Re: [OAUTH-WG] Draft 20 last call comments
Eran Hammer-Lahav <eran@hueniverse.com> Wed, 17 August 2011 21:59 UTC
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92FAA21F8A4E for <oauth@ietfa.amsl.com>; Wed, 17 Aug 2011 14:59:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.557
X-Spam-Level:
X-Spam-Status: No, score=-2.557 tagged_above=-999 required=5 tests=[AWL=0.042, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ScsK77OtkRDe for <oauth@ietfa.amsl.com>; Wed, 17 Aug 2011 14:59:36 -0700 (PDT)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by ietfa.amsl.com (Postfix) with SMTP id F2D1A21F8A36 for <oauth@ietf.org>; Wed, 17 Aug 2011 14:59:35 -0700 (PDT)
Received: (qmail 26170 invoked from network); 17 Aug 2011 22:00:27 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 17 Aug 2011 22:00:27 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Wed, 17 Aug 2011 15:00:17 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Justin Richer <jricher@mitre.org>
Date: Wed, 17 Aug 2011 14:59:01 -0700
Thread-Topic: [OAUTH-WG] Draft 20 last call comments
Thread-Index: AcxdJiAZTGGxs0AXRUexHIvvNipYFwAAI02g
Message-ID: <90C41DD21FB7C64BB94121FBBC2E72345029DFA8EA@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <1313096811.22073.96.camel@ground> <90C41DD21FB7C64BB94121FBBC2E72345029DFA82D@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1313611965.13419.112.camel@ground>
In-Reply-To: <1313611965.13419.112.camel@ground>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: "Anganes, Amanda L" <aanganes@mitre.org>, "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Draft 20 last call comments
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Aug 2011 21:59:36 -0000
> -----Original Message----- > From: Justin Richer [mailto:jricher@mitre.org] > Sent: Wednesday, August 17, 2011 1:13 PM > > > 1.3/1.4/1.5: Consider switching order to Authorization Grant, Access > > > Token, Refresh Token > > > > Not sure. What do others think? I put access token first because it is a more > important term to get out of the way. > > I agree that access tokens are a more important topic to OAuth overall, but > the rest of the document presents things in protocol flow order: you get the > auth grant, then you get the tokens. Ok. I'll give it a try. > > > 1.4.1: We probably want to mention a user agent here in the exposure > > > risk at the end. Since that's really the problem -- the browser > > > could steal the token, not the end user. > > > > Proposed text? > > The authorization code provides a few important security benefits > such as the ability to authenticate the client and issuing the access > token directly to the client without potentially exposing it to > others, including the resource owner or other applications in the resource > owner's user agent. How about: The authorization code provides a few important security benefits such as the ability to authenticate the client, and the transmission of the the access token directly to the client without passing it through the resource owner's user-agnet, potentially exposing it to others, including the resource owner. > > > 2: Isn't "means" generally treated as singular in instances like this? > > > Thus "means ... is" instead of "means ... are". > > > > Don't know. > > I think it is, unless someone can put a stake in to say that's wrong. "It is plural when it refers to a group of strategies or methods" > > > 2.1/2.2: The requirements (2.2) should go first in section 2. The > > > client types are part of deciding the requirements, and the concepts flow > better this way. > > > > You need to first define client types before you can require it. > > No you don't, you just need to reference them. You already don't define the > other requirements until after (such as the redirection urls). I think it reads > better to have the requirements up front, when the full matter of what > they're all about in the following sections. The client As it is now, there are > both forward and backward references in the requirements paragraph and > it's confusing to read like that. Ok. > > > 2.4.2: Want to mention the MAC binding as an example here? This > > > would parallel the OAuth2 method of signing the fetch for a request > > > token more directly. > > > > Nah. > > Let me put it stronger: I would like to see an explicit reference to the MAC > binding here as an example of a stronger auth binding, along with an > example. OAuth1 allowed for binding against the token endpoint using a > client secret that was not passed across the wire, and the MAC spec gives > that capability to OAuth2. I would really like to see that. > > I see no problem in the core document pointing out the MAC and Bearer > documents as prime examples where appropriate. Pointing to the MAC specification in this context will be both confusing and against the balance we have reached (with great effort) in how we discuss authentication. No one is a bigger supporter of the MAC proposal than me... and I rather avoid this reference, here. EHL
- [OAUTH-WG] Draft 20 last call comments Justin Richer
- Re: [OAUTH-WG] Draft 20 last call comments Eran Hammer-Lahav
- Re: [OAUTH-WG] Draft 20 last call comments Justin Richer
- Re: [OAUTH-WG] Draft 20 last call comments Eran Hammer-Lahav
- Re: [OAUTH-WG] Draft 20 last call comments Lodderstedt, Torsten
- Re: [OAUTH-WG] Draft 20 last call comments Justin Richer
- Re: [OAUTH-WG] Draft 20 last call comments Torsten Lodderstedt