Re: [OAUTH-WG] Future of PoP Work

Justin Richer <jricher@mit.edu> Mon, 24 October 2016 20:06 UTC

Return-Path: <jricher@mit.edu>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 771051295D6 for <oauth@ietfa.amsl.com>; Mon, 24 Oct 2016 13:06:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.631
X-Spam-Level:
X-Spam-Status: No, score=-4.631 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.431, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kty6j-i92uKN for <oauth@ietfa.amsl.com>; Mon, 24 Oct 2016 13:06:34 -0700 (PDT)
Received: from dmz-mailsec-scanner-4.mit.edu (dmz-mailsec-scanner-4.mit.edu [18.9.25.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 993191295CB for <oauth@ietf.org>; Mon, 24 Oct 2016 13:06:34 -0700 (PDT)
X-AuditID: 1209190f-60fff70000003135-0d-580e69c96947
Received: from mailhub-auth-2.mit.edu ( [18.7.62.36]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by (Symantec Messaging Gateway) with SMTP id F2.E6.12597.9C96E085; Mon, 24 Oct 2016 16:06:33 -0400 (EDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by mailhub-auth-2.mit.edu (8.13.8/8.9.2) with ESMTP id u9OK6WUn005705; Mon, 24 Oct 2016 16:06:32 -0400
Received: from [10.1.150.149] ([208.91.2.4]) (authenticated bits=0) (User authenticated as jricher@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id u9OK6Sd4023203 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 24 Oct 2016 16:06:30 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_52727EAE-3CA1-4396-AB2F-BDD9E2C81581"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Justin Richer <jricher@mit.edu>
In-Reply-To: <4158ACB0-929A-4DDC-B483-3D07D9AA7A5C@oracle.com>
Date: Mon, 24 Oct 2016 13:06:28 -0700
Message-Id: <35529A23-97AC-4B69-9544-90E2E8C53755@mit.edu>
References: <ef15c42a-e233-e148-4f38-ef7f75333c76@gmx.net> <72315511-98C7-4881-B349-CA32DACA9E96@mit.edu> <CAF2hCbZh2jhVCBBqKexgcNyPj+fBMH5txoQz_7PY9FaY5nXF4w@mail.gmail.com> <4158ACB0-929A-4DDC-B483-3D07D9AA7A5C@oracle.com>
To: Phil Hunt <phil.hunt@oracle.com>
X-Mailer: Apple Mail (2.3124)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprNKsWRmVeSWpSXmKPExsUixG6nonsyky/C4P88YYuTb1+xWSyY38hu 8X/pKSYHZo8X//YweixZ8pPJ4+PTWywBzFFcNimpOZllqUX6dglcGWtW9LMWvA6r+D7rOWsD Y4NXFyMnh4SAicTOyzPZuxi5OIQE2pgkJnyZwAjhbGSUuLJ7KxOEs5JJoruljxGkhVkgQWL2 t+MsIDavgJ7EpvVvmUBsYQEtiU1TzoHVsAmoSkxf0wIW5xSwk7g0aQVbFyMHBwtQfP8tSYgx 3hJfXtxkghhjJXFl33OoXQ8YJdZencIGkhARUJH4dvU6I8SpshJPTi5imcDIPwvJGbOQnAER 15ZYtvA1M4StKbG/ezkLpriGROe3iawLGNlWMcqm5Fbp5iZm5hSnJusWJyfm5aUW6Zro5WaW 6KWmlG5iBIU7pyT/DsY5Dd6HGAU4GJV4eBkM+CKEWBPLiitzDzFKcjApifKeCgAK8SXlp1Rm JBZnxBeV5qQWH2KU4GBWEuG9HQuU401JrKxKLcqHSUlzsCiJ8/53+xouJJCeWJKanZpakFoE k5Xh4FCS4J2RAdQoWJSanlqRlplTgpBm4uAEGc4DNPw3SA1vcUFibnFmOkT+FKMux7G5N9Yy CbHk5eelSonzHgUpEgApyijNg5sDSlMXoplYXjGKA70lzHscpIoHmOLgJr0CWsIEtEQwngdk SUkiQkqqgVF5/oWAczvsvZX2KVxpMQ87n2X3taIvSGbq7y9byz0U9hhk6CkpXtnIUlW4qcNr yf1DOz3ZTvz8+WPfuYseP/0avi/ZsKre0FWnrsKSI/p5SFrT/m2aZfc0rHexyYjOfVgxe/Xu btW7Fx9XZii2LbsVF90X9OZAUMLVdyebrj1pmb8uNOznlfdKLMUZiYZazEXFiQB/jQkOLgMA AA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/i_fadH5AQVFYccAnvp8dY3bo9sc>
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Future of PoP Work
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2016 20:06:37 -0000

You can already sign arbitrary content using a body hash with the current spec.

 — Justin

> On Oct 24, 2016, at 8:38 AM, Phil Hunt (IDM) <phil.hunt@oracle.com> wrote:
> 
> Maybe if we reworked the signing doc so content types like xml and json could be signed?  
> 
> This would cover for the majority of web api cases. 
> 
> Wonder what the advice of the http wg would be on this. 
> 
> Phil
> 
> On Oct 24, 2016, at 8:29 AM, Samuel Erdtman <samuel@erdtman.se <mailto:samuel@erdtman.se>> wrote:
> 
>> +1 on doing PoP work in this working group, including HTTP signing/MACing, I don´t think the old HTTP signature document was that far from useful.
>> 
>> With the ACE work I like when it is possible to just map work done in the OAuth and other working groups to the more optimized protocols. Some would maybe say that it is sub-optimal that the protocol was not initially designed for the constrained environment but I think the benefit of concept validation from web is a bigger plus.
>> 
>> //Samuel
>> 
>> On Sat, Oct 22, 2016 at 7:47 PM, Justin Richer <jricher@mit.edu <mailto:jricher@mit.edu>> wrote:
>> I believe that the PoP work should stay in the working group, and that without a usable presentation mechanism such as an HTTP message signature the whole work is pointless. I agree with Mike that we should learn from our own mistakes — and that is precisely the direction that the current HTTP signing draft took. As a result, the base level of functionality is signing the token itself (with a timestamp/nonce) using the key. All of the fiddly HTTP bits that trip people up? Not only are they optional, but it’s explicitly declared what’s covered. Why? Because we’re learning from past mistakes.
>> 
>> I think that token binding is relying on a lot of “ifs” that aren’t real yet, and if those “ifs” become reality then it will be to the benefit of large internet companies over everyone else. Additionally, token binding in OAuth is far from the simple solution that it’s being sold as. The very nature of an access token goes against the original purpose of tying an artifact to a single presentation channel. OAuth clients in the real world need to be able to deal with multiple resource servers and dynamically deployed APIs, and the token binding protocol fundamentally assumes a world where two machines are talking directly to each other.
>> 
>> All that said, this working group has consistently shown resistance to solving this problem for many years, so the results of this query don’t at all surprise me.
>> 
>>  — Justin
>> 
>> > On Oct 19, 2016, at 11:45 AM, Hannes Tschofenig <hannes.tschofenig@gmx.net <mailto:hannes.tschofenig@gmx.net>> wrote:
>> >
>> > Hi all,
>> >
>> > two questions surfaced at the last IETF meeting, namely
>> >
>> > 1) Do we want to proceed with the symmetric implementation of PoP or,
>> > alternatively, do we want to move it over to the ACE working group?
>> >
>> > 2) Do we want to continue the work on HTTP signing?
>> >
>> > We would appreciate your input on these two questions.
>> >
>> > Ciao
>> > Hannes & Derek
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org <mailto:OAuth@ietf.org>
>> > https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailman/listinfo/oauth>
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailman/listinfo/oauth>
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailman/listinfo/oauth>