Re: [OAUTH-WG] Mandatory-to-implement token type

Eran Hammer-Lahav <eran@hueniverse.com> Sun, 04 December 2011 18:31 UTC

Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0AD2821F85A1 for <oauth@ietfa.amsl.com>; Sun, 4 Dec 2011 10:31:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.524
X-Spam-Level:
X-Spam-Status: No, score=-2.524 tagged_above=-999 required=5 tests=[AWL=0.075, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pIQE4jjayHmD for <oauth@ietfa.amsl.com>; Sun, 4 Dec 2011 10:30:59 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by ietfa.amsl.com (Postfix) with SMTP id 63ED321F8538 for <oauth@ietf.org>; Sun, 4 Dec 2011 10:30:59 -0800 (PST)
Received: (qmail 18164 invoked from network); 4 Dec 2011 18:30:58 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.47) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 4 Dec 2011 18:30:58 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT005.EX1.SECURESERVER.NET ([72.167.180.134]) with mapi; Sun, 4 Dec 2011 11:30:58 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Anthony Nadalin <tonynad@microsoft.com>, Mike Jones <Michael.Jones@microsoft.com>, Barry Leiba <barryleiba@computer.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Date: Sun, 04 Dec 2011 11:30:56 -0700
Thread-Topic: [OAUTH-WG] Mandatory-to-implement token type
Thread-Index: AQHMpQL0Sb85EJbey0aMx4cOTKVJd5XH3D0AgAABeQCAABrqAIAAXtYAgAJmFACAAFCYgIAAeAmwgACVTyA=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723452856C7315@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <CALaySJJ+2au5rxEQmSSpXO42KmgCu=NhiLPBCx-3AH0hud=5CQ@mail.gmail.com> <CAH-8B6sjim_tcBkTPFWc1SnjhtHDQTR7sVT+aOjnYv7cs8JssA@mail.gmail.com> <4ED82D62.3070800@cs.tcd.ie> <CALaySJLKYLpPWc14_GUJKc5j1E3QovKQOx9HsdR-n2YV7kstpQ@mail.gmail.com> <4ED89384.9060603@cs.tcd.ie> <CAC4RtVBQdV+dwhzK903nkeNhsKzrHNFPYMK+EZtxRXnHWGs68w@mail.gmail.com> <4E1F6AAD24975D4BA5B16804296739435F7576DF@TK5EX14MBXC283.redmond.corp.microsoft.com> <B26C1EF377CB694EAB6BDDC8E624B6E73BFB1FF2@BL2PRD0310MB362.namprd03.prod.outlook.com>
In-Reply-To: <B26C1EF377CB694EAB6BDDC8E624B6E73BFB1FF2@BL2PRD0310MB362.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Mandatory-to-implement token type
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Dec 2011 18:31:00 -0000

Bearer tokens are practically identical to OAuth 1.0 PLAINTEXT. Get your facts right.

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Anthony Nadalin
> Sent: Sunday, December 04, 2011 1:37 AM
> To: Mike Jones; Barry Leiba; Stephen Farrell
> Cc: oauth WG
> Subject: Re: [OAUTH-WG] Mandatory-to-implement token type
> 
> I agree we have no plans to implement MAC if we wanted that we would
> have been happy with OAUTH 1.0a but that was not deployable
> 
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Mike Jones
> Sent: Saturday, December 03, 2011 6:26 PM
> To: Barry Leiba; Stephen Farrell
> Cc: oauth WG
> Subject: Re: [OAUTH-WG] Mandatory-to-implement token type
> 
> I strongly object to a mandatory-to-implement clause for the MAC scheme.
> They are unnecessary and market forces have shown that implementers do
> not want or need this kind of an authentication scheme.
> 
> 				-- Mike
> 
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Barry Leiba
> Sent: Saturday, December 03, 2011 1:38 PM
> To: Stephen Farrell
> Cc: oauth WG
> Subject: Re: [OAUTH-WG] Mandatory-to-implement token type
> 
> Stephen says:
> > On 12/02/2011 03:20 AM, Barry Leiba wrote:
> >> Maybe what would work best is some text that suggests what I say
> >> above: that toolkits intended for use in implementing OAuth services
> >> in general... implement [X and/or Y], and that code written for a
> >> specific environment implement what makes sense for that environment.
> >> It seems to me that to require any particular implementation in the
> >> latter case is arbitrary and counter-productive, and doesn't help
> >> anything interoperate.  Whereas general-purpose toolkits that
> >> implement everything DO help interop.
> >
> > That'd work just fine for me.
> 
> OK, so here's what I suggest... I propose adding a new section 7.2, thus:
> 
> -----------------------------------
> 7.2 Access Token Implementation Considerations
> 
> Access token types have to be mutually understood among the authorization
> server, the resource server, and the client -- the access token issues the
> token, the resource server validates it, and the client is required to
> understand the type, as noted in section 7.1, above.  Because of that,
> interoperability of program code developed separately depends upon the
> token types that are supported in the code.
> 
> Toolkits that are intended for general use (for building other clients and/or
> servers), therefore, SHOULD implement as many token types as practical, to
> ensure that programs developed with those toolkits are able to use the
> token types they need.  In particular, all general-use toolkits MUST
> implement bearer tokens [...ref...] and MAC tokens [...ref...].
> 
> Purpose-built code, built without such toolkits, has somewhat more
> flexibility, as its developers know the specific environment they're
> developing for.  There's clearly little point to including code to support a
> particular token type when it's known in advance that the type in question
> will never be used in the intended deployment.
> Developers of purpose-built code are encouraged to consider future
> extensions and to plan ahead for changes in circumstances, and might still
> want to include support for multiple token types.  That said, the choice of
> token-type support for such purpose-built code is left to the developers and
> their specific requirements.
> -----------------------------------
> 
> I think that expresses a reasonable compromise that might actually be
> followed and might actually do some good.  Comments?  Can we go with this
> and close this issue?  (And, sorry, I've been a Bad Chair, and haven't put this
> in the tracker.)
> 
> Barry
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> 
> 
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth