+1

How would clients find out? Discovery, docs?

Phil

> On Nov 9, 2013, at 15:11, John Bradley <ve7...@ve7jtb.com> wrote:
> 
> Yes  tcse is a way to use the code flow without per instance registration, 
> and better security than a plain public client.  
> Not every instance needs to needs registered as long as the redirect_uri is 
> constant. 
> 
> There is however a difference in how grants are treated then you have 
> multiple instances with the same client_id.
> If you want all copies of a app that the user has installed across devices to 
> have the same grants then use one client_id and tcse.
> 
> If you want the grants to be separate so that one instance has RW and the 
> other RO scopes for example then you need dynamic client registration or to 
> re-confirm all scopes each time and not prompt only for new scopes for the 
> client.   So there are legitimate reasons for doing both.
> 
> John B.
> 
> 
> 
>> On Nov 9, 2013, at 12:32 PM, Phil Hunt <phil.h...@oracle.com> wrote:
>> 
>> Sounds interesting. 
>> 
>> I wonder about why one might choose a public model with tcse vs stateless 
>> client reg?  
>> 
>> Eg. Tcse might be more important for transient clients. 
>> 
>> Phil
>> 
>>> On Nov 9, 2013, at 12:27, Torsten Lodderstedt <tors...@lodderstedt.net> 
>>> wrote:
>>> 
>>> Hi,
>>> 
>>> thanks for the explanation. Seems there is the simpler option sufficient to 
>>> solve the original problem but it's not secure enough to be a general 
>>> solution. 
>>> 
>>> Regarding implementation: The simpler option requires the developer to 
>>> create a value of reasonable randomness and the second additionally 
>>> requires to calculate the SHA correctly. I'm afraid client developers will 
>>> have trouble implementing it correctly. That's why the idea of OAuth always 
>>> was to push complexity to the server implementation.
>>> 
>>> While thinking about your proposal, I remembered a potential alternative. 
>>> We initially discussed usage of dynamically issued client id/secrets (dyn. 
>>> client registration) in order to mitigate the threat. This has two 
>>> advantages:
>>> - it utilizes general OAuth functionality
>>> - usage of client credentials is easy from a client developers perspective
>>> 
>>> This idea was originally rejected due to the potential implications on 
>>> scalability. The assumption was, potentially billions of client instances 
>>> could not be managed by the AS in a reasonable way. Based on the outcome of 
>>> the latest discussions around dynamic registration, we now know how to 
>>> implement registration in a stateless way using client secrets as 
>>> self-contained tokens. So this should not be a scalability issue any longer.
>>> 
>>> Should we reconsider this alternative?
>>> 
>>> regards,
>>> Torsten.
>>> 
>>>> Am 09.11.2013 um 19:04 schrieb Nat Sakimura <sakim...@gmail.com>:
>>>> 
>>>> And adding to it, it is Google's application team that needs to be 
>>>> persuaded. As usual, persuading application people to use crypto is hard. 
>>>> We have to strike a point that is acceptable to them as well as being 
>>>> somewhat sensible security-wise. Having option to bump up the security is 
>>>> important as a future migration path as well, hence the current design. 
>>>> 
>>>> =nat via iPhone
>>>> 
>>>> Nov 10, 2013 1:42、John Bradley <ve7...@ve7jtb.com> のメッセージ:
>>>> 
>>>>> Simplicity for clients that don't need the extra security.   I happen to 
>>>>> agree with you but it is Google that needs the convincing, as they have 
>>>>> deployed the non crypto version.
>>>>> As with many things getting people to adopt it is the trick.
>>>>> 
>>>>> John B.
>>>>> 
>>>>>> On Nov 9, 2013, at 8:15 AM, Torsten Lodderstedt 
>>>>>> <tors...@lodderstedt.net> wrote:
>>>>>> 
>>>>>> Hi John,
>>>>>> 
>>>>>> why not make the more secure option the only one?
>>>>>> 
>>>>>> regards,
>>>>>> Torsten.
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> John Bradley <ve7...@ve7jtb.com> schrieb:
>>>>>>> 
>>>>>>> With a native app using a captive browser with no malware, only the 
>>>>>>> response is susceptible to interception, making encrypting the request 
>>>>>>> redundant.
>>>>>>> In other environments and with some user groups the request's challenge 
>>>>>>> needs to be protected from interception.  This may be more the case in 
>>>>>>> a desktop environment where there is less control over the browser.
>>>>>>> 
>>>>>>> I expect that we will come to two options one unprotected requests and 
>>>>>>> one for protected requests.
>>>>>>> 
>>>>>>> To Phil's point this is not about identifying the class of software 
>>>>>>> this is about matching a response to an instance of software.   
>>>>>>> A software statement gives you a hint about the class of software but 
>>>>>>> not the instance without per client registration.
>>>>>>> 
>>>>>>> This method gives you the ability to securely return the token to only 
>>>>>>> the instance of the client that requested it without the overhead of 
>>>>>>> per instance dynamic registration.
>>>>>>> 
>>>>>>> This is a practical solution to a real problem people are having today, 
>>>>>>> and versions of this are in production now.   
>>>>>>> 
>>>>>>> Nat and I are trying to document it so that there can be 
>>>>>>> interoperability rather than every AS doing something different.
>>>>>>> 
>>>>>>> John B.
>>>>>>> 
>>>>>>>> On Nov 9, 2013, at 5:23 AM, Torsten Lodderstedt 
>>>>>>>> <tors...@lodderstedt.net> wrote:
>>>>>>>> 
>>>>>>>> Hi Nat,
>>>>>>>> 
>>>>>>>> what's the rationale for having different algorithms to produce a     
>>>>>>>> code challenges? As this may cause interop issues there should be good 
>>>>>>>> reasons to introduce variants.
>>>>>>>> 
>>>>>>>> regards,
>>>>>>>> Torsten.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Am 19.10.2013 12:15, schrieb Nat Sakimura:
>>>>>>>>> Incorporated the discussion at Berlin meeting and after in the ML. 
>>>>>>>>> 
>>>>>>>>> Best, 
>>>>>>>>> 
>>>>>>>>> Nat
>>>>>>>>> 
>>>>>>>>> ---------- Forwarded message ----------
>>>>>>>>> From: <internet-dra...@ietf.org>
>>>>>>>>> Date: 2013/10/19
>>>>>>>>> Subject: New Version Notification for draft-sakimura-oauth-tcse-02.txt
>>>>>>>>> To: Nat Sakimura <sakim...@gmail.com>, John Bradley 
>>>>>>>>> <jbrad...@pingidentity.com>, Naveen Agarwal <n...@google.com>
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> A new version of I-D, draft-sakimura-oauth-tcse-02.txt
>>>>>>>>> has been successfully submitted by Nat Sakimura and posted to the
>>>>>>>>> IETF repository.
>>>>>>>>> 
>>>>>>>>> Filename:        draft-sakimura-oauth-tcse
>>>>>>>>> Revision:        02
>>>>>>>>> Title:           OAuth Symmetric Proof of Posession for Code Extension
>>>>>>>>> Creation date:   2013-10-19
>>>>>>>>> Group:           Individual Submission
>>>>>>>>> Number of pages: 8
>>>>>>>>> URL:             
>>>>>>>>> http://www.ietf.org/internet-drafts/draft-sakimura-oauth-tcse-02.txt
>>>>>>>>> Status:          
>>>>>>>>> http://datatracker.ietf.org/doc/draft-sakimura-oauth-tcse
>>>>>>>>> Htmlized:        
>>>>>>>>> http://tools.ietf.org/html/draft-sakimura-oauth-tcse-02
>>>>>>>>> Diff:            
>>>>>>>>> http://www.ietf.org/rfcdiff?url2=draft-sakimura-oauth-tcse-02
>>>>>>>>> 
>>>>>>>>> Abstract:
>>>>>>>>>    The OAuth 2.0 public client utilizing authorization code grant is
>>>>>>>>>    susceptible to the code interception attack.  This specification
>>>>>>>>>    describe a mechanism that acts as a control against this threat.
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> Please note that it may take a couple of minutes from the time of 
>>>>>>>>> submission
>>>>>>>>> until the htmlized version and diff are available at tools.ietf.org.
>>>>>>>>> 
>>>>>>>>> The IETF Secretariat
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> -- 
>>>>>>>>> Nat Sakimura (=nat)
>>>>>>>>> Chairman, OpenID Foundation
>>>>>>>>> http://nat.sakimura.org/
>>>>>>>>> @_nat_en
>>>>>>>>> 
>>>>>>>>> 
>>>>>>>>> _______________________________________________
>>>>>>>>> OAuth mailing list
>>>>>>>>> OAuth@ietf.org
>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>>> 
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to