Re: [OAUTH-WG] Notes from 2nd "OAuth & Authentication" Conference Call

Hans Zandbelt <hzandbelt@pingidentity.com> Mon, 03 November 2014 09:55 UTC

Return-Path: <hzandbelt@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 003961A0055 for <oauth@ietfa.amsl.com>; Mon, 3 Nov 2014 01:55:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5ueIhcwwIxfu for <oauth@ietfa.amsl.com>; Mon, 3 Nov 2014 01:55:09 -0800 (PST)
Received: from na3sys009aog136.obsmtp.com (na3sys009aog136.obsmtp.com [74.125.149.85]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DAEAF1A003A for <oauth@ietf.org>; Mon, 3 Nov 2014 01:55:08 -0800 (PST)
Received: from mail-wi0-f169.google.com ([209.85.212.169]) (using TLSv1) by na3sys009aob136.postini.com ([74.125.148.12]) with SMTP ID DSNKVFdQ/BTcJUCNluIC5oAgsOo54C7a4JsC@postini.com; Mon, 03 Nov 2014 01:55:09 PST
Received: by mail-wi0-f169.google.com with SMTP id n3so5571546wiv.4 for <oauth@ietf.org>; Mon, 03 Nov 2014 01:55:07 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:message-id:date:from:user-agent:mime-version:to :cc:subject:references:in-reply-to:content-type :content-transfer-encoding; bh=pKPDv2Nc1Fnbr+zShBywa8Gjj+XWqNDZN4u17wNiLHc=; b=hSQD2W/tttqxSbFhFKSE0r47Jh/vFJnKSEsD8ut92/wiwhCTB2fL2uwSBLzvwcXWd6 FhBAq+SNonGXClSfjm7Dd1GIvDuKTNHY+fISMzQ61X/YD9U4JZt6FpKhfVTLLpttHuzC fSQ3yvV9IvjRwg+Se0UGdm7nwyiZCotiDly5RDert+jWlaEdipHpDjpXuBPrMmSQvSJS gPF9zfOuwLmPUuNo+rqD0xbyU/J263cG+lu1c96HBdiUEDBGLm0cYQAtdBSoJALVVdry v08ov2pJfk2zL2GLoSAELJFrVzFZSynpeXo568rFQlDUN5fsmE6YvKRZxXH8oe72d7zn abqg==
X-Gm-Message-State: ALoCoQm9Py64Zkb2mw6VT23QXmeuKu+g/vuCLt/8lJ8pFZpz2g0vSvNrmQYW8WZrHLPfuL2viPL7dayDhS+tHwXHWsuKFaEJkmKPwZ28rZ0oCsYc1ezkWHTzGT+6XPh3DsRl+e9gmecM
X-Received: by 10.194.184.12 with SMTP id eq12mr2055585wjc.100.1415008507130; Mon, 03 Nov 2014 01:55:07 -0800 (PST)
X-Received: by 10.194.184.12 with SMTP id eq12mr2055574wjc.100.1415008507005; Mon, 03 Nov 2014 01:55:07 -0800 (PST)
Received: from [192.168.10.222] (5ED52E8A.cm-7-6a.dynamic.ziggo.nl. [94.213.46.138]) by mx.google.com with ESMTPSA id eu8sm8136015wic.1.2014.11.03.01.55.05 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 03 Nov 2014 01:55:06 -0800 (PST)
Message-ID: <545750F8.80202@pingidentity.com>
Date: Mon, 03 Nov 2014 10:55:04 +0100
From: Hans Zandbelt <hzandbelt@pingidentity.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Nat Sakimura <sakimura@gmail.com>, Phil Hunt <phil.hunt@oracle.com>, John Bradley <ve7jtb@ve7jtb.com>
References: <543FF850.6070409@gmx.net> <B18173FA-7AD9-40A7-98AF-8D2A4AED744D@mitre.org> <5456640C.9090404@lodderstedt.net> <DF8EF8BB-75B1-49A4-92D6-81D72D3DA807@oracle.com> <FFB09F34-19C5-4616-87DE-EE6D10305724@ve7jtb.com> <65FB0488-88D1-4C55-B64F-071284AC6730@oracle.com> <CABzCy2CAy7ktNRdT1otfmZn8_8rXhNESH9J2mcyr_yB_F79Q7Q@mail.gmail.com>
In-Reply-To: <CABzCy2CAy7ktNRdT1otfmZn8_8rXhNESH9J2mcyr_yB_F79Q7Q@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/oauth/8z5L42D7rVJcbnKEKMoK4trtGR8
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Notes from 2nd "OAuth & Authentication" Conference Call
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Nov 2014 09:55:12 -0000

Facebook also has a "code" flow that uses a introspection call that is 
precisely an example of the OAuth 2.0 + a-bit-of-luck type of login that 
I was asking about earlier in this thread:

https://developers.facebook.com/docs/facebook-login/manually-build-a-login-flow/v2.2

Hans.

On 11/2/14, 9:16 PM, Nat Sakimura wrote:
> So, wrt FB, signed request is good. It can be another example to add.
> On Sun, Nov 2, 2014 at 19:55 Phil Hunt <phil.hunt@oracle.com
> <mailto:phil.hunt@oracle.com>> wrote:
>
>     Sigh.
>
>     Phil
>
>     @independentid
>     www.independentid.com <http://www.independentid.com>
>     phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>
>
>
>
>     On Nov 2, 2014, at 10:33 AM, John Bradley <ve7jtb@ve7jtb.com
>     <mailto:ve7jtb@ve7jtb.com>> wrote:
>
>      > If a client developer doesn't have Connect available then they
>     need to point the API developer at this doc, so that they do provide
>     Connect or some other API that takes into account all of the
>     security considerations.
>      >
>      > A client developer should never make up there own identity
>     protocol out of someone else's API that is not designed for it.
>      >
>      > A vanilla OAuth API with no additional security considerations on
>     the API developers part is pretty much guaranteed to go horribly wrong.
>      >
>      > John B.
>      >
>      > On Nov 2, 2014, at 2:15 PM, Phil Hunt <phil.hunt@oracle.com
>     <mailto:phil.hunt@oracle.com>> wrote:
>      >
>      >> We may have a problem with audience here.
>      >>
>      >> Justin mentioned he wrote it for service providers but the
>     threats are against the client that wants to authenticate users.
>      >>
>      >> Would be better to have recommendations for each group.
>      >>
>      >> Since oidc is the only recommendation, what does a client
>     implementer do when openid connect is not available?  Suggest we
>     give a list of qualities developers should look for (eg is fb
>     connect good)?
>      >>
>      >> Phil
>      >>
>      >>> On Nov 2, 2014, at 09:04, Torsten Lodderstedt
>     <torsten@lodderstedt.net <mailto:torsten@lodderstedt.net>> wrote:
>      >>>
>      >>> Hi all,
>      >>>
>      >>> I just read the document. It explains the situation,
>     challenges/threats, and options very clear and readable.
>      >>>
>      >>> So +1 for publishing it soon.
>      >>>
>      >>> kind regards,
>      >>> Torsten.
>      >>>
>      >>> Am 28.10.2014 00:21, schrieb Richer, Justin P.:
>      >>>> I've been incorporating peoples' feedback into the proposed
>     oauth.net <http://oauth.net> page, and the current state is here:
>      >>>>
>      >>>>
>     https://github.com/jricher/__oauth.net/blob/authentication/__articles/authentication.php
>     <https://github.com/jricher/oauth.net/blob/authentication/articles/authentication.php>
>      >>>>
>      >>>> Commentary has slowed down and I think the document's in
>     reasonable. I would like to publish this as a draft version on
>     oauth.net <http://oauth.net> in the very near future (like, this
>     week), so get comments and feedback to me on this soon. I'm going to
>     be at IIW all week if anyone wants to back me into a corner and talk
>     about this.
>      >>>>
>      >>>> -- Justin
>      >>>>
>      >>>>> On Oct 16, 2014, at 12:54 PM, Hannes Tschofenig
>     <hannes.tschofenig@gmx.net <mailto:hannes.tschofenig@gmx.net>> wrote:
>      >>>>>
>      >>>>> Participants:
>      >>>>>
>      >>>>> * Brian Campbell
>      >>>>> * John Bradley
>      >>>>> * Derek Atkins
>      >>>>> * Phil Hunt
>      >>>>> * William Kim
>      >>>>> * Josh Mandel
>      >>>>> * Hannes Tschofenig
>      >>>>>
>      >>>>>
>      >>>>> Notes:
>      >>>>>
>      >>>>> Justin distributed a draft writeup and explained the
>     reasoning behind
>      >>>>> it. The intended purpose is to put the write-up (after enough
>     review) on
>      >>>>> oauth.net <http://oauth.net>. See attachments. Justin
>     solicited feedback from the
>      >>>>> conference call participants and from the working group.
>      >>>>>
>      >>>>> One discussion item was specifically related to the concept
>     of audience
>      >>>>> restrictions, which comes in two flavours: (a) restriction of
>     the access
>      >>>>> token regarding the resource server and (b) restriction of
>     the id token
>      >>>>> regarding the client. Obviously, it is necessary to have both
>     of these
>      >>>>> audience restrictions in place and to actually check them.
>      >>>>>
>      >>>>> The group then went into a discussion about the use of
>     pseudonyms in
>      >>>>> authentication and the problems deployments ran into when
>     they used
>      >>>>> pseudonyms together with a wide range of attributes that
>     identified
>      >>>>> users nevertheless. Phil suggested to produce a write-up
>     about this topic.
>      >>>>>
>      >>>>> Finally, the group started a discussion about potential
>     actions for the
>      >>>>> OAuth working groups. Two activities were mentioned, namely
>     to produce
>      >>>>> an IETF draft of the write-up Justin has prepared as a
>     "formal" response
>      >>>>> to the problems with authentication using OAuth and, as a
>     second topic,
>      >>>>> potential re-chartering of the OAuth working group to work on
>     some
>      >>>>> solutions in this area. Hannes suggested to postpone these
>     discussions
>      >>>>> and to first finish the write-up Justin had distributed.
>      >>>>>
>      >>>>> Ciao
>      >>>>> Hannes & Derek
>      >>>>> <Authentication with OAuth 2.doc><Authentication with OAuth
>     2.html><Authentication with OAuth
>     2.pdf>_________________________________________________
>      >>>>> OAuth mailing list
>      >>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>      >>>>> https://www.ietf.org/mailman/__listinfo/oauth
>     <https://www.ietf.org/mailman/listinfo/oauth>
>      >>>> _________________________________________________
>      >>>> OAuth mailing list
>      >>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>      >>>> https://www.ietf.org/mailman/__listinfo/oauth
>     <https://www.ietf.org/mailman/listinfo/oauth>
>      >>>
>      >>> _________________________________________________
>      >>> OAuth mailing list
>      >>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>      >>> https://www.ietf.org/mailman/__listinfo/oauth
>     <https://www.ietf.org/mailman/listinfo/oauth>
>      >>
>      >> _________________________________________________
>      >> OAuth mailing list
>      >> OAuth@ietf.org <mailto:OAuth@ietf.org>
>      >> https://www.ietf.org/mailman/__listinfo/oauth
>     <https://www.ietf.org/mailman/listinfo/oauth>
>      >
>
>     _________________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/__listinfo/oauth
>     <https://www.ietf.org/mailman/listinfo/oauth>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

-- 
Hans Zandbelt              | Sr. Technical Architect
hzandbelt@pingidentity.com | Ping Identity