Re: [OAUTH-WG] AD review of -22

William Mills <wmills@yahoo-inc.com> Thu, 03 November 2011 17:24 UTC

Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D1051F0C85 for <oauth@ietfa.amsl.com>; Thu, 3 Nov 2011 10:24:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.338
X-Spam-Level:
X-Spam-Status: No, score=-17.338 tagged_above=-999 required=5 tests=[AWL=0.260, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8DIaIRYuD9lR for <oauth@ietfa.amsl.com>; Thu, 3 Nov 2011 10:24:17 -0700 (PDT)
Received: from nm15.bullet.mail.sp2.yahoo.com (nm15.bullet.mail.sp2.yahoo.com [98.139.91.85]) by ietfa.amsl.com (Postfix) with SMTP id 43DD11F0C81 for <oauth@ietf.org>; Thu, 3 Nov 2011 10:24:17 -0700 (PDT)
Received: from [98.139.91.66] by nm15.bullet.mail.sp2.yahoo.com with NNFMP; 03 Nov 2011 17:24:17 -0000
Received: from [98.139.91.46] by tm6.bullet.mail.sp2.yahoo.com with NNFMP; 03 Nov 2011 17:24:17 -0000
Received: from [127.0.0.1] by omp1046.mail.sp2.yahoo.com with NNFMP; 03 Nov 2011 17:24:17 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 135169.20787.bm@omp1046.mail.sp2.yahoo.com
Received: (qmail 33099 invoked by uid 60001); 3 Nov 2011 17:24:16 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1320341056; bh=5lGHVZuikJZBehzyT4ecPOwMsRnNi/Z7N7etKexa16g=; h=X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=WkyGbbCrXNUMUROL4xnBO3vRYZCvdgAqNEPZ/GLucAZwwg8OR3xF9pxF/Mpg+m/d+kA8NyWsWowa/r7COPhbeaTHxC8eLPdqcgBe4L6crfU5sJSqKSsGDmK1VkK3gXRDbqz499bQZ9+wDVvpT9xPMDUIeiE1+G/a2uV1SdE7i8w=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=RbiDHmrrzWxt7YS/n1ylsyIEq5IARKTK8YiHdWSmt/uCvblV5POQHcR5C5R1sjxIVPmfUuGYV01n7S6EmdfOmcFCf0dBXXNDLGFGhj/D6KTJA6moH1wk9qEQv4Vfl7qiDTOtvVsyNvQE0I1NcZDx5jxUMGf0l0fmSQDThkhcaEU=;
X-YMail-OSG: eRjtarEVM1kakjbZpX5WPacy80v9m17XL.v1ME.iYtSuDwS 0gTzZtE3JDVY7W_6dYoBCj5NJTUs8PuTVcBhrb2mtigwCvDhDR.TlaLUcQA7 _xH6pRu780FJE0D2.iKn8aypuROKtItDMNA1YmfOahJca2SNba1AOEE_TJxY cwK7WFTQEMjHmMUhJGMAIkASo_yJW0Wl6riN_T.zJeIH.ZO7nz5tCq7T0U7D lU2Idxywy5wNtfAWK_ALRGAiKL0MaUQGIqyeHc2hO_u338BIsjk5qEAfCMq8 tpKbAUEHXKYfxlmXTZUtqRmQExmC4RSNCP8ur8s9J0y0r6LjDnDdJNcSsqOq si1MQbWyrD2GwosuIAkP4EC86860xXwLHV8WF5TK3wv2wAMf1SyOkEH1_FaZ Y6fOk1OcmU3PZk7CCcobVpmKcZ799Dqk5Z1RwpoNwut.VCy8ceLn9oG_cLx9 LENJtk7P5.rj0w9fL7XYhAr6jFh_Vl6hGeCfWM9sF8VP_FUbPNGS5UUw-
Received: from [209.131.62.113] by web31803.mail.mud.yahoo.com via HTTP; Thu, 03 Nov 2011 10:24:16 PDT
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.115.325013
References: <4E971C36.7050000@cs.tcd.ie> <4EB19DD1.6050904@lodderstedt.net> , <5E3E5DFE-C122-4D89-9578-61A6C16EBD76@ve7jtb.com> <90C41DD21FB7C64BB94121FBBC2E72345263321025@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1320274139.8042.YahooMailNeo@web31809.mail.mud.yahoo.com> <1320324374.15549.29.camel@ground> <90C41DD21FB7C64BB94121FBBC2E72345263403444@P3PW5EX1MB01.EX1.SECURESERVER.NET> <5C0A54C3-5273-4E44-8870-6D42F3523330@oracle.com>
Message-ID: <1320341056.29651.YahooMailNeo@web31803.mail.mud.yahoo.com>
Date: Thu, 03 Nov 2011 10:24:16 -0700
From: William Mills <wmills@yahoo-inc.com>
To: Phil Hunt <phil.hunt@oracle.com>, Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <5C0A54C3-5273-4E44-8870-6D42F3523330@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1502656925-1163938373-1320341056=:29651"
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] AD review of -22
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Nov 2011 17:24:18 -0000

At this point in the process I think it would be better to add that to the threat model draft.  It would be appropriate to add it in the core spec, but not a good idea now that it's deep into the last call?



________________________________
From: Phil Hunt <phil.hunt@oracle.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Cc: Justin Richer <jricher@mitre.org>; William Mills <wmills@yahoo-inc.com>; "oauth@ietf.org" <oauth@ietf.org>
Sent: Thursday, November 3, 2011 9:47 AM
Subject: Re: [OAUTH-WG] AD review of -22

+1

I note that RFCs 2616 & 2617 only reference each other. There is no MTI text. It just references them.

It may be reasonable to observe that there are two classes of tokens Bearer, where the client treats token as opaque to return to server at appropriate times, and client-proof tokens such as MAC where the client must do something to prove possession with the objective that an attacker sniffing a client's authentication header (due to non-ssl communication) could not become or masquerade as the client.

Do we need an analogue to the bearer spec that lays foundations for the class of tokens that MAC fits into?  Or should the bearer spec be modified to explain the two classes of tokens?

If we had both, then we could set this up much like HTTP 1.1 does with RFC 2617.

Phil

@independentid
www.independentid.com
phil.hunt@oracle.com





On 2011-11-03, at 9:25 AM, Eran Hammer-Lahav wrote:

> It can help by telling servers that as long as they support one of the MTI types, they will be able to interop. Of course, they don't have to.
> 
> My feeling is that until there is an actual discovery experience out there that works, this kind of interop is not really an issue ATM.
> 
> EHL
> 
>> -----Original Message-----
>> From: Justin Richer [mailto:jricher@mitre.org]
>> Sent: Thursday, November 03, 2011 5:46 AM
>> To: William Mills
>> Cc: Eran Hammer-Lahav; John Bradley; Torsten Lodderstedt; oauth@ietf.org
>> Subject: Re: [OAUTH-WG] AD review of -22
>> 
>> This is exactly what I was thinking of. If a given token type is MTI for clients,
>> but servers can do whatever they want (this, as I read it, is what was
>> suggested), how does the MTI bit help interop at all?
>> 
>> -- Justin
>> 
>> On Wed, 2011-11-02 at 15:48 -0700, William Mills wrote:
>>> I actually think the protected resource specifies the token type(s) in
>>> either it's service docs or discovery information, and it does know
>>> knowing it's authentication server will issue compatible tokens.  The
>>> client may encounter endpoints requiring token types it doesn't
>>> support, and it needs to fail gracefully.  The client may select any
>>> supported OAuth 2 scheme it understands which the PR supports.
>>> 
>>> 
>>> 
>>> I am not in favor of specifying MUST for any particular flavor of
>>> token.
>>> 
>>> 
>>> What is the value of mandating a token type?
>>> 
>>> 
>>> 
>>> -bill
>>> 
>>> 
>>> 
>>> 
>>> 
>> __________________________________________________________
>> ____________
>>> From: Eran Hammer-Lahav <eran@hueniverse.com>
>>> To: John Bradley <ve7jtb@ve7jtb.com>; Torsten Lodderstedt
>>> <torsten@lodderstedt.net>
>>> Cc: "oauth@ietf.org" <oauth@ietf.org>
>>> Sent: Wednesday, November 2, 2011 1:11 PM
>>> Subject: Re: [OAUTH-WG] AD review of -22
>>> 
>>> Do you want to see no change or adjust it to client must implement
>>> both, server decides which to use.
>>> 
>>> EHL
>>> 
>>> 
>>> 
>> __________________________________________________________
>> ____________
>>> From: oauth-bounces@ietf.org [oauth-bounces@ietf.org] On Behalf Of
>>> John Bradley [ve7jtb@ve7jtb.com]
>>> Sent: Wednesday, November 02, 2011 1:06 PM
>>> To: Torsten Lodderstedt
>>> Cc: oauth@ietf.org
>>> Subject: Re: [OAUTH-WG] AD review of -22
>>> 
>>> 
>>> 
>>> +1
>>> On 2011-11-02, at 4:45 PM, Torsten Lodderstedt wrote:
>>> 
>>>> Hi Stephen,
>>>> 
>>>> I'm concerned about your proposal (7) to make support for MAC a MUST
>>>> for clients and BEARER a MAY only. In my opinion, this does not
>>>> reflect the group's consensus. Beside this, the security threat
>>>> analysis justifies usage of BEARER for nearly all use cases as long
>>>> as HTTPS (incl. server authentication) can be utilized.
>>>> regards,
>>>> Torsten.
>>>> 
>>>> Am 13.10.2011 19:13, schrieb Stephen Farrell:
>>>>> 
>>>>> Hi all,
>>>>> 
>>>>> Sorry for having been quite slow with this, but I had a bunch of
>>>>> travel recently.
>>>>> 
>>>>> Anyway, my AD comments on -22 are attached. I think that the first
>>>>> list has the ones that need some change before we push this out
>>>>> for IETF LC, there might or might not be something to change as a
>>>>> result of the 2nd list of questions and the rest are really nits
>>>>> can be handled either now or later.
>>>>> 
>>>>> Thanks for all your work on this so far - its nearly there IMO and
>>>>> we should be able to get the IETF LC started once these few things
>>>>> are dealt with.
>>>>> 
>>>>> Cheers,
>>>>> S.
>>>>> 
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth