Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01

George Fletcher <gffletch@aol.com> Thu, 09 August 2012 20:32 UTC

Return-Path: <gffletch@aol.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0B6E21F86DE for <oauth@ietfa.amsl.com>; Thu, 9 Aug 2012 13:32:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.948
X-Spam-Level:
X-Spam-Status: No, score=-1.948 tagged_above=-999 required=5 tests=[AWL=0.650, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LZovyftmNXNQ for <oauth@ietfa.amsl.com>; Thu, 9 Aug 2012 13:32:17 -0700 (PDT)
Received: from imr-ma03.mx.aol.com (imr-ma03.mx.aol.com [64.12.206.41]) by ietfa.amsl.com (Postfix) with ESMTP id 8F50D21F86D8 for <oauth@ietf.org>; Thu, 9 Aug 2012 13:32:17 -0700 (PDT)
Received: from mtaout-db06.r1000.mx.aol.com (mtaout-db06.r1000.mx.aol.com [172.29.51.198]) by imr-ma03.mx.aol.com (8.14.1/8.14.1) with ESMTP id q79KWAom030853; Thu, 9 Aug 2012 16:32:11 -0400
Received: from palantir.office.aol.com (palantir.office.aol.com [10.181.186.254]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mtaout-db06.r1000.mx.aol.com (MUA/Third Party Client Interface) with ESMTPSA id 9E0BAE0000E9; Thu, 9 Aug 2012 16:32:10 -0400 (EDT)
Message-ID: <50241E4A.1080500@aol.com>
Date: Thu, 09 Aug 2012 16:32:10 -0400
From: George Fletcher <gffletch@aol.com>
Organization: AOL LLC
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:14.0) Gecko/20120713 Thunderbird/14.0
MIME-Version: 1.0
To: oauth@ietf.org
References: <CAOKdZ1dzVcKBDt6CSLuHwc4NzUVd_hUMWdpJVS6=ncdJo05=UQ@mail.gmail.com> <502280D8.40708@mitre.org> <9AD4EEF7-6187-4A4F-A855-32819BCB8321@gmx.net> <5022D344.40600@mitre.org> <EEBC9705-16C0-4697-8F38-28660C3CB553@ve7jtb.com> <5023CC18.9090809@mitre.org> <1344531175.4871.YahooMailNeo@web31812.mail.mud.yahoo.com> <3940317E-948C-4909-9B8F-2689A6B8D4EB@gmail.com> <1344534823.39489.YahooMailNeo@web31801.mail.mud.yahoo.com> <5B59B739-F8E7-4F5A-A39C-8C46055D0E98@ve7jtb.com> <1344537819.41154.YahooMailNeo@web31803.mail.mud.yahoo.com> <50241165.40209@mitre.org>
In-Reply-To: <50241165.40209@mitre.org>
Content-Type: multipart/alternative; boundary="------------010105030503090505070402"
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.com; s=20110426; t=1344544330; bh=Igh3IlaOKcfkC/jYayOWfldJo2+2xYg1KQVTWKr8xhA=; h=From:To:Subject:Message-ID:Date:MIME-Version:Content-Type; b=ihsO9+2c17rUjajMeWjABEADoGL/VLs9XfRkayoIS62oL4w7kjIuvMAs0SNDit5eU Y0q++kOnHXSYNXiNnkni+TaSTN33iBUKm//XZEJ+8r+EG+Q0kJD1MqJM/Y9qvRLGw+ Z8UGpvOtw4zMfM9H06KXODiIu36g0qStNBqDT6ck=
X-AOL-SCOLL-SCORE: 0:2:460862080:93952408
X-AOL-SCOLL-URL_COUNT: 0
x-aol-sid: 3039ac1d33c650241e4a65d1
X-AOL-IP: 10.181.186.254
Subject: Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Aug 2012 20:32:19 -0000

+1

We've supported #3 for quite some time in our public APIs that pre-date 
OAuth.

Thanks,
George

On 8/9/12 3:37 PM, Justin Richer wrote:
> Use case #2: signature protection over plain HTTP parameters
>
> MAC gives us message-level signing in a way that doesn't require all 
> the parameters to be packed into an extra structure, like JWT/SAML do. 
> TLS gives no application-layer verification of integrity of 
> parameters, nor does it give you the ability to know who presented 
> those parameters (unless you're doing mutual TLS, which nobody does). 
> MAC gives you a fairly simple way to protect all parameters on a call 
> to the resource server while still keeping all of those parameters in 
> their native HTTP forms.
>
>
> Use case #3: generic signed HTTP fetch (not directly addressed by MAC 
> spec as of today)
>
> Sometimes you want to create a URL with one service, fix all of the 
> parameters in that URL, and protect those parameters with a signature. 
> Then that URL can be passed to an untrusted service who cannot modify 
> any portion of it. Nor can they re-use the signature portion to 
> protect different parameters. We do this today with a 2-legged OAuth 
> signature across a service URL. The "Client" generates the signed URLs 
> and passes them to a user agent which actually does the fetch to the 
> service.
>
>
>  -- Justin
>
> On 08/09/2012 02:43 PM, William Mills wrote:
>> OK, I'll play and start documenting the use cases.
>>
>> Use case #1: Secure authentication in plain text connections:
>>
>> Some applications need a secure form authorization, but do not want 
>> or need the overhead of encrypted connections.  HTTP cookies and 
>> their ilk are replayable credentials and do not satisfy this need.   
>> the MAC scheme using signed HTTP authorization credentials offer the 
>> capability to securely authorize a transaction, can offer integrity 
>> protection on all or part of an HTTP request, and can provide replay 
>> protection.
>>
>> -bill
>>
>> ------------------------------------------------------------------------
>> *From:* John Bradley <ve7jtb@ve7jtb.com>
>> *To:* William Mills <wmills_92105@yahoo.com>
>> *Cc:* Dick Hardt <dick.hardt@gmail.com>; "oauth@ietf.org" 
>> <oauth@ietf.org>
>> *Sent:* Thursday, August 9, 2012 11:26 AM
>> *Subject:* Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
>>
>> In Vancouver the question was asked about the future of the MAC spec 
>> due to it no linger having a editor.
>>
>> The Chair and AD indicated a desire to have a document on the 
>> use-cases we are trying to address before deciding on progressing MAC 
>> or starting a new document.
>>
>> Phil Hunt is going to put together a summery of the Vancouver 
>> discussion and we are going to work on the use-case/problem 
>> description document ASAP.
>>
>> People are welcome to contribute to the use-case document.
>>
>> Part of the problem with MAC has been that people could never agree 
>> on what it was protecting against.
>>
>> I think there is general agreement that one or more proof mechanisms 
>> are required for access tokens.
>> Security for the token endpoint also cannot be ignored.
>>
>>
>> John B.
>>
>> On 2012-08-09, at 1:53 PM, William Mills wrote:
>>
>>> MAC fixes the signing problems encountered in OAuth 1.0a, yes there 
>>> are libraries out there for OAuth 1.0a.  MAC fits in to the OAuth 2 
>>> auth model and will provide for a single codepath for sites that 
>>> want to use both Bearer and MAC.
>>>
>>> ------------------------------------------------------------------------
>>> *From:* Dick Hardt <dick.hardt@gmail.com <mailto:dick.hardt@gmail.com>>
>>> *To:* William Mills <wmills_92105@yahoo.com 
>>> <mailto:wmills_92105@yahoo.com>>
>>> *Cc:* "oauth@ietf.org <mailto:oauth@ietf.org>" <oauth@ietf.org 
>>> <mailto:oauth@ietf.org>>
>>> *Sent:* Thursday, August 9, 2012 10:27 AM
>>> *Subject:* Re: [OAUTH-WG] mistake in draft-ietf-oauth-v2-http-mac-01
>>>
>>>
>>> On Aug 9, 2012, at 9:52 AM, William Mills wrote:
>>>
>>>> I find the idea of starting from scratch frustrating.  MAC solves a 
>>>> set of specific problems and has a well defined use case.  It's 
>>>> symmetric key based which doesn't work for some folks, and the 
>>>> question is do we try to develop something that supports both PK 
>>>> and SK, or finish the SK use case and then work on a PK based draft.
>>>>
>>>> I think it's better to leave them separate and finish out MAC which 
>>>> is *VERY CLOSE* to being done.
>>>
>>> Who is interested in MAC? People can use OAuth 1.0 if they prefer 
>>> that model.
>>>
>>> For my projects, I prefer the flexibility of a signed or encrypted 
>>> JWT if I need holder of key.
>>>
>>> Just my $.02
>>>
>>> -- Dick
>>>
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth