Re: [OAUTH-WG] Question lengths in draft-sakimura-oauth-tcse-03

Brian Campbell <bcampbell@pingidentity.com> Mon, 12 May 2014 21:54 UTC

Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CB8A1A035C for <oauth@ietfa.amsl.com>; Mon, 12 May 2014 14:54:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.578
X-Spam-Level:
X-Spam-Status: No, score=-3.578 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L77D_knNtWF9 for <oauth@ietfa.amsl.com>; Mon, 12 May 2014 14:54:39 -0700 (PDT)
Received: from na6sys009bog017.obsmtp.com (na6sys009bog017.obsmtp.com [74.125.150.74]) by ietfa.amsl.com (Postfix) with ESMTP id 33D0F1A0767 for <oauth@ietf.org>; Mon, 12 May 2014 14:54:39 -0700 (PDT)
Received: from mail-ig0-f177.google.com ([209.85.213.177]) (using TLSv1) by na6sys009bob017.postini.com ([74.125.148.12]) with SMTP ID DSNKU3FDGW4ASgwNx2vgOUQN/N36zW8rnV+M@postini.com; Mon, 12 May 2014 14:54:33 PDT
Received: by mail-ig0-f177.google.com with SMTP id l13so4460985iga.16 for <oauth@ietf.org>; Mon, 12 May 2014 14:54:32 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=IzlQeM+1rLcwbASAiyYwCDcnl2gfTPZyZAlfsor3gDw=; b=NYsGZd7IbalJdac3LgM3FmoN0LOxYASCn+L8lY2BWZnQk7MDTjMLfkO4EgqZOzu5xY dNig8eAtOFnp2ZlnXBTqiPEIyCj7Ld/eZCwJXUCNJMdXip5Zvv6e2rRu7qgq+7rZE9u4 AxEkXXDOe/tpldZ+JwpZzvfgVAcTG+VLIyHVjUMkzzc3ftxS55O1uUv2vlLP8I1d7GaV a+VRbvxrJbeKUCo7bTLadH/5Q6a+5UkQPfPNVYQOFAkZ2za4ygTA0ewpRtglHa6hFHGf Qi6F5sfKEnYc1tTCvSO/UeyHODYy7EGPzwrn1589kFXr9inKOgiU7aA23rzghKcvEcWf g7Ew==
X-Gm-Message-State: ALoCoQlj66GqXNu47+1fwp+nQIi/QpXr5nVx2nDEyDwHrlefO/clN4RBsoaSU5sN19zha1idKdu6a5ffOLw0zpYn3dxQ3nk0KBDTxWQDxpgd0oJdtO/oDE3naTeD2iiXM3rh2XRVwTMx
X-Received: by 10.50.153.49 with SMTP id vd17mr48944415igb.40.1399931672814; Mon, 12 May 2014 14:54:32 -0700 (PDT)
X-Received: by 10.50.153.49 with SMTP id vd17mr48944385igb.40.1399931672637; Mon, 12 May 2014 14:54:32 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.64.240.201 with HTTP; Mon, 12 May 2014 14:54:02 -0700 (PDT)
In-Reply-To: <21A361B0-4E8F-4DAB-9EEB-D48FBCBDFFED@ve7jtb.com>
References: <CA+k3eCTZOheb0HCetS88EXcP-8LJQrYPRuwVcd4NWaWxUAVO1g@mail.gmail.com> <sjm4n0uk8be.fsf@mocana.ihtfp.org> <21A361B0-4E8F-4DAB-9EEB-D48FBCBDFFED@ve7jtb.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Mon, 12 May 2014 15:54:02 -0600
Message-ID: <CA+k3eCQJRymEDERy=3yvioetg-7Tz025gaZJ1FS4DYmkTGRhcQ@mail.gmail.com>
To: John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary="089e014954be0f1a2a04f93afe3c"
Archived-At: http://mailarchive.ietf.org/arch/msg/oauth/P6wgnqgsYWlCT98xUW3qvmOUDDM
Cc: oauth <oauth@ietf.org>, Naveen Agarwal <naa@google.com>
Subject: Re: [OAUTH-WG] Question lengths in draft-sakimura-oauth-tcse-03
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 May 2014 21:54:42 -0000

Right but that's why I'm asking why not just put the limit on
code_challange rather than inferring it from code_verifyer + challenge
algorithm, which probably bounds it but doesn't necessarily do so? It's not
a big deal but would read more clearly, I think.


On Mon, May 12, 2014 at 3:48 PM, John Bradley <ve7jtb@ve7jtb.com> wrote:

> I think octets is more consistent with other JW* and OAuth specs.
>
> The code_challange is the same length as the code_verifyer or is a hash of
> the code_verifyer so likely smaller than 128octets (43 ish for base64 256
> bit)
>
> Limiting the code_verifyer size sets the upper bound for code_challange,
> unless someone comes up with a really creative code challenge algorithm.
>
> I will talk to nat about changing it to octets when I see him tomorrow.
>
> John B.
>
> On May 12, 2014, at 11:15 PM, Derek Atkins <warlord@MIT.EDU> wrote:
>
> > Brian Campbell <bcampbell@pingidentity.com> writes:
> >
> >> I notice that code_verifier is defined as "high entropy cryptographic
> random
> >> string of length less than 128 bytes"  [1], which brought a few
> questions and
> >> comments to mind. So here goes:
> >>
> >> Talking about the length of a string in terms of bytes is always
> potentially
> >> confusing. Maybe characters would be an easier unit for people like me
> to wrap
> >> their little brains around?
> >
> > It depends if it really is characters or bytes.  For example there are
> > many multi-byte UTF-8 characters, so if it really is bytes then saying
> > characters is wrong because it could overflow.  So let's make sure we
> > know what we're talking about.  Historically, if we're talking bytes the
> > IETF often uses the phrase "octets".  Would that be less confusing?
> >
> >> Why are we putting a length restriction on the code_verifier anyway? It
> seems
> >> like it'd be more appropriate to restrict the length of the
> code_challenge
> >> because that's the thing the AS will have to maintain somehow (store in
> a DB
> >> or memory or encrypt into the code). Am I missing something here?
> >>
> >> Let me also say that I hadn't looked at this document since its early
> days in
> >> draft -00 or -01 last summer but I like the changes and how it's been
> kept
> >> pretty simple for the common use-case while still allowing for crypto
> agility/
> >> extension. Nice work!
> >>
> >> [1] http://tools.ietf.org/html/draft-sakimura-oauth-tcse-03#section-3.3
> >
> > -derek
> >
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
> > --
> >       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
> >       Member, MIT Student Information Processing Board  (SIPB)
> >       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
> >       warlord@MIT.EDU                        PGP key available
>
>


-- 
   [image: Ping Identity logo] <https://www.pingidentity.com/>
Brian Campbell
Portfolio Architect
  @ bcampbell@pingidentity.com  [image: phone] +1 720.317.2061  Connect
with us…  [image: twitter logo] <https://twitter.com/pingidentity> [image:
youtube logo] <https://www.youtube.com/user/PingIdentityTV> [image:
LinkedIn logo] <https://www.linkedin.com/company/21870> [image: Facebook
logo] <https://www.facebook.com/pingidentitypage> [image: Google+
logo]<https://plus.google.com/u/0/114266977739397708540> [image:
slideshare logo] <http://www.slideshare.net/PingIdentity> [image: flipboard
logo] <http://flip.it/vjBF7> [image: rss feed
icon]<https://www.pingidentity.com/blogs/>
   [image: Register for Cloud Identity Summit 2014 | Modern Identity
Revolution | 19–23 July, 2014 | Monterey,
CA]<https://www.cloudidentitysummit.com/>