Re: [OAUTH-WG] Notes from 2nd "OAuth & Authentication" Conference Call

Nat Sakimura <sakimura@gmail.com> Sun, 02 November 2014 20:17 UTC

Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C0B41A026A for <oauth@ietfa.amsl.com>; Sun, 2 Nov 2014 12:17:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AiY71H2__zXS for <oauth@ietfa.amsl.com>; Sun, 2 Nov 2014 12:16:59 -0800 (PST)
Received: from mail-ig0-x22d.google.com (mail-ig0-x22d.google.com [IPv6:2607:f8b0:4001:c05::22d]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E99CA1A019B for <oauth@ietf.org>; Sun, 2 Nov 2014 12:16:58 -0800 (PST)
Received: by mail-ig0-f173.google.com with SMTP id r10so3680365igi.0 for <oauth@ietf.org>; Sun, 02 Nov 2014 12:16:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:references:from:date:message-id:subject:to:cc :content-type; bh=OYdIPG3Q0z1PntjGuzLEwIF2ntt6A6PzWkV6F5n44dU=; b=qgKvRYSskQGWkj8lWR50JAemcZICJO4VTcilgsBDv2UFXkRT2hLPabCvohagBuB/to nOkJfjGGDGSH36tg4+H/IDsiyKYUnLqLWC25DJi3YDoRcMVOJ7X+ryIbE7NnursBZLdf 5VmUMSIqK8gxviMAdegIiA4LRr8oyQbiH0yxeShiAXUdRjp8bHAGWUjaDureDHXcx9XP e21J4GsY7LTVbCMisBsMLkH3Cw9Q4UkE+lsjmFRzKn7Te0wKQu6QjXJe9ms6Mr13T26t PY6MeGQ9Msw50zROcBPvFL2NvzUTOOLzweDU8VWLdFFxhFDo306vDvHkh4cpSCp+Oyk+ +EUA==
X-Received: by 10.50.164.194 with SMTP id ys2mr12085732igb.43.1414959418346; Sun, 02 Nov 2014 12:16:58 -0800 (PST)
MIME-Version: 1.0
References: <543FF850.6070409@gmx.net> <B18173FA-7AD9-40A7-98AF-8D2A4AED744D@mitre.org> <5456640C.9090404@lodderstedt.net> <DF8EF8BB-75B1-49A4-92D6-81D72D3DA807@oracle.com> <FFB09F34-19C5-4616-87DE-EE6D10305724@ve7jtb.com> <65FB0488-88D1-4C55-B64F-071284AC6730@oracle.com>
From: Nat Sakimura <sakimura@gmail.com>
Date: Sun, 02 Nov 2014 20:16:57 +0000
Message-ID: <CABzCy2CAy7ktNRdT1otfmZn8_8rXhNESH9J2mcyr_yB_F79Q7Q@mail.gmail.com>
To: Phil Hunt <phil.hunt@oracle.com>, John Bradley <ve7jtb@ve7jtb.com>
Content-Type: multipart/alternative; boundary="089e0149d11680c3d30506e5e9ab"
Archived-At: http://mailarchive.ietf.org/arch/msg/oauth/_n1z_RnmD-3OBenUXi8WCfqCUJc
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Notes from 2nd "OAuth & Authentication" Conference Call
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Nov 2014 20:17:01 -0000

So, wrt FB, signed request is good. It can be another example to add.
On Sun, Nov 2, 2014 at 19:55 Phil Hunt <phil.hunt@oracle.com> wrote:

> Sigh.
>
> Phil
>
> @independentid
> www.independentid.com
> phil.hunt@oracle.com
>
>
>
> On Nov 2, 2014, at 10:33 AM, John Bradley <ve7jtb@ve7jtb.com> wrote:
>
> > If a client developer doesn't have Connect available then they need to
> point the API developer at this doc, so that they do provide Connect or
> some other API that takes into account all of the security considerations.
> >
> > A client developer should never make up there own identity protocol out
> of someone else's API that is not designed for it.
> >
> > A vanilla OAuth API with no additional security considerations on the
> API developers part is pretty much guaranteed to go horribly wrong.
> >
> > John B.
> >
> > On Nov 2, 2014, at 2:15 PM, Phil Hunt <phil.hunt@oracle.com> wrote:
> >
> >> We may have a problem with audience here.
> >>
> >> Justin mentioned he wrote it for service providers but the threats are
> against the client that wants to authenticate users.
> >>
> >> Would be better to have recommendations for each group.
> >>
> >> Since oidc is the only recommendation, what does a client implementer
> do when openid connect is not available?  Suggest we give a list of
> qualities developers should look for (eg is fb connect good)?
> >>
> >> Phil
> >>
> >>> On Nov 2, 2014, at 09:04, Torsten Lodderstedt <torsten@lodderstedt.net>
> wrote:
> >>>
> >>> Hi all,
> >>>
> >>> I just read the document. It explains the situation,
> challenges/threats, and options very clear and readable.
> >>>
> >>> So +1 for publishing it soon.
> >>>
> >>> kind regards,
> >>> Torsten.
> >>>
> >>> Am 28.10.2014 00:21, schrieb Richer, Justin P.:
> >>>> I've been incorporating peoples' feedback into the proposed oauth.net
> page, and the current state is here:
> >>>>
> >>>> https://github.com/jricher/oauth.net/blob/authentication/
> articles/authentication.php
> >>>>
> >>>> Commentary has slowed down and I think the document's in reasonable.
> I would like to publish this as a draft version on oauth.net in the very
> near future (like, this week), so get comments and feedback to me on this
> soon. I'm going to be at IIW all week if anyone wants to back me into a
> corner and talk about this.
> >>>>
> >>>> -- Justin
> >>>>
> >>>>> On Oct 16, 2014, at 12:54 PM, Hannes Tschofenig <
> hannes.tschofenig@gmx.net> wrote:
> >>>>>
> >>>>> Participants:
> >>>>>
> >>>>> * Brian Campbell
> >>>>> * John Bradley
> >>>>> * Derek Atkins
> >>>>> * Phil Hunt
> >>>>> * William Kim
> >>>>> * Josh Mandel
> >>>>> * Hannes Tschofenig
> >>>>>
> >>>>>
> >>>>> Notes:
> >>>>>
> >>>>> Justin distributed a draft writeup and explained the reasoning behind
> >>>>> it. The intended purpose is to put the write-up (after enough
> review) on
> >>>>> oauth.net. See attachments. Justin solicited feedback from the
> >>>>> conference call participants and from the working group.
> >>>>>
> >>>>> One discussion item was specifically related to the concept of
> audience
> >>>>> restrictions, which comes in two flavours: (a) restriction of the
> access
> >>>>> token regarding the resource server and (b) restriction of the id
> token
> >>>>> regarding the client. Obviously, it is necessary to have both of
> these
> >>>>> audience restrictions in place and to actually check them.
> >>>>>
> >>>>> The group then went into a discussion about the use of pseudonyms in
> >>>>> authentication and the problems deployments ran into when they used
> >>>>> pseudonyms together with a wide range of attributes that identified
> >>>>> users nevertheless. Phil suggested to produce a write-up about this
> topic.
> >>>>>
> >>>>> Finally, the group started a discussion about potential actions for
> the
> >>>>> OAuth working groups. Two activities were mentioned, namely to
> produce
> >>>>> an IETF draft of the write-up Justin has prepared as a "formal"
> response
> >>>>> to the problems with authentication using OAuth and, as a second
> topic,
> >>>>> potential re-chartering of the OAuth working group to work on some
> >>>>> solutions in this area. Hannes suggested to postpone these
> discussions
> >>>>> and to first finish the write-up Justin had distributed.
> >>>>>
> >>>>> Ciao
> >>>>> Hannes & Derek
> >>>>> <Authentication with OAuth 2.doc><Authentication with OAuth
> 2.html><Authentication with OAuth 2.pdf>________________________
> _______________________
> >>>>> OAuth mailing list
> >>>>> OAuth@ietf.org
> >>>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>> _______________________________________________
> >>>> OAuth mailing list
> >>>> OAuth@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/oauth
> >>>
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>