Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-10-01 Thread Eran Hammer-Lahav
Given the overwhelming support for this proposal, I am officially asking the chairs to make a consensus call to break the current document into two parts. This will be done with the understanding that the result will be reviewed by the working group again once the parts are stable to determine i

Re: [OAUTH-WG] Comparing the JSON Token drafts

2010-10-01 Thread Mike Jones
The situation you site is exactly analogous to the situation where sites need to determine what claims they need to exchange in order to be able to work together. There is no provision in the protocol for signaling what claims you understand and require. It's not that this isn't essential or t

Re: [OAUTH-WG] Comparing the JSON Token drafts

2010-10-01 Thread Dirk Balfanz
On Fri, Oct 1, 2010 at 3:41 PM, Yaron Goland wrote: > No matter what algorithm or key size we pick the choice will prove > unsupportable for any number of implementers due to everything from security > issues (no matter what key size we pick, someone will have a real need for > something larger)

Re: [OAUTH-WG] Comparing the JSON Token drafts

2010-10-01 Thread John Panzer
Quick note: On Tue, Sep 28, 2010 at 10:23 AM, Dirk Balfanz wrote: > On Mon, Sep 27, 2010 at 5:46 PM, Mike Jones > wrote: > >> Dirk and I both posted JSON Token drafts on Thursday. They are at >> http://balfanz.github.com/jsontoken-spec/draft-balfanz-jsontoken-00.html(which >> I’ll refer to a

Re: [OAUTH-WG] What's the use case for signing OAuth 2.0 requests?

2010-10-01 Thread Yaron Goland
Relying on HTTPS - I would be interested in use cases where HTTPS isn't available but OAuth 1.0 signatures are a sufficient substitute. Also, HTTPS should be used with an application endpoint if it is dealing with high value content. Bearer tokens and discovery -

Re: [OAUTH-WG] What's the use case for signing OAuth 2.0 requests?

2010-10-01 Thread Yaron Goland
In the core OAuth spec the scenario is a tightly related token and application endpoint. It presumes that they will take the appropriate security mechanisms between them such as signed tokens but doesn't require any particular solution for how to implement such a mechanism. When the issue was e

Re: [OAUTH-WG] Comparing the JSON Token drafts

2010-10-01 Thread Yaron Goland
No matter what algorithm or key size we pick the choice will prove unsupportable for any number of implementers due to everything from security issues (no matter what key size we pick, someone will have a real need for something larger) to legal issues (various countries have their own opinions

Re: [OAUTH-WG] specification of authorization code properties

2010-10-01 Thread Brian Campbell
Yes Torsten, I believe the consensus we ended up out of that last discussion was that the spec and associated security considerations should be written in such a way as to allow for either approach. On Fri, Oct 1, 2010 at 10:55 AM, Torsten Lodderstedt wrote: > Prateek, > > as I remember previous

Re: [OAUTH-WG] specification of authorization code properties

2010-10-01 Thread Torsten Lodderstedt
Prateek, as I remember previous discussions, both design options (self-contained short-living/one-time use tokens as well as random strings) shall be feasible. So your contribution would helpful anyway. regards, Torsten. Am 01.10.2010 18:36, schrieb PRATEEK MISHRA: Torsten, Brain Campbell

Re: [OAUTH-WG] specification of authorization code properties

2010-10-01 Thread PRATEEK MISHRA
Torsten, Brain Campbell points out that previous discussions suggest that the authorization code is meant to be a cryptographically protected one-use token (vs. a random string) but that these key (essential!) details are not available draft 10. http://www.ietf.org/mail-archive/web/oauth/curr

Re: [OAUTH-WG] Looking for a compromise on signatures and other open issues

2010-10-01 Thread Pelle Wessman
+1, I think this sounds like a sensible path forward On Tue, Sep 28, 2010 at 8:25 AM, Eran Hammer-Lahav wrote: > (Please take a break from the other threads and read this with an open > mind. I have tried to make this both informative and balanced.) > > > > --- IETF Process > > > > For those unfa

Re: [OAUTH-WG] Comparing the JSON Token drafts

2010-10-01 Thread Eve Maler
Glad to see this being worked on here. I wanted to add a few requirements (and maybe, just maybe, a bit of a solution) into the mix. As you may recall, in the UMA group we've been working on what we called a "Claims 2.0" spec (all UMA specs -- and some OAuth-related specs too -- are linked off