Re: [OAUTH-WG] Separate HTTP and HTTPS tokens
Dick Hardt <dick.hardt@gmail.com> Sun, 16 May 2010 18:44 UTC
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 384B93A6B0F for <oauth@core3.amsl.com>; Sun, 16 May 2010 11:44:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.465
X-Spam-Level:
X-Spam-Status: No, score=-0.465 tagged_above=-999 required=5 tests=[AWL=-1.067, BAYES_50=0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_56=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yLvwKt26RLS4 for <oauth@core3.amsl.com>; Sun, 16 May 2010 11:44:40 -0700 (PDT)
Received: from mail-pz0-f200.google.com (mail-pz0-f200.google.com [209.85.222.200]) by core3.amsl.com (Postfix) with ESMTP id 2B1273A6B0B for <oauth@ietf.org>; Sun, 16 May 2010 11:44:39 -0700 (PDT)
Received: by pzk38 with SMTP id 38so77046pzk.31 for <oauth@ietf.org>; Sun, 16 May 2010 11:44:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type; bh=jKAzPuAz8NSYV3CSogCteowmkv9owDQ55mYUpf92Nhc=; b=Aywhpc4r2dCN0uWa9bVbMlN4fJLTup7y+Tb8rD6T2Gm6GHAS9l71mTqpruPCxZkqY4 +VByp91BL/reZDd2d0LijgvqTnKPj3n1ltSgq5cbe5FSkq3bfUh6jKX5B+/R3CTxn1/Q FpkHQasWpD4uUG5nRn9Wz3h3oPF7QlZVklj3Q=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=Arh0BhjDcA4ck8bLwQ2SjHrv+2V9JhTF6G2sLj4t0hiFZzFrzYQouGh8w+3wgOHCke vJ+26W47axfzt0gtnrgc45IXER/T/wgmAtXnztUHdmR9yC7MU+bD8o+L9tBegGdT2dQ9 XsG9Xbm5ixEyhRvCgcW9R7tWfLqquZDqzfrks=
MIME-Version: 1.0
Received: by 10.142.67.35 with SMTP id p35mr2849890wfa.203.1274035468677; Sun, 16 May 2010 11:44:28 -0700 (PDT)
Received: by 10.142.87.17 with HTTP; Sun, 16 May 2010 11:44:28 -0700 (PDT)
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E112634F5584@WSMSG3153V.srv.dir.telstra.com>
References: <255B9BB34FB7D647A506DC292726F6E112634F5377@WSMSG3153V.srv.dir.telstra.com> <AANLkTil3phNYPp_vkEDwlov3zAU-NHrw72OpnaK26ixo@mail.gmail.com> <255B9BB34FB7D647A506DC292726F6E112634F5584@WSMSG3153V.srv.dir.telstra.com>
Date: Sun, 16 May 2010 11:44:28 -0700
Message-ID: <AANLkTineTf6euI5U7RGgfru7rfNL7N-6iHGgwR34rvs-@mail.gmail.com>
From: Dick Hardt <dick.hardt@gmail.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>
Content-Type: multipart/alternative; boundary="001636e0a8f28ab4590486ba7fa1"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Separate HTTP and HTTPS tokens
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 May 2010 18:44:41 -0000
Note that you could accomplish this functionality with the 'modify' proposal I posted where an access token with a different scope could be requested could be used to acquire a second token that has less privileges and would be appropriate over HTTP. To recap, 'modify' is like 'refresh' except the new scope is also passed as a parameter. -- Dick On Thu, May 13, 2010 at 9:38 PM, Manger, James H < James.H.Manger@team.telstra.com> wrote: > David, > > > Why would we support bearer tokens over HTTP? > > Is someone planning to implement this? > > Because the cookies-over-HTTP ~equivalent is widely used. > The spec does say SHOULD NOT, but also explicitly talks about how to do it. > the spec suggests limited scope and lifetime -- limited scope implies > separate tokens for other scopes (eg for HTTPS). > > [section 5 Accessing a Protected Resource] > > Access tokens SHOULD NOT be sent in the clear over an insecure channel. > > However, when it is necessary to transmit bearer tokens in the clear > without a secure channel, authorization servers SHOULD issue access > tokens with limited scope and lifetime to reduce the potential risk > from a compromised access token. Clients SHOULD request and utilize > an access token with a matching secret when making protected resource > requests over an insecure channel (e.g. an HTTP request without using > TLS/SSL). > > > Even if you only support signed requests over HTTP you probably still want > 2 tokens: a bearer token for HTTPS; a token+secret for HTTP. > > [ > { "access_token":"Id87d6dDd", "sites":["https://api.example.org"] }, > { "access_token":"SlAV32hkKG", "sites":["http://api.example.org"], > access_token_secret="386584633534" } > ] > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth >
- [OAUTH-WG] Separate HTTP and HTTPS tokens Manger, James H
- Re: [OAUTH-WG] Separate HTTP and HTTPS tokens David Recordon
- Re: [OAUTH-WG] Separate HTTP and HTTPS tokens Manger, James H
- Re: [OAUTH-WG] Separate HTTP and HTTPS tokens Dick Hardt
- Re: [OAUTH-WG] Separate HTTP and HTTPS tokens Manger, James H