Am 25.09.2010 04:22, schrieb Eran Hammer-Lahav:
OAuth 2.0 is far from being published as an RFC. I estimate it is at least 6 months away from reaching final IESG approval, if not a year. This is mostly due to a significant effort needed in writing and reviewing the security considerations section which so far has received no attention.

FYI: Mark McGloin and me started to work on the security considerations. We will announce once we have collected and written down enough to share with the WG.

One thing we most likely will come up with is the question how to prevent token phishing and abuse by resource servers.

We already had a discussion about such threat scenarios in the WG when James H. Manger brought up his sites proposal (http://www.ietf.org/mail-archive/web/oauth/current/msg02343.html, detailed threat description in http://www.ietf.org/mail-archive/web/oauth/current/msg02366.html). Up to now, we don't have a solution in the draft.

A simple signature mechanism just for this purpose (not for client authentication, message integrity nor token/assertion integrity protection) is one option, James's proposal would be another. Since a lot of running code is out there for OAuth 1.0a signature, I'm fine with John's proposal. I would just recommend to drop the client secret from the signature calculation because not all clients will have a secret and making client secrets avalailable to resource servers causes other (scalability and security) problems. Using such a mechanism in combination with HTTPS should suffice.

In my perception from IETF 78, a lot of IETF people assess OAuth to fall back behind established IETF authentication & authorization protocols like Kerberos in terms of security. As far as I remember people were nearly shocked at the WG meeting to read the transmission of tokens (== credentials) over a secure channel is just a SHOULD and not a MUST. Moreover, the potential for token abuse became apparent instantely. In my opinion, we should work towards security improvements otherwise approval by IETF will be very hard.

regards,
Torsten.


We can easily lock down the bearer token portions and continue working on the spec. The argument that it needs to be published as an RFC for companies to deploy is both irrelevant and untrue. Facebook and Salesforce are two examples.

If your entire argument is that waiting for a signature will delay core, I am happy to promise that if the rest of the specification is done, and signatures are the only thing holding it back from publication, that we can take them out and publish.

My main issue with a separate specification is that is sends a clear (and misguided) message that signatures are some advance and complex thing most developers should ignore. It promoted bearer tokens to be the preferred implementation (in practice, an implied MUST) which will render any signature work pointless (an afterthought MAY). By putting it in the same specification (and I have clearly demonstrated that this can be done in under 4 pages) we give developers a complete picture and let them choose. We also get to call out the shortcomings of using bearer tokens and directly point to one possible alternative.

It is ridiculous how much time those opposed to signatures have wasted by demanding justification, proposing complex replacements, or just intentionally derailed any effort to come up with a simple signature solution.

If we can't quickly agree on a new signature, I am going to take 1.0a and paste it into the specification. That will be sad and pathetic, and will ignore our responsibility to move the web forward, but its light years better than a specification with only bearer tokens.

We have to find a quick way to compromise, or we will find ourselves with plenty more issues to resolve. I know a few people (myself included) who dropped their opposition to bearer tokens (especially without requiring HTTPS) that will be inclined to bring this up again and reopen the topic. It seems those who promote bearer tokens as the core 2.0 protocol got everything they wanted but have not given an inch so far.

EHL


On 9/24/10 4:26 PM, "John Panzer" <jpan...@google.com> wrote:

    -1 on requiring it to be part of core OAuth2.  Reasoning: It won't
    be a MUST or even SHOULD requirement for either client or server,
    so adding it later does not affect interop.  The actual schedule
    to finalize the signature mechanism should not be affected either
    way -- it's fine for a WG to produce 2 or more RFCs if that's the
    right thing to do.  (If there were consensus today on what exactly
    the signing mechanism should be I'd think differently, but I don't
    believe there is.)

    Caveat:  If there were consensus that OAuth 2 should simply adopt
    the OAuth 1.0a signature mechanism today, I'd be okay with that,
    just because there is some proven code out there.

    This is of course a trade-off.  My bias:  I really want us to
    stabilize what has been spec'd so far and move forward with that
    while additional work happens.  There are already multiple
    mutually implementations of "OAuth2" floating around and I'd
    rather resolve that quickly.
    --
    John Panzer / Google
    jpan...@google.com / abstractioneer.org
    <http://www.abstractioneer.org/>  / @jpanzer



    On Thu, Sep 23, 2010 at 6:43 PM, Eran Hammer-Lahav
    <e...@hueniverse.com> wrote:

        Since much of this recent debate was done off list, I'd like
        to ask people
        to simply express their support or objection to including a
        basic signature
        feature in the core spec, in line with the 1.0a signature
        approach.

        This is not a vote, just taking the temperature of the group.

        EHL

        _______________________________________________
        OAuth mailing list
        OAuth@ietf.org
        https://www.ietf.org/mailman/listinfo/oauth




_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to