Hi Francisco,

PKAuth seems similar to OAuth 2, I think it would help if you used the same
terminology:
- application => client
- social site => authorization server
- client => end user
- reference code => authorization code

The paper claims that users do not know how to interpret domain names, which
is probably true. Is there any evidence that users are doing better with
names as found in SSL certificates?

Discovery is based on link tags in HTML pages, did you consider using
/.well-known/host-meta instead?

At step 1, the difference between official-name and alternative-name can
only be "www.". Why not just follow redirects?

Not sure I understand why the reference code must be generated by the social
site, how would session fixation work if it was generated by the
application?

The social site most likely has a large number of API endpoints, providing
only one pkauth-subsequent-access does not scale. Or maybe I misunderstood
the purpose of pkauth-subsequent-access.

PKAuth would work only for web applications and compared to OAuth 2 it
raises the bar for them: they need an SSL cert and also an API endpoint.
Especially  web app only, is a very strong limitation.

Marius


On Wed, Dec 22, 2010 at 9:57 AM, Francisco Corella <fcore...@pomcor.com>wrote:

> Hi all,
>
> OAuth provides only weak security when used with
> unregistered applications.  OTOH compulsory registration is
> a bad idea: imagine a situation where a social site becomes
> dominant, social login via that site becomes the de facto
> authentication standard on the Web, every application has to
> register with the site, and the site can kill any
> application by revoking its registration.  I've written a
> paper <http://www.pomcor.com/whitepapers/PKAuth.pdf> that proposes a
> solution.  Thanks in advance for any
> comments.
>
> -- Francisco
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to