Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id 64C191A1BFB
 for <oauth@ietfa.amsl.com>; Tue,  2 Dec 2014 14:27:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.409
X-Spam-Level: 
X-Spam-Status: No, score=-1.409 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_RP_MATCHES_RCVD=-0.01,
 URI_NOVOWEL=0.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Jzr1mTagx_mC for <oauth@ietfa.amsl.com>;
 Tue,  2 Dec 2014 14:26:59 -0800 (PST)
Received: from smtpvbsrv1.mitre.org (smtpvbsrv1.mitre.org [198.49.146.234])
 by ietfa.amsl.com (Postfix) with ESMTP id 5D5671A1B21
 for <oauth@ietf.org>; Tue,  2 Dec 2014 14:26:59 -0800 (PST)
Received: from smtpvbsrv1.mitre.org (localhost.localdomain [127.0.0.1])
 by localhost (Postfix) with SMTP id E951552E0AA;
 Tue,  2 Dec 2014 17:26:58 -0500 (EST)
Received: from IMCCAS01.MITRE.ORG (imccas01.mitre.org [129.83.29.78])
 by smtpvbsrv1.mitre.org (Postfix) with ESMTP id DC94852E010;
 Tue,  2 Dec 2014 17:26:58 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.102]) by IMCCAS01.MITRE.ORG
 ([129.83.29.68]) with mapi id 14.03.0174.001; Tue, 2 Dec 2014 17:26:58 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: John Bradley <ve7jtb@ve7jtb.com>
Thread-Topic: [OAUTH-WG] Review of draft-ietf-oauth-introspection-01
Thread-Index: AQHQDiJoqgGZL6bZ70SXEfjMbJe4Jpx8qaoAgABMtwCAAAciAIAAAPSAgAABWoCAAAMSAIAACQgAgAAE5gCAAB4oAIAAAxKAgAAD6YA=
Date: Tue, 2 Dec 2014 22:26:57 +0000
Message-ID: <C62B7206-4F9F-4FB2-A7AE-6C2EB55C09D1@mitre.org>
References: <46D29E35-5A69-4687-BC44-45462DEA8D47@mitre.org>
 <580238515.3962316.1417548302668.JavaMail.yahoo@jws10646.mail.bf1.yahoo.com>
 <EA29FCAC-B690-40D3-A6EF-345F4483856E@mitre.org>
 <BA5E5445-7B45-4798-A462-154A76152A4A@ve7jtb.com>
 <E82E18D9-9A3F-4810-A05B-C90F9FD7D0B6@xmlgrrl.com>
 <AEDCFD5D-9006-4C65-A42F-8AF4254C235C@ve7jtb.com>
In-Reply-To: <AEDCFD5D-9006-4C65-A42F-8AF4254C235C@ve7jtb.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.146.15.76]
Content-Type: multipart/alternative;
 boundary="_000_C62B72064F9F4FB2A7AE6C2EB55C09D1mitreorg_"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/oauth/ivzAoNOmjJyaGGufIDhRjcFgPZU
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Review of draft-ietf-oauth-introspection-01
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>,
 <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>,
 <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Dec 2014 22:27:05 -0000

--_000_C62B72064F9F4FB2A7AE6C2EB55C09D1mitreorg_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

I agree that there's some use in this (and in fact I've deployed a version =
that uses a signed JWT to indicate its authorization server), but it should=
 remain outside the scope of this spec. It's a service discovery problem, i=
t's orthogonal.

 -- Justin


On Dec 2, 2014, at 5:13 PM, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@v=
e7jtb.com>> wrote:

Yes,  but unless there is something new the introspection endpoint in UMA i=
s tied to the resource.

In some cases having the token indicate the introspection endpoint may be u=
seful.

John B.

Sent from my iPhone

On Dec 2, 2014, at 10:02 PM, Eve Maler <eve@xmlgrrl.com<mailto:eve@xmlgrrl.=
com>> wrote:

FWIW, UMA goes ahead and standardizes a good deal about the trust establish=
ment between the RS and the AS, and (of course) profiles and wraps the toke=
n introspection spec as part of the resulting =93authorization API=94 that =
the AS presents to the RS. A big part of the motivation for this is to supp=
ort an n:n relationship between AS and RS entities.

EVe

On 2 Dec 2014, at 12:14 PM, John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@v=
e7jtb.com>> wrote:

Many of the proprietary introspection protocols in use return scope, role o=
r other meta data for the RS to make its access policy decision on.
One of the reasons for using opaque tokens rather than JWT is to prevent le=
akage of that info.

Making authentication to the introspection endpoint a MUST if additional at=
tributes are present is OK,  I might even be inclined to say that authentic=
ation of some sort is always required, but that might be going a bit far fo=
r some use cases.

We have a lot of proprietary ways to do this from IBM, Layer 7, Ping etc.  =
It would be nice if we could standardize it.   Precluding other attributes =
would not be helpful for adoption.


One issue that we haven=92t addressed in this spec is what happens if there=
 are multiple AS for the RS and how it would decide what introspection endp=
oint to use.
Perhaps that needs to be a extension, leaving this for the simple case.

However having more than on e AS per RS is not as unusual as it once was in=
 larger environments.

John B.


On Dec 2, 2014, at 4:56 PM, Richer, Justin P. <jricher@mitre.org<mailto:jri=
cher@mitre.org>> wrote:

Agreed, which is why we've got space for the "sub" and "user_id" fields but=
 not anything else about the user, and we've got a privacy considerations s=
ection for dealing with that. If you can help make the wording on that sect=
ion stronger, I'd appreciate it.

 -- Justin

On Dec 2, 2014, at 2:25 PM, Bill Mills <wmills_92105@yahoo.com<mailto:wmill=
s_92105@yahoo.com>> wrote:

If introspection returns any other user data beyond what is strictly requir=
ed to validate the token based solely on possession of the public part it w=
ould be a mistake.


On Tuesday, December 2, 2014 11:13 AM, "Richer, Justin P." <jricher@mitre.o=
rg<mailto:jricher@mitre.org>> wrote:


That's all fine -- it's all going over TLS anyway (RS->AS) just like the or=
iginal token fetch by the client (C->AS). Doesn't mean you need TLS *into* =
the RS (C->RS) with a good PoP token.

Can you explain how this is related to "act on behalf of"? I don't see any =
connection.

 -- Justin

On Dec 2, 2014, at 2:09 PM, Bill Mills <wmills_92105@yahoo.com<mailto:wmill=
s_92105@yahoo.com>> wrote:

Fetching the public key for a token might be fine, but what if the introspe=
ction endpoint returns the symmetric key?  Data about the user?  Where does=
 this blur the line between this and "act on behalf of"?


On Tuesday, December 2, 2014 11:05 AM, "Richer, Justin P." <jricher@mitre.o=
rg<mailto:jricher@mitre.org>> wrote:


The call to introspection has a TLS requirement, but the call to the RS wou=
ldn't necessarily have that requirement. The signature and the token identi=
fier are two different things. The identifier doesn't do an attacker any go=
od on its own without the verifiable signature that's associated with it an=
d the request. What I'm saying is that you introspect the identifier and ge=
t back something that lets you, the RS, check the signature.

 -- Justin

On Dec 2, 2014, at 1:40 PM, Bill Mills <wmills_92105@yahoo.com<mailto:wmill=
s_92105@yahoo.com>> wrote:

"However, I think it's very clear how PoP tokens would work. ..."

I don't know if that's true.  POP tokens (as yet to be fully defined) would=
 then also have a TLS or transport security requirement unless there is tok=
en introspection client auth in play I think.  Otherwise I can as an attack=
er take that toklen and get info about it that might be useful, and I don't=
 think that's what we want.

-bill








_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


Eve Maler                                  http://www.xmlgrrl.com/blog
+1 425 345 6756                         http://www.twitter.com/xmlgrrl



--_000_C62B72064F9F4FB2A7AE6C2EB55C09D1mitreorg_
Content-Type: text/html; charset="Windows-1252"
Content-ID: <B96EA434B50CB0488BD932D288B033A4@imc.mitre.org>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space;">
I agree that there's some use in this (and in fact I've deployed a version =
that uses a signed JWT to indicate its authorization server), but it should=
 remain outside the scope of this spec. It's a service discovery problem, i=
t's orthogonal.&nbsp;
<div><br>
</div>
<div>&nbsp;-- Justin</div>
<div><br>
</div>
<div><br>
<div>
<div>On Dec 2, 2014, at 5:13 PM, John Bradley &lt;<a href=3D"mailto:ve7jtb@=
ve7jtb.com">ve7jtb@ve7jtb.com</a>&gt; wrote:</div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite">
<div dir=3D"auto">
<div>Yes, &nbsp;but unless there is something new the introspection endpoin=
t in UMA is tied to the resource. &nbsp;&nbsp;</div>
<div><br>
</div>
<div>In some cases having the token indicate the introspection endpoint may=
 be useful.&nbsp;</div>
<div><br>
</div>
<div>John B.&nbsp;<br>
<br>
Sent from my iPhone</div>
<div><br>
On Dec 2, 2014, at 10:02 PM, Eve Maler &lt;<a href=3D"mailto:eve@xmlgrrl.co=
m">eve@xmlgrrl.com</a>&gt; wrote:<br>
<br>
</div>
<blockquote type=3D"cite">
<div class=3D"">FWIW, UMA goes ahead and standardizes a good deal about the=
 trust establishment between the RS and the AS, and (of course) profiles an=
d wraps the token introspection spec as part of the resulting =93authorizat=
ion API=94 that the AS presents to the
 RS. A big part of the motivation for this is to support an n:n relationshi=
p between AS and RS entities.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D""><span class=3D"Apple-tab-span" style=3D"white-space:pre"></=
span>EVe</div>
<br class=3D"">
<div>
<blockquote type=3D"cite" class=3D"">
<div class=3D"">On 2 Dec 2014, at 12:14 PM, John Bradley &lt;<a href=3D"mai=
lto:ve7jtb@ve7jtb.com" class=3D"">ve7jtb@ve7jtb.com</a>&gt; wrote:</div>
<br class=3D"Apple-interchange-newline">
<div class=3D"">
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space;" class=3D"">
Many of the proprietary introspection protocols in use return scope, role o=
r other meta data for the RS to make its access policy decision on.
<div class=3D"">One of the reasons for using opaque tokens rather than JWT =
is to prevent leakage of that info.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">Making authentication to the introspection endpoint a MUST =
if additional attributes are present is OK, &nbsp;I might even be inclined =
to say that authentication of some sort is always required, but that might =
be going a bit far for some use cases.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">We have a lot of proprietary ways to do this from IBM, Laye=
r 7, Ping etc. &nbsp;It would be nice if we could standardize it. &nbsp; Pr=
ecluding other attributes would not be helpful for adoption.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">One issue that we haven=92t addressed in this spec is what =
happens if there are multiple AS for the RS and how it would decide what in=
trospection endpoint to use.</div>
<div class=3D"">Perhaps that needs to be a extension, leaving this for the =
simple case.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">However having more than on e AS per RS is not as unusual a=
s it once was in larger environments.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D"">John B.</div>
<div class=3D""><br class=3D"">
</div>
<div class=3D""><br class=3D"">
<div class=3D"">
<blockquote type=3D"cite" class=3D"">
<div class=3D"">On Dec 2, 2014, at 4:56 PM, Richer, Justin P. &lt;<a href=
=3D"mailto:jricher@mitre.org" class=3D"">jricher@mitre.org</a>&gt; wrote:</=
div>
<br class=3D"Apple-interchange-newline">
<div class=3D"">
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space;" class=3D"">
Agreed, which is why we've got space for the &quot;sub&quot; and &quot;user=
_id&quot; fields but not anything else about the user, and we've got a priv=
acy considerations section for dealing with that. If you can help make the =
wording on that section stronger, I'd appreciate it.
<div class=3D""><br class=3D"">
</div>
<div class=3D"">&nbsp;-- Justin</div>
<div class=3D""><br class=3D"">
<div class=3D"">
<div class=3D"">On Dec 2, 2014, at 2:25 PM, Bill Mills &lt;<a href=3D"mailt=
o:wmills_92105@yahoo.com" class=3D"">wmills_92105@yahoo.com</a>&gt; wrote:<=
/div>
<br class=3D"Apple-interchange-newline">
<blockquote type=3D"cite" class=3D"">
<div style=3D"background-color: rgb(255, 255, 255); font-family: HelveticaN=
eue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-=
size: 12px;" class=3D"">
<div dir=3D"ltr" id=3D"yui_3_16_0_1_1417479933319_138170" class=3D""><span =
id=3D"yui_3_16_0_1_1417479933319_138169" class=3D"">If introspection return=
s any other user data beyond what is strictly required to validate the toke=
n based solely on possession of the public
 part it would be a mistake.</span></div>
<div class=3D"qtdSeparateBR"><br class=3D"">
<br class=3D"">
</div>
<div class=3D"yahoo_quoted" style=3D"display: block;">
<div style=3D"font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial,=
 Lucida Grande, sans-serif; font-size: 12px;" class=3D"">
<div style=3D"font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial,=
 Lucida Grande, sans-serif; font-size: 16px;" class=3D"">
<div dir=3D"ltr" class=3D""><font size=3D"2" face=3D"Arial" class=3D"">On T=
uesday, December 2, 2014 11:13 AM, &quot;Richer, Justin P.&quot; &lt;<a hre=
f=3D"mailto:jricher@mitre.org" class=3D"">jricher@mitre.org</a>&gt; wrote:<=
br class=3D"">
</font></div>
<br class=3D"">
<br class=3D"">
<div class=3D"y_msg_container">
<div id=3D"yiv0382255215" class=3D"">That's all fine -- it's all going over=
 TLS anyway (RS-&gt;AS) just like the original token fetch by the client (C=
-&gt;AS). Doesn't mean you need TLS *into* the RS (C-&gt;RS) with a good Po=
P token.&nbsp;
<div class=3D""><br clear=3D"none" class=3D"">
</div>
<div class=3D"">Can you explain how this is related to &quot;act on behalf =
of&quot;? I don't see any connection.</div>
<div class=3D""><br clear=3D"none" class=3D"">
</div>
<div class=3D"">&nbsp;-- Justin</div>
<div class=3D"yiv0382255215yqt3110801859" id=3D"yiv0382255215yqt27475"><br =
clear=3D"none" class=3D"">
<div class=3D"">
<div class=3D"">On Dec 2, 2014, at 2:09 PM, Bill Mills &lt;<a rel=3D"nofoll=
ow" shape=3D"rect" ymailto=3D"mailto:wmills_92105@yahoo.com" target=3D"_bla=
nk" href=3D"mailto:wmills_92105@yahoo.com" class=3D"">wmills_92105@yahoo.co=
m</a>&gt; wrote:</div>
<br clear=3D"none" class=3D"yiv0382255215Apple-interchange-newline">
<blockquote type=3D"cite" class=3D"">
<div style=3D"background-color:rgb(255, 255, 255);font-family:HelveticaNeue=
, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;font-size=
:12px;" class=3D"">
<div dir=3D"ltr" id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116280" clas=
s=3D""><span id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116283" class=3D=
"">Fetching the public key for a token might be fine, but what if the intro=
spection endpoint returns the symmetric key?
 &nbsp;Data about the user? &nbsp;Where does this blur the line between thi=
s and &quot;act on behalf of&quot;?</span></div>
<div class=3D"yiv0382255215qtdSeparateBR" id=3D"yiv0382255215yui_3_16_0_1_1=
417479933319_116279">
<br clear=3D"none" class=3D"">
<br clear=3D"none" class=3D"">
</div>
<div class=3D"yiv0382255215yahoo_quoted" id=3D"yiv0382255215yui_3_16_0_1_14=
17479933319_116250" style=3D"display: block;">
<div id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116249" style=3D"font-fa=
mily:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-s=
erif;font-size:12px;" class=3D"">
<div id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116248" style=3D"font-fa=
mily:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-s=
erif;font-size:16px;" class=3D"">
<div dir=3D"ltr" id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116278" clas=
s=3D""><font id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116277" size=3D"=
2" face=3D"Arial" class=3D"">On Tuesday, December 2, 2014 11:05 AM, &quot;R=
icher, Justin P.&quot; &lt;<a rel=3D"nofollow" shape=3D"rect" ymailto=3D"ma=
ilto:jricher@mitre.org" target=3D"_blank" href=3D"mailto:jricher@mitre.org"=
 class=3D"">jricher@mitre.org</a>&gt;
 wrote:<br clear=3D"none" class=3D"">
</font></div>
<br clear=3D"none" class=3D"">
<br clear=3D"none" class=3D"">
<div class=3D"yiv0382255215y_msg_container" id=3D"yiv0382255215yui_3_16_0_1=
_1417479933319_116247">
<div id=3D"yiv0382255215" class=3D"">
<div id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116246" class=3D"">The c=
all to introspection has a TLS requirement, but the call to the RS wouldn't=
 necessarily have that requirement. The signature and the token identifier =
are two different things. The identifier
 doesn't do an attacker any good on its own without the verifiable signatur=
e that's associated with it and the request. What I'm saying is that you in=
trospect the identifier and get back something that lets you, the RS, check=
 the signature.
<div id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116276" class=3D""><br c=
lear=3D"none" class=3D"">
</div>
<div id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116275" class=3D"">&nbsp=
;-- Justin</div>
<div id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116245" class=3D""><br c=
lear=3D"none" class=3D"">
<div id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116244" class=3D"">
<div class=3D"yiv0382255215yqt7402436989" id=3D"yiv0382255215yqt21556">
<div id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116274" class=3D"">On De=
c 2, 2014, at 1:40 PM, Bill Mills &lt;<a rel=3D"nofollow" shape=3D"rect" id=
=3D"yiv0382255215yui_3_16_0_1_1417479933319_116273" ymailto=3D"mailto:wmill=
s_92105@yahoo.com" target=3D"_blank" href=3D"mailto:wmills_92105@yahoo.com"=
 class=3D"">wmills_92105@yahoo.com</a>&gt;
 wrote:</div>
<br clear=3D"none" class=3D"yiv0382255215Apple-interchange-newline">
<blockquote id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116243" type=3D"c=
ite" class=3D"">
<div id=3D"yiv0382255215yui_3_16_0_1_1417479933319_116242" style=3D"backgro=
und-color:rgb(255, 255, 255);font-family:HelveticaNeue, 'Helvetica Neue', H=
elvetica, Arial, 'Lucida Grande', sans-serif;font-size:12px;" class=3D"">
<div id=3D"yiv0382255215yui_3_16_0_1_1417479933319_82481" class=3D""><span =
class=3D"">&quot;</span><span class=3D"yiv0382255215" id=3D"yiv0382255215yu=
i_3_16_0_1_1417479933319_83601" style=3D"font-size:15.5555562973022px;">How=
ever, I think it's very clear how PoP tokens would
 work. ...&quot;</span></div>
<div class=3D"yiv0382255215qtdSeparateBR" id=3D"yiv0382255215yui_3_16_0_1_1=
417479933319_82480">
<br clear=3D"none" class=3D"">
</div>
<div class=3D"yiv0382255215qtdSeparateBR" dir=3D"ltr" id=3D"yiv0382255215yu=
i_3_16_0_1_1417479933319_82480">
I don't know if that's true. &nbsp;POP tokens (as yet to be fully defined) =
would then also have a TLS or transport security requirement unless there i=
s token introspection client auth in play I think. &nbsp;Otherwise I can as=
 an attacker take that toklen and get info
 about it that might be useful, and I don't think that's what we want.</div=
>
<div class=3D"yiv0382255215qtdSeparateBR" dir=3D"ltr" id=3D"yiv0382255215yu=
i_3_16_0_1_1417479933319_82480">
<br clear=3D"none" class=3D"">
</div>
<div class=3D"yiv0382255215qtdSeparateBR" dir=3D"ltr" id=3D"yiv0382255215yu=
i_3_16_0_1_1417479933319_82480">
-bill</div>
<div class=3D"yiv0382255215qtdSeparateBR" id=3D"yiv0382255215yui_3_16_0_1_1=
417479933319_82480">
<br clear=3D"none" class=3D"">
</div>
<div class=3D"yiv0382255215qtdSeparateBR" id=3D"yiv0382255215yui_3_16_0_1_1=
417479933319_82480">
<br clear=3D"none" class=3D"">
<br clear=3D"none" class=3D"">
</div>
</div>
</blockquote>
</div>
</div>
</div>
</div>
</div>
<br clear=3D"none" class=3D"">
</div>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<br clear=3D"none" class=3D"">
</div>
</div>
<br class=3D"">
<br class=3D"">
</div>
</div>
</div>
</div>
</div>
</blockquote>
</div>
<br class=3D"">
</div>
</div>
_______________________________________________<br class=3D"">
OAuth mailing list<br class=3D"">
<a href=3D"mailto:OAuth@ietf.org" class=3D"">OAuth@ietf.org</a><br class=3D=
"">
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" class=3D"">https://=
www.ietf.org/mailman/listinfo/oauth</a><br class=3D"">
</div>
</blockquote>
</div>
<br class=3D"">
</div>
</div>
_______________________________________________<br class=3D"">
OAuth mailing list<br class=3D"">
<a href=3D"mailto:OAuth@ietf.org" class=3D"">OAuth@ietf.org</a><br class=3D=
"">
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.or=
g/mailman/listinfo/oauth</a><br class=3D"">
</div>
</blockquote>
</div>
<br class=3D"">
<div apple-content-edited=3D"true" class=3D"">
<div style=3D"font-family: Helvetica; font-style: normal; font-variant: nor=
mal; font-weight: normal; letter-spacing: normal; line-height: normal; orph=
ans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; w=
hite-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width=
: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break:=
 after-white-space;" class=3D"">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; font-f=
amily: Helvetica; font-style: normal; font-variant: normal; font-weight: no=
rmal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
-webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; =
widows: 2; word-spacing: 0px; border-spacing: 0px; -webkit-text-decorations=
-in-effect: none; -webkit-text-stroke-width: 0px;"><span class=3D"Apple-sty=
le-span" style=3D"font-family: Courier; "><br class=3D"Apple-interchange-ne=
wline">
Eve Maler &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &n=
bsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<a href=3D"http://www.=
xmlgrrl.com/blog" class=3D"">http://www.xmlgrrl.com/blog</a><br class=3D"">
&#43;1 425 345 6756 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;=
 &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<a href=3D"http://www.twitter.com/xmlgrrl=
" class=3D"">http://www.twitter.com/xmlgrrl</a></span></span></div>
</div>
<br class=3D"">
</blockquote>
</div>
</blockquote>
</div>
<br>
</div>
</body>
</html>

--_000_C62B72064F9F4FB2A7AE6C2EB55C09D1mitreorg_--

