Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header
Justin Richer <jricher@mitre.org> Thu, 15 July 2010 19:26 UTC
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1533E3A6A9A for <oauth@core3.amsl.com>; Thu, 15 Jul 2010 12:26:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.498
X-Spam-Level:
X-Spam-Status: No, score=-6.498 tagged_above=-999 required=5 tests=[AWL=0.101, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gQEvncu+7o98 for <oauth@core3.amsl.com>; Thu, 15 Jul 2010 12:26:38 -0700 (PDT)
Received: from smtp-bedford.mitre.org (smtp-bedford.mitre.org [129.83.20.191]) by core3.amsl.com (Postfix) with ESMTP id D259C3A6A72 for <oauth@ietf.org>; Thu, 15 Jul 2010 12:26:37 -0700 (PDT)
Received: from smtp-bedford.mitre.org (localhost.localdomain [127.0.0.1]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id o6FJQlKZ011663 for <oauth@ietf.org>; Thu, 15 Jul 2010 15:26:48 -0400
Received: from imchub1.MITRE.ORG (imchub1.mitre.org [129.83.29.73]) by smtp-bedford.mitre.org (8.13.1/8.13.1) with ESMTP id o6FJQlZw011657; Thu, 15 Jul 2010 15:26:47 -0400
Received: from [129.83.50.65] (129.83.50.65) by imchub1.MITRE.ORG (129.83.29.73) with Microsoft SMTP Server id 8.2.254.0; Thu, 15 Jul 2010 15:26:47 -0400
From: Justin Richer <jricher@mitre.org>
To: Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <DE089E9F-35D6-4805-AC77-F86F2642810B@hueniverse.com>
References: <AANLkTim6az--AdwmEoew2pz3kEjhc_GyEaiyo_0UhSRr@mail.gmail.com> <1279205969.18579.55.camel@localhost.localdomain> <AANLkTildz62l2Me26Dlrv5nNmp8Z3P8JD1K-ChcWc5IO@mail.gmail.com> <AANLkTill8k-fUFt-IZLWdZinScj4fSBoI4rAiAf1PrYR@mail.gmail.com> <1279216291.18579.61.camel@localhost.localdomain> <74AEEFD7-04B3-4B28-970E-0DB554728BED@facebook.com> <DE089E9F-35D6-4805-AC77-F86F2642810B@hueniverse.com>
Content-Type: text/plain; charset="UTF-8"
Date: Thu, 15 Jul 2010 15:26:47 -0400
Message-ID: <1279222007.11628.29.camel@localhost.localdomain>
MIME-Version: 1.0
X-Mailer: Evolution 2.28.3
Content-Transfer-Encoding: 7bit
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Jul 2010 19:26:39 -0000
> Framing the argument against "having a 2 in it" as bikeshedding is missing the point. My reason against using OAuth2 is that is will undermine all the work put in to build an extensible framework that can evolve without needing a whole new version. By putting a version number, we make it more attractive to change the protocol than extend it. I think that it is bikeshedding. You can build new and amazing things on a framework named oauth2 as much as you can on something named oauth. If OAuth3 is as backwards-incompatible as OAuth2 is, then it's going to need its own namespace anyway, isn't it? > So far the arguments made are all theoretical. Putting the '2' in there solves an issue that several WG members have brought up when dealing with both OAuth1 and 2 simultaneously -- a case that I think is actually going to happen. I have servers that need to support both 1.0 and 1.0a flows simultaneously, right now. I cannot see OAuth2 adoption and cutover being instantaneous enough across all these different systems for these endpoints to not also support OAuth2. > I will maintain my objection and preference to reuse the existing names until someone with an existing 1.0 deployment can make a compelling reason why they can rely on the presence of the oauth_signature_method to differentiate. I'm sorry, but I simply don't understand your staunch opposition to a simple, low-negative-impact, and decently supported request such as this. I've heard two supporting reasons on the list already: how do I tell the difference between a misbehaving OAuth1 and a properly-behaving OAuth2, and how do I branch early? And I'll also add in something that I admit is more style than anything: It just feels better to branch on the *presence* of something rather than the *absence* of something, if we have that choice. Conversely, I see no compelling reason (technical, political, or otherwise) to *not* have it be named "oauth2". -- Justin PS: I think the bikeshed is where we keep the boatcar... :) > On Jul 15, 2010, at 14:24, "Luke Shepard" <lshepard@facebook.com> wrote: > > > > > On Jul 15, 2010, at 10:51 AM, Justin Richer wrote: > > > >> It was discussed before, but I don't remember there being any consensus > >> in the group. What are the practical reasons for not using "oauth2" > >> namespacing in the one place we still use namespacing? Most of what I've > >> heard seems to sound like "I don't like it to have a 2 on it". > > > > I don't like it to have a 2 in it. > > > >> I don't want to have to set up the OAuth 2 system to have to catch > >> failed cases of the OAuth 1 protocol. A good OAuth 2 call and a bad > >> OAuth 1 call should be distinguishable from the start. Also, what about > >> when we finally get a signed-request going? I would assume that that's > >> going to add back in things like oauth_signature, oauth_nonce, and the > >> other parameters whose absence you should filter on. > > > > The latest signature discussions have all focused on a single, self-contained, signed parameter that includes both data and signature. I think it's unlikely that we will introduce the plethora of parameters that we had in OAuth 1.0. > > > >> -- Justin > >> > >> On Thu, 2010-07-15 at 13:37 -0400, David Recordon wrote: > >>> I thought this topic had been beaten to death before. An OAuth 1.0 > >>> protected resource request includes a variety of oauth_ parameters > >>> whereas OAuth 2.0 just has oauth_token. > >>> > >>> > >>> --David > >>> > >>> > >>> On Thu, Jul 15, 2010 at 10:12 AM, Brian Eaton <beaton@google.com> > >>> wrote: > >>> On Thu, Jul 15, 2010 at 7:59 AM, Justin Richer > >>> <jricher@mitre.org> wrote: > >>>> +1 on OAuth2 header, and I also want to see oauth2_token in > >>> URI and form > >>>> parameter methods. > >>> > >>> > >>> Good point about the query parameter names needing to be > >>> unambiguous. > >>> > >>> _______________________________________________ > >>> OAuth mailing list > >>> OAuth@ietf.org > >>> https://www.ietf.org/mailman/listinfo/oauth > >>> > >>> > >>> > >> > >> > >> _______________________________________________ > >> OAuth mailing list > >> OAuth@ietf.org > >> https://www.ietf.org/mailman/listinfo/oauth > > > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] OAuth vs OAuth2 in Authorization header Brian Eaton
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… William Mills
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Torsten Lodderstedt
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Manger, James H
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Eran Hammer-Lahav
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Eran Hammer-Lahav
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Justin Richer
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Blaine Cook
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… William Mills
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Brian Eaton
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Lukas Rosenstock
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… David Recordon
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Brian Eaton
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… William Mills
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Justin Richer
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Luke Shepard
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… John Kemp
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… David Recordon
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Eran Hammer-Lahav
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… John Kemp
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Eran Hammer-Lahav
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… William Mills
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Marius Scurtescu
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Justin Richer
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Justin Richer
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Naitik Shah
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Torsten Lodderstedt
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Naitik Shah
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… William Mills
- Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization h… Manger, James H