In my write-up, I'm saying that if you provide the shared key and you don't
care about rotating it, then the verifier can ignore the key_id (the issuer
would presumable not include the key_id). Same for public keys - if you
upload them out of band and you don't think you'll ever change them, then
the key_id is not necessary. I would argue that either of those practices is
not advisable (despite the fact that we've all been doing it for OAuth 1),
so I think the key_id is useful.

Dirk.

On Tue, Jun 22, 2010 at 1:45 PM, David Recordon <record...@gmail.com> wrote:

> Hey Dick, in answering my questions you made my point. If keys are
> managed out of band – as is done in OAuth 1.0 and what was done in the
> OAuth 2.0 Core spec until signatures were extracted – then having a
> key id is not needed. I certainly understand what they're used for,
> but don't find them relevant as part of the OAuth conversation today.
>
> And yes, Applied Cryptography is worth reading. :)
>
> --David
>
>
> On Tue, Jun 22, 2010 at 12:59 PM, Dick Hardt <dick.ha...@gmail.com> wrote:
> > David
> > key_ids are used when you need to identify which key to use of all the
> keys
> > you might have. If you are doing discovery of document that is bound to
> the
> > identifier of the signer, this is useful. Since OAuth 1.0 did not have
> > discovery and required an out of band key management process, key_ids
> have
> > little value.
> > To answer your question, key_ids dont' make sense if the keys are being
> > managed how you describe them. I would suggest that key_ids are not
> included
> > if public keys are managed independent from how Dirk had described them
> be
> > discovered.
> > I don't think key_ids make sense for shared secrets as they inherently
> have
> > an out of band process for sharing them.
> > If you would like to learn more about cryptography, I have found Bruce
> > Schneier's book Applied Cryptography to be pretty educational. Here is a
> > link to the Kindle version:
> >
> http://www.amazon.com/Applied-Cryptography-Protocols-Algorithms-ebook/dp/B000SEHPK6/ref=kinw_dp_ke?ie=UTF8&m=AG56TWVU5XWC2&qid=1277236054&sr=8-1
> > -- Dick
> >
> > On Tue, Jun 22, 2010 at 12:20 PM, David Recordon <record...@gmail.com>
> > wrote:
> >>
> >> All of the OAuth 1.0 implementations which I'm aware of either have
> >> the server provide a shared secret to the client or the client upload
> >> their public key to the server.
> >>
> >> In the case of the server providing a shared secret to the client,
> >> what would the value of key_id be?
> >>
> >> In the case of a client uploading their public key to the server, what
> >> would the value of key_id be?
> >>
> >> Thanks,
> >> --David
> >>
> >>
> >> On Tue, Jun 22, 2010 at 12:14 PM, Dick Hardt <dick.ha...@gmail.com>
> wrote:
> >> > I could imagine an architecture striving to be efficient, scalable,
> >> > distributed and secure where there are hundreds of servers each with a
> >> > unique private key baked into each server. All the public keys would
> be
> >> > in
> >> > one file.
> >> > Having a key id would help debugging as well as the signer is clearly
> >> > indicating which key should be used. If the signing fails, it could be
> >> > the
> >> > key, could be signature calculation, could be ...
> >> >
> >> > The downside of having a key_id seems heavily outweighed by the
> >> > advantages
> >> > to me.
> >> > On Tue, Jun 22, 2010 at 10:30 AM, Anthony Nadalin
> >> > <tony...@microsoft.com>
> >> > wrote:
> >> >>
> >> >> > If a server needs to verify, it can literally iterate over all of
> the
> >> >> > keys associated with the client until it finds the right one.
> >> >>
> >> >> Depends on how the server stored the keys, this can be a very
> expensive
> >> >> operation w/o a key_id to match/index on
> >> >>
> >> >> -----Original Message-----
> >> >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On
> Behalf
> >> >> Of
> >> >> Brian Eaton
> >> >> Sent: Tuesday, June 22, 2010 9:43 AM
> >> >> To: Dick Hardt; hannes.tschofe...@gmx.net
> >> >> Cc: OAuth WG
> >> >> Subject: Re: [OAUTH-WG] proposal for signatures
> >> >>
> >> >> On Tue, Jun 22, 2010 at 7:17 AM, Dick Hardt <dick.ha...@gmail.com>
> >> >> wrote:
> >> >> >> Thanks for writing this. A few questions...
> >> >> >>
> >> >> >> Do we need both `issuer` and `key_id`? Shouldn't we use
> `client_id`
> >> >> >> instead at least for OAuth?
> >> >> >
> >> >> > it is the ID of the key, not the client -- used to rollover keys
> >> >>
> >> >> I don't think key id is necessary, but adding Hannes since he called
> me
> >> >> crazy for saying that at IIW. =)
> >> >>
> >> >> The average client is going to have very few keys.  Probably just 1.
> >> >> 3 at the outside.
> >> >>
> >> >> If a server needs to verify, it can literally iterate over all of the
> >> >> keys
> >> >> associated with the client until it finds the right one.
> >> >>
> >> >> There is some precedent for this approach:
> >> >> http://support.microsoft.com/kb/906305/en-us.
> >> >>
> >> >> Cheers,
> >> >> Brian
> >> >> _______________________________________________
> >> >> OAuth mailing list
> >> >> OAuth@ietf.org
> >> >> https://www.ietf.org/mailman/listinfo/oauth
> >> >>
> >> >
> >> >
> >> > _______________________________________________
> >> > OAuth mailing list
> >> > OAuth@ietf.org
> >> > https://www.ietf.org/mailman/listinfo/oauth
> >> >
> >> >
> >
> >
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to