Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

Torsten Lodderstedt <torsten@lodderstedt.net> Thu, 15 July 2010 22:56 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7F1493A6802 for <oauth@core3.amsl.com>; Thu, 15 Jul 2010 15:56:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.109
X-Spam-Level:
X-Spam-Status: No, score=-2.109 tagged_above=-999 required=5 tests=[AWL=0.139, BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pIJykQz8a7Lt for <oauth@core3.amsl.com>; Thu, 15 Jul 2010 15:56:25 -0700 (PDT)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.31.28]) by core3.amsl.com (Postfix) with ESMTP id E0FA73A6800 for <oauth@ietf.org>; Thu, 15 Jul 2010 15:56:24 -0700 (PDT)
Received: from p4ffd0e52.dip.t-dialin.net ([79.253.14.82] helo=[127.0.0.1]) by smtprelay01.ispgateway.de with esmtpa (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1OZXM2-0003bn-7h; Fri, 16 Jul 2010 00:56:34 +0200
Message-ID: <4C3F921E.7040304@lodderstedt.net>
Date: Fri, 16 Jul 2010 00:56:30 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; de; rv:1.9.1.10) Gecko/20100512 Thunderbird/3.0.5
MIME-Version: 1.0
To: Naitik Shah <n@daaku.org>
References: <AANLkTim6az--AdwmEoew2pz3kEjhc_GyEaiyo_0UhSRr@mail.gmail.com> <1279205969.18579.55.camel@localhost.localdomain> <AANLkTildz62l2Me26Dlrv5nNmp8Z3P8JD1K-ChcWc5IO@mail.gmail.com> <AANLkTill8k-fUFt-IZLWdZinScj4fSBoI4rAiAf1PrYR@mail.gmail.com> <1279216291.18579.61.camel@localhost.localdomain> <AANLkTikJymidRFzQf17Ssm-CCX7RLZ8Gu0_SZl_ocWdi@mail.gmail.com>
In-Reply-To: <AANLkTikJymidRFzQf17Ssm-CCX7RLZ8Gu0_SZl_ocWdi@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------070608050108040407040000"
X-Df-Sender: 141509
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Jul 2010 22:56:26 -0000

where is the relation between token version and HTTP authentication 
scheme version?

regards,
Torsten.

Am 15.07.2010 23:34, schrieb Naitik Shah:
> I though we'd come to a decision on the versioning too :) IMHO, it's 
> better to push this burden of versioning into the token itself if 
> necessary. I think it's better from a developers perspective to pass 
> an oauth_token, because it's cleaner. Most deployments will already 
> have versioned tokens to enable upgrading these for internal changes, 
> so why can't the OAuth version be contained in there too? Given the 
> option to simplify the implementation for a API provider (Big Company, 
> or someone who has to know how OAuth works) vs API consumer 
> (Developer, or someone who usually just wants some data), I hope 
> everyone agrees our focus should be the Developer.
>
> While we (Facebook) didn't have OAuth 1.0 tokens to deal with and so 
> don't have the same backward compatibility issues, we've already 
> changed our tokens and introduced new ones a couple of times and this 
> had no impact on the parameter name being used.
>
>
> -Naitik
>
> On Thu, Jul 15, 2010 at 10:51 AM, Justin Richer <jricher@mitre.org 
> <mailto:jricher@mitre.org>> wrote:
>
>     It was discussed before, but I don't remember there being any
>     consensus
>     in the group. What are the practical reasons for not using "oauth2"
>     namespacing in the one place we still use namespacing? Most of
>     what I've
>     heard seems to sound like "I don't like it to have a 2 on it".
>
>     I don't want to have to set up the OAuth 2 system to have to catch
>     failed cases of the OAuth 1 protocol. A good OAuth 2 call and a bad
>     OAuth 1 call should be distinguishable from the start. Also, what
>     about
>     when we finally get a signed-request going? I would assume that that's
>     going to add back in things like oauth_signature, oauth_nonce, and the
>     other parameters whose absence you should filter on.
>
>      -- Justin
>
>     On Thu, 2010-07-15 at 13:37 -0400, David Recordon wrote:
>     > I thought this topic had been beaten to death before. An OAuth 1.0
>     > protected resource request includes a variety of oauth_ parameters
>     > whereas OAuth 2.0 just has oauth_token.
>     >
>     >
>     > --David
>     >
>     >
>     > On Thu, Jul 15, 2010 at 10:12 AM, Brian Eaton <beaton@google.com
>     <mailto:beaton@google.com>>
>     > wrote:
>     >         On Thu, Jul 15, 2010 at 7:59 AM, Justin Richer
>     > <jricher@mitre.org <mailto:jricher@mitre.org>> wrote:
>     > > +1 on OAuth2 header, and I also want to see oauth2_token in
>     >         URI and form
>     > > parameter methods.
>     >
>     >
>     >         Good point about the query parameter names needing to be
>     >         unambiguous.
>     >
>     >         _______________________________________________
>     >         OAuth mailing list
>     > OAuth@ietf.org <mailto:OAuth@ietf.org>
>     > https://www.ietf.org/mailman/listinfo/oauth
>     >
>     >
>     >
>
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>