I think James makes a good point here.

On Thu, Dec 9, 2010 at 10:45 PM, Manger, James H
<james.h.man...@team.telstra.com> wrote:
> I think these items shouldn't be in the bearer spec at all. They are about 
> "getting a token", not about "using a bearer token" so they should be left to 
> the core spec.
>
> --
> James Manger
>
>
> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of 
> Brian Campbell
> Sent: Thursday, December 09, 2010 1:38 PM
> To: oauth
> Subject: [OAUTH-WG] Couple questions on draft-ietf-oauth-v2-bearer-01 
> security considerations
>
> I know draft-ietf-oauth-v2-bearer-01 has been discussed a fair bit, however, 
> a couple things jumped out at me in areas that hadn't received much attention 
> yet so I wanted to raise the questions on a separate thread.
>
> Near the end of section 3.2. Threat Mitigation, it says:
>
> " Furthermore, the resource server MUST ensure that it only hands out
>   tokens to clients it has authenticated first and authorized.  For
>   this purpose, the client MUST be authenticated and authorized by the
>   resource server. "
>
> Was the intent here to say authorization server rather than resource server? 
> The resource server doesn't hand out tokens. Also, aren't there legitimate 
> cases where the client isn't authenticated (anonymous or other cases where 
> the client can't keep secrets)?
>
> Then it says:
>
> "The authorization server MUST also receive a
>   confirmation (the consent of the resource owner) prior to providing a
>   token to the client."
>
> Does this allow for implicit consent? On my first read of it, I interpret 
> this as potentially being more restrictive than what is in
> draft-ietf-oauth-v2-11
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to