Re: [OAUTH-WG] signatures, v2

Nat Sakimura <sakimura@gmail.com> Wed, 21 July 2010 08:50 UTC

Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2E8E53A67BD for <oauth@core3.amsl.com>; Wed, 21 Jul 2010 01:50:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5XgROTj8Zg1c for <oauth@core3.amsl.com>; Wed, 21 Jul 2010 01:50:10 -0700 (PDT)
Received: from mail-iw0-f172.google.com (mail-iw0-f172.google.com [209.85.214.172]) by core3.amsl.com (Postfix) with ESMTP id 05F453A6855 for <oauth@ietf.org>; Wed, 21 Jul 2010 01:50:09 -0700 (PDT)
Received: by iwn38 with SMTP id 38so7310358iwn.31 for <oauth@ietf.org>; Wed, 21 Jul 2010 01:50:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=DL5z8uTUZotPHy5bp13rldqcXTwj2yM4AgP89F1U5Dc=; b=UNdQ32q0I6bGKckce9S8JO4L4nfgPcjuikJAcZCR5bczE2+UUvgyYzlaE1ZGpcnivA 7mrLKIn0LUk/6Oq9MWkIpTDcCrw34Cq0wd8i6cMj9yO9cPvpmszIi12No1poWs+CKuYe Q4CONcpXXWnVsnMD2NbPp35HNw1vghsrU12rM=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=mJNIX3GV6Ja1/RsAISs0i8FT+cxCOdLKi7lZQvhItB7KJq1cXhUH9hTB6PzOuije/z InRP6xx4UCtvPUSqB52fv1ymM19XOOTNdRKeQGxBm8OLUmK66v/lGeVqd5/h5U2FGTo3 UaHaS3yWc/RuhIOMGx903V3Bf5sfr3Orz/Quw=
MIME-Version: 1.0
Received: by 10.231.182.204 with SMTP id cd12mr9229284ibb.101.1279702225939; Wed, 21 Jul 2010 01:50:25 -0700 (PDT)
Received: by 10.231.158.67 with HTTP; Wed, 21 Jul 2010 01:50:25 -0700 (PDT)
In-Reply-To: <AANLkTiks+y2gUFB1L1qnDnOxmAmiAVmHukSXwXQZu3AU@mail.gmail.com>
References: <AANLkTim7pvrLnQtz4WnDvYVRv0jbWgk3j8uMJj07CsM1@mail.gmail.com> <4C431BA3.2000907@lodderstedt.net> <AANLkTilBFabSRsxshSuBbzbYqwv7MzPbMq-fUBShjX9L@mail.gmail.com> <AANLkTiks+y2gUFB1L1qnDnOxmAmiAVmHukSXwXQZu3AU@mail.gmail.com>
Date: Wed, 21 Jul 2010 17:50:25 +0900
Message-ID: <AANLkTinsk_ZTX8Ugs0SEF1Amzgc-ko+8R_T94cV+JrpE@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Dirk Balfanz <balfanz@google.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] signatures, v2
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Jul 2010 08:50:11 -0000

On Wed, Jul 21, 2010 at 5:26 PM, Nat Sakimura <sakimura@gmail.com> wrote:
> Hi Dirk,
>
> Inline:
>
> On Tue, Jul 20, 2010 at 9:22 AM, Dirk Balfanz <balfanz@google.com> wrote:
>>
>>
>> On Sun, Jul 18, 2010 at 8:20 AM, Torsten Lodderstedt
>> <torsten@lodderstedt.net> wrote:
>>>
>>> Hi Dirk,
>>>
>>> I have some questions concerning your proposal:
>>>
>>> - As far as I understand, the difference to "magic signatures" lays in the
>>> usage of a JSON token carrying issuer, not_before, not_after and audience.
>>> While such properties are important for security tokens (assertions), I
>>> cannot see an advantage of using this format for signatures of HTTP
>>> requests. Would you please explain?
>>
>> You mean advantage over magic signatures? It's really a similar idea - it's
>> just that magic signatures as is don't quite fit the bill. For example, they
>> have newlines in
>> them: http://salmon-protocol.googlecode.com/svn/trunk/draft-panzer-magicsig-00.html#anchor5
>
> Well, they MAY, but they do not have to. Would not profiling Magic
> Signatures so that it does not contain newlines do?
>

e.g., base64url_encode(magic_sig_envelope).

Downside of course is that it is one more base64url_encode.
I really do not have much preference of one over another, but I have
some preference on the convergence of the two.

-- 
Nat Sakimura (=nat)
http://www.sakimura.org/en/
http://twitter.com/_nat_en