Re: [OAUTH-WG] Versioning

Marius Scurtescu <mscurtescu@google.com> Fri, 16 July 2010 16:37 UTC

Return-Path: <mscurtescu@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0FB3A3A6A26 for <oauth@core3.amsl.com>; Fri, 16 Jul 2010 09:37:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.797
X-Spam-Level:
X-Spam-Status: No, score=-100.797 tagged_above=-999 required=5 tests=[AWL=-0.974, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, FRT_BELOW2=2.154, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w2DXb8kOGHfW for <oauth@core3.amsl.com>; Fri, 16 Jul 2010 09:37:03 -0700 (PDT)
Received: from smtp-out.google.com (smtp-out.google.com [74.125.121.35]) by core3.amsl.com (Postfix) with ESMTP id 7B92D3A690C for <oauth@ietf.org>; Fri, 16 Jul 2010 09:37:02 -0700 (PDT)
Received: from hpaq5.eem.corp.google.com (hpaq5.eem.corp.google.com [172.25.149.5]) by smtp-out.google.com with ESMTP id o6GGbDqb018864 for <oauth@ietf.org>; Fri, 16 Jul 2010 09:37:13 -0700
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1279298233; bh=6yN8/B7CfZzaYpn+Nznti4aFUPE=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type:Content-Transfer-Encoding; b=Qi9F92RvKrSgOxzZgYMecQ5Leu+itxLdslRtBtk3NQpO5kUyhouz4Tw8KEqo4/vMU e+Sg42OzOVINcBP4dG4Vw==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:from:date:message-id: subject:to:cc:content-type:content-transfer-encoding:x-system-of-record; b=iz2XS65Su/5WmGuwawIon5PY3ShE2HT/Kg7vFANQow7cuIxaaMMMrmcZgMyySF2u5 gVwqbot1GEHYyn7D4UAoA==
Received: from gxk22 (gxk22.prod.google.com [10.202.11.22]) by hpaq5.eem.corp.google.com with ESMTP id o6GGaH6l015945 for <oauth@ietf.org>; Fri, 16 Jul 2010 09:37:12 -0700
Received: by gxk22 with SMTP id 22so1338635gxk.25 for <oauth@ietf.org>; Fri, 16 Jul 2010 09:37:12 -0700 (PDT)
Received: by 10.101.59.14 with SMTP id m14mr1570695ank.127.1279298231860; Fri, 16 Jul 2010 09:37:11 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.100.93.3 with HTTP; Fri, 16 Jul 2010 09:36:51 -0700 (PDT)
In-Reply-To: <012AB2B223CB3F4BB846962876F47217059B6D0A@SNV-EXVS08.ds.corp.yahoo.com>
References: <4C2C6D4A.5010401@cdatazone.org> <012AB2B223CB3F4BB846962876F47217059B693B@SNV-EXVS08.ds.corp.yahoo.com> <90C41DD21FB7C64BB94121FBBC2E72343B3ED4C454@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTikjW5OqYJIzwxrooAmHoWR5tNX1522TTBLH5rBT@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343B3ED4C475@P3PW5EX1MB01.EX1.SECURESERVER.NET> <AANLkTilTDOVNjJw9K0ZismTzbbNeuVcEBktE-8ojDfVR@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E72343B3ED4C515@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4C2DC7C5.2090009@cdatazone.org> <90C41DD21FB7C64BB94121FBBC2E72343B3ED4C623@P3PW5EX1MB01.EX1.SECURESERVER.NET> <4C2F108B.70504@cdatazone.org> <AANLkTilr38Y0TrUhks2_djJiAzZIcagMMy_Her-5h3Xn@mail.gmail.com> <20100708110542.150740@gmx.net> <AANLkTikYgB9ykpnOLaznz21QbOEApJ2SfXX9NOclk6Wt@mail.gmail.com> <4C3707BD.6070201@gmx.de> <AANLkTimOvB2hS6jOKldNlZyLNDlsAes48VuJPL46Ct3m@mail.gmail.com> <4C3E05EE.4050903@cdatazone.org> <AANLkTilI5vli9Nk7Xh6KbEXxgj6SICaAO9NRrndTlrmF@mail.gmail.com> <4C402772.1020601@cdatazone.org> <012AB2B223CB3F4BB846962876F47217059B6D0A@SNV-EXVS08.ds.corp.yahoo.com>
From: Marius Scurtescu <mscurtescu@google.com>
Date: Fri, 16 Jul 2010 09:36:51 -0700
Message-ID: <AANLkTikSlyQ_L54gloxgeoW_7676WTpkLk3F0M-qkpJE@mail.gmail.com>
To: William Mills <wmills@yahoo-inc.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Versioning
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Jul 2010 16:37:04 -0000

On Fri, Jul 16, 2010 at 9:13 AM, William Mills <wmills@yahoo-inc.com> wrote:
> For token migration from Oauth 1 to 2 are we ever really going to need
> to do that silently for a user in a client?  It's reasonable when the
> user gets a new client install that supports a new protocol for them to
> have to re-authenticate.  Where I see this happening is in a big server
> migration where you're integrating with somone like Google IMAP and you
> already have a huge store of tokens for IMAP and you want yo convert to
> Oauth 2 but you don't want to prompt all your users.
>
> Do I have this right?

I think so.

I don't think we have to decide if silent upgrade should always be
used or not, just that it is a valid option.

Marius


>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org]
>> On Behalf Of Rob Richards
>> Sent: Friday, July 16, 2010 2:34 AM
>> To: Marius Scurtescu
>> Cc: oauth@ietf.org
>> Subject: Re: [OAUTH-WG] Versioning
>>
>>
>>   On 7/14/10 6:33 PM, Marius Scurtescu wrote:
>> > On Wed, Jul 14, 2010 at 11:46 AM, Rob
>> Richards<rrichards@cdatazone.org>  wrote:
>> >> Finally getting a chance to catchup and respond to this thread.
>> >>
>> >> Marius Scurtescu wrote:
>> >>> See comments bellow...
>> >>>
>> >>>
>> >>> On Fri, Jul 9, 2010 at 4:27 AM, Stefanie
>> Dronia<sDronia@gmx.de>  wrote:
>> >>>
>> >>>> Hallo Marius,
>> >>>>
>> >>>> thanks for your statement.
>> >>>> Your idea of a migration flow is quite good and necessary.
>> >>>>
>> >>>> But I still doubt, if the work and effort should be
>> investigated to
>> >>>> spare the user from some interaction (authentication and
>> user consent).
>> >>>>
>> >>> It all depends for how many users does the client have
>> OAuth 1 tokens.
>> >>> Asking users to re-approve will confuse them and I guess
>> many will
>> >>> not do it,
>> >>>
>> >> I think the user should not be excluded from this interaction and
>> >> should be required to re-approve. IMO they should be
>> involved as its
>> >> also informational to know that the client they have previously
>> >> authorized is now requesting new credentials under a different
>> >> security scheme. The user should be the one to decide
>> whether or not they want to allow this.
>> > Why would you re-prompt the user? The only thing that
>> really changes
>> > is the underlying protocol, something most end users are not made
>> > aware of. How would the new approval page be any different from the
>> > initial one? The user granted a client access to some of its
>> > resources, that stays the same. If the authorization server
>> makes it
>> > explicit on the approval page that OAuth 1 is used, then yes, a
>> > re-approval is needed, but I don't think this normally happens.
>> >
>> >
>> >> When it comes right down to it the only concrete thing I
>> can think of
>> >> when migrating from 1.0 to 2.0 is the need to determine
>> which version
>> >> is being used at the resource endpoint. For most clients
>> moving from
>> >> 1.0 to 2.0 they will most likely just create the next version of
>> >> their client/app with 2.0 support and completely drop 1.0 support
>> >> rather than going through any migration flow.
>> > That depends on the client. If the client is a web site that has
>> > several thousand users, and it stores OAuth 1 access tokens for all
>> > these users, then migration totally makes sense. If the
>> client is an
>> > iPhone app with only one user, then maybe you are right.
>> Even in this
>> > case, I am sure the app would prefer not to annoy the user and just
>> > silently move to OAuth 2. If you are the app developer and your app
>> > has a large install base, would you risk losing even a small
>> > percentage of those users simply because you presented them with a
>> > confusing approval page?
>> >
>> >
>> >
>> As a user I would say yes, I want to be re-prompted or at
>> least explicitly request the migration of my tokens rather
>> than having something done silently, behind the scenes and
>> unbeknownst to me. The underlying protocol has changed,
>> whether or not I know it, and for all purposes could be the
>> most insure protocol out there. When something this
>> fundamental changes, I would want to have to re-authorize the
>> application because I could just as easily at this point decline.
>> Perhaps I went and read the changelog, the change was made
>> known on the site, or someone discovered the change and made
>> it public. As you can probably tell I lean way more towards
>> the side of the user and personally think it is more
>> responsible of the app or web site in question here to
>> require the re-authorization and risk losing some users (if
>> that is the case then clearly the application is not worth
>> the users time in the first place) than to silently change
>> the protocol on me.
>>
>> Rob
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>