Re: [OAUTH-WG] keeping support for RSA (Was: RE: OAuth 2.0 / Charter)

Eran Hammer-Lahav <eran@hueniverse.com> Mon, 30 November 2009 21:58 UTC

Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CC3433A68FD for <oauth@core3.amsl.com>; Mon, 30 Nov 2009 13:58:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.484
X-Spam-Level:
X-Spam-Status: No, score=-2.484 tagged_above=-999 required=5 tests=[AWL=0.115, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZPsJoeUUU9Ll for <oauth@core3.amsl.com>; Mon, 30 Nov 2009 13:58:48 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 09A663A67B3 for <oauth@ietf.org>; Mon, 30 Nov 2009 13:58:48 -0800 (PST)
Received: (qmail 17155 invoked from network); 30 Nov 2009 21:58:40 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 30 Nov 2009 21:58:40 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Mon, 30 Nov 2009 14:58:33 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Brian Eaton <beaton@google.com>
Date: Mon, 30 Nov 2009 14:58:38 -0700
Thread-Topic: [OAUTH-WG] keeping support for RSA (Was: RE: OAuth 2.0 / Charter)
Thread-Index: AcpyB4YOPzEGC0K4Rbu93k1fRCBinwAAGi5g
Message-ID: <90C41DD21FB7C64BB94121FBBC2E72343785209C21@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E72343785209A24@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1259536078.19069.6.camel@localhost> <90C41DD21FB7C64BB94121FBBC2E72343785209A5A@P3PW5EX1MB01.EX1.SECURESERVER.NET> <ED97F89464499E4D80A68CDCE1E3D1FF020897A1@PACORPEXCMB03.cable.comcast.com> <90C41DD21FB7C64BB94121FBBC2E72343785209B82@P3PW5EX1MB01.EX1.SECURESERVER.NET> <daf5b9570911301353r54e8690dv1d87de8e32675db9@mail.gmail.com>
In-Reply-To: <daf5b9570911301353r54e8690dv1d87de8e32675db9@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "Moore, Jonathan (CIM)" <Jonathan_Moore@comcast.com>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] keeping support for RSA (Was: RE: OAuth 2.0 / Charter)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Nov 2009 21:58:48 -0000

I think what most people miss about this is that addition of a new method to obtain a *token* without a third party (resource owner, etc.) present. So instead of the current way OAuth is used for 2-legged, as a dumb substitution for Basic auth, this new approach works the same way across the two use cases (2, 3-legged), by always requiring the exchange of credentials for a token, even for 2-legged.

And as stated above, this will require some other means to obtain a token without the use of browser redirection and user authorization.

EHL

> -----Original Message-----
> From: Brian Eaton [mailto:beaton@google.com]
> Sent: Monday, November 30, 2009 1:53 PM
> To: Eran Hammer-Lahav
> Cc: Moore, Jonathan (CIM); Paul C. Bryan; oauth@ietf.org
> Subject: Re: [OAUTH-WG] keeping support for RSA (Was: RE: OAuth 2.0 /
> Charter)
> 
> On Mon, Nov 30, 2009 at 11:25 AM, Eran Hammer-Lahav
> <eran@hueniverse.com> wrote:
> >
> > 4. We are still very likely to have a PK-based method for obtaining
> > *authorization* (a token). So PK will be still available for obtaining
> > a token. I know this does not address the 2-legged scenario, but
> > whatever we come up there should be the same with whatever we may
> end up including in the authentication part.
> 
> This does actually address the two-legged scenario quite nicely.
> 
> Client sends PK-signed message to Authorization Server.
> Authorization Server returns token.
> Client uses token.
> 
> Cheers,
> Brian