Re: [oauth] OAUTH Charter Proposal

kellan <kellan@pobox.com> Mon, 02 February 2009 17:02 UTC

Return-Path: <oauth-bounces@ietf.org>
X-Original-To: oauth-archive@ietf.org
Delivered-To: ietfarch-oauth-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 70FC53A6BBD; Mon, 2 Feb 2009 09:02:55 -0800 (PST)
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DA6F73A6973 for <oauth@core3.amsl.com>; Mon, 2 Feb 2009 09:02:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.934
X-Spam-Level:
X-Spam-Status: No, score=-1.934 tagged_above=-999 required=5 tests=[AWL=0.043, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6CH-13QifAFk for <oauth@core3.amsl.com>; Mon, 2 Feb 2009 09:02:53 -0800 (PST)
Received: from wf-out-1314.google.com (wf-out-1314.google.com [209.85.200.169]) by core3.amsl.com (Postfix) with ESMTP id EF0CB3A6817 for <oauth@ietf.org>; Mon, 2 Feb 2009 09:02:52 -0800 (PST)
Received: by wf-out-1314.google.com with SMTP id 27so1771419wfd.31 for <oauth@ietf.org>; Mon, 02 Feb 2009 09:02:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:sender:received:in-reply-to :references:date:x-google-sender-auth:message-id:subject:from:to:cc :content-type:content-transfer-encoding; bh=T0E12eEh+UheLCwv5ZtsKDh09T0rVysrfUhktYf0EMQ=; b=X1TfT+g6CDsGy2DrGduOAHBJ3ZdaosMPhC3W9AyS6pJVei2OXO4UGuHjwniA5CBS50 NVjjGnonK5mEa5+RNaa11vbX43OtbYar+Z5hAQ6ZAdDe/+X32ddqiVwdBGambuIl72hp 9OEN3OJflLX1xXPgGfiwaRvG9bzbOuGCNGI3g=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type :content-transfer-encoding; b=gib7Fiwwc9T+ogCqnRgMIsGLF8ADQCGdNckvWCb05SqHxS4YonHsdPiiCDr1nnpzWF mNXfPJNnIFfG1XE0R9KGDjchPb9VHlbpHrYSRzgl5FTAgfG58WpZClMlD9NNAj+NToeX R7TuYFZ0ZIZv1J5tx8ELOPg+NINVv1cn3l0vs=
MIME-Version: 1.0
Received: by 10.142.125.4 with SMTP id x4mr1930455wfc.75.1233594152268; Mon, 02 Feb 2009 09:02:32 -0800 (PST)
In-Reply-To: <033101c98303$e6fde7f0$0201a8c0@nsnintra.net>
References: <033101c98303$e6fde7f0$0201a8c0@nsnintra.net>
Date: Mon, 02 Feb 2009 12:02:32 -0500
X-Google-Sender-Auth: eca8a07b477277fe
Message-ID: <422b9b380902020902w5f10c01fx619f9da78613f967@mail.gmail.com>
From: kellan <kellan@pobox.com>
To: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
Cc: oauth@ietf.org
Subject: Re: [oauth] OAUTH Charter Proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Oauth bof discussion <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: oauth-bounces@ietf.org
Errors-To: oauth-bounces@ietf.org

George's concern that we not position ourselves as an AuthN
specification mirrors my own.

Also, when we talk about extensibility points we're talking about the
If-Not-Forbidden pattern, yes?

Lastly, and I'll admit this is a dumb question, is the inconsistent
capitalization to convey information, or are we still just in an early
draft?

-kellan

On Fri, Jan 30, 2009 at 12:55 PM, Hannes Tschofenig
<Hannes.Tschofenig@gmx.net> wrote:
> Hi all,
>
> After a chat with Lisa I got in touch with Eran to slightly revise the
> charter text that Sam and Mark put together for the last IETF meeting.
>
> It should addresses some of the comments provided during the BOF. Your
> feedback is welcome.
>
> Ciao
> Hannes
>
> -------------------------------------
>
> Open Authentication Protocol (oauth)
>
> Last Modified: 2009-01-30
>
> Chair(s):
>
> TBD
>
> Applications Area Director(s):
>
> Chris Newman <chris.newman@sun.com>
> Lisa Dusseault <lisa@osafoundation.org>
>
> Applications Area Advisor:
>
> TBD
>
> Mailing Lists:
>
> https://www.ietf.org/mailman/listinfo/oauth
>
> Description of Working Group:
>
> OAuth allows a user to grant a third-party Web site or application access to
> their resources, without revealing their credentials, or even their
> identity. For example, a photo-sharing site that supports OAuth would allow
> its users to use a third-party printing Web site to access their private
> pictures, without gaining full control of the user account.
>
> OAuth consist of:
>  * A mechanism for exchanging a user's credentials for a token-secret pair
> which can be used by a third party to access resources on their behalf
>  * A mechanism for signing HTTP requests with the token-secret pair
>
> The Working Group will produce one or more documents suitable for
> consideration as Proposed Standard, based upon the OAuth I-D, that will:
>  * Align OAuth with the Internet and Web architectures, best practices and
> terminology
>  * Assure good security practice, or document gaps in its capabilities
>  * Promote interoperability
>
> This specifically means that as a starting point for the working group the
> OAuth 1.0 specification is used and the
> available extension points are going to be utilized. It seems desireable to
> profile OAuth 1.0 in a way that produces a specification that is a backwards
> compatible profile, i.e. any OAUTH 1.0 and the specification produced by
> this group must support a basic set of features to guarantee
> interoperability.
>
> Furthermore, Oauth 1.0 defines three signature methods used to protect
> requests, namely PLAINTEXT, HMAC-SHA1, and RSA-SHA1. The group will work on
> new signature methods in case the existing mechanisms do not fulfill the
> security requirements. Existing signature methods will not be modified but
> may be dropped as part of the backwards compatible profiling activity.
>
> In doing so, it should consider:
>  * Implementer experience
>  * Existing uses of OAuth
>  * Ability to achieve broad impementation
>  * Ability to address broader use cases than may be contemplated by the
> original authors
>  * Impact on the Internet and Web
>
> The Working Group is not tasked with defining a generally applicable HTTP
> Authentication mechanism (i.e., browser-based "2-leg" scenerio), and should
> consider this work out of scope in its discussions. However, if the
> deliverables are able to be factored in such a way that this is a byproduct,
> or such a scenario could be addressed by additional future work, the Working
> Group may choose to do so.
>
> After delivering OAuth, the Working Group MAY consider defining additional
> functions and/or extensions, for example
> (but not limited to):
>  * Discovery of authentication configuration
>  * Message integrity
>  * Recommendations regarding the structure of the token
>
> Goals and Milestones:
>
> 12/2009     Submit document(s) suitable for publication as standards-track
> RFCs.
>
> _______________________________________________
> oauth mailing list
> oauth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
oauth mailing list
oauth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth