Re: [OAUTH-WG] OAuth Bearer authentication - for proxies?

Amos Jeffries <squid3@treenet.co.nz> Tue, 03 January 2012 00:36 UTC

Return-Path: <squid3@treenet.co.nz>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1361321F8522 for <oauth@ietfa.amsl.com>; Mon, 2 Jan 2012 16:36:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.751
X-Spam-Level:
X-Spam-Status: No, score=-2.751 tagged_above=-999 required=5 tests=[AWL=-2.089, BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, HOST_EQ_STATIC=1.172]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id shEvTPl+SBou for <oauth@ietfa.amsl.com>; Mon, 2 Jan 2012 16:36:56 -0800 (PST)
Received: from treenet.co.nz (ip-58-28-153-233.static-xdsl.xnet.co.nz [58.28.153.233]) by ietfa.amsl.com (Postfix) with ESMTP id 8799F21F8516 for <oauth@ietf.org>; Mon, 2 Jan 2012 16:36:56 -0800 (PST)
Received: from [192.168.1.3] (unknown [119.224.36.238]) by treenet.co.nz (Postfix) with ESMTP id ECE5DE70DA; Tue, 3 Jan 2012 13:36:51 +1300 (NZDT)
Message-ID: <4F024DA0.7080707@treenet.co.nz>
Date: Tue, 03 Jan 2012 13:36:48 +1300
From: Amos Jeffries <squid3@treenet.co.nz>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:8.0) Gecko/20111105 Thunderbird/8.0
MIME-Version: 1.0
To: igor.faynberg@alcatel-lucent.com
References: <301AF9A4-395C-4B5A-8610-CD86BEE1401A@mnot.net> <abe2950b95b27818e9e6ebddc99a7b7e@treenet.co.nz> <4EFE7E22.9010200@treenet.co.nz> <4F014DF3.9030105@alcatel-lucent.com> <4F016837.3040904@treenet.co.nz> <4F018048.1020900@lodderstedt.net> <4F019E09.3070007@treenet.co.nz> <4F022CFA.80907@alcatel-lucent.com>
In-Reply-To: <4F022CFA.80907@alcatel-lucent.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: ietf-http-wg@w3.org, oauth@ietf.org
Subject: Re: [OAUTH-WG] OAuth Bearer authentication - for proxies?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jan 2012 00:36:57 -0000

On 1/2/2012 7:07 AM, Amos Jeffries wrote:
>> On 2/01/2012 11:00 p.m., Torsten Lodderstedt wrote:
>> ...
>>>
>>> general note: I do not understand why caching proxies should impose 
>>> a problem in case TLS is used (end2end). Could you please explain?
>>
>> Because TLS is hop-by-hop (in HTTP hops, end-to-end only in TCP 
>> hops). Proxies which decrypt TLS and provide responses out of cache 
>> are already deployed in many places. Mostly in the form of 
>> reverse-proxies, but corporate decryption proxies are also on the 
>> increase.
>>
>> AYJ

On 3/01/2012 11:17 a.m., Igor Faynberg wrote:
> I am at a loss here; granted, it is a gray area...  Does it mean that 
> RFC 2817 has not been implemented properly?
>

 From RFC 2817:
"

5. Upgrade across Proxies

    As a hop-by-hop header, Upgrade is negotiated between each pair of
    HTTP counterparties.  If a User Agent sends a request with an Upgrade
    header to a proxy, it is requesting a change to the protocol between
    itself and the proxy, not an end-to-end change.
"

The more common case is CONNECT method from RFC 2068, from a user agent 
to a reverse-proxy. Same behaviour.

> To make it simple: At the client, I establish a session key with the 
> server, and then use it for confidentiality.  How is this key known to 
> any proxy?

  "the server" is a proxy.

AYJ