Re: [OAUTH-WG] defining new response types
John Bradley <ve7jtb@ve7jtb.com> Tue, 12 July 2011 22:12 UTC
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 682EC21F8C0E for <oauth@ietfa.amsl.com>; Tue, 12 Jul 2011 15:12:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.999
X-Spam-Level:
X-Spam-Status: No, score=-2.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_45=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gRkh3Uj5wmkk for <oauth@ietfa.amsl.com>; Tue, 12 Jul 2011 15:12:30 -0700 (PDT)
Received: from mail-vx0-f172.google.com (mail-vx0-f172.google.com [209.85.220.172]) by ietfa.amsl.com (Postfix) with ESMTP id 5246B21F8C0D for <oauth@ietf.org>; Tue, 12 Jul 2011 15:12:30 -0700 (PDT)
Received: by vxi40 with SMTP id 40so5614643vxi.31 for <oauth@ietf.org>; Tue, 12 Jul 2011 15:12:29 -0700 (PDT)
Received: by 10.220.107.212 with SMTP id c20mr146657vcp.86.1310508749366; Tue, 12 Jul 2011 15:12:29 -0700 (PDT)
Received: from [192.168.1.4] ([190.22.80.147]) by mx.google.com with ESMTPS id dg10sm1543842vcb.0.2011.07.12.15.12.26 (version=TLSv1/SSLv3 cipher=OTHER); Tue, 12 Jul 2011 15:12:28 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234501D4A0611@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Tue, 12 Jul 2011 18:12:23 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <A5D2AA9E-FA86-4AC2-A67B-5E7BE6CCD7AB@ve7jtb.com>
References: <CAGdjJpKq=90QhSt68sYbtW9TtW+OR5nxYxTSC1A1jYRA=369tg@mail.gmail.com> <85A6E014-25A0-4970-8741-2F174B20688E@hueniverse.com> <CAAJ++qHek0v=cPcRgWBhku5mftjMEDQzekvjABqynMGBo_p7GQ@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234501D4A058C@P3PW5EX1MB01.EX1.SECURESERVER.NET> <CAAJ++qGMkF5deh6FCYSxAUUcGrXrawWBL3PyyDHSto9xq+066A@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E7234501D4A05A6@P3PW5EX1MB01.EX1.SECURESERVER.NET> <CAAJ++qHHLfRASxQ6uPSVeQTRE139JzYNuGz-pcobG9WQF58F1w@mail.gmail.com> <4E1F6AAD24975D4BA5B168042967394348D46521@TK5EX14MBXC201.redmond.corp.microsoft.com> <90C41DD21FB7C64BB94121FBBC2E7234501D4A0611@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1084)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] defining new response types
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Jul 2011 22:12:31 -0000
The functionality is important. I was under the impression from Paul Tarjan that this had been agreed at the last F2F. While I am not emotionally attached to this specific request syntax, we do need this functionality. John Bradley On 2011-07-12, at 4:35 PM, Eran Hammer-Lahav wrote: > I will withdraw my objections to the change (parsing the response_type string) if enough support is present. If you care about it, please speak out now. > > EHL > >> -----Original Message----- >> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf >> Of Mike Jones >> Sent: Tuesday, July 12, 2011 1:32 PM >> To: OAuth WG >> Subject: Re: [OAUTH-WG] defining new response types >> >> As a data point motivating this functionality, the OpenID Connect Core spec >> currently includes: >> >> response_type >> A space delimited, case sensitive list of string >> values (Pending OAuth 2.0 changes). Acceptable values include >> "code", "token", and "none". The value MUST include "code" for >> requesting an Authorization Code, "token" for requesting an Access >> Token, and "none" if no response is needed. >> >> The OpenID Connect Session Management spec also defines an "id_token" >> response_type. Combinations of these (other than "none") are meaningful >> and used. >> >> The syntax for this can change, but this functionality is very important to >> OpenID Connect as it is currently written. >> >> Thanks, >> -- Mike >> >> -----Original Message----- >> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf >> Of Breno de Medeiros >> Sent: Tuesday, July 12, 2011 11:48 AM >> To: Eran Hammer-Lahav >> Cc: OAuth WG >> Subject: Re: [OAUTH-WG] defining new response types >> >> On Tue, Jul 12, 2011 at 11:36, Eran Hammer-Lahav <eran@hueniverse.com> >> wrote: >>> That's pretty farfetched. In previous versions we had 'code_and_token' >> which was a composite value but without any special characters. If people >> think that we need to force such values to avoid this claimed developer >> confusion, let's drop the + and be done. >>> >> >> Maybe far fetched, but it's already available in our production environment -- >> we had implemented the code_and_token approach earlier (though not >> documented it) but abandoned that route as we thought the exponential >> explosion was harmful when we started contemplating adding new types >> and allowing various combinations of them. >> >>> The only requirement I was asked to cover was to allow response type >> extensibility. If there is WG consensus to also support the requirement of >> composite values using any order, we can discuss that. >> >> Let's. >> >>> >>> In addition, defining a parsing method adds a significant amount of new >> complexity beyond just splitting the string: >>> >>> * It allows for composite values that make no sense (since anything goes, >> composite values are not registered, just the components). >>> * Additional error codes are needed to indicate bad format, unsupported >> values (specify which one), unsupported combinations, etc. >>> * Developers lose the benefit of a simple registry with every possible >> combination they may choose. >>> >>> So the two questions are: >>> >>> 1. Do you find the + proposal as defined in -18 to be useful or confusing? >> >> It is ugly. >> >>> 2. Should the protocol support dynamic composite values with the added >> complexity (breaking change)? >> >> That's my preference. >> >>> >>> EHL >>> >>>> -----Original Message----- >>>> From: Breno de Medeiros [mailto:breno@google.com] >>>> Sent: Tuesday, July 12, 2011 11:18 AM >>>> To: Eran Hammer-Lahav >>>> Cc: Marius Scurtescu; OAuth WG >>>> Subject: Re: [OAUTH-WG] defining new response types >>>> >>>> On Tue, Jul 12, 2011 at 11:10, Eran Hammer-Lahav >>>> <eran@hueniverse.com> >>>> wrote: >>>>> Requiring parsing of the response type parameter is a big change at >>>>> this >>>> point. Even if it is a decent idea, I'm against it for the sole >>>> reason that I don't want to introduce such a change - we're done. >>>>> >>>>> The + character makes reading values easier because it give >>>>> composites of >>>> existing, individually defined values, a special meaning to *people*, >>>> but it does not change any existing code or adds any work. Servers >>>> will still perform simple string comparison. Parsing a list of values is >> unnecessary complexity. >>>> Developers can learn to put values in their expected order (since >>>> they are all going to cut-n-paste anyway). >>>> >>>> I disagree. I believe that servers will either not support the >>>> composite types at all, or will allow developers to enter it into any >>>> order to avoid developer pain. >>>> >>>> Also, developers will _not_ cut-and-paste. They will expect the fact >>>> that order is not meaningful by interacting with providers that don't >>>> perform exact string matching and then have interoperability issues >>>> with compliant implementations. >>>> >>>>> >>>>> I rather drop the special character then add parsing, but I think >>>>> it is a useful >>>> *convention*. >>>>> >>>>> Do people want to keep it or drop it? >>>>> >>>>> EHL >>>>> >>>>> >>>>>> -----Original Message----- >>>>>> From: Breno de Medeiros [mailto:breno@google.com] >>>>>> Sent: Tuesday, July 12, 2011 10:59 AM >>>>>> To: Eran Hammer-Lahav >>>>>> Cc: Marius Scurtescu; OAuth WG >>>>>> Subject: Re: [OAUTH-WG] defining new response types >>>>>> >>>>>> Imposing order and exact string matching on response_type's while >>>>>> simultaneously supporting a special character '+' and introducing >>>>>> the concept of composite response_type is a poor compromise, >> IMNSHO. >>>> What >>>>>> is the rationale to fear allowing multiple-valued response_type as >>>>>> we have for other parameters in the spec? >>>>>> >>>>>> On Mon, Jul 11, 2011 at 18:51, Eran Hammer-Lahav >>>>>> <eran@hueniverse.com> >>>>>> wrote: >>>>>>> As for the plus encoding we can choose another char or give an >>>> example. >>>>>>> >>>>>>> On Jul 11, 2011, at 18:07, "Marius Scurtescu" >>>>>>> <mscurtescu@google.com> >>>>>> wrote: >>>>>>> >>>>>>>> If I read section 8.4 correctly it seems that new response >>>>>>>> types can be defined but composite values must be registered >> explicitly. >>>>>>>> >>>>>>>> I don't think this approach scales too well. OpenID Connect for >>>>>>>> example is adding a new response type: id_token. >>>>>>>> >>>>>>>> id_token can be combined with either code or token and >>>>>>>> potentially with both of them, the following combinations must >>>>>>>> be registered as a >>>>>>>> result: >>>>>>>> code+id_token >>>>>>>> token+id_token >>>>>>>> code+token+id_token >>>>>>>> >>>>>>>> and this assumes that code+token is already registered. >>>>>>>> >>>>>>>> I think it makes more sense to define response_type as a space >>>>>>>> separated list of items, where each item can be individually >>>>>>>> registered. I do realize that this complicates things quite a >>>>>>>> bit (not we have to define and deal with both composite >>>>>>>> response_type and the individual items). >>>>>>>> >>>>>>>> As a side note, using + as separator could cause lots of problems. >>>>>>>> If people naively type "code+toke" it will be decoded as "code >> token". >>>>>>>> No one will remember the hex code for +. >>>>>>>> >>>>>>>> Marius >>>>>>>> _______________________________________________ >>>>>>>> OAuth mailing list >>>>>>>> OAuth@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>> >>>>>> >>>>>> >>>>>> >>>>>> -- >>>>>> --Breno >>>>> >>>> >>>> >>>> >>>> -- >>>> --Breno >>> >> >> >> >> -- >> --Breno >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] defining new response types Marius Scurtescu
- Re: [OAUTH-WG] defining new response types Eran Hammer-Lahav
- Re: [OAUTH-WG] defining new response types Eran Hammer-Lahav
- Re: [OAUTH-WG] defining new response types Breno de Medeiros
- Re: [OAUTH-WG] defining new response types Eran Hammer-Lahav
- Re: [OAUTH-WG] defining new response types Breno de Medeiros
- Re: [OAUTH-WG] defining new response types Eran Hammer-Lahav
- Re: [OAUTH-WG] defining new response types Breno de Medeiros
- Re: [OAUTH-WG] defining new response types Mike Jones
- Re: [OAUTH-WG] defining new response types Eran Hammer-Lahav
- Re: [OAUTH-WG] defining new response types John Bradley
- Re: [OAUTH-WG] defining new response types Marius Scurtescu
- Re: [OAUTH-WG] defining new response types Paul Tarjan
- Re: [OAUTH-WG] defining new response types Breno
- Re: [OAUTH-WG] defining new response types Breno
- Re: [OAUTH-WG] defining new response types Eran Hammer-Lahav
- Re: [OAUTH-WG] defining new response types Breno