Re: [OAUTH-WG] Versioning

"William Mills" <wmills@yahoo-inc.com> Fri, 16 July 2010 16:14 UTC

Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EC6CC3A6A76 for <oauth@core3.amsl.com>; Fri, 16 Jul 2010 09:14:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -16.293
X-Spam-Level:
X-Spam-Status: No, score=-16.293 tagged_above=-999 required=5 tests=[AWL=-0.848, BAYES_00=-2.599, FRT_BELOW2=2.154, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BTyK+e2WWLOk for <oauth@core3.amsl.com>; Fri, 16 Jul 2010 09:14:12 -0700 (PDT)
Received: from mrout2.yahoo.com (mrout2.yahoo.com [216.145.54.172]) by core3.amsl.com (Postfix) with ESMTP id A43EB3A6A73 for <oauth@ietf.org>; Fri, 16 Jul 2010 09:14:12 -0700 (PDT)
Received: from SNV-EXPF01.ds.corp.yahoo.com (snv-expf01.ds.corp.yahoo.com [207.126.227.250]) by mrout2.yahoo.com (8.13.8/8.13.8/y.out) with ESMTP id o6GGDLea055704; Fri, 16 Jul 2010 09:13:21 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; s=serpent; d=yahoo-inc.com; c=nofws; q=dns; h=received:x-mimeole:content-class:mime-version: content-type:content-transfer-encoding:subject:date:message-id: in-reply-to:x-ms-has-attach:x-ms-tnef-correlator:thread-topic: thread-index:references:from:to:cc:return-path:x-originalarrivaltime; b=1bVKQek2gys8eU20tk9AAmWIGpw3GSyfePSXlscoWrNXQ/epGbPOBWE3EPPwe9ng
Received: from SNV-EXVS08.ds.corp.yahoo.com ([207.126.227.8]) by SNV-EXPF01.ds.corp.yahoo.com with Microsoft SMTPSVC(6.0.3790.4675); Fri, 16 Jul 2010 09:13:21 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
Date: Fri, 16 Jul 2010 09:13:20 -0700
Message-ID: <012AB2B223CB3F4BB846962876F47217059B6D0A@SNV-EXVS08.ds.corp.yahoo.com>
In-Reply-To: <4C402772.1020601@cdatazone.org>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [OAUTH-WG] Versioning
Thread-Index: AcskyjBlvBmwcZ4bQV+dGv7aSQEc9gANtK5A
References: <4C2C6D4A.5010401@cdatazone.org><012AB2B223CB3F4BB846962876F47217059B693B@SNV-EXVS08.ds.corp.yahoo.com><90C41DD21FB7C64BB94121FBBC2E72343B3ED4C454@P3PW5EX1MB01.EX1.SECURESERVER.NET><AANLkTikjW5OqYJIzwxrooAmHoWR5tNX1522TTBLH5rBT@mail.gmail.com><90C41DD21FB7C64BB94121FBBC2E72343B3ED4C475@P3PW5EX1MB01.EX1.SECURESERVER.NET><AANLkTilTDOVNjJw9K0ZismTzbbNeuVcEBktE-8ojDfVR@mail.gmail.com><90C41DD21FB7C64BB94121FBBC2E72343B3ED4C515@P3PW5EX1MB01.EX1.SECURESERVER.NET><4C2DC7C5.2090009@cdatazone.org><90C41DD21FB7C64BB94121FBBC2E72343B3ED4C623@P3PW5EX1MB01.EX1.SECURESERVER.NET><4C2F108B.70504@cdatazone.org><AANLkTilr38Y0TrUhks2_djJiAzZIcagMMy_Her-5h3Xn@mail.gmail.com><20100708110542.150740@gmx.net><AANLkTikYgB9ykpnOLaznz21QbOEApJ2SfXX9NOclk6Wt@mail.gmail.com><4C3707BD.6070201@gmx.de><AANLkTimOvB2hS6jOKldNlZyLNDlsAes48VuJPL46Ct3m@mail.gmail.com><4C3E05EE.4050903@cdatazone.org><AANLkTilI5vli9Nk7Xh6KbEXxgj6SICaAO9NRrndTlrmF@mail.gmail.com> <4C402772.1020601@cdatazone.org>
From: William Mills <wmills@yahoo-inc.com>
To: Rob Richards <rrichards@cdatazone.org>, Marius Scurtescu <mscurtescu@google.com>
X-OriginalArrivalTime: 16 Jul 2010 16:13:21.0319 (UTC) FILETIME=[CF4B1370:01CB2501]
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Versioning
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Jul 2010 16:14:14 -0000

For token migration from Oauth 1 to 2 are we ever really going to need
to do that silently for a user in a client?  It's reasonable when the
user gets a new client install that supports a new protocol for them to
have to re-authenticate.  Where I see this happening is in a big server
migration where you're integrating with somone like Google IMAP and you
already have a huge store of tokens for IMAP and you want yo convert to
Oauth 2 but you don't want to prompt all your users.

Do I have this right? 

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] 
> On Behalf Of Rob Richards
> Sent: Friday, July 16, 2010 2:34 AM
> To: Marius Scurtescu
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] Versioning
> 
> 
>   On 7/14/10 6:33 PM, Marius Scurtescu wrote:
> > On Wed, Jul 14, 2010 at 11:46 AM, Rob 
> Richards<rrichards@cdatazone.org>  wrote:
> >> Finally getting a chance to catchup and respond to this thread.
> >>
> >> Marius Scurtescu wrote:
> >>> See comments bellow...
> >>>
> >>>
> >>> On Fri, Jul 9, 2010 at 4:27 AM, Stefanie 
> Dronia<sDronia@gmx.de>  wrote:
> >>>
> >>>> Hallo Marius,
> >>>>
> >>>> thanks for your statement.
> >>>> Your idea of a migration flow is quite good and necessary.
> >>>>
> >>>> But I still doubt, if the work and effort should be 
> investigated to 
> >>>> spare the user from some interaction (authentication and 
> user consent).
> >>>>
> >>> It all depends for how many users does the client have 
> OAuth 1 tokens.
> >>> Asking users to re-approve will confuse them and I guess 
> many will 
> >>> not do it,
> >>>
> >> I think the user should not be excluded from this interaction and 
> >> should be required to re-approve. IMO they should be 
> involved as its 
> >> also informational to know that the client they have previously 
> >> authorized is now requesting new credentials under a different 
> >> security scheme. The user should be the one to decide 
> whether or not they want to allow this.
> > Why would you re-prompt the user? The only thing that 
> really changes 
> > is the underlying protocol, something most end users are not made 
> > aware of. How would the new approval page be any different from the 
> > initial one? The user granted a client access to some of its 
> > resources, that stays the same. If the authorization server 
> makes it 
> > explicit on the approval page that OAuth 1 is used, then yes, a 
> > re-approval is needed, but I don't think this normally happens.
> >
> >
> >> When it comes right down to it the only concrete thing I 
> can think of 
> >> when migrating from 1.0 to 2.0 is the need to determine 
> which version 
> >> is being used at the resource endpoint. For most clients 
> moving from 
> >> 1.0 to 2.0 they will most likely just create the next version of 
> >> their client/app with 2.0 support and completely drop 1.0 support 
> >> rather than going through any migration flow.
> > That depends on the client. If the client is a web site that has 
> > several thousand users, and it stores OAuth 1 access tokens for all 
> > these users, then migration totally makes sense. If the 
> client is an 
> > iPhone app with only one user, then maybe you are right. 
> Even in this 
> > case, I am sure the app would prefer not to annoy the user and just 
> > silently move to OAuth 2. If you are the app developer and your app 
> > has a large install base, would you risk losing even a small 
> > percentage of those users simply because you presented them with a 
> > confusing approval page?
> >
> >
> >
> As a user I would say yes, I want to be re-prompted or at 
> least explicitly request the migration of my tokens rather 
> than having something done silently, behind the scenes and 
> unbeknownst to me. The underlying protocol has changed, 
> whether or not I know it, and for all purposes could be the 
> most insure protocol out there. When something this 
> fundamental changes, I would want to have to re-authorize the 
> application because I could just as easily at this point decline. 
> Perhaps I went and read the changelog, the change was made 
> known on the site, or someone discovered the change and made 
> it public. As you can probably tell I lean way more towards 
> the side of the user and personally think it is more 
> responsible of the app or web site in question here to 
> require the re-authorization and risk losing some users (if 
> that is the case then clearly the application is not worth 
> the users time in the first place) than to silently change 
> the protocol on me.
> 
> Rob
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>