Re: [OAUTH-WG] why are we signing?

John Panzer <jpanzer@google.com> Wed, 02 December 2009 20:27 UTC

Return-Path: <jpanzer@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DBF943A657C for <oauth@core3.amsl.com>; Wed, 2 Dec 2009 12:27:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.952
X-Spam-Level:
X-Spam-Status: No, score=-105.952 tagged_above=-999 required=5 tests=[AWL=0.024, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zyTHnLyeRkED for <oauth@core3.amsl.com>; Wed, 2 Dec 2009 12:27:37 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.33.17]) by core3.amsl.com (Postfix) with ESMTP id 39A0B3A692A for <oauth@ietf.org>; Wed, 2 Dec 2009 12:27:37 -0800 (PST)
Received: from wpaz5.hot.corp.google.com (wpaz5.hot.corp.google.com [172.24.198.69]) by smtp-out.google.com with ESMTP id nB2KRR7X012310 for <oauth@ietf.org>; Wed, 2 Dec 2009 20:27:28 GMT
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1259785648; bh=suipGbfolCErOBfT7JiJkvsBIuc=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=EBCAHa3n7hTlvtOl4qiCgEXA9Q2M5zvY4iFvqFSMCxPGThwD0MhO0RCiHVDkjs61P 8t2i3CRJkes8tIPRqCZ+A==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:from:date:message-id: subject:to:cc:content-type:x-system-of-record; b=Esz7lIxE+CDbya7Y/S8YitYqvUwexQMcJvqRhYyf0UbZlRLg5iPPNzGxLzxgWJqVT 70P8k1Jc9UEOi8XpRAiaA==
Received: from pzk38 (pzk38.prod.google.com [10.243.19.166]) by wpaz5.hot.corp.google.com with ESMTP id nB2KROBL024997 for <oauth@ietf.org>; Wed, 2 Dec 2009 12:27:24 -0800
Received: by pzk38 with SMTP id 38so475305pzk.9 for <oauth@ietf.org>; Wed, 02 Dec 2009 12:27:24 -0800 (PST)
MIME-Version: 1.0
Received: by 10.114.165.15 with SMTP id n15mr1152211wae.83.1259785643679; Wed, 02 Dec 2009 12:27:23 -0800 (PST)
In-Reply-To: <a9d9121c0912021157h299bfc96y139c48fa918c8776@mail.gmail.com>
References: <daf5b9570911082102u215dcf22gf0aeb2f3578e5ea0@mail.gmail.com> <cb5f7a380911120745w2f576d1ej300723581e50f03f@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102E58@P3PW5EX1MB01.EX1.SECURESERVER.NET> <cb5f7a380911130837q40d07388y1ae9b472be0ae57a@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102F1F@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A4E79C63-7B5C-4FBA-9DDA-5FEB35B9584D@microsoft.com> <3D3C75174CB95F42AD6BCC56E5555B4501F19743@FIESEXC015.nsn-intra.net> <90C41DD21FB7C64BB94121FBBC2E72343785209BBB@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4B15D7C2.2070901@stpeter.im> <a9d9121c0912021157h299bfc96y139c48fa918c8776@mail.gmail.com>
From: John Panzer <jpanzer@google.com>
Date: Wed, 02 Dec 2009 12:27:03 -0800
Message-ID: <cb5f7a380912021227t542f782et316f9ab873b6edb5@mail.gmail.com>
To: Mike Malone <mjmalone@gmail.com>
Content-Type: multipart/alternative; boundary="0016367f92a7c8e16a0479c4b328"
X-System-Of-Record: true
Cc: ext Dick Hardt <Dick.Hardt@microsoft.com>, "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] why are we signing?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Dec 2009 20:27:38 -0000

I think there are multiple positions here.  Just to be clear, my position
is:

A combination of optional TLS, required bearer tokens, and optional token
rotation (refresh) is sufficiently secure and deployable.  I believe that
mandatory TLS would unacceptably reduce deployability (and mandatory
dependence on certificate chains more so).

--
John Panzer / Google
jpanzer@google.com / abstractioneer.org / @jpanzer



On Wed, Dec 2, 2009 at 11:57 AM, Mike Malone <mjmalone@gmail.com> wrote:

> On Tue, Dec 1, 2009 at 6:58 PM, Peter Saint-Andre <stpeter@stpeter.im>
> wrote:
> > <hat type='individual'/>
> >
> > On 11/30/09 1:27 PM, Eran Hammer-Lahav wrote:
> >> OAuth is being proposed as a generally useful method for securing API
> >> calls. I expect many open source libraries to implement it on the
> >> server side and use it for blog plugins, widgets, and other highly
> >> distributed software. If OAuth required the use of TLS, it would
> >> simply be ignored by all those applications which will likely
> >> continue using Basic.
> >>
> >> With all due respect to big companies, their resources, and ability
> >> to effortlessly deploy SSL/TLS, it is still an expensive and complex
> >> process for more developers deploying small scale server components.
> >
> > With all due respect, I think it can be harder for big companies to
> > deploy TLS -- they have a lot more users, need more hardware (special
> > SSL accelerators and the like), have more layers of employees (so it can
> > be more difficult to find the person who controls the hostmaster or
> > whois-listed email address), etc.
> >
> > Getting a Class 1 cert from the likes of StartSSL is easy as pie these
> > days. IMHO there is no excuse for not deploying SSL if you care one whit
> > about security. The problem is that too many small-scale developers (and
> > big companies!) simply don't care.
>
> I'm far from an expert on TLS/PKI, but here's a thought (and I'm
> pretty sure this has come up before)... If TLS is simpler than
> signatures then why not just use PKI for everything. A lot of the
> problems that have come up with OAuth are solved by PKI - client certs
> replace tokens, you can delegate authority by creating
> sub-certificates, the consumer provisioning problem is largely solved,
> etc.
>
> It seems like WRAP is using bits of PKI to solve half of the problem
> and then re-inventing other bits of PKI for the other half. If TLS/PKI
> is the solution, why not go whole hog?
>
> Mike
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>