Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt

Sergey Beryozkin <sberyozkin@gmail.com> Fri, 01 March 2013 15:43 UTC

Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D401F21E8051 for <oauth@ietfa.amsl.com>; Fri, 1 Mar 2013 07:43:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.434
X-Spam-Level:
X-Spam-Status: No, score=-3.434 tagged_above=-999 required=5 tests=[AWL=0.165, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ruXFLWSPb39r for <oauth@ietfa.amsl.com>; Fri, 1 Mar 2013 07:43:02 -0800 (PST)
Received: from mail-ee0-f50.google.com (mail-ee0-f50.google.com [74.125.83.50]) by ietfa.amsl.com (Postfix) with ESMTP id B1EE521F935A for <oauth@ietf.org>; Fri, 1 Mar 2013 07:43:01 -0800 (PST)
Received: by mail-ee0-f50.google.com with SMTP id e51so2543068eek.23 for <oauth@ietf.org>; Fri, 01 Mar 2013 07:43:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:user-agent:mime-version:to:cc :subject:references:in-reply-to:content-type :content-transfer-encoding; bh=5gGvVE+ox/SUNkU0toa4nzASyRKgkO9B1CEUZZkab5E=; b=xruj9ukdkX4p6jtluDkn2JQ1A2vi/xsBMogghWOWMdIfwqYTIiMyC5fkIP5vxj4laT RJ0huBknL/jZ/IHmBT3u7ig1foCNOfsTy2SgHVX+2KEE1x8eIlqCwHUVurT6PQwyiRUf Mw2prnbZFpDFniBYap4SgTRSOptP7puIQcxfPFQL6Qb5WtzZZ7PdfSHeaPAIM0fEq46a BEKER5f3PnPzscuMSr8O4jMDv9iWMsxjCFltj3PPr2wRgM83Za66cRQsJNhWMNohqxL2 T9XUTQv/omuOvqAAJtaxzFd/SzMpL9mWLkLnDBaaSC1fYrQpAD+U3g3Bz8H4MtqECVhy G2jg==
X-Received: by 10.14.219.129 with SMTP id m1mr28989661eep.16.1362152580833; Fri, 01 Mar 2013 07:43:00 -0800 (PST)
Received: from [10.36.226.5] ([217.173.99.61]) by mx.google.com with ESMTPS id l8sm17752002een.10.2013.03.01.07.42.58 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 01 Mar 2013 07:42:58 -0800 (PST)
Message-ID: <5130CC80.6060608@gmail.com>
Date: Fri, 01 Mar 2013 15:42:56 +0000
From: Sergey Beryozkin <sberyozkin@gmail.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: William Mills <wmills_92105@yahoo.com>
References: <20130225124642.7425.65145.idtracker@ietfa.amsl.com> <1361956373.9883.YahooMailNeo@web31807.mail.mud.yahoo.com> <21030204-8EA7-4FB0-9DD3-2B6C8CA57E02@gmx.net> <1362057295.36069.YahooMailNeo@web31809.mail.mud.yahoo.com> <512F8E1D.2060408@gmail.com> <1362073743.15800.YahooMailNeo@web31802.mail.mud.yahoo.com> <512F9BB3.2010201@gmail.com> <1362074764.35520.YahooMailNeo@web31806.mail.mud.yahoo.com> <5130962C.9090408@gmail.com> <1362149779.70391.YahooMailNeo@web31807.mail.mud.yahoo.com>
In-Reply-To: <1362149779.70391.YahooMailNeo@web31807.mail.mud.yahoo.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Mar 2013 15:43:04 -0000

On 01/03/13 14:56, William Mills wrote:
> The new signature base string stuff still needs work, I wanted to tackle
> more major restructuring first. I want to pull all of those things out
> of the query string.

Well, thanks for keeping replying, but I'm not closer to connecting the 
above response to the latest MAC draft than I was earlier - guess I'm 
not seeing a bigger picture.

Cheers, Sergey
>
> ------------------------------------------------------------------------
> *From:* Sergey Beryozkin <sberyozkin@gmail.com>
> *To:* William Mills <wmills_92105@yahoo.com>
> *Cc:* "oauth@ietf.org" <oauth@ietf.org>
> *Sent:* Friday, March 1, 2013 3:51 AM
> *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>
> I'm looking at [1]
>
> and I honestly don't follow what would adding JSON structure bring to
> the table, the text there is quite straight-forward, and the 'sorting'
> variable is not even there, may be, only if headers are *optionally*
> included when calculating 'mac'.
>
> Are you indirectly referring to the idea of OAuth2 servers supporting an
> OAuth1-style tokens which was proposed in the other thread by any
> chance, as you mention "oath_..." parameters ? In that context, using
> JWT extension may work, not really sure, but in context of [1] - I don't
> understand where it would fit in
>
> Thanks, Sergey
>
> [1]
> http://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac/?include_text=1
>
>
> On 28/02/13 18:06, William Mills wrote:
>  > I certainly hope so.
>  >
>  > ------------------------------------------------------------------------
>  > *From:* Sergey Beryozkin <sberyozkin@gmail.com
> <mailto:sberyozkin@gmail.com>>
>  > *To:* William Mills <wmills_92105@yahoo.com
> <mailto:wmills_92105@yahoo.com>>
>  > *Cc:* "oauth@ietf.org <mailto:oauth@ietf.org>" <oauth@ietf.org
> <mailto:oauth@ietf.org>>
>  > *Sent:* Thursday, February 28, 2013 10:02 AM
>  > *Subject:* Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>  >
>  > On 28/02/13 17:49, William Mills wrote:
>  > > The JWT replaces the oauth_token data element in the old MAC stuff. I
>  > > just want to take all the other oauth_* variables and stuff them in a
>  > > separate JSON object and completely kill the "fun with sorting
>  > > variables" when the oauth_* things can be carried in the query
> string or
>  > > header or post body.
>  > As far as the client accessing RS is concerned, should it be limited to
>  > using a header, same as for other OAuth2 tokens ?
>  >
>  > Cheers, Sergey
>  >
>  > >
>  > >
> ------------------------------------------------------------------------
>  > > *From:* Sergey Beryozkin <sberyozkin@gmail.com
> <mailto:sberyozkin@gmail.com>
>  > <mailto:sberyozkin@gmail.com <mailto:sberyozkin@gmail.com>>>
>  > > *To:* oauth@ietf.org <mailto:oauth@ietf.org> <mailto:oauth@ietf.org
> <mailto:oauth@ietf.org>>
>  > > *Sent:* Thursday, February 28, 2013 9:04 AM
>  > > *Subject:* Re: [OAUTH-WG] I-D Action:
> draft-ietf-oauth-v2-http-mac-03.txt
>  > >
>  > > Hi
>  > > On 28/02/13 13:14, William Mills wrote:
>  > > > I'm actually advocating that we change MAC to be a JWT extension.
>  > > IMHO, having a simpler option, plus, going forward, a possible JWT
>  > > profile (client to RS path) would work better -
>  > >
>  > > Why would JWT completely take over ? May be it should be possible
> indeed
>  > > to have it as a JWT extension - should it be part of the relevant JWT
>  > > assertion spec, where JWT is used as a possible grant ?
>  > >
>  > > Thanks, Sergey
>  > > >
>  > > >
>  > ------------------------------------------------------------------------
>  > > > *From:* Hannes Tschofenig <hannes.tschofenig@gmx.net
> <mailto:hannes.tschofenig@gmx.net>
>  > <mailto:hannes.tschofenig@gmx.net <mailto:hannes.tschofenig@gmx.net>>
>  > > <mailto:hannes.tschofenig@gmx.net
> <mailto:hannes.tschofenig@gmx.net> <mailto:hannes.tschofenig@gmx.net
> <mailto:hannes.tschofenig@gmx.net>>>>
>  > > > *To:* William Mills <wmills_92105@yahoo.com
> <mailto:wmills_92105@yahoo.com>
>  > <mailto:wmills_92105@yahoo.com <mailto:wmills_92105@yahoo.com>>
>  > > <mailto:wmills_92105@yahoo.com <mailto:wmills_92105@yahoo.com>
> <mailto:wmills_92105@yahoo.com <mailto:wmills_92105@yahoo.com>>>>
>  > > > *Cc:* Hannes Tschofenig <hannes.tschofenig@gmx.net
> <mailto:hannes.tschofenig@gmx.net>
>  > <mailto:hannes.tschofenig@gmx.net <mailto:hannes.tschofenig@gmx.net>>
>  > > <mailto:hannes.tschofenig@gmx.net <mailto:hannes.tschofenig@gmx.net>
>  > <mailto:hannes.tschofenig@gmx.net
> <mailto:hannes.tschofenig@gmx.net>>>>; "oauth@ietf.org
> <mailto:oauth@ietf.org>
>  > <mailto:oauth@ietf.org <mailto:oauth@ietf.org>>
>  > > <mailto:oauth@ietf.org <mailto:oauth@ietf.org>
> <mailto:oauth@ietf.org <mailto:oauth@ietf.org>>>"
>  > > > <oauth@ietf.org <mailto:oauth@ietf.org> <mailto:oauth@ietf.org
> <mailto:oauth@ietf.org>> <mailto:oauth@ietf.org <mailto:oauth@ietf.org>
>  > <mailto:oauth@ietf.org <mailto:oauth@ietf.org>>>>
>  > > > *Sent:* Thursday, February 28, 2013 2:28 AM
>  > > > *Subject:* Re: [OAUTH-WG] I-D Action:
>  > draft-ietf-oauth-v2-http-mac-03.txt
>  > > >
>  > > > Hi Bill,
>  > > >
>  > > > I believe you are misreading the document. In
>  > > > draft-ietf-oauth-v2-http-mac the client still uses the MAC when it
>  > > > accesses a protected resource.
>  > > > The only place where the JWT comes into the picture is with the
>  > > > description of the access token. This matters from a key distribution
>  > > > point of view. The session key for the MAC is included in the
> encrypted
>  > > > JWT. The JWT is encrypted by the authorization server and
> decrypted by
>  > > > the resource server.
>  > > >
>  > > > Information about how header fields get included in the MAC is
>  > described
>  > > > in Section 5.
>  > > >
>  > > > The nonce isn't killed it is just called differently: seq-nr. The
> stuff
>  > > > in the original MAC specification actually wasn't a nonce (from the
>  > > > semantic point of view).
>  > > > The extension parameter is there implicitly by allowing additional
>  > > > header fields to be included in the MAC computation.
>  > > >
>  > > > I need to look at the port number field again.
>  > > >
>  > > > Ciao
>  > > > Hannes
>  > > >
>  > > > On Feb 27, 2013, at 11:12 AM, William Mills wrote:
>  > > >
>  > > > > Just read the draft quickly.
>  > > > >
>  > > > > Since we're now leaning on JWT do we need to include the token in
>  > > > this? Why not just make an additional "Envelope MAC" thing and
> have the
>  > > > signature include the 3 JWT parts in the signature base string? That
>  > > > object then just becomes a JSON container for the kid, timestamp,
>  > > > signature method, signature etc. That thing then is a 4th base64
>  > encoded
>  > > > JSON thing in the auth header.
>  > > > >
>  > > > > How header fields get included in the signature needs definition.
>  > > > >
>  > > > > Why did you kill the port number, nonce, and extension
> parameter out
>  > > > of the signature base string?
>  > > > >
>  > > > > The BNF appears to have no separators between values.
>  > > > >
>  > > > > -bill
>  > > > >
>  > > > >
>  > > > > From: "internet-drafts@ietf.org
> <mailto:internet-drafts@ietf.org> <mailto:internet-drafts@ietf.org
> <mailto:internet-drafts@ietf.org>>
>  > <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
> <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>>
>  > > <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
> <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
>  > <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
> <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>>>"
>  > > > <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
> <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
>  > <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
> <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>>
>  > > <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
> <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
>  > <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
> <mailto:internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>>>>
>  > > > > To: i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
> <mailto:i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>>
>  > <mailto:i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
> <mailto:i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>>>
>  > > <mailto:i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
> <mailto:i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>>
>  > <mailto:i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
> <mailto:i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>>>>
>  > > > > Cc: oauth@ietf.org <mailto:oauth@ietf.org>
> <mailto:oauth@ietf.org <mailto:oauth@ietf.org>> <mailto:oauth@ietf.org
> <mailto:oauth@ietf.org>
>  > <mailto:oauth@ietf.org <mailto:oauth@ietf.org>>>
> <mailto:oauth@ietf.org <mailto:oauth@ietf.org> <mailto:oauth@ietf.org
> <mailto:oauth@ietf.org>>
>  > > <mailto:oauth@ietf.org <mailto:oauth@ietf.org>
> <mailto:oauth@ietf.org <mailto:oauth@ietf.org>>>>
>  > > > > Sent: Monday, February 25, 2013 4:46 AM
>  > > > > Subject: [OAUTH-WG] I-D Action: draft-ietf-oauth-v2-http-mac-03.txt
>  > > > >
>  > > > >
>  > > > > A New Internet-Draft is available from the on-line Internet-Drafts
>  > > > directories.
>  > > > > This draft is a work item of the Web Authorization Protocol Working
>  > > > Group of the IETF.
>  > > > >
>  > > > > Title : OAuth 2.0 Message Authentication Code (MAC) Tokens
>  > > > > Author(s) : Justin Richer
>  > > > > William Mills
>  > > > > Hannes Tschofenig
>  > > > > Filename : draft-ietf-oauth-v2-http-mac-03.txt
>  > > > > Pages : 26
>  > > > > Date : 2013-02-25
>  > > > >
>  > > > > Abstract:
>  > > > > This specification describes how to use MAC Tokens in HTTP requests
>  > > > > to access OAuth 2.0 protected resources. An OAuth client willing to
>  > > > > access a protected resource needs to demonstrate possession of a
>  > > > > crytographic key by using it with a keyed message digest
> function to
>  > > > > the request.
>  > > > >
>  > > > > The document also defines a key distribution protocol for
> obtaining a
>  > > > > fresh session key.
>  > > > >
>  > > > >
>  > > > > The IETF datatracker status page for this draft is:
>  > > > > https://datatracker.ietf.org/doc/draft-ietf-oauth-v2-http-mac
>  > > > >
>  > > > > There's also a htmlized version available at:
>  > > > > http://tools.ietf.org/html/draft-ietf-oauth-v2-http-mac-03
>  > > > >
>  > > > > A diff from the previous version is available at:
>  > > > > http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-v2-http-mac-03
>  > > > >
>  > > > >
>  > > > > Internet-Drafts are also available by anonymous FTP at:
>  > > > > ftp://ftp.ietf.org/internet-drafts/
>  > > > >
>  > > > > _______________________________________________
>  > > > > OAuth mailing list
>  > > > > OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org
> <mailto:OAuth@ietf.org>> <mailto:OAuth@ietf.org <mailto:OAuth@ietf.org>
>  > <mailto:OAuth@ietf.org <mailto:OAuth@ietf.org>>>
> <mailto:OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org
> <mailto:OAuth@ietf.org>>
>  > > <mailto:OAuth@ietf.org <mailto:OAuth@ietf.org>
> <mailto:OAuth@ietf.org <mailto:OAuth@ietf.org>>>>
>  > > > > https://www.ietf.org/mailman/listinfo/oauth
>  > > > >
>  > > > >
>  > > >
>  > > >
>  > > >
>  > > >
>  > > >
>  > > > _______________________________________________
>  > > > OAuth mailing list
>  > > > OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org
> <mailto:OAuth@ietf.org>> <mailto:OAuth@ietf.org <mailto:OAuth@ietf.org>
>  > <mailto:OAuth@ietf.org <mailto:OAuth@ietf.org>>>
>  > > > https://www.ietf.org/mailman/listinfo/oauth
>  > >
>  > >
>  > > _______________________________________________
>  > > OAuth mailing list
>  > > OAuth@ietf.org <mailto:OAuth@ietf.org> <mailto:OAuth@ietf.org
> <mailto:OAuth@ietf.org>> <mailto:OAuth@ietf.org <mailto:OAuth@ietf.org>
>  > <mailto:OAuth@ietf.org <mailto:OAuth@ietf.org>>>
>  > > https://www.ietf.org/mailman/listinfo/oauth
>  > >
>  > >
>  >
>  >
>
>