Re: [OAUTH-WG] Quick survey: fragment vs. query

2010-07-15 Thread Torsten Lodderstedt
why that? If there will be a signature proposal for resource server access, the same (simplified?) model could be applied to the authz server's API. And as I pointed out in my original posting, I see this as a _further_ option not the only one. While it is technically more complicated, it has

Re: [OAUTH-WG] shared symmetric secret

2010-07-15 Thread Evan Gilbert
Password doesn't seem to be the right analogy. You don't (or really shouldn't) store passwords in plain text or in cookies. How about cookies? Most web developers understand that cookies are used as a token that grants access to resources. We've also called these tokensAPI cookies when trying to

Re: [OAUTH-WG] resource server id needed?

2010-07-15 Thread William Mills
I haven't seen the proposed discovery stuff yet, but discovery in the SASL stuff will solve this, and so would discovery advertized from the resource server. -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Torsten Lodderstedt Sent:

Re: [OAUTH-WG] resource server id needed?

2010-07-15 Thread Torsten Lodderstedt
Marius Scurtescu schrieb: On Wed, Jul 14, 2010 at 3:22 PM, Torsten Lodderstedt tors...@lodderstedt.net wrote: I have a question concerning the OAuth philosophy: How many resource servers may be managed by a single OAuth authorization server? (a) A single resource server or (b) several of

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Torsten Lodderstedt
+1 for OAuth2 Brian Eaton schrieb: Draft 10 switched from Token scheme in the authorization header to OAuth. I'd rather we didn't reuse OAuth. 'OAuth2' would be great. Token is ugly as sin, but is better than OAuth. Spec section: http://tools.ietf.org/html/draft-ietf-oauth-v2-10#page-30 The

Re: [OAUTH-WG] Quick survey: fragment vs. query

2010-07-15 Thread Brian Eaton
On Wed, Jul 14, 2010 at 11:02 PM, Torsten Lodderstedt tors...@lodderstedt.net wrote: why that? If there will be a signature proposal for resource server access, the same (simplified?) model could be applied to the authz server's API. Sure. Other folks have used signed URLs in this kind of

Re: [OAUTH-WG] single use authorization codes

2010-07-15 Thread Igor Faynberg
An important point, which I think should be captured in the security consideration section. Igor Torsten Lodderstedt wrote: what about guessing/brute force attacks on the code? Supposed an authorization server issuing tokens for a client w/o secret. Then the number of attempts needed to

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Eran Hammer-Lahav
To elaborate a bit: Since there is no discovery in 1.0, the only place this can create a conflict is on the server side, when servers support both new and old schemes, and need to tell which version the client is using. This is the same issue as using the 'oauth_token' parameter in the query

Re: [OAUTH-WG] resource server id needed?

2010-07-15 Thread Eran Hammer-Lahav
No. It is. Let me ask you this: why can't you use 'photos:server1' and 'photos:server2' as scopes? EHL On 7/14/10 10:49 PM, Torsten Lodderstedt tors...@lodderstedt.net wrote: Did I get you right? Your answer is: Oauth is not suited for deployments with different resource servers which rely

Re: [OAUTH-WG] shared symmetric secret

2010-07-15 Thread Eran Hammer-Lahav
Access tokens should not be stored in plain text either since stealing them is just like stealing a password. As for cookies, client developers do very little to protect cookies today. While the theory might be similar, in practice, telling a client developer this is just like a cookies

Re: [OAUTH-WG] Assertion profile + client_secret and client_id security

2010-07-15 Thread Eran Hammer-Lahav
You need to verify that when you use an authorization code, not when you use an assertion. EHL On 7/15/10 3:54 AM, Elena Lozano elena.loz...@rediris.es wrote: Hi everyone, As we adapt the RedIRIS PHP OAuth2 library[1] to the last version of the draft we have found some issues regarding the

[OAUTH-WG] OAuth2 Spec Feedback for v2-10

2010-07-15 Thread Christian Stübner
Hi @all! Here is my feedback to the current version (-10) of the draft. So far it looks really promising to me. Just a view thoughts/ideas/questions: 1.4: Is it necessary for an authorization server to support all client profiles in order to be standard complaint? 1.4.1. Wording: Profile Web

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Campbell
I agree it's important but it belong in security considerations or perhaps somewhere in the definition of the Authorization Code itself? Either way here's some text that could be used as a starting point. I borrowed heavily from concepts and language in SAML regarding artifacts and IDs which

Re: [OAUTH-WG] I-D: multiple access tokens

2010-07-15 Thread Christian Stübner
Torsten, I came across your I-D when looking for a way to distinguish between different protected resources. Just some remarks and questions: o In 3.1. I suppose your example request is missing the service_id, right? o 3.4. Replace server_id by service_id and you comply with the rest of the

Re: [OAUTH-WG] I-D: multiple access tokens

2010-07-15 Thread Christian Stübner
My post was a reply to http://www.ietf.org/mail-archive/web/oauth/current/msg03639.html. (Something obviously went wrong with the Thread Index.) Regards, Christian Torsten, I came across your I-D when looking for a way to distinguish between different protected resources. Just some

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Justin Richer
+1 on OAuth2 header, and I also want to see oauth2_token in URI and form parameter methods. 1.0 clients will talk to systems that support both oauth2 and oauth1 simultaneously. Most likely on the same PR endpoints as well. Since the protocols are not backwards compatible, they should be able to

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Blaine Cook
On 15 July 2010 15:59, Justin Richer jric...@mitre.org wrote: +1 on OAuth2 header, and I also want to see oauth2_token in URI and form parameter methods. 1.0 clients will talk to systems that support both oauth2 and oauth1 simultaneously. Most likely on the same PR endpoints as well. Since

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread William Mills
Well, no. We're rolling out new Oauth 1.0a stuf even now, because 2.0 isn't ready and Oauth 1.0a is better than many alternatives. OAuth is dead, long live OAuth. Right? I mean, you don't move the White House to another address every time you get a new president... b.

Re: [OAUTH-WG] resource server id needed?

2010-07-15 Thread Torsten Lodderstedt
As I have written in my reply to Marius's posting. I'm fine with including server ids in scopes. But this requires a definition of the scope's syntax and semantics in the spec. Otherwise, scope interpretation (and server identification) will be deployment specific. In your example, ':' is

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Torsten Lodderstedt
sounds really good. +1 for adding this to the authorization code's specification. Am 15.07.2010 16:22, schrieb Brian Campbell: I agree it's important but it belong in security considerations or perhaps somewhere in the definition of the Authorization Code itself? Either way here's some text

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Lukas Rosenstock
+1 for both 2010/7/15 Justin Richer jric...@mitre.org: +1 on OAuth2 header, and I also want to see oauth2_token in URI and form parameter methods. 1.0 clients will talk to systems that support both oauth2 and oauth1 simultaneously. Most likely on the same PR endpoints as well. Since the

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Eaton
On Thu, Jul 15, 2010 at 7:22 AM, Brian Campbell bcampb...@pingidentity.com wrote:    The Authorization Code value MUST be constructed from    a cryptographically strong random or pseudo-random number    sequence [RFC1750] generated by the Authorization Server.    The probability of any two

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Justin Richer
It was discussed before, but I don't remember there being any consensus in the group. What are the practical reasons for not using oauth2 namespacing in the one place we still use namespacing? Most of what I've heard seems to sound like I don't like it to have a 2 on it. I don't want to have to

Re: [OAUTH-WG] resource server id needed?

2010-07-15 Thread Marius Scurtescu
On Thu, Jul 15, 2010 at 10:03 AM, Torsten Lodderstedt tors...@lodderstedt.net wrote: As I have written in my reply to Marius's posting. I'm fine with including server ids in scopes. But this requires a definition of the scope's syntax and semantics in the spec. Otherwise, scope interpretation

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Luke Shepard
On Jul 15, 2010, at 10:51 AM, Justin Richer wrote: It was discussed before, but I don't remember there being any consensus in the group. What are the practical reasons for not using oauth2 namespacing in the one place we still use namespacing? Most of what I've heard seems to sound like I

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread David Recordon
Given that OAuth discovery hasn't been written yet, how would an OAuth 1.0 client know about a 2.0 protected resource in the first place? On Thu, Jul 15, 2010 at 11:33 AM, John Kemp j...@jkemp.net wrote: On Jul 15, 2010, at 9:07 AM, Eran Hammer-Lahav wrote: I would like people to raise

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Eran Hammer-Lahav
Framing the argument against having a 2 in it as bikeshedding is missing the point. My reason against using OAuth2 is that is will undermine all the work put in to build an extensible framework that can evolve without needing a whole new version. By putting a version number, we make it more

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread John Kemp
On Jul 15, 2010, at 2:35 PM, David Recordon wrote: Given that OAuth discovery hasn't been written yet, how would an OAuth 1.0 client know about a 2.0 protected resource in the first place? It wouldn't know anything other than it got back a WWW-Authenticate header when accessing the resource,

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Eran Hammer-Lahav
There is no such thing. Since there is no discovery for 1.0, all calls are hardcoded into the client today. There is no 'trying things out'. EHL On Jul 15, 2010, at 14:33, John Kemp j...@jkemp.net wrote: On Jul 15, 2010, at 9:07 AM, Eran Hammer-Lahav wrote: I would like people to raise

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread William Mills
Lots of things can be done. Checking presence of oauth_signature_method implies that the format is the same in all cases including the auth header right? What you seem to be arguing for right now is parsing the entire line to decide which auth you do. I would *much* prefer a leading tag or

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Marius Scurtescu
On Thu, Jul 15, 2010 at 11:36 AM, Eran Hammer-Lahav e...@hueniverse.com wrote: Framing the argument against having a 2 in it as bikeshedding is missing the point. My reason against using OAuth2 is that is will undermine all the work put in to build an extensible framework that can evolve

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Justin Richer
It was discussed before, but I don't remember there being any consensus in the group. What are the practical reasons for not using oauth2 namespacing in the one place we still use namespacing? Most of what I've heard seems to sound like I don't like it to have a 2 on it. I don't like

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Justin Richer
Framing the argument against having a 2 in it as bikeshedding is missing the point. My reason against using OAuth2 is that is will undermine all the work put in to build an extensible framework that can evolve without needing a whole new version. By putting a version number, we make it more

[OAUTH-WG] Device profile draft

2010-07-15 Thread David Recordon
I've broken the device profile out of draft 06 so that it now lives in a separate document as an extension and have updated it to fit into the draft 10 structure. It defines a new device endpoint for the initial setup request where the client gets the two codes and URL. It then uses the existing

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread George Fletcher
Looks good. Are there any restrictions on the device_code such that it has to be under a certain size? Seems like it would be good to protect against random polling attacks (I presume this is what the Google research refers to). If there are no size restrictions then the device_code could be

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread David Recordon
On Thu, Jul 15, 2010 at 1:05 PM, George Fletcher gffle...@aol.com wrote: Looks good. Are there any restrictions on the device_code such that it has to be under a certain size? Seems like it would be good to protect against random polling attacks (I presume this is what the Google research

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread Zeltsan, Zachary (Zachary)
Section 1.5: The client makes the following request at an arbitrary but reasonable interval which MUST NOT exceed the minimum interval rate provided by the authorization server (if present via the interval parameter). My understanding is that the intervals between the client's subsequent

[OAUTH-WG] SAML 2.0 Bearer Assertion Profile for OAuth 2.0 draft

2010-07-15 Thread Brian Campbell
I'm gong to join the growing list of people attaching a potential I-D to an email due to he cut off time for the I-D submissions. Attached is a draft that aims to tightly define the particular format of a SAML 2.0 bearer assertion in requesting an access token using the assertion grant_type.

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread David Recordon
On Thu, Jul 15, 2010 at 1:36 PM, Zeltsan, Zachary (Zachary) zachary.zelt...@alcatel-lucent.com wrote: Section 1.5: “The client makes the following request at an arbitrary but reasonable interval which MUST NOT exceed the minimum interval rate provided by the authorization server (if

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Campbell
As written it probably does preclude that but I'm sure we could massage it to be more flexible while still keeping the intent that the code isn't something that can be easily guessed or is likely to collide. I must admit to never having considered the authz code as anything but a random string as

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Eaton
On Thu, Jul 15, 2010 at 2:16 PM, Brian Campbell bcampb...@pingidentity.com wrote: I must admit to never having considered the authz code as anything but a random string as a reference that must be resolved.  Can you expand on your thinking a bit, if only to enlighten me? Are you thinking of

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread Michael D Adams
On Thu, Jul 15, 2010 at 2:11 PM, David Recordon record...@gmail.com wrote: On Thu, Jul 15, 2010 at 1:36 PM, Zeltsan, Zachary (Zachary) “The client makes the following request at an arbitrary but reasonable interval which MUST NOT exceed the minimum interval rate provided by   the authorization

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Naitik Shah
I though we'd come to a decision on the versioning too :) IMHO, it's better to push this burden of versioning into the token itself if necessary. I think it's better from a developers perspective to pass an oauth_token, because it's cleaner. Most deployments will already have versioned tokens to

Re: [OAUTH-WG] Device profile draft

2010-07-15 Thread David Recordon
Even better, thanks! On Thu, Jul 15, 2010 at 2:31 PM, Michael D Adams m...@automattic.comwrote: On Thu, Jul 15, 2010 at 2:11 PM, David Recordon record...@gmail.com wrote: On Thu, Jul 15, 2010 at 1:36 PM, Zeltsan, Zachary (Zachary) “The client makes the following request at an arbitrary but

Re: [OAUTH-WG] resource server id needed?

2010-07-15 Thread Torsten Lodderstedt
Am 15.07.2010 20:14, schrieb Marius Scurtescu: On Thu, Jul 15, 2010 at 10:03 AM, Torsten Lodderstedt tors...@lodderstedt.net wrote: As I have written in my reply to Marius's posting. I'm fine with including server ids in scopes. But this requires a definition of the scope's syntax and

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Torsten Lodderstedt
where is the relation between token version and HTTP authentication scheme version? regards, Torsten. Am 15.07.2010 23:34, schrieb Naitik Shah: I though we'd come to a decision on the versioning too :) IMHO, it's better to push this burden of versioning into the token itself if necessary. I

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Campbell
Okay, I'm with you. Some text guiding the more obvious (to me anyway) usage might still be useful. Something like, If Authorization Code value is a reference to state on the server, the value MUST/SHOULD be constructed from a cryptographically strong random or pseudo-random number sequence

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Eran Hammer-Lahav
No normative language needed. Security consideration is the right approach. EHL On Jul 15, 2010, at 19:05, Brian Campbell bcampb...@pingidentity.com wrote: Okay, I'm with you. Some text guiding the more obvious (to me anyway) usage might still be useful. Something like, If

Re: [OAUTH-WG] I-D: multiple access tokens

2010-07-15 Thread Torsten Lodderstedt
Am 15.07.2010 16:27, schrieb Christian Stübner: Torsten, I came across your I-D when looking for a way to distinguish between different protected resources. Just some remarks and questions: o In 3.1. I suppose your example request is missing the service_id, right? Yepp. o 3.4. Replace

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Eaton
On Thu, Jul 15, 2010 at 4:04 PM, Brian Campbell bcampb...@pingidentity.com wrote: I'm guessing you don't want any language restricting the length of the code?  Though there is some practical limit due to the URL length in the 302 (I think it has to be a redirect). There are certain practical

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread Naitik Shah
The formats for 1.0 and 2.0 are sufficiently different that it is possible to unambiguously figure out what version is being used. -Naitik On Thu, Jul 15, 2010 at 3:56 PM, Torsten Lodderstedt tors...@lodderstedt.net wrote: where is the relation between token version and HTTP authentication

Re: [OAUTH-WG] OAuth vs OAuth2 in Authorization header

2010-07-15 Thread William Mills
Sure, but it's not easy to early branch, you have to actually parse the whole header. It's also fragile if extensions are not careful. From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Naitik Shah Sent: Thursday, July 15,

Re: [OAUTH-WG] proposal for signatures

2010-07-15 Thread Dirk Balfanz
Hi Dick, you're right - after actually reading the paper :-), I agree that if you have both sender and receiver in your payload, the order (of encrypting and signing) doesn't seem to matter. I'm still hesitant, though, to optimize for the encryption use case now (even though I do believe it will

Re: [OAUTH-WG] shared symmetric secret

2010-07-15 Thread Evan Gilbert
On Thu, Jul 15, 2010 at 6:35 AM, Eran Hammer-Lahav e...@hueniverse.comwrote: Access tokens should not be stored in plain text either since stealing them is just like stealing a password. Access tokens are designed to be stored in plain text in less secure environments - web browser cookie

Re: [OAUTH-WG] authz code randomness (was: single use authorization codes)

2010-07-15 Thread Brian Campbell
On Thu, Jul 15, 2010 at 5:36 PM, Brian Eaton bea...@google.com wrote: There are certain practical limits, but I think there is still blood on the specification from the last time normative language was discussed. That must have been been before my time - sorry for bringing it up again. We can

Re: [OAUTH-WG] proposal for signatures

2010-07-15 Thread Dick Hardt
On 2010-07-15, at 5:29 PM, Dirk Balfanz wrote: Hi Dick, you're right - after actually reading the paper :-), I agree that if you have both sender and receiver in your payload, the order (of encrypting and signing) doesn't seem to matter. I'm still hesitant, though, to optimize for

Re: [OAUTH-WG] signatures, v2

2010-07-15 Thread Dick Hardt
On 2010-07-15, at 6:45 PM, Naitik Shah wrote: On Thu, Jul 15, 2010 at 5:43 PM, Dirk Balfanz balf...@google.com wrote: One question: What's the deal with having the signature go first? If you can explain to me why that is a good idea, I'm happy to oblige. When we were talking about