Re: [OAUTH-WG] OAuth Interim Meeting

2011-05-11 Thread Doug Tangren
2 questions? 1. Would there be a conference line one could dial into remotely? (I'm in New York City) 2. Is this open to implementors of the spec in addition to it's authors? (I'm currently implementing draft 15 as developer @ meetup.com) -Doug Tangren http://lessis.me

Re: [OAUTH-WG] OAuth Interim Meeting

2011-05-11 Thread David Recordon
Yes and yes. Just please add (remote) to your name on the wiki page. On Wed, May 11, 2011 at 8:38 AM, Doug Tangren d.tang...@gmail.com wrote: 2 questions? 1. Would there be a conference line one could dial into remotely? (I'm in New York City) 2. Is this open to implementors of the spec in

Re: [OAUTH-WG] OAuth Interim Meeting

2011-05-11 Thread Eran Hammer-Lahav
This is an official interim working group meeting which goes by all the normal IETF rules of such meetings and is open for all. EHL From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Doug Tangren Sent: Tuesday, May 10, 2011 11:38 PM To: Barry Leiba Cc: OAuth WG Subject:

Re: [OAUTH-WG] BCP for returning HTTP Authentication (2617) Error Status (questions from the OAuth WG)

2011-05-11 Thread Julian Reschke
On 09.05.2011 18:49, Eran Hammer-Lahav wrote: ... The OAuth WG is seeking guidance on the following questions: 1. Should the WG define a general purpose method for returning errors with a 401 WWW-Authenticate headers, including a cross-scheme error code registry? ... Not sure. Are there

Re: [OAUTH-WG] OAuth Interim Meeting

2011-05-11 Thread Barry Leiba
Doug says... 2. Is this open to implementors of the spec in addition to it's authors? (I'm currently implementing draft 15 as developer @ meetup.com) Eran says... This is an official interim working group meeting which goes by all the normal IETF rules of such meetings and is open for all.

Re: [OAUTH-WG] OAuth Interim Meeting

2011-05-11 Thread Doug Tangren
Thanks guys. Added my name to the list. -Doug Tangren http://lessis.me ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

[OAUTH-WG] I-D Action:draft-ietf-oauth-v2-http-mac-00.txt

2011-05-11 Thread Internet-Drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Open Authentication Protocol Working Group of the IETF. Title : HTTP Authentication: MAC Access Authentication Author(s) : E. Hammer-Lahav, et al.

Re: [OAUTH-WG] oauth2 implicit flow user experience

2011-05-11 Thread Marius Scurtescu
On Tue, May 10, 2011 at 4:43 PM, Lodderstedt, Torsten t.lodderst...@telekom.de wrote: Hi Marius, wrt auto-approval: how is the authorization server supposed to validated the client's identity in a reliable way? Otherwise another application (using the id of the legitimate client) could

Re: [OAUTH-WG] oauth2 implicit flow user experience

2011-05-11 Thread Breno
On Tue, May 10, 2011 at 4:43 PM, Lodderstedt, Torsten t.lodderst...@telekom.de wrote: Hi Marius, wrt auto-approval: how is the authorization server supposed to validated the client's identity in a reliable way? Otherwise another application (using the id of the legitimate client) could

[OAUTH-WG] Fwd: OAuth Security Consideration Text

2011-05-11 Thread Hannes Tschofenig
Breno did a review of the security draft. Thanks a lot! Begin forwarded message: From: Breno de Medeiros br...@google.com Date: May 7, 2011 4:25:53 AM GMT+03:00 To: Hannes Tschofenig hannes.tschofe...@gmx.net Subject: Re: OAuth Security Consideration Text Hi Hannes, I have gone through

Re: [OAUTH-WG] oauth2 implicit flow user experience

2011-05-11 Thread Lodderstedt, Torsten
How shall the authorization server ensure that the calling client is a user-agent based app (i.e. a native app could impersonate an user-agent based app)? In my opinion, enforcing explicit user consent is the only way to prevent this kind of attack. regards, Torsten. -Ursprüngliche

Re: [OAUTH-WG] oauth2 implicit flow user experience

2011-05-11 Thread Breno
On Wed, May 11, 2011 at 11:44 AM, Lodderstedt, Torsten t.lodderst...@telekom.de wrote: How shall the authorization server ensure that the calling client is a user-agent based app (i.e. a native app could impersonate an user-agent based app)? In my opinion, enforcing explicit user consent is

Re: [OAUTH-WG] oauth2 implicit flow user experience

2011-05-11 Thread Marius Scurtescu
On Wed, May 11, 2011 at 11:44 AM, Lodderstedt, Torsten t.lodderst...@telekom.de wrote: How shall the authorization server ensure that the calling client is a user-agent based app (i.e. a native app could impersonate an user-agent based app)? Through registration and redirect URI validation.

Re: [OAUTH-WG] oauth2 implicit flow user experience

2011-05-11 Thread Breno
On Wed, May 11, 2011 at 3:26 PM, Lodderstedt, Torsten t.lodderst...@telekom.de wrote: Through registration and redirect URI validation. A native app does not have to impersonate, they can just register a user-agent client. Everything boils down to the user trusting the app. As Breno

Re: [OAUTH-WG] BCP for returning HTTP Authentication (2617) Error Status (questions from the OAuth WG)

2011-05-11 Thread Mark Nottingham
My .02 - On 10/05/2011, at 2:49 AM, Eran Hammer-Lahav wrote: The OAuth working group has defined an authorization protocol [1] for delegating access to protected resources. Once access has been authorized, the client is issued a set of token credentials which are uses to make

Re: [OAUTH-WG] Fwd: OAuth Security Consideration Text

2011-05-11 Thread Lodderstedt, Torsten
Hi Breno, thanks for the feedback. Please find my comments inline. Now higher level comments: On Native Apps protection of refresh token: On section Definitions, there is a sentence in the Native Apps It is assumed that such applications can protect dynamically issued secrets,

[OAUTH-WG] consistency of token param name in bearer token type

2011-05-11 Thread Doug Tangren
This may have come up before so I'm sorry if I'm repeating. Why does bearer token spec introduce a new name for oauth2 access tokens [1], bearer_token, and before that [2], oauth_token? I apologize if this may sound shallow but, why introduce a new parameter name verses sticking with what the

Re: [OAUTH-WG] consistency of token param name in bearer token type

2011-05-11 Thread Eran Hammer-Lahav
The name needs to be unique enough not to conflict with likely parameters already used by providers. I don’t have an opinion which name is better, just that it was oauth_token before and when we changed the scheme name to Bearer, changed it too. EHL From: oauth-boun...@ietf.org

Re: [OAUTH-WG] Fwd: OAuth Security Consideration Text

2011-05-11 Thread Breno
On Wed, May 11, 2011 at 7:23 PM, Lodderstedt, Torsten t.lodderst...@telekom.de wrote: Hi Breno, thanks for the feedback. Please find my comments inline. Now higher level comments: On Native Apps protection of refresh token: On section Definitions, there is a sentence in the