Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

David Recordon <recordond@gmail.com> Thu, 15 July 2010 18:35 UTC

Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E9E453A67B1 for <oauth@core3.amsl.com>; Thu, 15 Jul 2010 11:35:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.336
X-Spam-Level:
X-Spam-Status: No, score=-2.336 tagged_above=-999 required=5 tests=[AWL=0.262, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IVhCk3oAF4W4 for <oauth@core3.amsl.com>; Thu, 15 Jul 2010 11:35:28 -0700 (PDT)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by core3.amsl.com (Postfix) with ESMTP id 79DB93A6820 for <oauth@ietf.org>; Thu, 15 Jul 2010 11:35:28 -0700 (PDT)
Received: by yxj4 with SMTP id 4so206961yxj.31 for <oauth@ietf.org>; Thu, 15 Jul 2010 11:35:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type; bh=/veATxrKmuGwJ/MLtJbPkgKb/s8DNOYfICNBfhPbq8o=; b=GEHDFwCWyi25dgoBSAtImOc5w28Xs7KKq5LrksgVJ+ge6urNgHUUoqK02EXOADWCl4 cY2WOHgKqMa+lW+6VWvOiY1+ImbhJE0Au/92rpPokf0Xse67rigUz5cfz+aGf5o/IPAG c2K4M1bKlIM4/tmld1AdbauwM4jLROBdJzcl8=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=EnYU2UBzYJKiQzRU/8n95umS/wD1Yvbm6bWaV6eAyTl1jVl5WcnyXiFiBLO8tTOMEV +iJecTW6yatKm+ZhFEZhpTZk2ht0y6R+OdqXBYrcEjVR1B8/WghCqAUZHF0V9CaMny3N /NzVYBezb682kWGnJ1+kc3G3oFtaJvyRgFG60=
MIME-Version: 1.0
Received: by 10.101.10.39 with SMTP id n39mr60074ani.97.1279218938967; Thu, 15 Jul 2010 11:35:38 -0700 (PDT)
Received: by 10.231.196.88 with HTTP; Thu, 15 Jul 2010 11:35:38 -0700 (PDT)
In-Reply-To: <02D7ABE3-5B51-43B6-B7A2-6CB9AA045AAA@jkemp.net>
References: <AANLkTim6az--AdwmEoew2pz3kEjhc_GyEaiyo_0UhSRr@mail.gmail.com> <F747E8F8-D022-46F7-BBCE-4219BF3B27B0@hueniverse.com> <02D7ABE3-5B51-43B6-B7A2-6CB9AA045AAA@jkemp.net>
Date: Thu, 15 Jul 2010 11:35:38 -0700
Message-ID: <AANLkTinqCZPv6N8eIMPfC-vfTXicjNIJZcE-JCOgYHIj@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: John Kemp <john@jkemp.net>
Content-Type: multipart/alternative; boundary="0016e68ee1eb727774048b715e69"
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Jul 2010 18:35:30 -0000

Given that OAuth discovery hasn't been written yet, how would an OAuth 1.0
client know about a 2.0 protected resource in the first place?


On Thu, Jul 15, 2010 at 11:33 AM, John Kemp <john@jkemp.net> wrote:

> On Jul 15, 2010, at 9:07 AM, Eran Hammer-Lahav wrote:
>
> > I would like people to raise their hand and explain how this will break
> actual 1.0 deployments.
>
> What happens if a 1.0 client receives a WWW-Authenticate header from a 2.0
> protected resource with the 'OAuth' mechanism specified? Might it then
> attempt OAuth 1 with a 2.0 token service (and thus just fail without being
> able to know what went wrong)?
>
> - johnk
>
> >
> > EHL
> >
> >
> >
> > On Jul 15, 2010, at 1:38, Brian Eaton <beaton@google.com> wrote:
> >
> >> Draft 10 switched from "Token" scheme in the authorization header to
> >> "OAuth".  I'd rather we didn't reuse OAuth.  'OAuth2' would be great.
> >> "Token" is ugly as sin, but is better than "OAuth".
> >>
> >> Spec section: http://tools.ietf.org/html/draft-ietf-oauth-v2-10#page-30
> >>
> >> The problem with reusing "OAuth" is that there are existing
> >> implementations in the wild that have special behavior implemented for
> >> OAuth authorization headers.  Since OAuth2 headers don't have the same
> >> semantics, we're going to break those implementations.  We shouldn't
> >> reuse "OAuth" for the same reasons we shouldn't reuse "Negotiate",
> >> "NTLM", "Digest", or "Basic.
> >>
> >> Cheers,
> >> Brian
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>