Re: [OAUTH-WG] Signatures, Why?

Igor Faynberg <igor.faynberg@alcatel-lucent.com> Tue, 16 March 2010 06:48 UTC

Return-Path: <igor.faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A828B3A68F7 for <oauth@core3.amsl.com>; Mon, 15 Mar 2010 23:48:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.427
X-Spam-Level:
X-Spam-Status: No, score=-2.427 tagged_above=-999 required=5 tests=[AWL=0.172, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aRQhN+fzgQwt for <oauth@core3.amsl.com>; Mon, 15 Mar 2010 23:48:23 -0700 (PDT)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by core3.amsl.com (Postfix) with ESMTP id 68C8D3A62C1 for <oauth@ietf.org>; Mon, 15 Mar 2010 23:48:23 -0700 (PDT)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id o2G6mR8o016409 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 16 Mar 2010 01:48:27 -0500 (CDT)
Received: from [135.244.36.244] (faynberg.lra.lucent.com [135.244.36.244]) by umail.lucent.com (8.13.8/TPES) with ESMTP id o2G6mPS8025023; Tue, 16 Mar 2010 01:48:26 -0500 (CDT)
Message-ID: <4B9F29BC.3010709@alcatel-lucent.com>
Date: Tue, 16 Mar 2010 02:48:28 -0400
From: Igor Faynberg <igor.faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: Paul Lindner <lindner@inuus.com>
References: <d37b4b431003041200n1fc6cc5au83194aca28763b0d@mail.gmail.com> <4B99B2DD.3000405@stpeter.im> <4B99D783.1090905@lodderstedt.net> <4B9EB99F.1050609@lodderstedt.net> <cb5f7a381003152322m5c6ec744nb8336e329860439e@mail.gmail.com> <b71cdca91003152330p74409dc5ua34fb4ef06702a15@mail.gmail.com>
In-Reply-To: <b71cdca91003152330p74409dc5ua34fb4ef06702a15@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Signatures, Why?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: igor.faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Mar 2010 06:48:24 -0000

That's what I have been thinking. Why is it important to sign the 
headers?  (I am not against signing them, but I cannot see the need in 
the specific cases we had discussed. In other words, if I had signed the 
body of the request, I probably would not care if someone changed the 
headers.)

Igor

Paul Lindner wrote:
> What about  
> http://oauth.googlecode.com/svn/spec/ext/body_hash/1.0/drafts/1/spec.html ? 
>
>
> That's in use and has been implemented in shindig for quite some time.
>
> That draft adds protection of the body -- I don't know of any draft 
> that covers signing the headers...
>
>
> On Mon, Mar 15, 2010 at 11:22 PM, John Panzer <jpanzer@google.com 
> <mailto:jpanzer@google.com>> wrote:
>
>     I'm confused by one "pro" for signatures:
>
>     "Protect integrity of whole request - authorization data and
>     payload when communicating over unsecure channel"
>
>     I do not believe there is an existing concrete proposal that will
>     protect the whole request, unless you add additional restrictions
>     on the request types -- e.g., only HTTP GET or POST with
>     form-encoded data variables only.
>
>     If the assertion is that signatures will actually provide
>     integrity for arbitrary HTTP request bodies as well as the URL,
>     authority, and HTTP method:   I would like to see at least one
>     concrete proposal that will accomplish this.   IIRC there's only
>     one that I think is possibly implementable in an interoperable
>     way, and it supports only JSON payloads.  In other words, anyone
>     using body signing would need to wrap their data in JSON to do it.
>      (This is not necessarily the worst thing in the world, of course,
>     but it is something to be taken into account when listing pros and
>     cons.)
>
>     On Mon, Mar 15, 2010 at 3:50 PM, Torsten Lodderstedt
>     <torsten@lodderstedt.net <mailto:torsten@lodderstedt.net>> wrote:
>
>         Hi all,
>
>         I composed a detailed summary at
>         http://trac.tools.ietf.org/wg/oauth/trac/wiki/SignaturesWhy.
>         Please review it.
>
>         @Zachary: I also added some of your recent notes.
>
>         regards,
>         Torsten.
>
>>         I volunteer to write it up.
>>>         <hat type='chair'/>
>>>
>>>         On 3/4/10 1:00 PM, Blaine Cook wrote:
>>>           
>>>>         One of the things that's been a primary focus of both today's WG call
>>>>         and last week's call is what are the specific use cases for
>>>>         signatures?
>>>>
>>>>         - Why are signatures needed?
>>>>         - What do signatures need to protect?
>>>>
>>>>         Let's try to outline the use cases! Please reply here, so that we have
>>>>         a good idea of what they are as we move towards the Anaheim WG.
>>>>             
>>>         This was a valuable thread. Perhaps someone could write up a summary of
>>>         the points raised, either on the list or at the wiki?
>>>
>>>         Peter
>>>
>>>           
>>>
>>>
>>>         _______________________________________________
>>>         OAuth mailing list
>>>         OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>         https://www.ietf.org/mailman/listinfo/oauth
>>>           
>>
>>
>>         _______________________________________________
>>         OAuth mailing list
>>         OAuth@ietf.org <mailto:OAuth@ietf.org>
>>         https://www.ietf.org/mailman/listinfo/oauth
>>           
>
>
>         _______________________________________________
>         OAuth mailing list
>         OAuth@ietf.org <mailto:OAuth@ietf.org>
>         https://www.ietf.org/mailman/listinfo/oauth
>
>
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>