Re: [OAUTH-WG] Native clients & 'confidentiality'

Paul Madsen <paul.madsen@gmail.com> Mon, 09 January 2012 18:54 UTC

Return-Path: <paul.madsen@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A423021F84D6 for <oauth@ietfa.amsl.com>; Mon, 9 Jan 2012 10:54:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.598
X-Spam-Level:
X-Spam-Status: No, score=-3.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 27YT0nhrWkul for <oauth@ietfa.amsl.com>; Mon, 9 Jan 2012 10:54:51 -0800 (PST)
Received: from mail-gy0-f172.google.com (mail-gy0-f172.google.com [209.85.160.172]) by ietfa.amsl.com (Postfix) with ESMTP id 1EE3121F8493 for <oauth@ietf.org>; Mon, 9 Jan 2012 10:54:51 -0800 (PST)
Received: by ghbg18 with SMTP id g18so1957368ghb.31 for <oauth@ietf.org>; Mon, 09 Jan 2012 10:54:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type; bh=4VvNii2s4qGAYxT7+A82miNY/MzY65gYP6SOpylK+1k=; b=WPRpp9aELDX01m0Ve4xnQieNRD5K5NiI9mLTsgFO/FR7ZtTuy0mRbCHnpFGMnP7Xo4 Ar+s47aZ3WMJ+OJE6tU3gix1XEQiZB6qwGKVub8H0MEPoPbh2Wx8eT58RqhT/m8zuUMo GJARdOO0Rj3xmvZlZlNwjRonVFmRQ1FtERDiw=
Received: by 10.100.244.37 with SMTP id r37mr7105532anh.11.1326135290698; Mon, 09 Jan 2012 10:54:50 -0800 (PST)
Received: from pmadsen-mbp.local ([209.226.201.250]) by mx.google.com with ESMTPS id i6sm3922139and.3.2012.01.09.10.54.48 (version=SSLv3 cipher=OTHER); Mon, 09 Jan 2012 10:54:49 -0800 (PST)
Message-ID: <4F0B37F8.9040204@gmail.com>
Date: Mon, 09 Jan 2012 13:54:48 -0500
From: Paul Madsen <paul.madsen@gmail.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:8.0) Gecko/20111105 Thunderbird/8.0
MIME-Version: 1.0
To: Eran Hammer <eran@hueniverse.com>
References: <4EEF2BC4.7020409@gmail.com> <90C41DD21FB7C64BB94121FBBC2E723453A72D0CFA@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723453A72D0CFA@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: multipart/alternative; boundary="------------040407060902040404000209"
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Native clients & 'confidentiality'
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jan 2012 18:54:52 -0000

Thanks Eran and others for their responses

FWIW & FYI, OMAP decided to phrase requirements more directly in terms 
of authentication to the AS (MUST for web app clients & SHOULD for 
native clients) rather than use the confidential/public distinction.

Thanks again for your input

Paul

On 1/9/12 11:17 AM, Eran Hammer wrote:
>
> The text is pretty straight forward in its intentions. A confidential 
> client must had a secret -- what's open is how well the secret needs 
> to be protected (e.g. hard to extract) to qualify as 'capable of 
> keeping' secrets. You can require all clients to be confidential, but 
> without specifying what qualifies as confidential, this requirement is 
> pretty useless. It eliminates clients without secrets, or open source 
> clients with the client id hardcoded and visible, but some can claim 
> that a obfuscated secret in a native application binary is good 
> enough. They will be wrong, but the spec allows them to make that 
> decision.
>
> EHL
>
> *From:*oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On 
> Behalf Of *Paul Madsen
> *Sent:* Monday, December 19, 2011 4:19 AM
> *To:* oauth@ietf.org
> *Subject:* [OAUTH-WG] Native clients & 'confidentiality'
>
> Hi, the Online Media Authorization Protocol (OMAP) is a (as yet 
> unreleased) profile of OAuth 2.0 for online delivery of video content 
> based on a user's subscriptions (the TV Everywhere use case)
>
> We want to support both server & native mobile clients. It is for the 
> second class of clients that I'd appreciate some clarification of 
> 'confidentiality' as defined in OAuth 2.
>
> OAuth 2 distinguishes confidential & public clients based on their 
> ability to secure the credentials they'd use to authenticate to an AS 
> - confidential clients can protect those credentials, public clients 
> can't.
>
> Notwithstanding the above definition, the spec gives a degree of 
> discretion to the AS
>
>
>     The client type designation is based on the authorization server's
>     definition of secure authentication and its acceptable exposure
>     levels of client credentials.
>   
>   
>
> Give this discretion, is itpractical for the OMAP spec to stipulate 
> that 'All Clients (both server & native mobile), MUST be 
> confidential', ie let each individual OMAP AS specify its own 
> requirements of clients and their ability to securely authenticate?
>
> Is this consistent with the OAuth definition of confidentiality?
>
> Thanks
>
> Paul
>
>
>
>
>
>
>
>