Re: [OAUTH-WG] why are we signing?

Mike Malone <mjmalone@gmail.com> Tue, 01 December 2009 18:22 UTC

Return-Path: <mjmalone@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E68B03A697C for <oauth@core3.amsl.com>; Tue, 1 Dec 2009 10:22:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W4Ebtl0XzmKh for <oauth@core3.amsl.com>; Tue, 1 Dec 2009 10:22:49 -0800 (PST)
Received: from qw-out-2122.google.com (qw-out-2122.google.com [74.125.92.24]) by core3.amsl.com (Postfix) with ESMTP id B87203A6967 for <oauth@ietf.org>; Tue, 1 Dec 2009 10:22:48 -0800 (PST)
Received: by qw-out-2122.google.com with SMTP id 9so1003852qwb.31 for <oauth@ietf.org>; Tue, 01 Dec 2009 10:22:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=3+kPquppk99TQJYYczfBoYa0x3JWlpyQtriOygeSRpI=; b=v6kLpGpAQ902QDdtoRmjcsRUfxep6LZpIGNAL4mCNied7j0YujX1hyZUDJRcDV3G0+ tud8h+FDTd73N9KFR5qSFrthYK3t3p7PT0HCjpcBfmUX+J73kc1fVNbKidBIEQWAMaF+ tEZBOH8dJW4I8tMK0eWN3ftnsHan9S4J+id40=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=l3FvgxifAbTYDJuzfcH/L0LM8bT1Qx8Gjv+mzCr9lZgm3yAoHWndiXmHWyjVPk5kSe b9tivkjjcoP6Ecofyj8J805840ijG1DQX7LGDIULTfPdlLCKQ9txWlbCsqcVOdPNF3f9 XdFRACEELRxX9b8fFWGUloPvo/f/ig5cpbrTg=
MIME-Version: 1.0
Received: by 10.229.29.204 with SMTP id r12mr724207qcc.72.1259691758579; Tue, 01 Dec 2009 10:22:38 -0800 (PST)
In-Reply-To: <cb5f7a380912010852j3251199dse8d10da469dafa@mail.gmail.com>
References: <daf5b9570911082102u215dcf22gf0aeb2f3578e5ea0@mail.gmail.com> <daf5b9570911111754u49f72a0aia59814b5da497a51@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102B49@P3PW5EX1MB01.EX1.SECURESERVER.NET> <cb5f7a380911120745w2f576d1ej300723581e50f03f@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102E58@P3PW5EX1MB01.EX1.SECURESERVER.NET> <cb5f7a380911130837q40d07388y1ae9b472be0ae57a@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102F1F@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A4E79C63-7B5C-4FBA-9DDA-5FEB35B9584D@microsoft.com> <a9d9121c0911301432y76487b39hed670f0ed609c768@mail.gmail.com> <cb5f7a380912010852j3251199dse8d10da469dafa@mail.gmail.com>
Date: Tue, 01 Dec 2009 10:22:38 -0800
Message-ID: <a9d9121c0912011022p746e187fn1ff8240dbcdde096@mail.gmail.com>
From: Mike Malone <mjmalone@gmail.com>
To: John Panzer <jpanzer@google.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: Dick Hardt <Dick.Hardt@microsoft.com>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] why are we signing?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Dec 2009 18:22:50 -0000

On Tue, Dec 1, 2009 at 8:52 AM, John Panzer <jpanzer@google.com> wrote:
> On Mon, Nov 30, 2009 at 2:32 PM, Mike Malone <mjmalone@gmail.com> wrote:
>>
>> On Mon, Nov 30, 2009 at 11:17 AM, Dick Hardt <Dick.Hardt@microsoft.com>
>> wrote:
>> >
>> > On 2009-11-13, at 7:21 AM, Eran Hammer-Lahav wrote:
>> >>
>> >> I for one, see great value in offering some form of crypto-based
>> >> security for cases where TLS is not suitable.
>> >
>> > Are these use cases enumerated somewhere?
>>
>> I'm not completely opposed to the TLS route, but since you asked...
>> off the top of my head, here are a couple drawbacks to using TLS
>> instead of signing:
>>  - Bigger burden on developers who need to debug this stuff (i.e.,
>> you can't sniff your own traffic to debug requests & responses).
>>  - Properly setting up TLS can be complicated and expensive. For
>> developers who don't have a lot of ops skills the barrier may be too
>> high.
>>  - You can no longer pass around signed URLs as another level of
>> delegation (a use case that I use regularly for making XHR & POST
>> requests from the browser). This could be a non-issue if some other
>> mechanism for fourth-party delegation existed.
>>
> Can you elaborate on the above?  For OAuth, signatures (bound to a
> particular Consumer Secret that can't be leaked to subcontractors) is a
> barrier to multi-level delegation.

Right, but you can do poor-man's delegation by signing a URL and
passing it off to a third (er, fourth) party to use. I've seen this
most often with web apps, where the app (the OAuth Consumer) wants to
make a request to the Provider directly from the browser (e.g.,
POSTing a large file). They can't sign the URL in javascript without
compromising the Consumer Secret, so the the URL is signed server side
and passed to the browser for use.

Mike