Re: [OAUTH-WG] why are we signing?

Mike Malone <mjmalone@gmail.com> Wed, 02 December 2009 19:59 UTC

Return-Path: <mjmalone@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9ECC13A6829 for <oauth@core3.amsl.com>; Wed, 2 Dec 2009 11:59:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IkUHyoUpBq7m for <oauth@core3.amsl.com>; Wed, 2 Dec 2009 11:59:54 -0800 (PST)
Received: from qw-out-2122.google.com (qw-out-2122.google.com [74.125.92.24]) by core3.amsl.com (Postfix) with ESMTP id A46333A6403 for <oauth@ietf.org>; Wed, 2 Dec 2009 11:59:54 -0800 (PST)
Received: by qw-out-2122.google.com with SMTP id 9so105028qwb.31 for <oauth@ietf.org>; Wed, 02 Dec 2009 11:59:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :from:date:message-id:subject:to:cc:content-type; bh=GWHEEmFJZw0KXhmluzY0Fi3k1gZkG8xTlMNJFscD9Po=; b=jPb/gQvYBWFIOJ00ao0BMBwRcE9PpU8ZRNDS5SarmLw2pWFw+a+O1WVmfloW09fAuq xMRtxSYuiHaTIQfF1v7ZFRT/YPjdmvJMeiX1+6GvpBMpFRgdxtbUAjv4hJKL7BNAkpkY iLS9EaX2FPRaFF0bzbrZJnqIMFXyuJI8Zr78k=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; b=AT6GMQtucANyrlaBAgxwCo87pfkOVIno9lgP+xqrw2Z7UvBhBYEFBeixv4IkwrM16g g8Y32/ioNnNAw2zolf4LLnJcutCEyVemoEunXq1hlBeGFvwouqn633c/DwyRowwMcUdH ev7DwW5+QMWjD0ryjiYPJRjuuBLjCmyysSxn4=
MIME-Version: 1.0
Received: by 10.229.10.13 with SMTP id n13mr76304qcn.103.1259783983107; Wed, 02 Dec 2009 11:59:43 -0800 (PST)
In-Reply-To: <4B15D7C2.2070901@stpeter.im>
References: <daf5b9570911082102u215dcf22gf0aeb2f3578e5ea0@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102B49@P3PW5EX1MB01.EX1.SECURESERVER.NET> <cb5f7a380911120745w2f576d1ej300723581e50f03f@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102E58@P3PW5EX1MB01.EX1.SECURESERVER.NET> <cb5f7a380911130837q40d07388y1ae9b472be0ae57a@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343785102F1F@P3PW5EX1MB01.EX1.SECURESERVER.NET> <A4E79C63-7B5C-4FBA-9DDA-5FEB35B9584D@microsoft.com> <3D3C75174CB95F42AD6BCC56E5555B4501F19743@FIESEXC015.nsn-intra.net> <90C41DD21FB7C64BB94121FBBC2E72343785209BBB@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4B15D7C2.2070901@stpeter.im>
From: Mike Malone <mjmalone@gmail.com>
Date: Wed, 02 Dec 2009 11:57:42 -0800
Message-ID: <a9d9121c0912021157h299bfc96y139c48fa918c8776@mail.gmail.com>
To: Peter Saint-Andre <stpeter@stpeter.im>
Content-Type: text/plain; charset="ISO-8859-1"
Cc: ext Dick Hardt <Dick.Hardt@microsoft.com>, "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] why are we signing?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Dec 2009 19:59:55 -0000

On Tue, Dec 1, 2009 at 6:58 PM, Peter Saint-Andre <stpeter@stpeter.im> wrote:
> <hat type='individual'/>
>
> On 11/30/09 1:27 PM, Eran Hammer-Lahav wrote:
>> OAuth is being proposed as a generally useful method for securing API
>> calls. I expect many open source libraries to implement it on the
>> server side and use it for blog plugins, widgets, and other highly
>> distributed software. If OAuth required the use of TLS, it would
>> simply be ignored by all those applications which will likely
>> continue using Basic.
>>
>> With all due respect to big companies, their resources, and ability
>> to effortlessly deploy SSL/TLS, it is still an expensive and complex
>> process for more developers deploying small scale server components.
>
> With all due respect, I think it can be harder for big companies to
> deploy TLS -- they have a lot more users, need more hardware (special
> SSL accelerators and the like), have more layers of employees (so it can
> be more difficult to find the person who controls the hostmaster or
> whois-listed email address), etc.
>
> Getting a Class 1 cert from the likes of StartSSL is easy as pie these
> days. IMHO there is no excuse for not deploying SSL if you care one whit
> about security. The problem is that too many small-scale developers (and
> big companies!) simply don't care.

I'm far from an expert on TLS/PKI, but here's a thought (and I'm
pretty sure this has come up before)... If TLS is simpler than
signatures then why not just use PKI for everything. A lot of the
problems that have come up with OAuth are solved by PKI - client certs
replace tokens, you can delegate authority by creating
sub-certificates, the consumer provisioning problem is largely solved,
etc.

It seems like WRAP is using bits of PKI to solve half of the problem
and then re-inventing other bits of PKI for the other half. If TLS/PKI
is the solution, why not go whole hog?

Mike