Re: [OAUTH-WG] December 27, 2012 OAuth Release

William Mills <wmills_92105@yahoo.com> Fri, 04 January 2013 23:57 UTC

Return-Path: <wmills_92105@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EBA521F8A8E for <oauth@ietfa.amsl.com>; Fri, 4 Jan 2013 15:57:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.855
X-Spam-Level:
X-Spam-Status: No, score=-1.855 tagged_above=-999 required=5 tests=[AWL=0.743, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4QvRE769+kka for <oauth@ietfa.amsl.com>; Fri, 4 Jan 2013 15:57:13 -0800 (PST)
Received: from nm29-vm0.bullet.mail.bf1.yahoo.com (nm29-vm0.bullet.mail.bf1.yahoo.com [98.139.213.166]) by ietfa.amsl.com (Postfix) with ESMTP id E176B21F846E for <oauth@ietf.org>; Fri, 4 Jan 2013 15:57:12 -0800 (PST)
Received: from [98.139.215.140] by nm29.bullet.mail.bf1.yahoo.com with NNFMP; 04 Jan 2013 23:57:12 -0000
Received: from [98.139.212.192] by tm11.bullet.mail.bf1.yahoo.com with NNFMP; 04 Jan 2013 23:57:12 -0000
Received: from [127.0.0.1] by omp1001.mail.bf1.yahoo.com with NNFMP; 04 Jan 2013 23:57:12 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 319047.49887.bm@omp1001.mail.bf1.yahoo.com
Received: (qmail 83213 invoked by uid 60001); 4 Jan 2013 23:57:11 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1357343831; bh=9heNwMlDuvC02tTnnZcksGBs0QcSYB4snHsKYoLushc=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=KIrhfkxPRyiX+Wx1aN1zKkshxU/xns+i+swVtImqp995frYkPMsjjLkYwO+buEQBpWJVTSdd08HQhplrrXN5naEc76z33FmpqodFVEWC6d62NNXTwYEOsoHUmzhgsgcxmDqLlxHRcsLEqpHYxJvK+nsgewsCPJRMsPpn47tjkH0=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=l7+EFAr2X6NuoHM4vfyz+lRzB8xsTuwKciYqypgTIxzn4qsVxcyDklClriodAZBh4L1Jzw4xgJgRuX8MGLfQe5FXsyL/TMR5vLJO4EsnIUx7wFngTIhOD+3AM4bvBduICwJvLqdFBhM9TChXmHAaW7MwomK1CDDdqkanwaUMXKE=;
X-YMail-OSG: oE9F4OEVM1nhFG_0qf.hB5.PKJ4N0CGignK6AmqW5tnNdgP _Q6CH8NsgkjS5YcmgNyWydXImHuZp1LFekXuKzfyNdHoRVMZGvd4o367nlwz aGRww1T3xBAj3XhRNUEgVRJzVCtBukm59ZiSZwGFgodGqqtM20S_LfYQrQO3 idTXXkM2pXo636zWUt0XzEX.YH9J92lD1sdS1rHBIQhf9D.HARYPGs4QXcnG B5pKJ4uginUyD3EB1TJWTrUTaJf0tnRKNFCJbKhQU1Q0qxbG.4x_2CdCFO3P 5U0831zL6gzHOE1akDtv3lqNy36qwewi4kB0KHxMEWONBidwCTXRnD8StY8m ibgbGlB7trYSu775RAJWwypPAHTbbEjGnglV6nEB6udAiMVRnBYdSmf6lRFF piRpsMyBlcSpo0w67Q.Wt3lU7mQoKyRnFixFC6zKaUvKi02gZVQFnUNyKj5T _IXO1PiJAo5v_ViBF1ngnfqobnnKYufGNujKmX5..Dlq0ebCkCQXUTQeEqUJ MxYThHZZrsyAU0yL40KuxaXu16P5GU30MziGnV.7h_HYG_IZXQjr3F7e5GW4 0AM.b262RuJC8YbfpiZ0IQ4VGq7WqHAe2q7vLQ7ZltM8dW0E_7hSy7yo99iB yg4VbrDWdZhU3VG.azkNDa6i61CxsWrO.S9BR88AwX5GtHXlFycE2oo4sgbF wtaEfIm1P5aCsKg--
Received: from [209.131.62.113] by web31810.mail.mud.yahoo.com via HTTP; Fri, 04 Jan 2013 15:57:11 PST
X-Rocket-MIMEInfo: 001.001, WWVhaCwgSSB0aGluayBpdCB3b3VsZCB3b3JrLiBBZGRpbmcgY2xpZW50IGFzc2VydGVkIEpXVCBwYXlsb2FkIHdvdWxkIGFsc28gbmljZWx5IGdldCBvdXQgb2YgdGhlIHdob2xlIHF1ZXN0aW9uIG9mIHdoZXJlIHRoZSBub25jZSwgdGltZXN0YW1wLCBhbmQgc3VjaCBnbyBhbmQgd2hldGhlciB0aGV5IGNhbiBiZSBwYXJ0IG9mIHRoZSBxdWVyeSBzdHJpbmcsIHdoaWNoIHdhcyBhbHdheXMgYW5ub3lpbmcgd2l0aCBNQUMgYW5kIE9BdXRoIDEuCgpXZSBzdGlsbCBoYXZlIHRoZSBwcm9ibGVtIHRoYXQgc29tZSABMAEBAQE-
X-Mailer: YahooMailWebService/0.8.130.494
References: <4E1F6AAD24975D4BA5B1680429673943669B0A1E@TK5EX14MBXC283.redmond.corp.microsoft.com> <1356746794.51868.YahooMailNeo@web31807.mail.mud.yahoo.com> <4E1F6AAD24975D4BA5B1680429673943669FE2AD@TK5EX14MBXC283.redmond.corp.microsoft.com> <1357339700.37914.YahooMailNeo@web31816.mail.mud.yahoo.com> <E7EF196D-1771-477E-932B-917A4A85D5A6@ve7jtb.com>
Message-ID: <1357343831.30497.YahooMailNeo@web31810.mail.mud.yahoo.com>
Date: Fri, 04 Jan 2013 15:57:11 -0800
From: William Mills <wmills_92105@yahoo.com>
To: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <E7EF196D-1771-477E-932B-917A4A85D5A6@ve7jtb.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1935884094-435661301-1357343831=:30497"
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] December 27, 2012 OAuth Release
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills_92105@yahoo.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Jan 2013 23:57:14 -0000

Yeah, I think it would work. Adding client asserted JWT payload would also nicely get out of the whole question of where the nonce, timestamp, and such go and whether they can be part of the query string, which was always annoying with MAC and OAuth 1.

We still have the problem that some clients don't know what order the query or post arguments will be generated in, but that wasn't resolved yet anyway.

How do we solve for the server requiring a specific set of supported hashes and feeding that back to the client?

-bill


________________________________
 From: John Bradley <ve7jtb@ve7jtb.com>
To: William Mills <wmills_92105@yahoo.com> 
Cc: Mike Jones <Michael.Jones@microsoft.com>; "oauth@ietf.org" <oauth@ietf.org> 
Sent: Friday, January 4, 2013 3:44 PM
Subject: Re: [OAUTH-WG] December 27, 2012 OAuth Release
 

If everything you want to sign can go in the JWT there is nothing to stop that.   Otherwise you are back to coming up with a way of doing a detached signature and putting a hash in the JWT like connect is doing by putting a hash of the token in the id_token for the "token id_token} flow.

The hard part is figuring out what needs to be signed.   

As for client generated JWT we already have the JWT assertion profile.  Connect is using that as an option to authenticate to the token endpoint. 

Would doing a similar thing but to the RS really work for you?

John B.

On 2013-01-04, at 7:48 PM, William Mills <wmills_92105@yahoo.com> wrote:

It's the core problem I see MAC solving.  I'd be happy enough to define a JWT variant that does this if that's easier than MAC.  What do you think?
>
>
>
>________________________________
> From: Mike Jones <Michael.Jones@microsoft.com>
>To: William Mills <wmills_92105@yahoo.com>; "oauth@ietf.org" <oauth@ietf.org> 
>Sent: Friday, January 4, 2013 2:35 PM
>Subject: RE: [OAUTH-WG] December 27, 2012 OAuth Release
> 
>
> 
>There’s no generic OAuth way to do this.  There is a way to do it in OpenID Connect – see request_object_signing_alg, userinfo_signed_response_alg, and id_token_signed_response_algin
http://openid.net/specs/openid-connect-registration-1_0-13.html#anchor3 and  userinfo_signing_alg_values_supported, id_token_signing_alg_values_supported, and request_object_signing_alg_values_supportedin
http://openid.net/specs/openid-connect-discovery-1_0-11.html#anchor9.
> 
>                                                            -- Mike
> 
>From:William Mills [mailto:wmills_92105@yahoo.com] 
>Sent: Friday, December 28, 2012 6:07 PM
>To: Mike Jones; oauth@ietf.org
>Subject: Re: [OAUTH-WG] December 27, 2012 OAuth Release
> 
>Mike,
> 
>I've read through the JWT spec and I'm curious about something.  How do I specify a signature requirement as the server?  I didn't see it but I probably just missed it.  I'm thinking that with very little work a JWT can do everything that MAC does with greater flexibility, *BUT* the server needs to be able to require a signed usage.  Something I never liked about OAuth 1.0 is that the server must support all valid signature types, even PLAINTEXT, so I want to be able to avoid that.
> 
>It would require the client to be able to include client generated stuff in the JWT.
> 
>Thanks,
> 
>-bill
>
>_______________________________________________
>OAuth mailing list
>OAuth@ietf.org
>https://www.ietf.org/mailman/listinfo/oauth
>