Re: Oauth blog post

Hector Santos <hsantos@isdg.net> Fri, 03 August 2012 04:07 UTC

Return-Path: <hsantos@isdg.net>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 876FC11E809B for <ietf@ietfa.amsl.com>; Thu, 2 Aug 2012 21:07:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.586
X-Spam-Level:
X-Spam-Status: No, score=-102.586 tagged_above=-999 required=5 tests=[AWL=0.013, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CugoJUVO0djx for <ietf@ietfa.amsl.com>; Thu, 2 Aug 2012 21:07:21 -0700 (PDT)
Received: from pop3.winserver.com (news.winserver.com [208.247.131.9]) by ietfa.amsl.com (Postfix) with ESMTP id 50FFD11E80AE for <ietf@ietf.org>; Thu, 2 Aug 2012 21:07:20 -0700 (PDT)
DKIM-Signature: v=1; d=isdg.net; s=tms1; a=rsa-sha1; c=simple/relaxed; l=5870; t=1343966838; h=Received:Received: Received:Received:Message-ID:Date:From:Organization:To:Subject: List-ID; bh=nHgxf2mN8tLLJU2P/JXReTNM+V8=; b=pd2z/5+E4ykTzukHohT9 OAEsX9iE6wQvSWWLvzHhyAumQEcEdKUfxJe4o16iiWFiDfWYJRGeSGFjtL5r9CdY f7XjwcLccy89HkWavynPffFh49AyKiby9eQNuguNNX3XIMd+4E3p3yH0mrkxAxho ASnFzo7hCk2tHm21wNu5Ff0=
Received: by winserver.com (Wildcat! SMTP Router v7.0.454.4) for ietf@ietf.org; Fri, 03 Aug 2012 00:07:18 -0400
Authentication-Results: dkim.winserver.com; dkim=pass header.d=beta.winserver.com header.s=tms1 header.i=beta.winserver.com; adsp=pass policy=all author.d=isdg.net asl.d=beta.winserver.com;
Received: from hector.wildcatblog.com ([208.247.131.23]) by winserver.com (Wildcat! SMTP v7.0.454.4) with ESMTP id 4283621415.6563.4072; Fri, 03 Aug 2012 00:07:16 -0400
DKIM-Signature: v=1; d=beta.winserver.com; s=tms1; a=rsa-sha256; c=simple/relaxed; l=5870; t=1343966678; h=Received:Received: Message-ID:Date:From:Organization:To:Subject:List-ID; bh=GpFOH3f kNY7ZoIf78SumpZauZad66W5bIboP7K/rZ08=; b=d+FBL9EX4dkQZejR/ClyALp Xrgav4vF2hl2fhzFUpRbEM2G/YJg0LDubbcKcPiZv7pGFJ6e9PUbuzMtphF24WC0 HoDGF5/hGtKev8QkzAlXUnY+Bs/XEfZQAZN2VMAKoYks5+9NGQa5itNZujcwcui2 IbSicCcFZ0cmxa3EnIcg=
Received: by beta.winserver.com (Wildcat! SMTP Router v7.0.454.4) for ietf@ietf.org; Fri, 03 Aug 2012 00:04:38 -0400
Received: from [192.168.1.101] ([99.3.147.93]) by beta.winserver.com (Wildcat! SMTP v7.0.454.4) with ESMTP id 587476286.9.6528; Fri, 03 Aug 2012 00:04:37 -0400
Message-ID: <501B4E68.2030402@isdg.net>
Date: Fri, 03 Aug 2012 00:07:04 -0400
From: Hector Santos <hsantos@isdg.net>
Organization: Santronics Software, Inc.
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Subject: Re: Oauth blog post
References: <501531F7.5040404@gmail.com> <6.2.5.6.2.20120729073422.06d8fe10@resistor.net> <39B73AD9-4E8F-4E94-A538-69BE5D8C0E18@gmx.net> <6.2.5.6.2.20120730101231.047f2550@resistor.net>, <CAL0qLwYNRW6FSC4kMQkn81+4HgKdv591D43Z31rLAg3ArRsSZg@mail.gmail.com> <CD5674C3CD99574EBA7432465FC13C1B22726A0BED@DC-US1MBEX4.global.avaya.com> <CABC742E-0DD2-412D-B60E-879C30D01769@gmx.net>
In-Reply-To: <CABC742E-0DD2-412D-B60E-879C30D01769@gmx.net>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: SM <sm@resistor.net>, "ietf@ietf.org" <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Aug 2012 04:07:22 -0000

Whose library? (rhetorical question).

In my experience, the issue is pretty straight forward and its what 
this OAUTH fellow exemplified - technology leaders taking control of a 
standard for their strategic benefit. This is not a phenomenon, its 
par for the course and its a principle reason why I have mandated 
since the 80s that we (SSI) do not get locked in on any standard 
protocol, with PPP, RADIUS, TELNET, FTP, SMTP, POP3, HTTP and others 
our product are strategically based on.  This is not odd and 
product/project managers who don't recognized protocol(s) apply to the 
benefit of their company and product lines is well, not doing their 
company any great service. The IETF is suppose to be the watchdog for 
protocol standards changing on the community and more often you are 
seeing the mantra of "Who's Who" or basically the old GM theory - 
"Whats good for GM, is good for ...." changing standards or pseudo 
developed standard protocols.

Overall, we have a conflict of interest and if anyone who does not 
have any particular interest in a protocol, makes you wonder why one 
would be involved or are even carrying a corporate badge.  I for one 
will not appreciate an employee doing work that may have a direct or 
indirect conflict of interest and would be pissed if he didn't 
recognized it.  Thats not odd or evil. Thats par for the course.

Which brings us to the "Whose Library?" question.  If one is to follow 
market and technology leaders, does that mean you are using their 
library as well?  I'm sure that does not always fit with all corporate 
IP policies, and more controlled so in the past with in-house 
developed source code, than it does today with all the globalization 
and participation going on.  Look at the mess that (open source) 
created!  It all fun when you're young, but one day you have to bring 
home the bacon.

I think it is a mistake to assume that using a Library is the answer 
or rather is something that defines a protocol direction and the 
people that define it. One question might be what language is this in? 
  Would it be C/C++? or some perl scripting language? Some other? 
What if the organization has its own strategic "added value" language 
for its customers?  You don't have to go far than just use an example 
of .NET? What if the OAUTH Library was offered only in .NET. I'm sure 
the *nix world would not be jumping with joy there.  All this and I've 
hardly touch based with many more reasons to be careful of these 
protocol definition/direction issues, why one has be very careful and 
also if they can, be active, if only just vocal and watchful when need 
be of people, in particular those who are very active with the IETF 
process taking control and advocating a method in a direction that can 
have a major/negative impact on you.   Its a tough issue because 
decisions do need to be made but its getting harder to swallow the 
"Rough Consensus" stick being especially when its a highly subjective 
issue involved.

In any case, I believe the IETF should take heed of what has occured 
with the OAUTH incident. I don't believe it is an isolated issue which 
I am sure many here believe. I am not sure what all can be learned 
other than possibly the IETF needs to be more watchful of standards 
moving away from a network wide community open standard to one that 
only feasibly benefits a much smaller set, abeit larger entities.

At the end of the day, its all about cost, yet, while a library may 
help address that, that is not always the best solution unless we do 
want to have specific market and technology leaders in control of a 
particular protocol w/o a library.  In my view, the community MUST 
have an IETF around to be watchful of the standards from being 
strategically changed on people. It assume a level of equal capability 
by all to stay on par or get out of the way and that presents conflict 
of interest and possible anti-trust.  The GM theory does not always apply.

-- 
HLS

Hannes Tschofenig wrote:
> In the identity management case we are not necessarily talking about solutions that are "good" or "bad". The issue is that certain people care about one use case and other people care about other use cases.  I use the term "use case" in a generic sense to also include certain deployment assumptions (e.g., has to work with existing programming languages, deployment environments), or design themes (e.g., XML vs. JSON). 
> 
> So, for example, in the OAuth case there are people who care a lot about different Websites sharing data between each other (the photo sharing / photo printing use case). Again others think that the smart phone use case is more important. The solutions for these two cases are slightly different (because they can rely on different assumptions). 
> 
> Initially, people start with a single use case they care about. The work gets attention and other people start to use the protocol as well and notice that it does not meet their use cases. So, they add functionality. Over time the set of specification becomes more complex and a beginner does not see through the specification jungle anymore. Then, these newcomers start from scratch to fix all these "complex protocols". Typically, these persons like to reject any idea that was done in the past (such as learning from the experience the previous generation had made). The cycle starts from the beginning. We went through these cycles several times already in the identity management world. 

> I believe that application developers shouldn't even worry about the details of the protocol suite. They should be using a library instead. We use libraries all the time and particularly with security protocols. Take TLS as an example. No application developer would come up with the idea to write their own TLS stack either. They let security professionals write those libraries.