Hannes,

Thanks for your proposal. I'm glad to see work on this starting.

I think use cases may demand more than just channel security. A lot of cases do 
not have end-to-end TLS channels available. So while this could be stated to be 
an improvement it may not achieve the end-to-end authentication of clients 
being looked for.

One aspect of the MAC draft that I did like was that it involved a changing 
authorization value which essentially gave a message centric security model.

Would it be appropriate to start a discussion on the use cases the WG would 
like to address?

Phil

@independentid
www.independentid.com
phil.h...@oracle.com





On 2012-07-10, at 3:33 AM, John Bradley wrote:

> I agree that there are use-cases for all of the proof of possession 
> mechanisms.
> 
> Presentment methods also need to be considered.   
> 
> TLS client auth may not always be the best option.  Sometimes message signing 
> is more appropriate.
> 
> One question is if we want to do a generic proof of possession for JWT that 
> is useful outside OAuth,  or something OAuth specific.    The answer may be a 
> combined approach.
> 
> I think this is a good start to get discussion going.
> 
> John B.
> On 2012-07-09, at 3:05 PM, Hannes Tschofenig wrote:
> 
>> Hi Tony, 
>> 
>> I had to start somewhere. I had chosen the asymmetric version since it 
>> provides good security properties and there is already the BrowserID/OBC 
>> work that I had in the back of my mind. I am particularly interested to 
>> illustrate that you can accomplish the same, if not better, characteristics 
>> than BrowserID by using OAuth instead of starting from scratch. 
>> 
>> Regarding the symmetric keys: The asymmetric key can be re-used but with a 
>> symmetric key holder-of-the-key you would have to request a fresh one every 
>> time in order to accomplish comparable security benefits. 
>> 
>> Ciao
>> Hannes
>> 
>> On Jul 9, 2012, at 9:57 PM, Anthony Nadalin wrote:
>> 
>>> Hannes, thanks for drafting this, couple of comments:
>>> 
>>> 1. HOK is one of Proof of Possession methods, should we consider others?
>>> 2. This seems just to handle asymmetric keys, need to also handle symmetric 
>>> keys
>>> 
>>> 
>>> -----Original Message-----
>>> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of 
>>> Hannes Tschofenig
>>> Sent: Monday, July 09, 2012 11:15 AM
>>> To: OAuth WG
>>> Subject: [OAUTH-WG] Holder-of-the-Key for OAuth
>>> 
>>> Hi guys, 
>>> 
>>> today I submitted a short document that illustrates the concept of 
>>> holder-of-the-key for OAuth. 
>>> Here is the document: 
>>> https://datatracker.ietf.org/doc/draft-tschofenig-oauth-hotk
>>> 
>>> Your feedback is welcome 
>>> 
>>> Ciao
>>> Hannes
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> 
>>> 
>>> 
>>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to