ([208.247.131.23]) by winserver.com (Wildcat! SMTP v7.0.454.4) with ESMTP id 4283621415.6563.4072; Fri, 03 Aug 2012 00:07:16 -0400
DKIM-Signature: v=1; d=beta.winserver.com; s=tms1; a=rsa-sha256; c=simple/relaxed; l=5870; t=1343966678; h=Received:Received: Message-ID:Date:From:Organization:To:Subject:List-ID; bh=GpFOH3f kNY7ZoIf78SumpZauZad66W5bIboP7K/rZ08=; b=d+FBL9EX4dkQZejR/ClyALp Xrgav4vF2hl2fhzFUpRbEM2G/YJg0LDubbcKcPiZv7pGFJ6e9PUbuzMtphF24WC0 HoDGF5/hGtKev8QkzAlXUnY+Bs/XEfZQAZN2VMAKoYks5+9NGQa5itNZujcwcui2 IbSicCcFZ0cmxa3EnIcg=
Received: by beta.winserver.com (Wildcat! SMTP Router v7.0.454.4) for ietf@ietf.org; Fri, 03 Aug 2012 00:04:38 -0400
Received: from [192.168.1.101] ([99.3.147.93]) by beta.winserver.com (Wildcat! SMTP v7.0.454.4) with ESMTP id 587476286.9.6528; Fri, 03 Aug 2012 00:04:37 -0400
Message-ID: <501B4E68.2030402@isdg.net>
Date: Fri, 03 Aug 2012 00:07:04 -0400
From: Hector Santos <hsantos@isdg.net>
Organization: Santronics Software, Inc.
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Subject: Re: Oauth blog post
References: <501531F7.5040404@gmail.com> <6.2.5.6.2.20120729073422.06d8fe10@resistor.net> <39B73AD9-4E8F-4E94-A538-69BE5D8C0E18@gmx.net> <6.2.5.6.2.20120730101231.047f2550@resistor.net>, <CAL0qLwYNRW6FSC4kMQkn81+4HgKdv591D43Z31rLAg3ArRsSZg@mail.gmail.com> <CD5674C3CD99574EBA7432465FC13C1B22726A0BED@DC-US1MBEX4.global.avaya.com> <CABC742E-0DD2-412D-B60E-879C30D01769@gmx.net>
In-Reply-To: <CABC742E-0DD2-412D-B60E-879C30D01769@gmx.net>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: SM <sm@resistor.net>, "ietf@ietf.org" <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Aug 2012 04:07:22 -0000
Whose library? (rhetorical question). In my experience, the issue is pretty straight forward and its what this OAUTH fellow exemplified - technology leaders taking control of a standard for their strategic benefit. This is not a phenomenon, its par for the course and its a principle reason why I have mandated since the 80s that we (SSI) do not get locked in on any standard protocol, with PPP, RADIUS, TELNET, FTP, SMTP, POP3, HTTP and others our product are strategically based on. This is not odd and product/project managers who don't recognized protocol(s) apply to the benefit of their company and product lines is well, not doing their company any great service. The IETF is suppose to be the watchdog for protocol standards changing on the community and more often you are seeing the mantra of "Who's Who" or basically the old GM theory - "Whats good for GM, is good for ...." changing standards or pseudo developed standard protocols. Overall, we have a conflict of interest and if anyone who does not have any particular interest in a protocol, makes you wonder why one would be involved or are even carrying a corporate badge. I for one will not appreciate an employee doing work that may have a direct or indirect conflict of interest and would be pissed if he didn't recognized it. Thats not odd or evil. Thats par for the course. Which brings us to the "Whose Library?" question. If one is to follow market and technology leaders, does that mean you are using their library as well? I'm sure that does not always fit with all corporate IP policies, and more controlled so in the past with in-house developed source code, than it does today with all the globalization and participation going on. Look at the mess that (open source) created! It all fun when you're young, but one day you have to bring home the bacon. I think it is a mistake to assume that using a Library is the answer or rather is something that defines a protocol direction and the people that define it. One question might be what language is this in? Would it be C/C++? or some perl scripting language? Some other? What if the organization has its own strategic "added value" language for its customers? You don't have to go far than just use an example of .NET? What if the OAUTH Library was offered only in .NET. I'm sure the *nix world would not be jumping with joy there. All this and I've hardly touch based with many more reasons to be careful of these protocol definition/direction issues, why one has be very careful and also if they can, be active, if only just vocal and watchful when need be of people, in particular those who are very active with the IETF process taking control and advocating a method in a direction that can have a major/negative impact on you. Its a tough issue because decisions do need to be made but its getting harder to swallow the "Rough Consensus" stick being especially when its a highly subjective issue involved. In any case, I believe the IETF should take heed of what has occured with the OAUTH incident. I don't believe it is an isolated issue which I am sure many here believe. I am not sure what all can be learned other than possibly the IETF needs to be more watchful of standards moving away from a network wide community open standard to one that only feasibly benefits a much smaller set, abeit larger entities. At the end of the day, its all about cost, yet, while a library may help address that, that is not always the best solution unless we do want to have specific market and technology leaders in control of a particular protocol w/o a library. In my view, the community MUST have an IETF around to be watchful of the standards from being strategically changed on people. It assume a level of equal capability by all to stay on par or get out of the way and that presents conflict of interest and possible anti-trust. The GM theory does not always apply. -- HLS Hannes Tschofenig wrote: > In the identity management case we are not necessarily talking about solutions that are "good" or "bad". The issue is that certain people care about one use case and other people care about other use cases. I use the term "use case" in a generic sense to also include certain deployment assumptions (e.g., has to work with existing programming languages, deployment environments), or design themes (e.g., XML vs. JSON). > > So, for example, in the OAuth case there are people who care a lot about different Websites sharing data between each other (the photo sharing / photo printing use case). Again others think that the smart phone use case is more important. The solutions for these two cases are slightly different (because they can rely on different assumptions). > > Initially, people start with a single use case they care about. The work gets attention and other people start to use the protocol as well and notice that it does not meet their use cases. So, they add functionality. Over time the set of specification becomes more complex and a beginner does not see through the specification jungle anymore. Then, these newcomers start from scratch to fix all these "complex protocols". Typically, these persons like to reject any idea that was done in the past (such as learning from the experience the previous generation had made). The cycle starts from the beginning. We went through these cycles several times already in the identity management world. > I believe that application developers shouldn't even worry about the details of the protocol suite. They should be using a library instead. We use libraries all the time and particularly with security protocols. Take TLS as an example. No application developer would come up with the idea to write their own TLS stack either. They let security professionals write those libraries.
- Oauth blog post Yaron Sheffer
- Re: Oauth blog post Randy Bush
- Re: Oauth blog post SM
- RE: Oauth blog post Tschofenig, Hannes (NSN - FI/Espoo)
- Re: Oauth blog post Hannes Tschofenig
- Re: Oauth blog post Glen Zorn
- RE: Oauth blog post Worley, Dale R (Dale)
- Re: Oauth blog post Hannes Tschofenig
- Re: Oauth blog post Hannes Tschofenig
- Re: Oauth blog post Yoav Nir
- Re: Oauth blog post Hannes Tschofenig
- Re: Oauth blog post Glen Zorn
- RE: Oauth blog post Worley, Dale R (Dale)
- Re: Oauth blog post Glen Zorn
- Re: Oauth blog post Yaron Sheffer
- Re: Oauth blog post Hannes Tschofenig
- Re: Oauth blog post Hannes Tschofenig
- Re: Oauth blog post Tim Bray
- RE: Oauth blog post Worley, Dale R (Dale)
- Re: Oauth blog post SM
- Re: Oauth blog post Murray S. Kucherawy
- Re: Oauth blog post Murray S. Kucherawy
- Re: Oauth blog post SM
- RE: Oauth blog post Worley, Dale R (Dale)
- RE: Oauth blog post Glen Zorn
- Re: Oauth blog post Hannes Tschofenig
- Re: Oauth blog post Hannes Tschofenig
- RE: Oauth blog post Worley, Dale R (Dale)
- Re: Oauth blog post Hector Santos