Re: [OAUTH-WG] Fwd: New Version Notification for draft-sakimura-oauth-tcse-02.txt
Torsten Lodderstedt <torsten@lodderstedt.net> Sat, 09 November 2013 16:15 UTC
Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E82D21E80D8 for <oauth@ietfa.amsl.com>; Sat, 9 Nov 2013 08:15:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.248
X-Spam-Level:
X-Spam-Status: No, score=-2.248 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cYelUD176s3p for <oauth@ietfa.amsl.com>; Sat, 9 Nov 2013 08:15:40 -0800 (PST)
Received: from smtprelay02.ispgateway.de (smtprelay02.ispgateway.de [80.67.29.24]) by ietfa.amsl.com (Postfix) with ESMTP id A555311E8136 for <oauth@ietf.org>; Sat, 9 Nov 2013 08:15:38 -0800 (PST)
Received: from [80.187.110.117] (helo=[10.206.21.78]) by smtprelay02.ispgateway.de with esmtpsa (TLSv1:RC4-MD5:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1VfBCB-00015C-Tu; Sat, 09 Nov 2013 17:15:37 +0100
User-Agent: K-9 Mail for Android
In-Reply-To: <001C64DB-2DD0-4740-8C9A-B7A0445F68CD@ve7jtb.com>
References: <20131019101348.9565.3370.idtracker@ietfa.amsl.com> <CABzCy2Ai6W3XRLzXTGQB8vS40V6QTsoa6Q+7uq4zMftgnZkc7g@mail.gmail.com> <527E376C.2010205@lodderstedt.net> <001C64DB-2DD0-4740-8C9A-B7A0445F68CD@ve7jtb.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----HMTYFX5JH8A3R61OGHOEBZ5U7R56C6"
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Sat, 09 Nov 2013 17:15:26 +0100
To: John Bradley <ve7jtb@ve7jtb.com>
Message-ID: <fcf385e3-9ab3-4f9e-8b5e-e729d0218699@email.android.com>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: New Version Notification for draft-sakimura-oauth-tcse-02.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Nov 2013 16:15:49 -0000
Hi John, why not make the more secure option the only one? regards, Torsten. John Bradley <ve7jtb@ve7jtb.com> schrieb: >With a native app using a captive browser with no malware, only the >response is susceptible to interception, making encrypting the request >redundant. >In other environments and with some user groups the request's challenge >needs to be protected from interception. This may be more the case in >a desktop environment where there is less control over the browser. > >I expect that we will come to two options one unprotected requests and >one for protected requests. > >To Phil's point this is not about identifying the class of software >this is about matching a response to an instance of software. >A software statement gives you a hint about the class of software but >not the instance without per client registration. > >This method gives you the ability to securely return the token to only >the instance of the client that requested it without the overhead of >per instance dynamic registration. > >This is a practical solution to a real problem people are having today, >and versions of this are in production now. > >Nat and I are trying to document it so that there can be >interoperability rather than every AS doing something different. > >John B. > >On Nov 9, 2013, at 5:23 AM, Torsten Lodderstedt ><torsten@lodderstedt.net> wrote: > >> Hi Nat, >> >> what's the rationale for having different algorithms to produce a >code challenges? As this may cause interop issues there should be good >reasons to introduce variants. >> >> regards, >> Torsten. >> >> >> Am 19.10.2013 12:15, schrieb Nat Sakimura: >>> Incorporated the discussion at Berlin meeting and after in the ML. >>> >>> Best, >>> >>> Nat >>> >>> ---------- Forwarded message ---------- >>> From: <internet-drafts@ietf.org> >>> Date: 2013/10/19 >>> Subject: New Version Notification for >draft-sakimura-oauth-tcse-02.txt >>> To: Nat Sakimura <sakimura@gmail.com>, John Bradley ><jbradley@pingidentity.com>, Naveen Agarwal <naa@google.com> >>> >>> >>> >>> A new version of I-D, draft-sakimura-oauth-tcse-02.txt >>> has been successfully submitted by Nat Sakimura and posted to the >>> IETF repository. >>> >>> Filename: draft-sakimura-oauth-tcse >>> Revision: 02 >>> Title: OAuth Symmetric Proof of Posession for Code >Extension >>> Creation date: 2013-10-19 >>> Group: Individual Submission >>> Number of pages: 8 >>> URL: >http://www.ietf.org/internet-drafts/draft-sakimura-oauth-tcse-02.txt >>> Status: >http://datatracker.ietf.org/doc/draft-sakimura-oauth-tcse >>> Htmlized: >http://tools.ietf.org/html/draft-sakimura-oauth-tcse-02 >>> Diff: >http://www.ietf.org/rfcdiff?url2=draft-sakimura-oauth-tcse-02 >>> >>> Abstract: >>> The OAuth 2.0 public client utilizing authorization code grant is >>> susceptible to the code interception attack. This specification >>> describe a mechanism that acts as a control against this threat. >>> >>> >>> >>> >>> >>> Please note that it may take a couple of minutes from the time of >submission >>> until the htmlized version and diff are available at tools.ietf.org. >>> >>> The IETF Secretariat >>> >>> >>> >>> >>> -- >>> Nat Sakimura (=nat) >>> Chairman, OpenID Foundation >>> http://nat.sakimura.org/ >>> @_nat_en >>> >>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] Fwd: New Version Notification for draf… Nat Sakimura
- Re: [OAUTH-WG] New Version Notification for draft… Phil Hunt
- Re: [OAUTH-WG] Fwd: New Version Notification for … Torsten Lodderstedt
- Re: [OAUTH-WG] Fwd: New Version Notification for … John Bradley
- Re: [OAUTH-WG] New Version Notification for draft… John Bradley
- Re: [OAUTH-WG] Fwd: New Version Notification for … Torsten Lodderstedt
- Re: [OAUTH-WG] Fwd: New Version Notification for … John Bradley
- Re: [OAUTH-WG] Fwd: New Version Notification for … Nat Sakimura
- Re: [OAUTH-WG] Fwd: New Version Notification for … Phil Hunt
- Re: [OAUTH-WG] Fwd: New Version Notification for … Torsten Lodderstedt
- Re: [OAUTH-WG] Fwd: New Version Notification for … Phil Hunt
- Re: [OAUTH-WG] Fwd: New Version Notification for … John Bradley
- Re: [OAUTH-WG] Fwd: New Version Notification for … Phil Hunt
- Re: [OAUTH-WG] Fwd: New Version Notification for … Torsten Lodderstedt
- Re: [OAUTH-WG] Fwd: New Version Notification for … John Bradley
- Re: [OAUTH-WG] Fwd: New Version Notification for … Torsten Lodderstedt
- Re: [OAUTH-WG] Fwd: New Version Notification for … Sergey Beryozkin