Re: [OAUTH-WG] application/x-www-form-urlencoded vs JSON (Proposal)

Torsten Lodderstedt <torsten@lodderstedt.net> Thu, 06 May 2010 17:29 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 782E63A6A04 for <oauth@core3.amsl.com>; Thu, 6 May 2010 10:29:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.569
X-Spam-Level:
X-Spam-Status: No, score=-0.569 tagged_above=-999 required=5 tests=[AWL=-0.735, BAYES_40=-0.185, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cOgPIgW85DTb for <oauth@core3.amsl.com>; Thu, 6 May 2010 10:29:21 -0700 (PDT)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.29.24]) by core3.amsl.com (Postfix) with ESMTP id E747C3A69E8 for <oauth@ietf.org>; Thu, 6 May 2010 10:29:20 -0700 (PDT)
Received: from p4fff325d.dip.t-dialin.net ([79.255.50.93] helo=[127.0.0.1]) by smtprelay02.ispgateway.de with esmtpa (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1OA4sj-0002VO-Tm; Thu, 06 May 2010 19:29:06 +0200
Message-ID: <4BE2FC60.7040303@lodderstedt.net>
Date: Thu, 06 May 2010 19:29:04 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; de; rv:1.9.1.9) Gecko/20100317 Thunderbird/3.0.4
MIME-Version: 1.0
To: jsmarr@stanfordalumni.org
References: <9890332F-E759-4E63-96FE-DB3071194D84@gmail.com> <20100430105935.20255m8kdythy6sc@webmail.df.eu> <90C41DD21FB7C64BB94121FBBC2E723439323D0DB0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTik3NSJynWfiNWovruPEOT2Y6G1zcWPFOaS_pHdy@mail.gmail.com> <4BE1AF25.7000308@lodderstedt.net> <AANLkTil2_9KOm1eRoC0jxvH99E55K3BEW-T5cgWLay9H@mail.gmail.com> <AANLkTilWV3VVBROXZuky5OLNzM2hz27pEqwG1l6W2Uc1@mail.gmail.com> <4BE1BB10.7060009@lodderstedt.net> <w2v77facc501005051149pca35de47tfcca515a3b557c81@mail.gmail.com> <4BE1F2A1.9040707@pidster.com> <s2mc334d54e1005060846k10f446b4r5f907acf237f8735@mail.gmail.com>
In-Reply-To: <s2mc334d54e1005060846k10f446b4r5f907acf237f8735@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------020501080004050308020903"
X-Df-Sender: 141509
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] application/x-www-form-urlencoded vs JSON (Proposal)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 May 2010 17:29:23 -0000

+1 , we've got really strong support for JSON and I'm also looking 
forward to review Erans proposal.

I checked back today with some of our service and client application 
developers. All of our services offer JSON and XML as transport format, 
no one even considered using application/x-www-form-urlencoded for 
encoding web services responses.

On the client side, things look even simpler. Our own client application 
generally use JSON on all platforms, incl. smartphones (Android, 
iPhone), handsets (J2ME), home entertainment, and home automation 
devices. Especially the later are really special since they use only a 
small subest of Java (no Java 5, no generics, ..) but JSON is apparently 
not a problem. It is mainly prefered because it combines small 
resource/bandwitdh consumption with ease of use. Our iPhone applications 
are built using external libraries, the experiences are good.

As Joseph said, JSON is the "right horse to bet on". Platform support is 
getting better in my observation. For example, J2ME supports it and 
JavaScript is getting native JSON support as well.

 From my point of view, the Oauth API should fit well into the world of 
HTTP-based services and choosing a completly different encoding 
(application/x-www-form-urlencoded) for OAuth might appear somehow weird 
to developers. Moreover, what do developers really gain from that 
constraint? OAuth just provides the tokens for invoking other services 
securly. If all the other services use JSON, applications need JSON 
libraries anyway. So why bother with that question with respect to OAuth?

regards,
Torsten.

Am 06.05.2010 17:46, schrieb Joseph Smarr:
> I'm hearing a lot of confusion on this thread.
>
> Evan-of course when attributes are sent *on-the-url* then they get 
> parsed automatically by the HTTP stack, but we're talking about the 
> response body, which every OAuth 1.0 library I've seen writes their 
> own (usually buggy) parser for, and that's where we're proposing to 
> use JSON.
>
> I've seen good JSON library support on every platform I've needed to 
> work for, and it's becoming more and more common (look at Facebook's 
> new Graph API, for instance), so I doubt many platforms will be 
> without JSON parsers for much longer. That being said, it's prudent to 
> look at the state-of-the-art and verify that requiring JSON is not a 
> practical hindrance for iPhone developers, etc., but I still think 
> it's "betting on the right horse" and it's going to be a lot simpler 
> and less error-prone than either url-encoded values or XML.
>
> Eran-thanks for agreeing to write something up, and I agree we've got 
> strong support for JSON being the primary/only format for the response 
> body. I look forward to the proposed text and will happily review it.
>
> Thanks, js
>
> On Wed, May 5, 2010 at 3:35 PM, Pid <pid@pidster.com 
> <mailto:pid@pidster.com>> wrote:
>
>     On 05/05/2010 19:49, DeWitt Clinton wrote:
>     > Having written more than one compliant JSON parser myself, it is
>     most
>     > certainly not "trivial", and not something that can be safely
>     done with
>     > a regular expression or other hacks.
>     >
>     > That said, it's not /hard/, and that alone is no reason not to
>     mandate
>     > JSON, but I do want people to be clear about what mandating JSON
>     means.
>     >  Clients will need a fully compliant parser.  Period.  If the
>     OAuth spec
>     > requires JSON, then it should require it by reference to RFC
>     4627, not
>     > just by giving some examples that demonstrate the curly braces.
>     >
>     > -DeWitt
>
>     I know it's late, but can I add my 2 cents - as a developer who'll be
>     implementing this?
>
>
>     In the original post, Dick suggested that developers were having
>     trouble
>     with the URL encoding format - but I respectfully suggest that JSON is
>     going to be more problematic.
>
>     There's no guarantee that an external JSON parser will be
>     available for
>     a given platform/language/business, (perhaps because of licensing, if
>     not other more technical reasons).  So that means writing one.
>
>     Writing a JSON parser just to cover the simple usage proposed won't be
>     too tricky, but if the JSON response is so simple why bother
>     adding this
>     dependency at all?  I'm slightly baffled...
>
>
>     URL encoding is required for at least one flow, so IMHO it might
>     as well
>     stay for the rest.  Simplicity is important.
>
>
>     Can someone from the pro-JSON side offer a clearer explanation as
>     to the
>     benefits, so I can stop scratching my head about it all, please?
>
>
>
>     Respectfully,
>
>     Pid
>
>
>     > On Wed, May 5, 2010 at 11:38 AM, Torsten Lodderstedt
>     > <torsten@lodderstedt.net <mailto:torsten@lodderstedt.net>
>     <mailto:torsten@lodderstedt.net <mailto:torsten@lodderstedt.net>>>
>     wrote:
>     >
>     >     Am 05.05.2010 20:01, schrieb Evan Gilbert:
>     >>
>     >>
>     >>     On Wed, May 5, 2010 at 10:59 AM, Evan Gilbert
>     <uidude@google.com <mailto:uidude@google.com>
>     >> <mailto:uidude@google.com <mailto:uidude@google.com>>> wrote:
>     >>
>     >>
>     >>
>     >>         On Wed, May 5, 2010 at 10:47 AM, Torsten Lodderstedt
>     >> <torsten@lodderstedt.net <mailto:torsten@lodderstedt.net>
>     <mailto:torsten@lodderstedt.net <mailto:torsten@lodderstedt.net>>>
>     wrote:
>     >>
>     >>             Even if not supported directly by the platform
>     there are
>     >>             many JSON libraries available these days.
>     >>
>     >>
>     >>         It's not hard to add JSON support, but it's a factor in the
>     >>         choice.
>     >>
>     >>
>     >>
>     >> http://www.json.org/ lists 3 libraries for Objective-C alone.
>     >>
>     >>             Moreover, the JSON documents we are discussing now are
>     >>             simple, something like
>     >>
>     >>
>     >>             { "access_token": "SlAV32hkKG", "expires_in": "3600",
>     >>             "refresh_token": "8xLOxBtZp8" }
>     >>
>     >>             Parsing such a document is not a challenge even without
>     >>             library support.
>     >>
>     >>
>     >>         Per notes above - the client needs to do understand form
>     >>         encoding anyway. The client needs to parse the redirect_uri
>     >>         and also needs to generate form encoded requests.
>     >>
>     >>
>     >>     Also, for the User-Agent flow, parsing potentially
>     untrusted JSON
>     >>     in JavaScript is difficult. The normal path of using eval() is
>     >>     unsafe and leads to XSS holes - you need to run regex
>     matcher to
>     >>     verify that the JSON content has no executable code.
>     >
>     >     You are right, using eval to parse JSON is dangerous and
>     thus as far
>     >     as I understand, the recommended way is to use a JSON parser
>     (aka
>     >     native JSON support)?
>     >
>     >     regards,
>     >     Torsten.
>     >
>     >     _______________________________________________
>     >     OAuth mailing list
>     > OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org
>     <mailto:OAuth@ietf.org>>
>     > https://www.ietf.org/mailman/listinfo/oauth
>     >
>     >
>     >
>     >
>     > _______________________________________________
>     > OAuth mailing list
>     > OAuth@ietf.org <mailto:OAuth@ietf.org>
>     > https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>