On 21 June 2010 16:33, Nat Sakimura <sakim...@gmail.com> wrote:
> On Mon, Jun 21, 2010 at 10:26 PM, Ben Laurie <b...@google.com> wrote:
>> On 21 June 2010 14:22, Nat Sakimura <sakim...@gmail.com> wrote:
>>> Hi Dirk,
>>>
>>> In addition to Ben's questions, I have another. For X.509, you seem to
>>> be using DER. How do you express the entire certificate chain using
>>> DER?
>>> (With PEM, you can just concatenate ... )
>>
>> With DER you can concatenate, too, of course. There's also PKCS#n (for
>> some value of n which I forget ... 12?) which allows bundling of cert
>> chains.
>
> That's PKCS#12, I suppose. I had under an impression that PKCS#12 includes the
> private key, though.

Doesn't have to, though admittedly it isn't quite designed for this
application. Presumably if we went down this route we'd have do no
encryption and a well-known "secret" for the HMAC key.

>
>>
>>>
>>> And here is some comments:
>>>
>>> If body_hash is not used, it seems it is just doing the client
>>> authentication via asymmetric crypto.
>>> This is a valid use case, and actually is quite nice. I think this is
>>> the main use case.
>>>
>>> If we wanted to make sure that the request itself is not tampered, we
>>> need to sign the body.
>>> For this, I somehow feel that Magic Signatures is more interoperable
>>> since it actually sends the armored ASCII strings with it.
>>>
>>> =nat
>>>
>>>
>>>
>>> On Mon, Jun 21, 2010 at 8:18 PM, Ben Laurie <b...@google.com> wrote:
>>>> On 21 June 2010 08:04, Dirk Balfanz <balf...@google.com> wrote:
>>>>> Hi guys,
>>>>> I think I owe the list a proposal for signatures.
>>>>> I wrote something down that liberally borrows ideas from Magic Signatures,
>>>>> SWT, and (even the name from) JSON Web Tokens.
>>>>> Here is a short document (called "JSON Tokens") that just explains how to
>>>>> sign something and verify the signature:
>>>>> http://docs.google.com/document/pub?id=1kv6Oz_HRnWa0DaJx_SQ5Qlk_yqs_7zNAm75-FmKwNo4
>>>>
>>>> "signature is a base64-encoded string of the signature bits." should
>>>> be websafe-base64?
>>>>
>>>> "the current time is not after the expiration time of the token
>>>> (defined as not_before + session_length)" should be not_before +
>>>> token_lifetime, right? But I'd prefer a not_after instead.
>>>>
>>>> What is a Service Descriptor? Is this something to do with webfinger,
>>>> or something else?
>>>>
>>>> In the HMAC keys section you describe the keys as symmetric, which is
>>>> strictly accurate, but more normally called shared keys for this use.
>>>>
>>>> Obviously you'll need to be a bit more specific about what you mean by
>>>> "RSA-SHA256".
>>>>
>>>>> Here is an extension of JSON Tokens that can be used for signed OAuth
>>>>> tokens:
>>>>> http://docs.google.com/document/pub?id=1JUn3Twd9nXwFDgi-fTKl-unDG_ndyowTZW8OWX9HOUU
>>>>
>>>> As you know, I hate the term "non-repudation". Can't you just call it 
>>>> "signing"?
>>>>
>>>> "Protection against leaked authentication tokens: Protocols such as
>>>> OAuth2 use bearer tokens, which may leak when used over non-SSL.
>>>> Signing requests when using bearer tokens lets the recipient of such a
>>>> request verify that the issuer of the request was a legitimate holder
>>>> of the bearer token." - only true if you make the checking of the
>>>> nonce a MUST instead of "may". And even then, MitM wins, of course.
>>>>
>>>> Why is body_hash optional?
>>>>
>>>>> Here is a different extension of JSON Tokens that can be used for 2-legged
>>>>> flows. The idea is that this could be used as a drop-in replacement for 
>>>>> SAML
>>>>> assertions in the OAuth2 assertion flow:
>>>>> http://docs.google.com/document/pub?id=1s4kjRS9P0frG0ulhgP3He01ONlxeTwkFQV_pCoOowzc
>>>>
>>>> You use the abbreviation AS before the full name Authorization Server.
>>>>
>>>>> I also have started to write some code to implement this as a> 
>>>>> proof-of-concept.
>>>>>
>>>>> Thoughts? Comments?
>>>>
>>>> Nice.
>>>>
>>>>> Dirk.
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>
>>>
>>>
>>> --
>>> Nat Sakimura (=nat)
>>> http://www.sakimura.org/en/
>>> http://twitter.com/_nat_en
>>>
>>
>
>
>
> --
> Nat Sakimura (=nat)
> http://www.sakimura.org/en/
> http://twitter.com/_nat_en
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to