Re: [OAUTH-WG] OAuth WG Re-Chartering

Torsten Lodderstedt <torsten@lodderstedt.net> Wed, 21 March 2012 19:36 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFF0421E80E3 for <oauth@ietfa.amsl.com>; Wed, 21 Mar 2012 12:36:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.584
X-Spam-Level:
X-Spam-Status: No, score=-1.584 tagged_above=-999 required=5 tests=[AWL=0.665, BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RLVImtKQH098 for <oauth@ietfa.amsl.com>; Wed, 21 Mar 2012 12:36:05 -0700 (PDT)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.18.14]) by ietfa.amsl.com (Postfix) with ESMTP id 41C7921E80DC for <oauth@ietf.org>; Wed, 21 Mar 2012 12:36:01 -0700 (PDT)
Received: from [79.253.8.52] (helo=[192.168.71.36]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1SARKB-0007Bk-De; Wed, 21 Mar 2012 20:35:59 +0100
Message-ID: <4F6A2D9E.3050503@lodderstedt.net>
Date: Wed, 21 Mar 2012 20:35:58 +0100
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:10.0.2) Gecko/20120216 Thunderbird/10.0.2
MIME-Version: 1.0
To: Eran Hammer <eran@hueniverse.com>
References: <B327D847-B059-41D7-A468-8B8A5DB8BFCE@gmx.net> <CAAz=scnGaFzNNHv1xEQa0hCiA2gup_J_86HyzCnd7P0YTqfFxw@mail.gmail.com> <999913AB42CC9341B05A99BBF358718D01382ADC@FIESEXC035.nsn-intra.net> <90C41DD21FB7C64BB94121FBBC2E723453AFF089FE@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723453AFF089FE@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth WG Re-Chartering
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Mar 2012 19:36:07 -0000

In my opinion, dynamic client registration would allow us to drop public 
client thus simplifying the core spec.

regards,
Torsten.

Am 15.03.2012 16:00, schrieb Eran Hammer:
> I believe most do, except for the dynamic client registration. I don't have strong objections to it, but it is the least important and least defined / deployed proposal on the list. The AS->RS work is probably simpler and more useful at this point.
>
> EH
>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>> Of Tschofenig, Hannes (NSN - FI/Espoo)
>> Sent: Thursday, March 15, 2012 4:47 AM
>> To: ext Blaine Cook; Hannes Tschofenig
>> Cc: oauth@ietf.org
>> Subject: Re: [OAUTH-WG] OAuth WG Re-Chartering
>>
>> Hi Blaine,
>>
>> These are indeed good requirements you stated below.
>>
>> When you look at the list of topics do you think that the proposed items
>> indeed fulfill them?
>>
>> Ciao
>> Hannes
>>
>>
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>>> Of ext Blaine Cook
>>> Sent: Thursday, March 15, 2012 1:31 PM
>>> To: Hannes Tschofenig
>>> Cc: oauth@ietf.org WG
>>> Subject: Re: [OAUTH-WG] OAuth WG Re-Chartering
>>>
>>> On 14 March 2012 20:21, Hannes Tschofenig
>> <hannes.tschofenig@gmx.net>
>>> wrote:
>>>> So, here is a proposal:
>>>>
>>>> [Editor's Note: New work for the group. 5 items maximum! ]
>>>>
>>>> Aug. 2012    Submit 'Token Revocation' to the IESG for consideration
>>> as a Proposed Standard
>>>> Nov. 2012    Submit 'JSON Web Token (JWT)' to the IESG for
>>> consideration as a Proposed Standard
>>>> Nov. 2012    Submit 'JSON Web Token (JWT) Bearer Token Profiles for
>>> OAuth 2.0' to the IESG for consideration
>>>> Jan. 2013    Submit 'OAuth Dynamic Client Registration Protocol' to
>>> the IESG for consideration as a Proposed Standard
>>>> Sep. 2012    Submit 'OAuth Use Cases' to the IESG for consideration
>>> as an Informational RFC
>>>
>>> This looks great to me.
>>>
>>> I have serious concerns about feature-creep, and think that the OAuth
>>> WG should strongly limit its purview to these issues. In general, I
>>> think it prudent for this working group in particular to consider
>>> standardisation of work only under the following criteria:
>>>
>>> 1. Proposals must have a direct relationship to the mechanism of OAuth
>>> (and not, specifically, bound to an application-level protocol).
>>> 2. Proposals must have significant adoption in both enterprise and
>>> startup environments.
>>> 3. Any proposal must be driven based on a consideration of the
>>> different approaches, as adopted in the wild, and strive to be a
>>> better synthesis of those approaches, not a means to an end.
>>>
>>> These are the constraints with which I started the OAuth project, and
>>> they're more relevant than ever. I'd hate to see OAuth fail in the end
>>> because of a WS-*-like death by standards-pile-on.
>>>
>>> b.
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth