Re: [OAUTH-WG] Signatures spec proposal, take 2
Dirk Balfanz <balfanz@google.com> Fri, 24 September 2010 02:07 UTC
Return-Path: <balfanz@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5F4733A6827 for <oauth@core3.amsl.com>; Thu, 23 Sep 2010 19:07:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.893
X-Spam-Level:
X-Spam-Status: No, score=-105.893 tagged_above=-999 required=5 tests=[AWL=0.083, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s2UKrpWEkftC for <oauth@core3.amsl.com>; Thu, 23 Sep 2010 19:07:02 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.44.51]) by core3.amsl.com (Postfix) with ESMTP id 59C603A6804 for <oauth@ietf.org>; Thu, 23 Sep 2010 19:07:02 -0700 (PDT)
Received: from wpaz13.hot.corp.google.com (wpaz13.hot.corp.google.com [172.24.198.77]) by smtp-out.google.com with ESMTP id o8O27WFL025944 for <oauth@ietf.org>; Thu, 23 Sep 2010 19:07:32 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1285294052; bh=uvj/b+CK5xIm/wCc+j3eTNkKGXs=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:Subject:From: To:Cc:Content-Type; b=k7e+1v/KQe26s49esIYaq1cyo7xYPxyzJkdKJyUYvGNlL3D0fWuc9x5Sy8RSJrYEC GKvUoC9FGZ4dLQ/tftYxA==
Received: from iwn42 (iwn42.prod.google.com [10.241.68.106]) by wpaz13.hot.corp.google.com with ESMTP id o8O26e8f030909 for <oauth@ietf.org>; Thu, 23 Sep 2010 19:07:31 -0700
Received: by iwn42 with SMTP id 42so2322494iwn.30 for <oauth@ietf.org>; Thu, 23 Sep 2010 19:07:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=beta; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type; bh=Cy9XsDW1TNtL7pRFALH5rUgMNrgoTAgpHBPHLgB6RhM=; b=hbxH3hnGzRwECGii5FArHPwHjf3KkGuXIiyCn/haEeKwE/Sruwcb2vJWLJSasbpi3K 5VBKsOoqtVPVKIfPVaYA==
DomainKey-Signature: a=rsa-sha1; c=nofws; d=google.com; s=beta; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=ltK4PSuOmgHovu7Fyn5jra8MaNq7uCueP83MQqGa73lftE7hoagsfR/jlGG+i+M1Zw OdkVNZ5z2Wd6KjaMamcw==
MIME-Version: 1.0
Received: by 10.231.190.203 with SMTP id dj11mr2963442ibb.93.1285294051288; Thu, 23 Sep 2010 19:07:31 -0700 (PDT)
Received: by 10.231.130.9 with HTTP; Thu, 23 Sep 2010 19:07:31 -0700 (PDT)
In-Reply-To: <C8C15230.3AC67%eran@hueniverse.com>
References: <AANLkTikR_7uLDx6BaxTYwQJZfjqHDQPwKaA+kOWCsKEc@mail.gmail.com> <C8C15230.3AC67%eran@hueniverse.com>
Date: Thu, 23 Sep 2010 19:07:31 -0700
Message-ID: <AANLkTinM0J5mt1cm7O745-Fu7BbiuXVLVWt3nO08Oy73@mail.gmail.com>
From: Dirk Balfanz <balfanz@google.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: multipart/alternative; boundary="0016364ecc6c5be52a0490f7d7d4"
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Signatures spec proposal, take 2
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Sep 2010 02:07:04 -0000
On Thu, Sep 23, 2010 at 6:51 PM, Eran Hammer-Lahav <eran@hueniverse.com>wrote: > In part II, how is the signature bound to the HTTP request URI? I see the > method and body, but not the request URI. > The request URI goes in the audience parameter that's defined in part I. Dirk. > > EHL > > > > On 9/23/10 3:39 PM, "Dirk Balfanz" <balfanz@google.com> wrote: > > Hi guys, > > sorry it took a while, but here is an updated proposal. It's still in three > parts: > > Part I is about "JSON Tokens" that can be used for all sorts of things, not > just OAuth: > http://balfanz.github.com/jsontoken-spec/draft-balfanz-jsontoken-00.html > > Part II is about how to embed an OAuth token and (some parts of) an HTTP > request into a JSON Token: > http://balfanz.github.com/jsontoken-spec/draft-balfanz-signedoauth2-00.html > > Part III is how to use signatures instead of client secrets for assertions > in OAuth: > > http://balfanz.github.com/jsontoken-spec/draft-balfanz-clientassertions-00.html > > Diffs from the last specs are: > > - JSON Tokens are now just a profile of Magic Signatures, which John Panzer > has helpfully extended for this purpose > - There was a vulnerability to masquerading attacks in the last proposal, > which is addressed in this proposal by adding a data_type parameter that is > part of the signature, but _not_ part of the payload. > - no more support of X.509 certs - the only supported format for discovered > public keys is now the Magic Key format. We'll give people tools (which are > quite easy to write) to convert their self-signed or CA-issued certs to > magic keys. > - The specs are now formatted as I-Ds. > > Comments, please! > > Dirk. > > >
- [OAUTH-WG] Signatures spec proposal, take 2 Dirk Balfanz
- Re: [OAUTH-WG] Signatures spec proposal, take 2 Eran Hammer-Lahav
- Re: [OAUTH-WG] Signatures spec proposal, take 2 Dirk Balfanz
- Re: [OAUTH-WG] Signatures spec proposal, take 2 Eran Hammer-Lahav
- Re: [OAUTH-WG] Signatures spec proposal, take 2 Richard L. Barnes
- Re: [OAUTH-WG] Signatures spec proposal, take 2 Dirk Balfanz
- Re: [OAUTH-WG] Signatures spec proposal, take 2 Richard L. Barnes
- Re: [OAUTH-WG] Signatures spec proposal, take 2 Dirk Balfanz
- Re: [OAUTH-WG] Signatures spec proposal, take 2 Eran Hammer-Lahav