Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Torsten Lodderstedt
+1 for basic signature support there is a need to protect end-users from token abuse by rogue resource servers (see http://tools.ietf.org/html/draft-ietf-oauth-v2-10#section-5, paragraph 3). Signatures based on a token secret is one way to prevent this kind of attack. Signature mechanisms

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Bastian Hofmann
+1 2010/9/24 Eran Hammer-Lahav : > Since much of this recent debate was done off list, I'd like to ask people > to simply express their support or objection to including a basic signature > feature in the core spec, in line with the 1.0a signature approach. > > This is not a vote, just taking the

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread George Fletcher
+1 I am agnostic as to whether this means we define the signatures within the spec or just reference/profile some other work. The fewer number of signature algorithms we have to implement the better:) George On 9/23/10 9:43 PM, Eran Hammer-Lahav wrote: Since much of this recent debate was

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Justin Richer
I would like to see the signatures stay in a separate spec, but to be worked on and released along side of the core spec. In fact, I think that there's more than one kind of "signature" that can be used with the OAuth token mechanisms. At IIW East, we walked through several use cases that called

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Justin Richer
> If it wasn’t clear, the reason why I am back at fighting for this > after taking a break for a few months, is based on the recent positive > experience from the Twitter migration. To me, it completely voids the > arguments that normalization on the client side is too hard. I wholeheartedly disag

Re: [OAUTH-WG] Simpilfying use of assertions when requesting an access token

2010-09-24 Thread Brian Campbell
Yeah, that is true. One of my reasons for bringing this up was in consideration of proposing a similar simplification around client authentication. But clearly client authn and grants can and will be presented together in the same request. I was aware of the potential for name conflicts but didn

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Richard L. Barnes
I think that any signature method that we end up using needs to rely less on magic and anecdote and more on explicit declaration. This is certainly correct ... I think that Brian Eaton's approach of sending the bare string that was signed, which was also a JSON element that could be parsed

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Justin Richer
> > I think that any signature method that we end up using needs to rely > > less on magic and anecdote and more on explicit declaration. > > This is certainly correct ... > > > > I think > > that Brian Eaton's approach of sending the bare string that was > > signed, > > which was also a JSON

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Richard L. Barnes
Yes, there is certainly a risk if someone just checks the signature and does not verify the content of the message. This is a bad implementation of an authorization system, to be sure, and it's an issue that people need to be aware of. But simply signing metadata doesn't completely solve the p

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Eran Hammer-Lahav
Validating the signed data delivered with the request is as much magic as the current 1.0 approach. Go write the validation rules and see. I'm getting really tired of this argument because it is not grounded in reality. Any attempt to compare the HTTP request to what was signed, whether it is s

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread John Panzer
Richard, I'm a bit confused because the made-up example you give below is, essentially, what Magic Signatures does. The algorithm you present is basically the correct one IMHO. Are you assuming that the recipient is _also_ using the HTTP-level method and URL path for some important security dec

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Richard L. Barnes
Maybe I've misunderstood the Magic Signatures proposal. I thought that the MagicSig blob actually contained the data that was signed, so that step (3) below would be unnecessary. (Note that the object in Step 2 has only field *names*, not *values*.) Including the data is the part of that

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread John Panzer
On Fri, Sep 24, 2010 at 9:06 AM, Eran Hammer-Lahav wrote: > Validating the signed data delivered with the request is as much magic as > the current 1.0 approach. Go write the validation rules and see. > Done that (for the specific case of Salmon). The only trick is to write the code so that if t

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread John Panzer
Ah ok, I misread your field names as field values :). Of course recipients can always choose to ignore the result of verifying signatures (or not verify them at all) no matter what scheme you use. Note that Magic Signatures is unabashedly an envelope, and well written libraries make it hard to sh

Re: [OAUTH-WG] Signatures spec proposal, take 2

2010-09-24 Thread Dirk Balfanz
On Thu, Sep 23, 2010 at 7:59 PM, Richard L. Barnes wrote: > Basically, this argument comes down to which validation pattern you prefer. > > OPTION 1: > 0. Input = object + signature > 1. Verify match between object data and HTTP fields > 2. Verify signature over the object > > OPTION 2: > 0. Inpu

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Igor Faynberg
I hope I am not causing the temperature of the group to rise dangerously by "voting" in support (a.k.a. +1). Igor Eran Hammer-Lahav wrote: Since much of this recent debate was done off list, I'd like to ask people to simply express their support or objection to including a basic signature fea

Re: [OAUTH-WG] Google's view on signatures in the core OAuth2 spec

2010-09-24 Thread Richard L. Barnes
Then there's the question of checking to see if the data in the envelope is consistent with data outside the envelope. A good way to do this is to ignore the data outside the envelope and only use the verified, enveloped data. This is precisely the problem. But think about what "only usin

Re: [OAUTH-WG] Signatures spec proposal, take 2

2010-09-24 Thread Richard L. Barnes
I think it's more robust to verify than to generate. In option 2, you have to "guess" what the signer actually signed. To be fair, you have pretty good signals, like the HTTP request line, the Host: header, etc., but in the end, you don't _know_ that the signer really saw the same thing whe

Re: [OAUTH-WG] Signatures spec proposal, take 2

2010-09-24 Thread Dirk Balfanz
On Fri, Sep 24, 2010 at 10:08 AM, Richard L. Barnes wrote: > I think it's more robust to verify than to generate. In option 2, you have >> to "guess" what the signer actually signed. To be fair, you have pretty good >> signals, like the HTTP request line, the Host: header, etc., but in the end, >

Re: [OAUTH-WG] Signatures spec proposal, take 2

2010-09-24 Thread Eran Hammer-Lahav
Most developers will do one of two things: 1. Completely ignore the HTTP request and just look at the signed data. 2. Come up with some simple rules to normalize both the request URI and signed data and compare them to make sure they are the same. Why is this bad? - This proposal recreates SOAP

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Eve Maler
+1 for signature support in the core spec (which may look like normative pointers out to a separate spec module if it turns out there's wider usage for that module beyond OAuth). Eve On 23 Sep 2010, at 6:43 PM, Eran Hammer-Lahav wrote: > Since much of this recent debate was done off li

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Justin Richer
Perhaps this is picking nits but I want to clarify my opinion: I'm fine if the core spec *mentions* signatures, I just don't want it to *define* them. I'm perfectly happy with a section on "if you want to do signing, here's a way to do signing", but I want that way to be defined and described elsew

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Doreswamy, Rangan
+1 for adding it in to the core spec.. Thanks, RD -Original Message- From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Eve Maler Sent: Friday, September 24, 2010 1:38 PM To: Eran Hammer-Lahav Cc: OAuth WG Subject: Re: [OAUTH-WG] Basic signature support in the core s

[OAUTH-WG] What's the use case for signing OAuth 2.0 requests?

2010-09-24 Thread Yaron Goland
My understanding of Eran's article (http://hueniverse.com/2010/09/oauth-2-0-without-signatures-is-bad-for-the-web/) is that Eran believes that bearer tokens are not good enough as a security mechanism because they allow for replay attacks in discovery style scenarios. He then, if I understood t

Re: [OAUTH-WG] What's the use case for signing OAuth 2.0 requests?

2010-09-24 Thread PRATEEK MISHRA
Yaron, You have referenced the SAML browser SSO protocol (POST profile) in your blog posting, and correctly observed that the same problem would manifest itself there as well. As a counter-measure, the SAML POST profile explicitly requires that the target (destination) URL or similar ident

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread John Panzer
-1 on requiring it to be part of core OAuth2. Reasoning: It won't be a MUST or even SHOULD requirement for either client or server, so adding it later does not affect interop. The actual schedule to finalize the signature mechanism should not be affected either way -- it's fine for a WG to produc

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread David Recordon
+1 on core On Thu, Sep 23, 2010 at 6:43 PM, Eran Hammer-Lahav wrote: > Since much of this recent debate was done off list, I'd like to ask people > to simply express their support or objection to including a basic signature > feature in the core spec, in line with the 1.0a signature approach. > >

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Dick Hardt
That's a confusing answer Eve. Is it in the spec or pointed to from the spec? I think there is consensus that there are enough use cases that signatures need to be spec'ed -- the question is if the signature spec is in core or a separate spec. For people that don't need signatures, having them

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Dick Hardt
-1 in core +1 to being referenced in core and being a separate document On 2010-09-23, at 6:43 PM, Eran Hammer-Lahav wrote: > Since much of this recent debate was done off list, I'd like to ask people > to simply express their support or objection to including a basic signature > feature in the

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Nat
+1 on referencing separate spec from the core. -1 for actually defining the sig inside the core. =nat @ Tokyo via iPhone On 2010/09/24, at 10:43, Eran Hammer-Lahav wrote: > Since much of this recent debate was done off list, I'd like to ask people > to simply express their support or objectio

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Eran Hammer-Lahav
OAuth 2.0 is far from being published as an RFC. I estimate it is at least 6 months away from reaching final IESG approval, if not a year. This is mostly due to a significant effort needed in writing and reviewing the security considerations section which so far has received no attention. We can

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Eran Hammer-Lahav
Most developers don't know if they need signatures! By putting them elsewhere we will be promoting the bearer token approve as the default choice and that's unacceptable to me. It is promoting a specific security compromise (for developer ease) that is far from industry consensus. I can make th

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Eran Hammer-Lahav
I'm happy to do that. But I will be breaking the spec into more than two parts. Basically, I will be creating a version that does not force anyone to read anything they might not care about. Clearly, we shouldn't based editorial decisions on what you want to read :-) EHL On 9/24/10 5:21 PM, "

Re: [OAUTH-WG] What's the use case for signing OAuth 2.0 requests?

2010-09-24 Thread Eran Hammer-Lahav
These are my two: 1. Remove the need to rely solely on HTTPS There are plenty of cases where people can't or don't want to use HTTPS. Clearly, the web is not all HTTPS and OAuth should be useful on the entire web. We are not going to settle the long debate over the cost or speed of using HTTPS

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Dick Hardt
wrt. developers knowing what they need => I think the AS / PR will tell developers if they need to use signatures, or if they need to use HTTPS, or if they need to use assertions. Sorry for including more than one topic in my email :: my main point was that I was confused by what Eve was propo

Re: [OAUTH-WG] Basic signature support in the core specification

2010-09-24 Thread Dick Hardt
I don't follow your logic ... or perhaps I don't see why the spec needs to be written in more than two parts. For example, the current spec does not specify the format of the token -- which keeps it simpler and straight forward. There are separate draft specs for standardizing the token. Simila