Re: [OAUTH-WG] 'Scope' parameter proposal

John Kemp <john@jkemp.net> Thu, 22 April 2010 19:26 UTC

Return-Path: <john@jkemp.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A04B03A68CC for <oauth@core3.amsl.com>; Thu, 22 Apr 2010 12:26:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.333, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O7j6OLP-F0YJ for <oauth@core3.amsl.com>; Thu, 22 Apr 2010 12:26:25 -0700 (PDT)
Received: from outbound-mail-01.bluehost.com (cpoproxy1-pub.bluehost.com [69.89.21.11]) by core3.amsl.com (Postfix) with SMTP id 959343A684A for <oauth@ietf.org>; Thu, 22 Apr 2010 12:10:07 -0700 (PDT)
Received: (qmail 22899 invoked by uid 0); 22 Apr 2010 19:09:57 -0000
Received: from unknown (HELO box320.bluehost.com) (69.89.31.120) by cpoproxy1.bluehost.com with SMTP; 22 Apr 2010 19:09:57 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=jkemp.net; h=Received:Subject:Mime-Version:Content-Type:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-Identified-User; b=c6tGGy7dtBwk2WjDOwq/YC8sD7mzu29Je0iEKGaa1s5VRlHFK2mg9/fgEey/3ujQ5LP5MrkRtXSWioBPbp6k0/AY8HP1ZVI3U7fNRtzCmf7IFD3K0Z6FZPcOKBHlAXCF;
Received: from c-75-69-14-217.hsd1.vt.comcast.net ([75.69.14.217] helo=[192.168.0.64]) by box320.bluehost.com with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.69) (envelope-from <john@jkemp.net>) id 1O51mf-0003k7-7b; Thu, 22 Apr 2010 13:09:57 -0600
Mime-Version: 1.0 (Apple Message framework v1078)
Content-Type: text/plain; charset="us-ascii"
From: John Kemp <john@jkemp.net>
In-Reply-To: <z2wdaf5b9571004221121m611c6a4ay6d636c440bb48d06@mail.gmail.com>
Date: Thu, 22 Apr 2010 15:09:54 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <E4CB27E8-3882-4714-B90F-CCD0F98F3EB3@jkemp.net>
References: <C7F1D1FC.32809%eran@hueniverse.com> <0D5497F5-75A7-4A42-9A5E-9C2310162B18@jkemp.net> <90C41DD21FB7C64BB94121FBBC2E723438E5C7F30A@P3PW5EX1MB01.EX1.SECURESERVER.NET> <g2mdaf5b9571004221036j5d6837f6z4d7959d69a3cbb2b@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723438E5C7FCD4@P3PW5EX1MB01.EX1.SECURESERVER.NET> <z2wdaf5b9571004221121m611c6a4ay6d636c440bb48d06@mail.gmail.com>
To: Brian Eaton <beaton@google.com>
X-Mailer: Apple Mail (2.1078)
X-Identified-User: {1122:box320.bluehost.com:jkempnet:jkemp.net} {sentby:smtp auth 75.69.14.217 authed with john+jkemp.net}
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] 'Scope' parameter proposal
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Apr 2010 19:26:26 -0000

On Apr 22, 2010, at 2:21 PM, Brian Eaton wrote:

> On Thu, Apr 22, 2010 at 11:01 AM, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
>> Rules around realms show this is very tricky but unless we update 2617 (which we
>> are not chartered to do) we are still stuck with realm as a required parameter.
>> One way to avoid this debate is to simply say that clients should use realms to
>> decide when to reuse tokens. It doesn't solve the problem, but it doesn't create a
>> new one either.
> 
> The existing rules for realm are basically same-origin policy.

Well, that's usually true in practice for HTTP BASIC, but looking at RFC2617, realm is really about telling the *user* the necessary credentials to access that resource. So 'realm' is supposed to be user-informative text, and could thus easily be something other than same-origin policy based. In fact the word 'realm' makes 'security realm' spring to mind. I don't think that by definition it excludes "multiple origins". 

>  That
> doesn't actually work for any of the delegated auth solutions that
> OAuth2 is based on, and is meant to replace.  Telling people to use
> realm is terrible, no-good, very-bad advice.

Realm is intended to be information to guide a user on what credentials to use. OAuth is not concerned as such with credentials, it's concerned with authorization tokens. So I agree, we shouldn't use realm for something other than informing the user, should that be necessary. 

> 
> As far as I can tell, the only practical guidance we can give
> developers is "follow the service provider documentation."

Agree.

- johnk

> 
> Cheers,
> Brian
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth