On Tue, Apr 28, 2009 at 2:57 PM, Peter Keane <pjke...@gmail.com> wrote: > > On Tue, Apr 28, 2009 at 7:41 AM, Hubert Le Van Gong <hubert...@gmail.com> > wrote: >> >> I also saw 2 additional ideas that might help >> (and are not necessarily exclusive with the 2 proposals): >> >> (3) Make Request tokens one-time only >> (4) Request that the user logs in at the Consumer before the request >> token request > > Actually, there is no requirement that the Consumer have any notion of > identity, in which case the consumer has no mechanism to sign user in. > The idea here is that you can leverage the the SP's authentication > service as long as you can verify that the u...@sp == u...@consumer. > And the only way to do that is w/ an out-of-band agreement, such as a > PIN that the user gets upon sign-in at the SP and must type in at the > consumer.
So if I understand your use case, in addition to delegated authorization of Consumer to access a resource at SP, OAuth also provides for delegated authentication of the user at the Consumer by the SP? Just trying to get my head around that case... Hubert > > --peter > >> >> Are those off the table? >> I think (3), although potentially difficult to deploy, would significantly >> help. >> Maybe (3) and (4) could be added in the spec as Best Practice or >> Recommendations? >> >> Hubert >> >> >> >> On Sun, Apr 26, 2009 at 7:48 AM, Eran Hammer-Lahav <e...@hueniverse.com> >> wrote: >>> >>> Let's see if we can take a quick break from the discussion and get a sense >>> of where we are. Please answer the questions to follow. >>> >>> --- >>> >>> We have identified 2 solutions listed here: >>> >>> https://oauth.pbwiki.com/OAuth-Session-Fixation-Advisory >>> >>> >>> * Signed Approval URLs >>> >>> This proposal breaks the protocol into two separate flows, one for >>> Consumers capable of launching a browser and accepting callbacks, and >>> another for those who can't. It requires a significant rewrite of the >>> specification because of the way the flow and signature are mixed together >>> in the current Core 1.0 specification. >>> >>> >>> * Signed Callback URLs >>> >>> This proposal makes the callback URL part of the signed request for Request >>> Token (which does not allow an attacker to manipulate it), and adds some >>> unpredictable value to the callback redirection that is needed to get an >>> Access Token. >>> >>> The spec changes include (see quick reference at the bottom): >>> >>> - Move the oauth_callback parameter from 6.2.1 to 6.1.1 >>> - Add a new parameter to 6.2.3 which is needed to make 6.3.1 >>> >>> --- >>> >>> Open questions: >>> >>> 1. Am I missing a completely different alternative? If yes, please create a >>> new wiki page and point to it (if you don't have access ask or email it to >>> someone who does). >>> >>> 2. Given the simplicity of the Signed Callback URLs *specification change*, >>> I would like to instead of asking people which solution they prefer, to ask >>> people if they have a strong objection to using the Signed Callback URLs >>> solution, and if so, to explain why? >>> >>> 3. For the Signed Callback URLs solution, what to call the new parameter >>> returned in 6.2.3? Suggestions so far included: >>> >>> - pin >>> - verifier >>> - chaperon >>> - callback token >>> - callback secret >>> >>> 4. And, should the new parameter be added to 6.3.1 (oauth_token + >>> oauth_something) or replace the value of the oauth_token parameter? >>> >>> The second option basically returns an authorized token which is used with >>> the existing secret from 6.1.2. The benefit of a new parameter is it is >>> easier to follow the protocol. The benefit of reusing oauth_token to make >>> 6.3.1 is that is keeps the signed request consistent with all other signed >>> requests (no new parameters). >>> >>> EHL >>> >>> --- >>> >>> Quick Reference >>> >>> 6.1.1. Consumer Obtains a Request Token >>> 6.1.2. Service Provider Issues an Unauthorized Request Token >>> 6.2.1. Consumer Directs the User to the Service Provider >>> 6.2.2. Service Provider Authenticates the User and Obtains Consent >>> 6.2.3. Service Provider Directs the User Back to the Consumer >>> 6.3.1. Consumer Requests an Access Token >>> 6.3.2. Service Provider Grants an Access Token >>> >>> >>> > >>> >> >> > >> > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "OAuth" group. To post to this group, send email to oauth@googlegroups.com To unsubscribe from this group, send email to oauth+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/oauth?hl=en -~----------~----~----~----~------~----~------~--~---