Re: [oauth] draft-dehora-farrell-oauth-accesstoken-creds-00.txt and OAUTH Extensions in the Charter

"Hannes Tschofenig" <Hannes.Tschofenig@gmx.net> Tue, 17 February 2009 21:35 UTC

Return-Path: <Hannes.Tschofenig@gmx.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 811D83A6849 for <oauth@core3.amsl.com>; Tue, 17 Feb 2009 13:35:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.276
X-Spam-Level:
X-Spam-Status: No, score=-2.276 tagged_above=-999 required=5 tests=[AWL=0.323, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YTJF7Lu+CTZM for <oauth@core3.amsl.com>; Tue, 17 Feb 2009 13:35:32 -0800 (PST)
Received: from mail.gmx.net (mail.gmx.net [213.165.64.20]) by core3.amsl.com (Postfix) with SMTP id E190C3A67FB for <oauth@ietf.org>; Tue, 17 Feb 2009 13:35:31 -0800 (PST)
Received: (qmail invoked by alias); 17 Feb 2009 21:35:42 -0000
Received: from a91-154-108-144.elisa-laajakaista.fi (EHLO 4FIL42860) [91.154.108.144] by mail.gmx.net (mp045) with SMTP; 17 Feb 2009 22:35:42 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX189YRgZ5Ts99TXs5kS7G+0QXwU+o9WZS90IeNxhHW uSj24kkDmUMcZR
From: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
To: 'Eran Hammer-Lahav' <eran@hueniverse.com>, Dorothy.Gellert@nokia.com, stephen.farrell@cs.tcd.ie
References: <26A704E322043948902DFFDD2CB493DB27E8CED2FE@NOK-EUMSG-01.mgdnok.nokia.com> <C5C066FB.12B6A%eran@hueniverse.com>
Date: Tue, 17 Feb 2009 23:36:46 +0200
Message-ID: <004601c99147$d612c670$0201a8c0@nsnintra.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 11
Thread-Index: AcmRGpgtNrUn/IH9T5uk5JjrmOw72AAJKJ+gAAEdgjoAAFXogA==
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3350
In-Reply-To: <C5C066FB.12B6A%eran@hueniverse.com>
X-Y-GMX-Trusted: 0
X-FuHaFi: 0.71
Cc: oauth@ietf.org
Subject: Re: [oauth] draft-dehora-farrell-oauth-accesstoken-creds-00.txt and OAUTH Extensions in the Charter
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Oauth bof discussion <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Feb 2009 21:35:33 -0000

Hi Eran, 
 
I understand your concerns. We started to add examples to the initial
charter text: 
 
"
After delivering OAuth, the Working Group may consider defining additional
functions and/or extensions, for example (but not limited to):

* Discovery of authentication configuration.
* Message integrity.
* Recommendations regarding the structure of the token.
"

I understand why Stephen asks for getting text about his extension added. I
can imagine that someone else comes up with their favorite extension,
simililarly as you listed in your mail. 

In some sense it would be fair to add text about the other examples added as
well, if someone cares. 

I wonder what other folks in the group think about this topic? 

Ciao
Hannes
 


________________________________

	From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
Behalf Of Eran Hammer-Lahav
	Sent: 17 February, 2009 23:07
	To: Dorothy.Gellert@nokia.com; stephen.farrell@cs.tcd.ie;
Hannes.Tschofenig@gmx.net
	Cc: oauth@ietf.org
	Subject: Re: [oauth]
draft-dehora-farrell-oauth-accesstoken-creds-00.txt and OAUTH Extensions in
the Charter
	
	
	I don't understand why we need to add this.
	
	There is nothing to stop people from proposing and developing such
ideas. So far we have little implementation experience with much of these
suggestions. The fact is, everyone here is correctly referring to these
ideas as *extensions*. The purpose of this working group is to figure out
the 'core' framework. Error handling is crucial to interop.
Internationalization is important when dealing with user interfaces which
OAuth does even in its core components. These make sense to *consider*.
	
	But why go and single out one extension just because it has an I-D?
I could have stood up at the BoF and listed at least 10 other extensions
with wide interest. Yahoo cares a lot about its Session extension. Google
cares a lot about a few OpenSocial extensions related to gadgets. We have
known limitations with the use of OAuth consumer credentials in desktop
applications. Many people asked for a standard way of consumer registration.
Discovery has been a big topic for the past year and a half. The choice of
signature method hash functions have been an issue in the past due to lack
to support for some on limited devices. The list goes on and on.
	
	OAuth Core represents a compromise that allowed a wide range of use
cases to agree on something that provided a good foundation and was based on
implementation experience. For the most part this WG must have the narrow
focus of taking draft-hammer-oauth and bringing it to IETF proposed standard
level. That means focusing on security and interop. Anything else should
come later.
	
	EHL
	
	
	On 2/17/09 12:43 PM, "Dorothy.Gellert@nokia.com"
<Dorothy.Gellert@nokia.com> wrote:
	
	

		
		
		I recall there was a lot of support in Minneapolis for
extension targeted for devices as Stephen suggests.  I would support adding
the text proposed by Stephen to the OAUTH charter:
		
		"The WG will develop an oauth extension suited for use on
challenged devices and by aggregators that allows for the client to directly
acquire an access token from a set of credentials. One such scheme is
defined in draft-dehora-farrell-oauth-accesstoken-creds"
		
		I don't believe the last sentence precludes any other
proposed drafts that meet this goal, if there are other approaches that may
be developing in the WG.
		
		Best Regards,
		Dorothy
		
		
		-----Original Message-----
		From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org]
On Behalf Of ext Stephen Farrell
		Sent: Tuesday, February 17, 2009 8:15 AM
		To: Hannes Tschofenig
		Cc: oauth@ietf.org
		Subject: Re: [oauth]
draft-dehora-farrell-oauth-accesstoken-creds-00.txt and OAUTH Extensions in
the Charter
		
		
		
		Hannes Tschofenig wrote:
		> Stephen ask me how their document
		> draft-dehora-farrell-oauth-accesstoken-creds-00.txt is
reflected in
		> the charter text.
		
		Actually, I sent a mail to you and Blaine off list. I guess
we should now discuss it on the list, now that you've gone ahead here
instead of responding to the off list mail.
		
		Also I didn't ask how "its reflected" I suggested a way to
include it, which is quite different.
		
		My suggestion is to add the following:
		
		"The WG will develop an oauth extension suited for use on
challenged devices and by aggregators that allows for the client to directly
acquire an access token from a set of credentials. One such scheme is
defined in draft-dehora-farrell-oauth-accesstoken-creds"
		
		I'd still like to see that included and will certainly
suggest it again in SF, as I did in MSP, and without anyone (that I recall)
disagreeing with considering the use case.
		
		> Independent of this particular document, I believe that we
should
		> focus our initial efforts on the Base OAUTH specification
rather than
		> working on extensions.
		
		Agreed. I never asked that our use case be worked before the
spec work is done and have no idea how you formed that impression.
		
		> As such, I would say that (depending on the progress of
the work with
		> the main specification) we should discuss extensions in
the summer
		> timeframe.
		
		I think its fair enough to mention the AFAIK only proposed
extension that's documented as an I-D in the charter. I don't read your
current charter proposal as encompassing our draft without rechartering.
		
		> Regarding this specific extension: I read through
		> draft-dehora-farrell-oauth-accesstoken-creds-00.txt and
wanted to make
		> sure that I understood the extension correctly. Here is a
message flow
		> that Jeff created some time ago. This document suggests to
skip the
		> message exchanges marked as (2.*). This means that the
redirect from
		> the Service Provider to the Customer and the subsequent
steps of user
		> authentication and authorization are replaced with the
ability to
		> carry some username/password in the Access token when the
Consumer
		> sends the request to the Service Provider.
		
		Right.
		
		> My personal view is that this goes a bit against the OAUTH
idea.
		> Unless the username/password is again created using some
other
		> mechanism (which the document does not describe) then
there are
		> vulnerability that OAUTH was initially meant to deal with.
		
		That's sort-of correct, however the point is that its
necessary to deploy OAuth for existing mobile devices and some aggregation
use cases.
		
		> Additionally, the result is less likely to be easy to
deploy.
		
		I think you're 100% wrong there...for the use cases we're
considering. On what basis do you say that? Do you think that HTTP redirects
on mobiles are just fine?
		
		> As a justification for the work the following argument is
provided:
		> "HTTP redirection to a browser is unavailable or
unsuitable, such as
		> intermediary aggregators and mobile or settop devices." I
wonder
		> whether this is really a problem in today's mobile devices
to justify this optimization.
		
		You can wonder, but it is.
		
		Stephen.
		
		_______________________________________________
		oauth mailing list
		oauth@ietf.org
		https://www.ietf.org/mailman/listinfo/oauth
		_______________________________________________
		oauth mailing list
		oauth@ietf.org
		https://www.ietf.org/mailman/listinfo/oauth