I don't have much data on how many request/responses an oauth web client does per connection. But if we force a new TLS connection for each access token (which may only be used for 1 or 2 request/responses) we will have a scalability issue. I do agree the approach is relatively simple and workable for native apps since there is less of a client performance issue.
For web app clients, I'd rather keep TLS security a separate issue/layer. For example, a long-lived private key (symmetric or asymmetric) could be issued to the client so that it can establish 2-way TLS connections that can be used for 1000s of requests per connection. Then a separate authorization header HoK access token is used to authenticate each request/response. Speaking of the authorization header, it's not clear in section 3.2 whether in fact an authorization header is sent. The implication seems to be that the resource server must have a way to pull the information from the TLS end-point or get it from the authorization header which 3.2 doesn't speak to. Phil @independentid www.independentid.com phil.h...@oracle.com On 2012-07-10, at 1:26 PM, William Mills wrote: > OK, but why do you need holder-of-key then? I think holder-of-key gets > significantly weird in the symmetric key case. In the PKI case the token > has (public_key, token, signature(public_key, token, serversecret)). How > will the server assert something in the credential that's useful in place of > a plublic key (or certificate)? I think the best case there is that the > server is asserting a client name which the protected resource uses to look > up the symmetric key to use for the signature check, but that could just be > included in token anyway without holder-of-key. > > I really don't see how this works with symmetric keys in any useful way > that's not easier via another method like MAC tokens? > > > From: prateek mishra <prateek.mis...@oracle.com> > To: "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofe...@nsn.com> > Cc: oauth@ietf.org > Sent: Tuesday, July 10, 2012 12:00 PM > Subject: Re: [OAUTH-WG] Holder-of-the-Key for OAuth > > Hannes, > > we have a variety of use-cases wherein a single server ("client") repeatedly > interacts with a resource server for business purposes. These interactions > may be on-behalf-of > a single user or even multiple users. In such a use-case, use of assymetric > signature imposes an unacceptable performance penalty and there is a lot of > interest in being able > to use symmetric signature instead. > > - prateek >> Hi Prateek, >> >> why do you care about the symmetric key case? >> Specifying more variants requires more code and decreases interoperability. >> >> Ciao >> Hannes >> >> >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of >> ext prateek mishra >> Sent: Tuesday, July 10, 2012 8:42 PM >> To: oauth@ietf.org >> Subject: Re: [OAUTH-WG] Holder-of-the-Key for OAuth >> >> As Phil Hunt suggests, there is a need for a discussion of the use-cases >> involved >> >> How to bind the key to the requestor may have several variations, I would >> hope the work would cover a broad range >> >> Given the importance of the symmetric key case, I would also be interested >> in key establishment methods as well >> >> >> >> When I say arguably, I expect you to argue. >> >> John B. >> >> Sent from my iPhone >> >> On 2012-07-10, at 1:01 PM, Anthony Nadalin <tony...@microsoft.com> wrote: >> >> Binding the key to the channel is arguably the most secure >> >> Not really, there are hardware options that give good security properties >> >> -----Original Message----- >> From: John Bradley [mailto:ve7...@ve7jtb.com] >> Sent: Tuesday, July 10, 2012 9:55 AM >> To: Hannes Tschofenig >> Cc: Anthony Nadalin; Hannes Tschofenig; OAuth WG >> Subject: Re: [OAUTH-WG] Holder-of-the-Key for OAuth >> >> Binding the key to the channel is arguably the most secure. >> >> SSL offloading and other factors may prevent that from working in all cases. >> >> I suspect that we will need two OAuth bindings. One for TLS and one for >> signed message. >> >> John B. >> >> Sent from my iPhone >> >> On 2012-07-10, at 12:11 PM, Hannes Tschofenig <hannes.tschofe...@gmx.net> >> wrote: >> >> If we do not bind the key to the channel than we will run into all sorts of >> problems. The current MAC specification illustrates that quite nicely. On >> top of that you can re-use the established security channel for the actual >> data exchange. >> >> On Jul 10, 2012, at 5:29 PM, Anthony Nadalin wrote: >> >> One question is if we want to do a generic proof of possession for JWT that >> is useful outside OAuth, or something OAuth specific. The answer may be >> a combined approach. >> >> Depends if we want OAuth to support the concept of a request/response for a >> proof token and keep the actual binding for a separate specification, in >> most of our cases the keying material is opaque (and just a blob), where we >> care about the key material is in the key agreement (entropy) cases. >> >> -----Original Message----- >> From: John Bradley [mailto:ve7...@ve7jtb.com] >> Sent: Tuesday, July 10, 2012 3:34 AM >> To: Hannes Tschofenig >> Cc: Anthony Nadalin; OAuth WG >> Subject: Re: [OAUTH-WG] Holder-of-the-Key for OAuth >> >> I agree that there are use-cases for all of the proof of possession >> mechanisms. >> >> Presentment methods also need to be considered. >> >> TLS client auth may not always be the best option. Sometimes message >> signing is more appropriate. >> >> One question is if we want to do a generic proof of possession for JWT that >> is useful outside OAuth, or something OAuth specific. The answer may be >> a combined approach. >> >> I think this is a good start to get discussion going. >> >> John B. >> On 2012-07-09, at 3:05 PM, Hannes Tschofenig wrote: >> >> Hi Tony, >> >> I had to start somewhere. I had chosen the asymmetric version since it >> provides good security properties and there is already the BrowserID/OBC >> work that I had in the back of my mind. I am particularly interested to >> illustrate that you can accomplish the same, if not better, characteristics >> than BrowserID by using OAuth instead of starting from scratch. >> >> Regarding the symmetric keys: The asymmetric key can be re-used but with a >> symmetric key holder-of-the-key you would have to request a fresh one every >> time in order to accomplish comparable security benefits. >> >> Ciao >> Hannes >> >> On Jul 9, 2012, at 9:57 PM, Anthony Nadalin wrote: >> >> Hannes, thanks for drafting this, couple of comments: >> >> 1. HOK is one of Proof of Possession methods, should we consider others? >> 2. This seems just to handle asymmetric keys, need to also handle symmetric >> keys >> >> >> -----Original Message----- >> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of >> Hannes Tschofenig >> Sent: Monday, July 09, 2012 11:15 AM >> To: OAuth WG >> Subject: [OAUTH-WG] Holder-of-the-Key for OAuth >> >> Hi guys, >> >> today I submitted a short document that illustrates the concept of >> holder-of-the-key for OAuth. >> Here is the document: >> https://datatracker.ietf.org/doc/draft-tschofenig-oauth-hotk >> >> Your feedback is welcome >> >> Ciao >> Hannes >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth >> >> >> >> >> >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth >> >> >> >> >> >> >> >> >> >> >> >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth >> > > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth