Re: [OAUTH-WG] Separate HTTP and HTTPS tokens

Dick Hardt <dick.hardt@gmail.com> Sun, 16 May 2010 18:44 UTC

Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 384B93A6B0F for <oauth@core3.amsl.com>; Sun, 16 May 2010 11:44:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.465
X-Spam-Level:
X-Spam-Status: No, score=-0.465 tagged_above=-999 required=5 tests=[AWL=-1.067, BAYES_50=0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_56=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yLvwKt26RLS4 for <oauth@core3.amsl.com>; Sun, 16 May 2010 11:44:40 -0700 (PDT)
Received: from mail-pz0-f200.google.com (mail-pz0-f200.google.com [209.85.222.200]) by core3.amsl.com (Postfix) with ESMTP id 2B1273A6B0B for <oauth@ietf.org>; Sun, 16 May 2010 11:44:39 -0700 (PDT)
Received: by pzk38 with SMTP id 38so77046pzk.31 for <oauth@ietf.org>; Sun, 16 May 2010 11:44:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type; bh=jKAzPuAz8NSYV3CSogCteowmkv9owDQ55mYUpf92Nhc=; b=Aywhpc4r2dCN0uWa9bVbMlN4fJLTup7y+Tb8rD6T2Gm6GHAS9l71mTqpruPCxZkqY4 +VByp91BL/reZDd2d0LijgvqTnKPj3n1ltSgq5cbe5FSkq3bfUh6jKX5B+/R3CTxn1/Q FpkHQasWpD4uUG5nRn9Wz3h3oPF7QlZVklj3Q=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=Arh0BhjDcA4ck8bLwQ2SjHrv+2V9JhTF6G2sLj4t0hiFZzFrzYQouGh8w+3wgOHCke vJ+26W47axfzt0gtnrgc45IXER/T/wgmAtXnztUHdmR9yC7MU+bD8o+L9tBegGdT2dQ9 XsG9Xbm5ixEyhRvCgcW9R7tWfLqquZDqzfrks=
MIME-Version: 1.0
Received: by 10.142.67.35 with SMTP id p35mr2849890wfa.203.1274035468677; Sun, 16 May 2010 11:44:28 -0700 (PDT)
Received: by 10.142.87.17 with HTTP; Sun, 16 May 2010 11:44:28 -0700 (PDT)
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E112634F5584@WSMSG3153V.srv.dir.telstra.com>
References: <255B9BB34FB7D647A506DC292726F6E112634F5377@WSMSG3153V.srv.dir.telstra.com> <AANLkTil3phNYPp_vkEDwlov3zAU-NHrw72OpnaK26ixo@mail.gmail.com> <255B9BB34FB7D647A506DC292726F6E112634F5584@WSMSG3153V.srv.dir.telstra.com>
Date: Sun, 16 May 2010 11:44:28 -0700
Message-ID: <AANLkTineTf6euI5U7RGgfru7rfNL7N-6iHGgwR34rvs-@mail.gmail.com>
From: Dick Hardt <dick.hardt@gmail.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>
Content-Type: multipart/alternative; boundary="001636e0a8f28ab4590486ba7fa1"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Separate HTTP and HTTPS tokens
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 May 2010 18:44:41 -0000

Note that you could accomplish this functionality with the 'modify' proposal
I posted where an access token with a different scope could be requested
could be used to acquire a second token that has less privileges and would
be appropriate over HTTP.

To recap, 'modify' is like 'refresh' except the new scope is also passed as
a parameter.

-- Dick

On Thu, May 13, 2010 at 9:38 PM, Manger, James H <
James.H.Manger@team.telstra.com> wrote:

> David,
>
> > Why would we support bearer tokens over HTTP?
> > Is someone planning to implement this?
>
> Because the cookies-over-HTTP ~equivalent is widely used.
> The spec does say SHOULD NOT, but also explicitly talks about how to do it.
> the spec suggests limited scope and lifetime -- limited scope implies
> separate tokens for other scopes (eg for HTTPS).
>
> [section 5 Accessing a Protected Resource]
>
>   Access tokens SHOULD NOT be sent in the clear over an insecure channel.
>
>   However, when it is necessary to transmit bearer tokens in the clear
>   without a secure channel, authorization servers SHOULD issue access
>   tokens with limited scope and lifetime to reduce the potential risk
>   from a compromised access token.  Clients SHOULD request and utilize
>   an access token with a matching secret when making protected resource
>   requests over an insecure channel (e.g. an HTTP request without using
>   TLS/SSL).
>
>
> Even if you only support signed requests over HTTP you probably still want
> 2 tokens: a bearer token for HTTPS; a token+secret for HTTP.
>
> [
>  { "access_token":"Id87d6dDd", "sites":["https://api.example.org"] },
>   { "access_token":"SlAV32hkKG", "sites":["http://api.example.org"],
>        access_token_secret="386584633534" }
> ]
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>