Re: [OAUTH-WG] why are we signing?

Brian Eaton <beaton@google.com> Tue, 01 December 2009 23:31 UTC

Return-Path: <beaton@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8EEAE3A6934 for <oauth@core3.amsl.com>; Tue, 1 Dec 2009 15:31:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level:
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jWlVWQODHn2E for <oauth@core3.amsl.com>; Tue, 1 Dec 2009 15:31:51 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.33.17]) by core3.amsl.com (Postfix) with ESMTP id 7FAB73A6872 for <oauth@ietf.org>; Tue, 1 Dec 2009 15:31:51 -0800 (PST)
Received: from wpaz24.hot.corp.google.com (wpaz24.hot.corp.google.com [172.24.198.88]) by smtp-out.google.com with ESMTP id nB1NVfZV004086 for <oauth@ietf.org>; Tue, 1 Dec 2009 23:31:41 GMT
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1259710301; bh=pKDeXaj+OQzQhIVCM9D8//19hY0=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:Subject:From: To:Cc:Content-Type; b=Ln8VgslkazqE/l/UjgydOruizdf2j5tGsAOWqjSpzBi87l+fby93bp1kE2BN1bctg 13ZHoZfzfmn00oIyxpK/w==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:date:message-id:subject:from:to: cc:content-type:x-system-of-record; b=hQiG25ge5n6EbfL3IF86DquAJOgBCIYox6DWUDjuTn8CfpCECZw8cesm1XESAJ9XR j8m/nrc1g+3tiT/qtvqmQ==
Received: from pzk38 (pzk38.prod.google.com [10.243.19.166]) by wpaz24.hot.corp.google.com with ESMTP id nB1NUrmF020720 for <oauth@ietf.org>; Tue, 1 Dec 2009 15:31:38 -0800
Received: by pzk38 with SMTP id 38so4254016pzk.9 for <oauth@ietf.org>; Tue, 01 Dec 2009 15:31:38 -0800 (PST)
MIME-Version: 1.0
Received: by 10.140.165.13 with SMTP id n13mr383590rve.3.1259710298291; Tue, 01 Dec 2009 15:31:38 -0800 (PST)
In-Reply-To: <4B156CB0.5040001@aol.com>
References: <daf5b9570911082102u215dcf22gf0aeb2f3578e5ea0@mail.gmail.com> <cb5f7a380911120745w2f576d1ej300723581e50f03f@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102E58@P3PW5EX1MB01.EX1.SECURESERVER.NET> <cb5f7a380911130837q40d07388y1ae9b472be0ae57a@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102F1F@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A4E79C63-7B5C-4FBA-9DDA-5FEB35B9584D@microsoft.com> <a9d9121c0911301432y76487b39hed670f0ed609c768@mail.gmail.com> <cb5f7a380912010852j3251199dse8d10da469dafa@mail.gmail.com> <a9d9121c0912011022p746e187fn1ff8240dbcdde096@mail.gmail.com> <4B156CB0.5040001@aol.com>
Date: Tue, 01 Dec 2009 15:31:38 -0800
Message-ID: <daf5b9570912011531pe5d2b24jb062861205172ab2@mail.gmail.com>
From: Brian Eaton <beaton@google.com>
To: George Fletcher <gffletch@aol.com>
Content-Type: text/plain; charset="ISO-8859-1"
X-System-Of-Record: true
Cc: Dick Hardt <Dick.Hardt@microsoft.com>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] why are we signing?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Dec 2009 23:31:52 -0000

On Tue, Dec 1, 2009 at 11:21 AM, George Fletcher <gffletch@aol.com> wrote:
> In addition to the use case Mike gave, I have seen at least two other use
> cases of having the "proxy" sign the URL and then present over HTTP.
> 1. an iGoogle gadget that wants to launch an iframe with a URL that carries
> specific identity & authorized rights
> 2. a rich/desktop application want to launch a browser in an
> authenticated/authorized state (i.e. client-to-browser SSO)

OK, so now we're up to 7 (8?) different use cases where "OAuth"
signatures are being used.  Some others are listed here:

http://www.ietf.org/mail-archive/web/oauth/current/msg00544.html

... most of them still inventing their own signature base strings,
which I find either amusing or tragic depending on my mood. =)

> I also haven't seen anyone bring up the "restricted device" use case yet:) I
> do work with a product team that refuses to use SSL because of the memory,
> load time, and CPU requirements.

So what do these folks deem to be acceptable, security-wise?

(I'll put my money on "short-lived bearer token that is automatically
refreshed at intervals"... =)

> Curious if any in the mobile device
> environment see the requirement of SSL an issue? Potentially not given most
> devices these days have a browser.

I hear this now and again, but every time I've looked at it seriously
it's turned out to be a non-issue.

Cheers,
Brian