Re: [OAUTH-WG] Preliminary OAuth Core draft -29

John Bradley <ve7jtb@ve7jtb.com> Mon, 09 July 2012 15:45 UTC

Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2668721F85F4 for <oauth@ietfa.amsl.com>; Mon, 9 Jul 2012 08:45:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.48
X-Spam-Level:
X-Spam-Status: No, score=-3.48 tagged_above=-999 required=5 tests=[AWL=0.118, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T76JEeu-m5aT for <oauth@ietfa.amsl.com>; Mon, 9 Jul 2012 08:45:09 -0700 (PDT)
Received: from mail-gg0-f172.google.com (mail-gg0-f172.google.com [209.85.161.172]) by ietfa.amsl.com (Postfix) with ESMTP id C782B21F85A0 for <oauth@ietf.org>; Mon, 9 Jul 2012 08:45:08 -0700 (PDT)
Received: by ggnc4 with SMTP id c4so11215434ggn.31 for <oauth@ietf.org>; Mon, 09 Jul 2012 08:45:33 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=subject:mime-version:content-type:from:in-reply-to:date:cc :message-id:references:to:x-mailer:x-gm-message-state; bh=GbVNniY5IEYIEnJ+uGb71aYbZNA4RapCIAtJjLQMFmA=; b=dPkwfr3y3uQPhvb8bUB/FmdCAzFC9h8qCF0MeJtNbnlFtKO8DGQ3ZePEYner1DsQe5 XL7FtLUNfXoPwIkX893Eo3wou/nIHk2RYs5gjfCLkjSNZ3maXWcnxPD3+UeLCoh2+ovB 1hcOPoi6kvNV7xYppNq1mYO5PR/AaBcALHWlAnu+bZ0s+A3cAGg1FynyTIAoqmqzMypC Oibq+rqjwjEV8n+wXDGS1evPJFUk5gXklMYWa8CCRv8ZkeFmL4p3xI77MzSYB7fDTRvy GuHmCdotMfCC2g3VVh4siaPvhJ4EIS2uGxA6X2UipePAZeRMYrz/pEqTClQQtdyuRH7g NKMA==
Received: by 10.236.170.199 with SMTP id p47mr46666426yhl.12.1341848733630; Mon, 09 Jul 2012 08:45:33 -0700 (PDT)
Received: from [192.168.1.211] (190-20-12-246.baf.movistar.cl. [190.20.12.246]) by mx.google.com with ESMTPS id n15sm30286648anh.6.2012.07.09.08.45.20 (version=TLSv1/SSLv3 cipher=OTHER); Mon, 09 Jul 2012 08:45:32 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: multipart/signed; boundary="Apple-Mail=_59A0D889-7074-460E-92DC-334D0FC68F86"; protocol="application/pkcs7-signature"; micalg="sha1"
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436657C93A@TK5EX14MBXC283.redmond.corp.microsoft.com>
Date: Mon, 09 Jul 2012 11:44:56 -0400
Message-Id: <D67F6901-4239-4C0B-91CC-F6B637E0DAE7@ve7jtb.com>
References: <4E1F6AAD24975D4BA5B16804296739436657C93A@TK5EX14MBXC283.redmond.corp.microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.1278)
X-Gm-Message-State: ALoCoQmU+agTvg+FLxCcS4bgw6sHzKyaZpZdkOH1EO0TuMBCDGHt6fz5DciinGmEPLSZcCk2edVs
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Preliminary OAuth Core draft -29
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2012 15:45:10 -0000

Given we are making the changes to the public client code flow.

I would change the name of the security consideration to:
> Misuse of Access Token to Impersonate Resource Owner in Implicit Flow

Sorry I forgot to change that when I sent it.

John B.

On 2012-07-09, at 3:08 AM, Mike Jones wrote:

> A preliminary version of OAuth core draft -29 is attached for the working group’s consideration and discussion on today’s call.  I believe that this addresses all issues that have been raised, including Julian’s issues about the ABNF, character sets, and form encoding.  Changes are:
>  
> Added "MUST" to "A public client that was not issued a client password MUST use the client_id request parameter to identify itself when sending requests to the token endpoint" and added text explaining why this must be so.
> Added that the authorization server MUST "ensure the authorization code was issued to the authenticated confidential client or to the public client identified by the client_id in the request".
> Added Security Considerations section "Misuse of Access Token to Impersonate Resource Owner at Public Client".
> Deleted ";charset=UTF-8" from examples formerly using "Content-Type: application/x-www-form-urlencoded;charset=UTF-8".
> Added the phrase "and a character encoding of UTF-8" when describing how to send requests using the HTTP request entity-body, per Julian Reschke's suggestion.
> Added "The ABNF below is defined in terms of Unicode code points [UNICODE5]; these characters are typically encoded in UTF-8".
> For symmetry when using HTTP Basic authentication, also apply the application/x-www-form-urlencoded encoding to the client password, just as was already done for the client identifier.
> Reduced multiple blank lines around artwork elements to single blank lines.
> Removed Eran Hammer's name from the author list, at his request. Dick Hardt is now listed as the editor.
>  
>                                                             Best wishes,
>                                                             -- Mike
>  
> <draft-ietf-oauth-v2-29 preliminary.txt><draft-ietf-oauth-v2-29 preliminary.html><draft-ietf-oauth-v2-29 preliminary.pdf><draft-ietf-oauth-v2-29 preliminary.xml>_______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth