Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
Justin Richer <jricher@mitre.org> Thu, 14 February 2013 19:25 UTC
Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4B2321F88CC for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 11:25:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.571
X-Spam-Level:
X-Spam-Status: No, score=-6.571 tagged_above=-999 required=5 tests=[AWL=0.028, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0Lo3Yg-Qm8TQ for <oauth@ietfa.amsl.com>; Thu, 14 Feb 2013 11:25:20 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id ACF6A21F86AD for <oauth@ietf.org>; Thu, 14 Feb 2013 11:25:17 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 1E37E1F05EF; Thu, 14 Feb 2013 14:25:17 -0500 (EST)
Received: from IMCCAS02.MITRE.ORG (imccas02.mitre.org [129.83.29.79]) by smtpksrv1.mitre.org (Postfix) with ESMTP id EDF0B1F0254; Thu, 14 Feb 2013 14:25:16 -0500 (EST)
Received: from [10.146.15.29] (129.83.31.58) by IMCCAS02.MITRE.ORG (129.83.29.79) with Microsoft SMTP Server (TLS) id 14.2.318.4; Thu, 14 Feb 2013 14:25:16 -0500
Message-ID: <511D39EF.8010403@mitre.org>
Date: Thu, 14 Feb 2013 14:24:31 -0500
From: Justin Richer <jricher@mitre.org>
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130106 Thunderbird/17.0.2
MIME-Version: 1.0
To: Prateek Mishra <prateek.mishra@oracle.com>
References: <0573984A-8C11-4960-9BC6-F44D4B664C19@gmx.net> <511BBBAC.9060502@oracle.com> <0DF3F088-7F15-4C0F-85C4-35DE80CB01E0@gmx.net> <511CEDFB.6010908@mitre.org> <511D3919.4090906@oracle.com>
In-Reply-To: <511D3919.4090906@oracle.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Originating-IP: [129.83.31.58]
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Minutes from the OAuth Design Team Conference Call - 11th February 2013
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2013 19:25:26 -0000
Prateek, My point was that a public client could very easily and safely be issued a secret in the form of an OAuth token. This includes any type of signing key that the MAC/etc token would want to use. What public client's can't have are configuration-time keys, like a client_secret. It's important to not conflate the two. -- Justin On 02/14/2013 02:20 PM, Prateek Mishra wrote: > Justin - my comment was scoped to *key distribution* - not to the > general use of public clients. > > I was wondering how one can distribute keys or have key agreement > between an AS and a client, if there is no existing trust relationship > between them. Maybe there is some > clever crypto way of achieving this, but I personally dont understand > how this might happen. > > - prateek > >> >>>> 2) Regarding (symmetric) key distribution, dont we need some kind >>>> of existing trust relationship between the client and AS to make >>>> this possible? I guess it >>>> would be enough to require use of a "confidential" client, that >>>> would make it possible for the two parties to agree on a session >>>> key at the point where an access token >>>> is issued by the AS. >>> That's a very good question. I have not formed an option about this >>> issue yet particularly given the recent capability to dynamically >>> register clients. >> >> I don't think that signing tokens should require confidential >> clients. This was one of the implementation issues with OAuth 1, as >> it required a "consumer_secret" at all times. This led to Google >> telling people to use "anonymous" as the "consumer_secret" for what >> were effectively public clients. Even with dynamic registration, >> there's still a place for public clients, in my opinion. >> >
- [OAUTH-WG] Minutes from the OAuth Design Team Con… Hannes Tschofenig
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Hannes Tschofenig
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Antonio Sanso
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Sergey Beryozkin
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Hannes Tschofenig
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Antonio Sanso
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… John Bradley
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Phil Hunt
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Justin Richer
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Prateek Mishra
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Hannes Tschofenig
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Justin Richer
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Prateek Mishra
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Prateek Mishra
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Justin Richer
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Mike Jones
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Torsten Lodderstedt
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Torsten Lodderstedt
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… John Bradley
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Prateek Mishra
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Phil Hunt
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Sergey Beryozkin
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Tim Bray
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Justin Richer
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Phil Hunt
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Richer, Justin P.
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Sergey Beryozkin
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Phil Hunt
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… zhou.sujing
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… William Mills
- Re: [OAUTH-WG] Minutes from the OAuth Design Team… Sergey Beryozkin